{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:26:22Z","timestamp":1778693182706,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003593","name":"conselho nacional de desenvolvimento cient\u00edfico e tecnol\u00f3gico","doi-asserted-by":"publisher","award":["312777\/2020-5"],"award-info":[{"award-number":["312777\/2020-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"coordena\u00e7\u00e3o de aperfei\u00e7oamento de pessoal de n\u00edvel superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Optim Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s10589-022-00356-0","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T10:03:43Z","timestamp":1646215423000},"page":"31-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An adaptive trust-region method without function evaluations"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3284-3371","authenticated-orcid":false,"given":"Geovani N.","family":"Grapiglia","sequence":"first","affiliation":[]},{"given":"Gabriel F. D.","family":"Stella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,2]]},"reference":[{"key":"356_CR1","doi-asserted-by":"publisher","first-page":"5948","DOI":"10.1016\/j.eswa.2014.03.019","volume":"41","author":"N Abdelhamid","year":"2014","unstructured":"Abdelhamid, N., Ayesh, A., Thabtah, F.: Phishing detection based Associative Classification data mining. Expert Syst. Appl. 41, 5948\u20135959 (2014)","journal-title":"Expert Systems with Applications"},{"key":"356_CR2","unstructured":"Aeberhard, S., Coomans, D., de Vel, O.: Comparison of Classifiers in High Dimensional Settings, Tech. Rep. no. 92-02, (1992), Dept. of Computer Science and Dept. of Mathematics and Statistics, James Cook University of North Queensland"},{"key":"356_CR3","doi-asserted-by":"crossref","unstructured":"Balima, O., Boulanger, J., Charette, A., Marceau, D.: New developments in frequency domain optical tomography. Part II: application with a L-BFGS associated to an inexact line search. J. Quant. Spectrosc. Radiat. Transf. 112, 1235\u20131240 (2011)","DOI":"10.1016\/j.jqsrt.2010.08.033"},{"key":"356_CR4","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S0377-0427(00)00422-2","volume":"124","author":"M Bartholomew-Biggs","year":"2000","unstructured":"Bartholomew-Biggs, M., Brown, S., Christianson, B., Dixon, L.: Automatic differentiation of algorithms. J. Comput. Appl. Math. 124, 171\u2013190 (2000)","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"356_CR5","first-page":"1","volume":"18","author":"AG Baydin","year":"2018","unstructured":"Baydin, A.G., Pearlmutter, B.A., Radul, A.A., Siskind, J.M.: Automatic differentiation in machine learning: a survey. J. Mach. Learn. Res. 18, 1\u201343 (2018)","journal-title":"Journal of Machine Learning Research"},{"key":"356_CR6","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s11590-019-01395-z","volume":"14","author":"EG Birgin","year":"2020","unstructured":"Birgin, E.G., Gardenghi, J.L., Mart\u00ednez, J.M., Santos, S.A.: On the use of third-order models with fourth-order regularization for unconstrained optimization. Optim. Lett. 14, 815\u2013838 (2020)","journal-title":"Optimization Letters"},{"key":"356_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-13105-9_2","volume-title":"Information Technologies in Biomedicine","author":"M Charytanowicz","year":"2010","unstructured":"Charytanowicz, M., Niewczas, J., Kulczycki, P., Kowalski, P.A., Lukasik, S., Zak, S.: A complete gradient clustering algorithm for features analysis of X-ray images. In: Pietka, E., Kawa, J. (eds.) Information Technologies in Biomedicine, pp. 15\u201324. Springer, Berlin (2010)"},{"key":"356_CR8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719857","volume-title":"Trust-Region Methods","author":"AR Conn","year":"2000","unstructured":"Conn, A.R., Gould, N.I.M., Toint, Ph.L.: Trust-Region Methods. SIAM, Philadelphia (2000)"},{"key":"356_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(96)00034-3","volume":"89","author":"Solving the multiple-instance problem with axis-parallel rectangles","year":"1997","unstructured":"Dietterich, T.G., Lathrop, R.H., Lozano-Perez, T.: Solving the multiple-instance problem with axis-parallel rectangles. Artif. Intell. 