On Sequential Online Archiving of Objective Vectors

نویسندگان

  • Manuel López-Ibáñez
  • Joshua D. Knowles
  • Marco Laumanns
چکیده

In this paper, we examine the problem of maintaining an approximation of the set of nondominated points visited during a multiobjective optimization, a problem commonly known as archiving. Most of the currently available archiving algorithms are reviewed, and what is known about their convergence and approximation properties is summarized. The main scenario considered is the restricted case where the archive must be updated online as points are generated one by one, and at most a fixed number of points are to be stored in the archive at any one time. In this scenario, the C-monotonicity of an archiving algorithm is proposed as a weaker, but more practical, property than negative efficiency preservation. This paper shows that hypervolume-based archivers and a recently proposed multi-level grid archiver have this property. On the other hand, the archiving methods used by SPEA2 and NSGA-II do not, and they may C-deteriorate with time. The C-monotonicity property has meaning on any input sequence of points. We also classify archivers according to limit properties, i.e. convergence and approximation properties of the archiver in the limit of infinite (input) samples from a finite space with strictly positive generation probabilities for all points. This paper establishes a number of research questions, and provides the initial framework and analysis for answering them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Sequential Optimality Conditions without Constraint Qualifications for Nonlinear Programming with Nonsmooth Convex Objective Functions

Sequential optimality conditions provide adequate theoretical tools to justify stopping criteria for nonlinear programming solvers. Here, nonsmooth approximate gradient projection and complementary approximate Karush-Kuhn-Tucker conditions are presented. These sequential optimality conditions are satisfied by local minimizers of optimization problems independently of the fulfillment of constrai...

متن کامل

بررسی الگوی خود-آرشیوی نویسندگان ایرانی: مقایسه حوزه های علوم و علوم اجتماعی

Purpose: This research is devoted to find out the level of self-archival pattern among Iranian researchers with high rate of publications, based upon the ISI citation indices in the scopes of science and social sciences. Methodology: This research is a descriptive survey based on observation. The necessary data was obtained through observing the websites of the 80 Iranian researchers with high...

متن کامل

Study of the Attitude of Users towards Picture Archiving and Communication System Based on the Technology Acceptance Model in Teaching Hospitals of Qom, Iran

Background and Objectives: Many healthcare providers use health information technology to improve their performance. Picture Archiving and Communication System is a subsystem of the health information system that aims to facilitate the storing, archiving, and managing of digital images as well as their transmission. In this regard, measuring the level of acceptance of technology can be very hel...

متن کامل

Effective Triggers and Barriers of Self-archiving Behavior Displayed by Knowledge and Information Sciences’ faculty members in Iran

Background and Aim: The present investigation was carried out in order to study the self-archiving behavior displayed by Knowledge and Information Sciences (KIS) faculty members in Iran. It intended to discover the incentives and barriers impacting on this behavior as well as arriving at a baseline for predicting the extent of self-archiving. Method: A descriptive survey method was deployed. Th...

متن کامل

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011