{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:28:38Z","timestamp":1758274118999},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[1992,2,1]],"date-time":"1992-02-01T00:00:00Z","timestamp":696902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mathematical Programming"],"published-print":{"date-parts":[[1992,2]]},"DOI":"10.1007\/bf01586052","type":"journal-article","created":{"date-parts":[[2005,4,28]],"date-time":"2005-04-28T04:35:49Z","timestamp":1114662949000},"page":"233-249","source":"Crossref","is-referenced-by-count":9,"title":["On the best case performance of hit and run methods for detecting necessary constraints"],"prefix":"10.1007","volume":"54","author":[{"given":"R. J.","family":"Caron","sequence":"first","affiliation":[]},{"given":"M.","family":"Hlynka","sequence":"additional","affiliation":[]},{"given":"J. F.","family":"McDonald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","volume-title":"Handbook of Mathematical Functions","year":"1964","unstructured":"M. Abramowitz and I.A. Stegun, eds.,Handbook of Mathematical Functions (National Bureau of Standards, Washington, DC, 1964)."},{"key":"CR2","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/BF02591694","volume":"37","author":"H.C.P. Berbee","year":"1987","unstructured":"H.C.P. Berbee, C.G.E. Boender, A.H.G. Rinnooy Kan, C.L. Scheffer, R.L. Smith and J. Telgen, \u201cHit-and-run algorithms for the identification of nonredundant linear equalities,\u201dMathematical Programming 37 (1987) 184\u2013207.","journal-title":"Mathematical Programming"},{"key":"CR3","doi-asserted-by":"crossref","unstructured":"C.G.E. Boender, R.J. Caron, J.F. McDonald, A.H.G. Rinnooy Kan, H.E. Romeijn, R.J. Smith, J. Telgen and A.C.F. Vorst, \u201cShake-and-bake algorithms for generating uniform points on the boundary of bounded polyhedra,\u201dOperations Research 39 (1991).","DOI":"10.1287\/opre.39.6.945"},{"key":"CR4","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-642-45535-3_10","volume-title":"Redundancy in Mathematical Programming","author":"A. Boneh","year":"1983","unstructured":"A. Boneh, \u201cPREDUCE \u2014 A probabilistic algorithm for identifying redundancy by a random feasible point generator,\u201d in: Karwan et al., eds.,Redundancy in Mathematical Programming (Springer, Berlin, 1983) pp. 108\u2013134."},{"key":"CR5","series-title":"contributed paper","volume-title":"Constraints redundancy and feasible region boundedness by a random feasible point generator (RFPG)","author":"A. Boneh","year":"1979","unstructured":"A. Boneh and A. Golan, \u201cConstraints redundancy and feasible region boundedness by a random feasible point generator (RFPG),\u201d contributed paper, EURO III, Amsterdam, April 1979."},{"key":"CR6","volume-title":"\u201cThe coupon collector's problem revisited,\u201d Technical Report","author":"A Boneh","year":"1989","unstructured":"A Boneh and H. Hofri, \u201cThe coupon collector's problem revisited,\u201d Technical Report, The Technion (Haifa, Israel, 1989)."},{"key":"CR7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/BF01582281","volume":"43","author":"R.J. Caron","year":"1989","unstructured":"R.J. Caron and J.F. McDonald, \u201cA new approach to the analysis of random methods for detecting necessary linear inequality constraints\u201d,Mathematical Programming 43 (1989) 97\u2013102.","journal-title":"Mathematical Programming"},{"key":"CR8","volume-title":"\u201cOn the best case performance of probabilistic methods for detecting necessary constraints,\u201d Windsor Mathematics Report WMR 88-02","author":"R.J. Caron","year":"1988","unstructured":"R.J. Caron, M. Hlynka and J.F. McDonald, \u201cOn the best case performance of probabilistic methods for detecting necessary constraints,\u201d Windsor Mathematics Report WMR 88-02, Department of Mathematics and Statistics, University of Windsor (Windsor, Ont., Canada, 1988)."},{"key":"CR9","volume-title":"\u201cRandom methods for detecting necessary linear inequality constraints: Stopping rules,\u201d Windsor Mathematics Report WMR 86-03","author":"R.J. Caron","year":"1986","unstructured":"R.J. Caron, J.F. McDonald, R.L. Smith and J. Telgen, \u201cRandom methods for detecting necessary linear inequality constraints: Stopping rules,\u201d Windsor Mathematics Report WMR 86-03, Department of Mathematics and Statistics, University of Windsor (Windsor, Ont., 1986)."},{"key":"CR10","volume-title":"An Introduction to Probability Theory and its Applications, Vol. 1","author":"W. Feller","year":"1968","unstructured":"W. Feller,An Introduction to Probability Theory and its Applications, Vol. 1 (Wiley, New York, 1968)."},{"key":"CR11","volume-title":"Redundancy in Mathematical Programming","year":"1983","unstructured":"M.H. Karwan, V. Lotfi, J. Telgen and S. Zionts, eds.,Redundancy in Mathematical Programming (Springer, Berlin, 1983)."},{"key":"CR12","volume-title":"\u201cRandom methods for identifying nonredundant constraints,\u201d Technical Report 81-4","author":"R.L. Smith","year":"1981","unstructured":"R.L. Smith and J. Telgen, \u201cRandom methods for identifying nonredundant constraints,\u201d Technical Report 81-4, Department of Industrial and Operations Engineering, The University of Michigan (Ann Arbor, MI, 1981)."},{"key":"CR13","volume-title":"\u201cMultinomial problems in geometric probability with Dirichlet analysis,\u201d Technical Report No. 239","author":"M. Sobel","year":"1987","unstructured":"M. Sobel, \u201cMultinomial problems in geometric probability with Dirichlet analysis,\u201d Technical Report No. 239, Department of Statistics, Stanford University (Stanford, CA, 1987)."},{"key":"CR14","unstructured":"J. Telgen, private communication with A. Boneh (January 1980)."}],"container-title":["Mathematical Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01586052.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01586052\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01586052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T11:32:35Z","timestamp":1556883155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01586052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,2]]},"references-count":14,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1992,2]]}},"alternative-id":["BF01586052"],"URL":"https:\/\/doi.org\/10.1007\/bf01586052","relation":{},"ISSN":["0025-5610","1436-4646"],"issn-type":[{"value":"0025-5610","type":"print"},{"value":"1436-4646","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,2]]}}}