{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:38:28Z","timestamp":1772296708634,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1990,6,1]],"date-time":"1990-06-01T00:00:00Z","timestamp":644198400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[1990,6]]},"DOI":"10.1007\/bf02241862","type":"journal-article","created":{"date-parts":[[2005,11,14]],"date-time":"2005-11-14T19:33:31Z","timestamp":1131996811000},"page":"91-132","source":"Crossref","is-referenced-by-count":6,"title":["A programmed algorithm for existence proofs for two-point boundary value problems","Ein programmierter Algorithmus zum Existenzbeweis f\u00fcr Zweipunkt-Randwertaufgaben"],"prefix":"10.1007","volume":"44","author":[{"given":"M.","family":"G\u00f6hlen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Plum","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Schr\u00f6der","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"BF02241862_CR1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/BF02310100","volume":"39","author":"J. H. Bleher","year":"1987","unstructured":"Bleher, J. H., Rump, S. M., Kulisch, U., Ullrich, Ch., Walter, W.: FORTRAN-SC, A Study of a FORTRAN Extension for Engineering\/Scientific Computation with Access to ACRITH. Computing39, 93\u2013110 (1987).","journal-title":"Computing"},{"key":"BF02241862_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-6333-3","volume-title":"A Practical Guide to Splines","author":"C. Boor de","year":"1978","unstructured":"de Boor, C.: A Practical Guide to Splines. Berlin-Heidelberg-New York: Springer 1978."},{"key":"BF02241862_CR3","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/BF01899376","volume":"3","author":"L. Collatz","year":"1952","unstructured":"Collatz, L.: Aufgaben monotoner Art. Arch. Math.3, 366\u2013376 (1952).","journal-title":"Arch. Math."},{"key":"BF02241862_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05500-7","volume-title":"The Numerical Treatment of Differential Equations","author":"L. Collatz","year":"1960","unstructured":"Collatz, L.: The Numerical Treatment of Differential Equations. Berlin-G\u00f6ttingen-Heidelberg: Springer 1960."},{"key":"BF02241862_CR5","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1137\/0715009","volume":"15","author":"D. M. Cruickshank","year":"1978","unstructured":"Cruickshank, D. M., Wright, K.: Computable Error Bounds for Polynomial Collocation Methods. SIAM J. Numer. Anal. 15, 134\u2013151 (1978).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02241862_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/BF01111276","volume":"86","author":"H. Ehlich","year":"1964","unstructured":"Ehlich, H., Zeller, K.: Schwankung von Polynomen zwischen Gitterpunkten. Math. Z.86, 41\u201344 (1964).","journal-title":"Math. Z."},{"key":"BF02241862_CR7","unstructured":"G\u00e4rtel, U.: Fehlerabsch\u00e4tzungen f\u00fcr vektorwertige Randwertaufgaben zweiter Ordnung, insbesondere f\u00fcr Probleme aus der chemischen Reaktions-Diffusions-Theorie. Dissertation K\u00f6ln 1987."},{"key":"BF02241862_CR8","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/BF01389432","volume":"49","author":"Ch. Gro\u00dfmann","year":"1986","unstructured":"Gro\u00dfmann, Ch., Kr\u00e4tzchmar, M., Roos, H.-G.: Gleichm\u00e4\u00dfig einschlie\u00dfende Diskretisierungsverfahren f\u00fcr schwach nichtlineare Randwertaufgaben. Numer. Math.49, 95\u2013110 (1986).","journal-title":"Numer. Math."},{"key":"BF02241862_CR9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/BF02238729","volume":"41","author":"Ch. Gro\u00dfmann","year":"1989","unstructured":"Gro\u00dfmann, Ch., Al-Zanaidi, M.: Monotone Iteration Discretization Algorithm for BVP's. Computing41, 59\u201374 (1989).","journal-title":"Computing"},{"key":"BF02241862_CR10","unstructured":"IBM High-Accuracy Arithmetic Subroutine Library (ACRITH). Program Description and User's Guide, SC 33-6164-02, 3rd Edition (1986)."},{"key":"BF02241862_CR11","volume-title":"Self-Validating Numerics for Function Space Problems","author":"E. W. Kaucher","year":"1984","unstructured":"Kaucher, E. W., Miranker, W. L.: Self-Validating Numerics for Function Space Problems. Academic Press, New York 1984."