{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T10:04:35Z","timestamp":1751882675530},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1996,12,1]],"date-time":"1996-12-01T00:00:00Z","timestamp":849398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[1996,12]]},"DOI":"10.1007\/bf02206826","type":"journal-article","created":{"date-parts":[[2005,10,6]],"date-time":"2005-10-06T04:32:15Z","timestamp":1128573135000},"page":"439-463","source":"Crossref","is-referenced-by-count":30,"title":["Computational experience with penalty-barrier methods for nonlinear programming"],"prefix":"10.1007","volume":"62","author":[{"given":"Marc G.","family":"Breitfeld","sequence":"first","affiliation":[]},{"given":"David F.","family":"Shanno","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02206826_CR1","series-title":"Research Report 9\/92","volume-title":"Penalty\/barrier multiplier methods for minimax and constrained smooth convex problems","author":"A. Ben-Tal","year":"1992","unstructured":"A. Ben-Tal, I. Yuzefovich and M. Zibulevsky, Penalty\/barrier multiplier methods for minimax and constrained smooth convex problems, Research Report 9\/92, Optimization Laboratory, Faculty of Industrial Engineering and Management, Technion, Haifa, Israel (1992)."},{"key":"BF02206826_CR2","series-title":"Technical Report 93\/10","volume-title":"CUTE: Constrained and Unconstrained Testing Environment","author":"I. Bongartz","year":"1993","unstructured":"I. Bongartz, A.R. Conn, N.I.M. Gould and P.L. Toint, CUTE: Constrained and Unconstrained Testing Environment, Technical Report 93\/10, Department of Mathematics, Facult\u00e9s Universitaires de Namur, Namur, Belgium (1993)."},{"key":"BF02206826_CR3","doi-asserted-by":"crossref","unstructured":"M.G. Breitfeld and D.F. Shanno, Preliminary computational experience with modified log-barrier functions for large-scale nonlinear programming, in:Large Scale Optimization: State of the Art ed. W.W. Hager, D.W. Hearn and P.M. Pardalos (Kluwer Academic, 1994), pp. 45\u201367.","DOI":"10.1007\/978-1-4613-3632-7_3"},{"key":"BF02206826_CR4","series-title":"Technical Report 92\/07","volume-title":"A globally convergent Lagrangian","author":"A.R. Conn","year":"1992","unstructured":"A.R. Conn, N.I.M. Gould and P.L. Toint, A globally convergent Lagrangian, Technical Report 92\/07, (Department of Mathematics, Facult\u00e9s Universitaires de Namur, Namur, Belgium (1992)."},{"key":"BF02206826_CR5","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/BF01580667","volume":"10","author":"R.S. Dembo","year":"1976","unstructured":"R.S. Dembo, A set of geometric programming test problems and their solutions, Mathematical Programming 10(1976)192\u2013213.","journal-title":"Mathematical Programming"},{"key":"BF02206826_CR6","volume-title":"Nonlinear Programming: Sequential Unconstrained Minimization Techniques","author":"A.V. Fiacco","year":"1968","unstructured":"A.V. Fiacco and G.P. McCormick,Nonlinear Programming: Sequential Unconstrained Minimization Techniques (Wiley, New York, 1968); Reprint: Vol. 4 ofSIAM Classics in Applied Mathematics (SIAM Publ., Philadelphia, PA, 1990)."},{"key":"BF02206826_CR7","volume-title":"Practical Methods of Optimization","author":"R. Fletcher","year":"1987","unstructured":"R. Fletcher,Practical Methods of Optimization, 2nd ed. (Wiley, New York, 1987).","edition":"2nd ed."},{"key":"BF02206826_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-53032-0","volume-title":"A Collection of Test Problems for Constrained Global Optimization Algorithms","author":"C.A. Floudas","year":"1990","unstructured":"C.A. Floudas and P.M. Pardalos,A Collection of Test Problems for Constrained Global Optimization Algorithms Lecture Notes in Computer Science 455 (Springer, Berlin, 1990)."},{"key":"BF02206826_CR9","volume-title":"The logarithmic potential method for convex programming","author":"K.R. Frisch","year":"1955","unstructured":"K.R. Frisch, The logarithmic potential method for convex programming, unpublished manuscript, Institute of Economics, University of Oslo, Oslo, Norway (May 1955)."