{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:47:05Z","timestamp":1772740025422,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[1992,9,1]],"date-time":"1992-09-01T00:00:00Z","timestamp":715305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[1992,9]]},"DOI":"10.1007\/bf02238640","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T04:35:49Z","timestamp":1132029349000},"page":"303-317","source":"Crossref","is-referenced-by-count":23,"title":["Nonmonotone trust region methods with curvilinear path in unconstrained optimization","Ein nichtmonotones Konfidenzbereichs-Verfahren mit krummlinigem Pfad zur unrestringierten Optimierung"],"prefix":"10.1007","volume":"48","author":[{"given":"Y.","family":"Xiao","sequence":"first","affiliation":[]},{"given":"F.","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02238640_CR1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/BFb0121156","volume":"30","author":"J. P. Bulteau","year":"1987","unstructured":"Bulteau, J. P., Vial, J. P.: Curvilinear path and trust region in unconstrained optimization: a convergence analysis. Math. Programming Study30, 82\u2013101 (1987).","journal-title":"Math. Programming Study"},{"key":"BF02238640_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0121085","volume":"26","author":"R. M. Chamberlain","year":"1986","unstructured":"Chamberlain, R. M., Powell, M. J. D., Lemarechal, C., Pedersen, H. C.: The watchdog technique for forcing convergence in algorithms for constrained optimization. Math. Programming Study26, 1\u201317 (1986).","journal-title":"Math. Programming Study"},{"key":"BF02238640_CR3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/BF00932218","volume":"28","author":"J. E. Dennis Jr.","year":"1979","unstructured":"Dennis, J. E., Jr., Mei, H. H. W.: Two new unconstrained optimization algorithms which use function and gradient values. JOTA28, 453\u2013482 (1979).","journal-title":"JOTA"},{"key":"BF02238640_CR4","volume-title":"Numerical methods for unconstrained optimization and nonlinear equations","author":"J. E. Dennis Jr.","year":"1983","unstructured":"Dennis, J. E., Jr., Schnabel, R. B.: Numerical methods for unconstrained optimization and nonlinear equations. Englewood Cliffs, New York: Prentice-Hall 1983."},{"issue":"6","key":"BF02238640_CR5","first-page":"20","volume":"31","author":"Z. Gan","year":"1991","unstructured":"Gan, Z., Zhou, F., Xiao, Y.: Study on the algorithm for multidimensional scaling. J. of Tsinghua Univ.31, 6, 20\u201327 (1991).","journal-title":"J. of Tsinghua Univ."},{"key":"BF02238640_CR6","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1137\/0723046","volume":"23","author":"L. Grippo","year":"1986","unstructured":"Grippo, L., Lampariello, F., Lucidi, S.: A nonmonotone line search technique for Newton's methods. SIAM J. Numer. Anal.23, 707\u2013716 (1986).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02238640_CR7","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/BF00940345","volume":"60","author":"L. Grippo","year":"1989","unstructured":"Grippo, L., Lampariello, F., Lucidi, S.: A truncated Newton method with nonmonotone line search for unconstrained optimization. JOTA60, 401\u2013419 (1989).","journal-title":"JOTA"},{"key":"BF02238640_CR8","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/BF00939421","volume":"64","author":"L. Grippo","year":"1990","unstructured":"Grippo, L., Lampariello, F., Lucidi, S.: A quasi-discrete Newton algorithm with a nonmonotone stabilization technique. JOTA64, 495\u2013510 (1990).","journal-title":"JOTA"},{"key":"BF02238640_CR9","unstructured":"Grippo, L., Lampariello, F., Lucidi S.: A class of nonmonotone stabilization methods in unconstrained optimization, IASI-CNR, Report No. 290, 1990."},{"key":"BF02238640_CR10","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-642-68874-4_11","volume-title":"Mathematical Programming: the state of the art","author":"J. J. Mor\u00e9","year":"1983","unstructured":"Mor\u00e9, J. J.: Recent development in algorithms and software for trust region methods, pp. 258\u2013287 In: Bachem, A., Grotschel, M., Kortz, B. (eds.) Mathematical Programming: the state of the art. Berlin, Heidelberg, New York, Tokyo: Springer 1983."},{"key":"BF02238640_CR11","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1137\/0904038","volume":"4","author":"J. J. Mor\u00e9","year":"1983","unstructured":"Mor\u00e9, J. J., Sorensen, D. C.: Computing a trust region step. SIAM J. Sci. Statist. Comput.4, 553\u2013572 (1983).","journal-title":"SIAM J. Sci. Statist. Comput."},{"key":"BF02238640_CR12","unstructured":"Panier, E. R., Tits, A. L.: Avoiding the Maratos effect by means of a nonmonotone linear search: I. General constrained problems System Research Center, University of Maryland, Technical Report SRC-TR-89-41, 1989."},{"key":"BF02238640_CR13","first-page":"87","volume-title":"Numerical methods for nonlinear algebraic equations","author":"M. J. D. Powell","year":"1970","unstructured":"Powell, M. J. D.: A hybrid method for nonlinear equations, pp. 87\u2013114. Babinowitz, P., (ed.) Numerical methods for nonlinear algebraic equations. London: Gordon and Breach Press 1970."},{"key":"BF02238640_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/B978-0-12-468650-2.50005-5","volume-title":"Nonlinear programming 2","author":"M. J. D. Powell","year":"1975","unstructured":"Powell, M. J. D.: Convergence properties of a class of minimization algorithms, pp. 1\u201329. In: Mangasarian, O. L., Meyer, R. R., Robinson, S. M. (eds) Nonlinear programming 2. New York: Academic Press 1975."},{"key":"BF02238640_CR15","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1137\/0722003","volume":"22","author":"G. A. Shultz","year":"1985","unstructured":"Shultz, G. A., Schnabel, R. B., Byrd, R. H.: A family of trust-region-based algorithms for unconstrained minimization with strong global convergence properties. SIAM J. Numer. Anal.22, 47\u201367 (1985).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02238640_CR16","first-page":"29","volume-title":"Nonlinear optimization 1981","author":"D. C. Sorensen","year":"1982","unstructured":"Sorensen, D. C.: Trust region methods for unconstrained minimization, pp. 29\u201338. In: Powell, M. J. D. (ed.) Nonlinear optimization 1981. London: Academic Press 1982."},{"key":"BF02238640_CR17","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1137\/0719026","volume":"19","author":"D. C. Sorensen","year":"1982","unstructured":"Sorensen, D. C.: Newton's method with a model trust region modification. SIAM J. Numer. Anal.19, 409\u2013426 (1982).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02238640_CR18","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1137\/0720042","volume":"20","author":"T. Steihaug","year":"1983","unstructured":"Steihaug, T.: The conjugate gradient method and trust regions in large scale optimization. SIAM J. Numer. Anal.20, 626\u2013637 (1983).","journal-title":"SIAM J. Numer. Anal."}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02238640.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02238640\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02238640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T17:12:58Z","timestamp":1557940378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02238640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,9]]},"references-count":18,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[1992,9]]}},"alternative-id":["BF02238640"],"URL":"https:\/\/doi.org\/10.1007\/bf02238640","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,9]]}}}