},{"key":"BF02241862_CR12","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1137\/0718028","volume":"18","author":"G. Kedem","year":"1981","unstructured":"Kedem, G.: A Posteriori Error Bounds for Two-Point Boundary Value Problems. SIAM J. Numer. Anal.18, 431\u2013448 (1981).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02241862_CR13","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/BF01462273","volume":"25","author":"T. K\u00fcpper","year":"1976","unstructured":"K\u00fcpper, T.: Einschlie\u00dfungsaussagen f\u00fcr gew\u00f6hnliche Differentialoperatoren. Numer. Math.25, 201\u2013214 (1976).","journal-title":"Numer. Math."},{"key":"BF02241862_CR14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/BF01403909","volume":"30","author":"T. K\u00fcpper","year":"1978","unstructured":"K\u00fcpper, T.: Einschlie\u00dfungsaussagen bei Differentialoperatoren zweiter Ordnung durch punktweise Ungleichungen. Numer. Math.30, 93\u2013101 (1978).","journal-title":"Numer. Math."},{"key":"BF02241862_CR15","unstructured":"Kulisch, U.: FORTRAN-SC, Language Reference and User's Guide. University of Karlsruhe and IBM Development Laboratory B\u00f6blingen 1987."},{"key":"BF02241862_CR16","volume-title":"Computer Arithmetic in Theory and Practice","author":"U. Kulisch","year":"1981","unstructured":"Kulisch, U., Miranker, W. L. Computer Arithmetic in Theory and Practice. Academic Press, New York 1981."},{"key":"BF02241862_CR17","first-page":"T295","volume":"64","author":"R. Lohner","year":"1984","unstructured":"Lohner, R., Adams, E.: Einschlie\u00dfung der L\u00f6sung gew\u00f6hnlicher Anfangs- und Randwertaufgaben. ZAMM64, T295-T297 (1984).","journal-title":"ZAMM"},{"key":"BF02241862_CR18","unstructured":"Lohner, R.: Einschlie\u00dfung der L\u00f6sung gew\u00f6hnlicher Anfangs- und Randwertaufgaben und Anwendungen. Dissertation Universit\u00e4t Karlsruhe 1988."},{"key":"BF02241862_CR19","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1137\/0712068","volume":"12","author":"M. A. McCarthy","year":"1975","unstructured":"McCarthy, M. A., Tapia, R. A.: Computable a posterioriL \u221e-Error Bounds for the Approximate Solution of Two-Point Boundary Value Problems. SIAM J. Numer. Anal.12, 919\u2013937 (1975).","journal-title":"SIAM J. Numer. Anal."},{"key":"BF02241862_CR20","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02252131","volume":"23","author":"K. Nickel","year":"1979","unstructured":"Nickel, K.: The Construction of a priori Bounds for the Solution of a Two-Point Boundary Value Problem with Finite Elements I. Computing23, 247\u2013265 (1979).","journal-title":"Computing"},{"key":"BF02241862_CR21","unstructured":"Ruttmann, B.: Untersuchungen zur Fehlerabsch\u00e4tzung von polynomialen N\u00e4herungsl\u00f6sungen bei Randwertaufgaben gew\u00f6hnlicher Differentialgleichungen. Dissertation Universit\u00e4t K\u00f6ln 1982."},{"key":"BF02241862_CR22","unstructured":"Schr\u00f6der, J.: Operator Inequalities. Academic Press 1980."},{"key":"BF02241862_CR23","unstructured":"Schr\u00f6der, J.: Existence proofs for boundary value problems by numerical algorithms. Report Univ. Cologne 1986."},{"key":"BF02241862_CR24","first-page":"9","volume":"Suppl. 6","author":"J. Schr\u00f6der","year":"1988","unstructured":"Schr\u00f6der, J.: A method for producing verified results for two-point boundary value problems. Computing, Suppl.6, 9\u201322 (1988).","journal-title":"Computing"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02241862.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02241862\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02241862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T23:15:48Z","timestamp":1557875748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02241862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,6]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1990,6]]}},"alternative-id":["BF02241862"],"URL":"https:\/\/doi.org\/10.1007\/bf02241862","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990,6]]}}}