},{"key":"BF02206826_CR10","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/BF01585529","volume":"7","author":"P.E. Gill","year":"1974","unstructured":"P.E. Gill and W. Murray, Newton-type methods for unconstrained and linearly constrained optimization, Mathematical Programming 7(1974)311\u2013350.","journal-title":"Mathematical Programming"},{"key":"BF02206826_CR11","series-title":"Report NAC","volume-title":"Safeguarded steplength algorithms for optimization using descent methods","author":"P.E. Gill","year":"1974","unstructured":"P.E. Gill and W. Murray, Safeguarded steplength algorithms for optimization using descent methods, Report NAC, 37, National Physical Laboratory, Teddington, England (1974)."},{"key":"BF02206826_CR12","series-title":"Lecture Notes in Economics and Mathematical Systems","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-48320-2","volume-title":"Test Examples for Nonlinear Programming Codes","author":"W. Hock","year":"1981","unstructured":"W. Hock and K. Schittkowski,Test Examples for Nonlinear Programming Codes, Lecture Notes in Economics and Mathematical Systems 187 (Springer, Berlin, 1981)."},{"key":"BF02206826_CR13","unstructured":"J.J. Mor\u00e9 and D.C. Sorensen, Newton's method, in:Studies in Numerical Analysis, ed. G.A. Golub (Mathematical Association of America, 1984) pp. 29\u201382."},{"key":"BF02206826_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/BF00932477","volume":"7","author":"W. Murray","year":"1971","unstructured":"W. Murray, Analytical expressions for eigenvalues and eigenvectors of the Hessian matrices of barrier and penalty functions, Journal of Optimization Theory and Applications 7(1971)181\u2013196.","journal-title":"Journal of Optimization Theory and Applications"},{"key":"BF02206826_CR15","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1137\/0804013","volume":"4","author":"W. Murray","year":"1994","unstructured":"W. Murray and M.H. Wright, Line search procedures for the logarithmic barrier function, SIAM Journal on Optimization 4(1994)229\u2013246.","journal-title":"SIAM Journal on Optimization"},{"key":"BF02206826_CR16","doi-asserted-by":"crossref","unstructured":"S.G. Nash, R. Polyak and A. Sofer, A numerical comparison of barrier and modified-barrier methods for large-scale bound-constrained optimization, in:Large Scale Optimization: State of the Art, ed. W.W. Hager, D.W. Hearn and P.M. Pardalos (Kluwer Academic, 1994) pp. 319\u2013338.","DOI":"10.1007\/978-1-4613-3632-7_16"},{"key":"BF02206826_CR17","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF01586050","volume":"54","author":"R. Polyak","year":"1992","unstructured":"R. Polyak, Modified barrier functions (theory and methods), Mathematical Programming 54(1992)177\u2013222.","journal-title":"Mathematical Programming"},{"key":"BF02206826_CR18","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/62038.62040","volume":"15","author":"D.F. Shanno","year":"1989","unstructured":"D.F. Shanno and K.H. Phua, Numerical experience with sequential quadratci programming algorithms for equality constrained nonlinear programming, Transactions on Mathematical Software 15(1989)49\u201363.","journal-title":"Transactions on Mathematical Software"},{"key":"BF02206826_CR19","series-title":"Texts in Applied Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2272-7","volume-title":"Introduction to Numerical Analysis","author":"J. Stoer","year":"1993","unstructured":"J. Stoer and R. Bulirsch,Introduction to Numerical Analysis, 2nd ed., Texts in Applied Mathematics 12 (Springer, New York, 1993).","edition":"2nd ed."}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02206826.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02206826\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02206826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T18:35:27Z","timestamp":1557858927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02206826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,12]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1996,12]]}},"alternative-id":["BF02206826"],"URL":"https:\/\/doi.org\/10.1007\/bf02206826","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,12]]}}}