89, 31\u201371 (1997)","journal-title":"Artificial Intelligence"},{"key":"356_CR10","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1016\/j.ijnonlinmec.2011.09.009","volume":"47","author":"J Ding","year":"2012","unstructured":"Ding, J., Pan, Z., Chen, L.: Parameter identification of multibody systems based on second order sensitivity analysis. Int. J. Non-Linear Mech. 47, 1105\u20131110 (2012)","journal-title":"International Journal of Non-Linear Mechanics"},{"key":"356_CR11","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s101070100263","volume":"91","author":"E Dolan","year":"2002","unstructured":"Dolan, E., Mor\u00e9, J.J.: Benchmarking optimization software with performance profiles. Math. Program. 91, 201\u20132013 (2002)","journal-title":"Mathematical Programming"},{"key":"356_CR12","unstructured":"Dua, D., Graff, C.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, Irvine (2019). http:\/\/archive.ics.uci.edu\/ml"},{"key":"356_CR13","unstructured":"Fan, J., Yuan, Y.: A new trust region algorithm with trust region radius converging to zero. In: Li, D. (ed.) Proceeding of the 5th International Conference on Optimization: Techiniques and Applications, pp. 786-794. Hong Kong (2001)"},{"key":"356_CR14","doi-asserted-by":"crossref","unstructured":"Fisher, R.A.: The use of multiple measurements in taxonomic problems. Annu. Eugenics 7(Part II), 179\u2013188 (1936)","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"356_CR15","unstructured":"Fletcher, R.: An efficient, global convergent algorithm for unconstrained and linearly constrained optimization problems. Technical Report TP 431, AERE, Harwell Laboratory, Oxfordshire, England (1970)"},{"key":"356_CR16","unstructured":"Fletcher, R.: Practical Methods of Optimization, Volume 1: Unconstrained Optimization. Wiley, Chichester, England (1980)"},{"key":"356_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0893-6080(88)90023-8","volume":"1","author":"RP Gorman","year":"1988","unstructured":"Gorman, R.P., Sejnowski, T.J.: Analysis of hidden units in a layered network trained to classify sonar targets. Neural Netw. 1, 75\u201389 (1988)","journal-title":"Neural Networks"},{"key":"356_CR18","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10107-014-0794-9","volume":"152","author":"GN Grapiglia","year":"2015","unstructured":"Grapiglia, G.N., Yuan, J., Yuan, Y.: On the convergence and worst-case complexity of trust-region and regularization methods for unconstrained optimization. Math. Program. 152, 491\u2013520 (2015)","journal-title":"Mathematical Programming"},{"key":"356_CR19","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1007\/s10957-016-1007-x","volume":"171","author":"GN Grapiglia","year":"2016","unstructured":"Grapiglia, G.N., Yuan, J., Yuan, Y.: Nonlinear stepsize control algorithms: complexity bounds for first-and second-order optimality. J. Optim. Theory Appl. 171, 980\u2013997 (2016)","journal-title":"Journal of Optimization Theory and Applications"},{"key":"356_CR20","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1137\/050623012","volume":"19","author":"S Gratton","year":"2008","unstructured":"Gratton, S., Sartenaer, A., Toint, Ph.L.: Recursive trust-region methods for multiscale nonlinear optimization. SIAM J. Optim. 19, 414\u2013444 (2008)","journal-title":"SIAM Journal on Optimization"},{"key":"356_CR21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898717761","volume-title":"Evaluationg Derivatives: Principles and Techniques of Algorithmic Differentiation","author":"A Griewank","year":"2008","unstructured":"Griewank, A., Walther, A.: Evaluationg Derivatives: Principles and Techniques of Algorithmic Differentiation. SIAM, Philadelphia (2008)"},{"key":"356_CR22","unstructured":"Hebden, M.D.: An algorithm for minimization using exact second order derivatives. Technical Report TP 515, AERE, Harwell Laboratory, Oxfordshire, England (1973)"},{"key":"356_CR23","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s10589-007-9145-6","volume":"43","author":"A Heusinger","year":"2009","unstructured":"Heusinger, A., Kanzow, C.: Optimization reformulations of the generalized Nash equilibrium problem using Nikaido-Isoda-type functions. Comput. Optim. Appl. 43, 353\u2013377 (2009)","journal-title":"Computational Optimization and Applications"},{"key":"356_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1002\/mmce.20579","volume":"22","author":"S Koziel","year":"2012","unstructured":"Koziel, S., Mosler, F., Reitzinger, S., Thoma, P.: Robust microwave design optimization using adjoint sensitivity and trust regions. Int. J. RF Microwave Comput. Aided Eng. 22, 10\u201319 (2012)","journal-title":"International Journal of RF and Microwave Computer-Aided Engineering"},{"key":"356_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/355934.355936","volume":"7","author":"Testing unconstrained optimization software","year":"1981","unstructured":"Mor\u00e9, J.J., Garbow, B.S., Hillstrom, K.E.: Testing unconstrained optimization software. ACM Trans. Math. Softw. 