Skip to main content
Log in

Generating well-behaved utility functions for compromise programming

  • Contributed Papers
  • Published:
Journal of Optimization Theory and Applications Aims and scope Submit manuscript

Abstract

The purpose of this paper is to seek utility functions satisfying a weak condition which guarantees that the utility optimum always belongs to the compromise set. This set is a special subset of the attainable or feasible set, which is generated through the application of the well-known operational research approach called compromise programming. It is shown that there are large families of utility functions satisfying this condition, thus reinforcing the value of compromise programming as a good surrogate of the traditional utility optimum.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Yu, P. L.,A Class of Solutions for Group Decision Problems, Management Science, Vol. 19, pp. 936–946, 1973.

    Google Scholar 

  2. Zeleny, M.,Compromise Programming, Multiple Criteria Decision Making, Edited by J. L. Cochrane and M. Zeleny, University of South Carolina Press, Columbia, South Carolina, pp. 262–301, 1973.

    Google Scholar 

  3. Zeleny, M.,A Concept of Compromise Solutions and the Method of the Displaced Ideal, Computers and Operations Research, Vol. 1, pp. 479–496, 1974.

    Article  Google Scholar 

  4. Yu, P. L.,Multiple-Criteria Decision Making: Concepts, Techniques, and Extensions, Plenum Press, New York, New York, 1985.

    Google Scholar 

  5. Freimer, M., andYu, P. L.,Some Results on Compromise Solutions for Group Decision Problems, Management Science, Vol. 22, pp. 688–693, 1976.

    Google Scholar 

  6. Ballestero, E., andRomero, C.,A Theorem Connecting Utility Functions Optimization and Compromise Programming, Operations Research Letters, Vol. 10, pp. 421–427, 1991.

    Article  Google Scholar 

  7. Ballestero, E., andRomero, C.,Utility Optimization When the Utility Function is Virtually Unknown, Theory and Decision, Vol. 37, pp. 233–243, 1994.

    Article  Google Scholar 

  8. John, F.,Partial Differential Equations, Springer Verlag, New York, New York, 1980.

    Google Scholar 

  9. Hirsch, M. W.,Differential Topology, Springer Verlag, New York, New York, 1976.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by P. L. Yu

Thanks are due to the reviewers for their helpful suggestions. The English editing by Ms. Christine Méndez is appreciated. The authors have been supported by the Comisión Interministerial de Ciencia y Tecnología (CICYT), Madrid, Spain.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Morón, M.A., Romero, C. & del Portal, F.R.R. Generating well-behaved utility functions for compromise programming. J Optim Theory Appl 91, 643–649 (1996). https://doi.org/10.1007/BF02190125

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02190125

Key Words

Navigation