{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T23:27:38Z","timestamp":1759879658283},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265285"},{"type":"electronic","value":"9783319265292"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26529-2_8","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T07:23:39Z","timestamp":1449645819000},"page":"127-145","source":"Crossref","is-referenced-by-count":4,"title":["Quadratic Zonotopes"],"prefix":"10.1007","author":[{"given":"Assal\u00e9","family":"Adj\u00e9","sequence":"first","affiliation":[]},{"given":"Pierre-Lo\u00efc","family":"Garoche","sequence":"additional","affiliation":[]},{"given":"Alexis","family":"Werey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Bouissou, O., Mimram, S., Chapoutot, A.: Hyson: set-based simulation of hybrid systems. In: RSP, pp. 79\u201385. IEEE (2012)","DOI":"10.1109\/RSP.2012.6380694"},{"key":"8_CR2","unstructured":"Comba, J.L.D., Stolfi, J.: Affine arithmetic and its applications to computer graphics (1993)"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/BF01397083","volume":"18","author":"TJ Dekker","year":"1971","unstructured":"Dekker, T.J.: A floating-point technique for extending the available precision. Numerische Mathematik 18(3), 224\u2013242 (1971)","journal-title":"Numerische Mathematik"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/978-3-642-02658-4_47","volume-title":"Computer Aided Verification","author":"K Ghorbal","year":"2009","unstructured":"Ghorbal, K., Goubault, E., Putot, S.: The zonotope abstract domain Taylor1+. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 627\u2013633. Springer, Heidelberg (2009)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-14295-6_22","volume-title":"Computer Aided Verification","author":"K Ghorbal","year":"2010","unstructured":"Ghorbal, K., Goubault, E., Putot, S.: A logical product approach to zonotope intersection. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 212\u2013226. Springer, Heidelberg (2010)"},{"key":"8_CR6","first-page":"65","volume":"287","author":"E Goubault","year":"2012","unstructured":"Goubault, E., Le Gall, T., Putot, S.: An accurate join for zonotopes, preserving affine input\/output relations. ENTCS 287, 65\u201376 (2012)","journal-title":"ENTCS"},{"key":"8_CR7","unstructured":"Ghorbal, K.: Static analysis of numerical programs: constrained affine sets abstract domain. Theses, Ecole Polytechnique X (2011)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-31954-2_19","volume-title":"Hybrid Systems: Computation and Control","author":"A Girard","year":"2005","unstructured":"Girard, A.: Reachability of uncertain linear systems using zonotopes. In: Morari, M., Thiele, L. (eds.) HSCC 2005. LNCS, vol. 3414, pp. 291\u2013305. Springer, Heidelberg (2005)"},{"key":"8_CR9","series-title":"Algorithms and Combinatorics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97881-4","volume-title":"Geometric Algorithms and Combinatorial Optimization","author":"M Gr\u00f6tschel","year":"1988","unstructured":"Gr\u00f6tschel, M., Lov\u00e1sz, L., Schrijver, A.: Geometric Algorithms and Combinatorial Optimization. Algorithms and Combinatorics. Springer, Heidelberg (1988)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38856-9_1","volume-title":"Static Analysis","author":"E Goubault","year":"2013","unstructured":"Goubault, E.: Static analysis by abstract interpretation of numerical programs and systems, and FLUCTUAT. In: Logozzo, F., F\u00e4hndrich, M. (eds.) Static Analysis. LNCS, vol. 7935, pp. 1\u20133. Springer, Heidelberg (2013)"},{"key":"8_CR11","unstructured":"Goubault, E., Putot, S.: A zonotopic framework for functional abstractions. In: CoRR, abs\/0910.1763 (2009)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-33125-1_5","volume-title":"Static Analysis","author":"E Goubault","year":"2012","unstructured":"Goubault, E., Putot, S., V\u00e9drine, F.: Modular static analysis with zonotopes. In: Min\u00e9, A., Schmidt, D. (eds.) SAS 2012. LNCS, vol. 7460, pp. 24\u201340. Springer, Heidelberg (2012)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/3-540-07170-9_2","volume-title":"Interval Mathematics","author":"ER Hansen","year":"1975","unstructured":"Hansen, E.R.: A generalized interval arithmetic. In: Nickel, K. (ed.) Interval Mathematics. LNCS, vol. 29, pp. 7\u201318. Springer, Heidelberg (1975)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/978-3-642-02658-4_52","volume-title":"Computer Aided Verification","author":"B Jeannet","year":"2009","unstructured":"Jeannet, B., Min\u00e9, A.: Apron: a library of numerical abstract domains for static analysis. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 661\u2013667. Springer, Heidelberg (2009)"},{"key":"8_CR15","volume-title":"Art of Computer Programming: Seminumerical Algorithms","author":"DE Knuth","year":"1997","unstructured":"Knuth, D.E.: Art of Computer Programming: Seminumerical Algorithms, vol. 2. Addison-Wesley Professional, New York (1997)"},{"key":"8_CR16","unstructured":"Min\u00e9, A.: Weakly relational numerical abstract domains. Ph.D. thesis, \u00c9cole Polytechnique, December 2004"},{"issue":"3","key":"8_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11155-006-7217-4","volume":"12","author":"F Messine","year":"2006","unstructured":"Messine, F., Touhami, A.: A general reliable quadratic form: an extension of affine arithmetic. Reliable Comput. 12(3), 171\u2013192 (2006)","journal-title":"Reliable Comput."},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970791","volume-title":"Interior-Point Polynomial Algorithms in Convex Programming","author":"Y Nesterov","year":"1994","unstructured":"Nesterov, Y., Nemirovskii, A.: Interior-Point Polynomial Algorithms in Convex Programming, vol. 13. SIAM, Philadelphia (1994)"},{"key":"8_CR19","series-title":"Applied Optimization","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-1-4613-3449-1_9","volume-title":"Interior Point Methods of Mathematical Programming","author":"MV Ramana","year":"1996","unstructured":"Ramana, M.V., Pardalos, P.M.: Semidefinite programming. In: Terlaky, T. (ed.) Interior Point Methods of Mathematical Programming. Applied Optimization, vol. 5, pp. 369\u2013398. Springer, Heidelberg (1996)"},{"key":"8_CR20","unstructured":"Stolfi, J., De Figueiredo, L.H.: Self-validated numerical methods and applications. In: Brazilian Mathematics Colloquium monograph, IMPA, Rio de Janeiro, Brazil (1997)"},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0020-0190(90)90100-C","volume":"36","author":"SA Vavasis","year":"1990","unstructured":"Vavasis, S.A.: Quadratic programming is in NP. Inf. Process. Lett. 36(2), 73\u201377 (1990)","journal-title":"Inf. Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26529-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:16:17Z","timestamp":1559322977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26529-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265285","9783319265292"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26529-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}