7, 17\u201341 (1981)","journal-title":"ACM Transactions on Mathematical Software"},{"key":"356_CR26","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/B978-0-12-597050-1.50006-3","volume-title":"Nonlinear Programming","author":"MJD Powell","year":"1970","unstructured":"Powell, M.J.D.: A new algorithm for unconstrained optimization. In: Rosen, J.B., Mangasarian, O.L., Ritter, K. (eds.) Nonlinear Programming, pp. 31\u201366. Academic Press, New York (1970)"},{"key":"356_CR27","doi-asserted-by":"crossref","unstructured":"Powell, M.J.D.: Convergence properties of a class of minimization algorithms. In: O.L. Mangasarian, R.R. Meyer and S.M. Robinson (eds.) Nonlinear Programming, pp. 1\u201327 (1975)","DOI":"10.1016\/B978-0-12-468650-2.50005-5"},{"key":"356_CR28","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interative graph analytics and visualization (2015). http:\/\/networkrepository.com","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"356_CR29","first-page":"262","volume":"10","author":"VG Sigillito","year":"1989","unstructured":"Sigillito, V.G., Wing, S.P., Hutton, L.V., Baker, K.B.: Classification of radar returns from the ionosphere using neural networks. Johns Hopkins APL Tech. Digest 10, 262\u2013266 (1989)","journal-title":"Johns Hopkins APL Technical Digest"},{"key":"356_CR30","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1137\/0720042","volume":"20","author":"T Steihaug","year":"1983","unstructured":"Steihaug, T.: The conjugate gradient and trust regions in large scale optimization. SIAM J. Numer. Anal. 20, 626\u2013637 (1983)","journal-title":"SIAM Journal on Numerical Analysis"},{"key":"356_CR31","doi-asserted-by":"crossref","unstructured":"Street, W.N., Wolberg, W.H., Mangasarian, O.L.: Nuclear feature extraction for breast tumor diagnosis. IS&T\/SPIE 1993 International Symposium on Electronic Imaging: Science and Technology, volume 1905, pages 861-870, San Jose, CA (1993)","DOI":"10.1117\/12.148698"},{"key":"356_CR32","first-page":"57","volume-title":"Sparse Matrices and Their Uses","author":"PhL Toint","year":"1981","unstructured":"Toint, Ph.L.: Towards an efficient sparsity exploiting Newton method for minimization. In: Duff, I.S. (ed.) Sparse Matrices and Their Uses, pp. 57\u201388. Academic Press, London (1981)"},{"key":"356_CR33","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.apm.2004.09.005","volume":"29","author":"JMB Walmag","year":"2005","unstructured":"Walmag, J.M.B., Dellez, E.J.M.: A trust-region method applied to parameter identification of a simple prey-predator model. Appl. Math. Model. 29, 289\u2013307 (2005)","journal-title":"Applied Mathematical Modelling"},{"key":"356_CR34","unstructured":"Wu, X., Ward, R., Bottou, L.: WNGrad: learn the learning rate in gradient descent. ArXiv:1803.02865, November 2020"},{"key":"356_CR35","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10107-015-0893-2","volume":"151","author":"Y Yuan","year":"2015","unstructured":"Yuan, Y.: Recent advances in trust region algorithms. Math. Program. Ser. B 151, 249\u2013281 (2015)","journal-title":"Mathematical Programming Ser. B"},{"key":"356_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cageo.2015.02.007","volume":"78","author":"H Zhang","year":"2015","unstructured":"Zhang, H., Li, X., Song, H., Liu, S.: An adaptive subspace trust-region method for frequency-domain seismic full waveform inversion. Comput. Geosci. 78, 1\u201314 (2015)","journal-title":"Computers & Geosciences"}],"container-title":["Computational Optimization and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10589-022-00356-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10589-022-00356-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10589-022-00356-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T06:06:18Z","timestamp":1674885978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10589-022-00356-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,2]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["356"],"URL":"https:\/\/doi.org\/10.1007\/s10589-022-00356-0","relation":{},"ISSN":["0926-6003","1573-2894"],"issn-type":[{"value":"0926-6003","type":"print"},{"value":"1573-2894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,2]]},"assertion":[{"value":"20 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}