{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:37:15Z","timestamp":1756463835138,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T00:00:00Z","timestamp":1535500800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["11571029"],"award-info":[{"award-number":["11571029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11471325"],"award-info":[{"award-number":["11471325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11590-018-1320-4","type":"journal-article","created":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T17:03:52Z","timestamp":1535562232000},"page":"569-578","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On Lagrangian duality gap of quadratic fractional programming with a two-sided quadratic constraint"],"prefix":"10.1007","volume":"14","author":[{"given":"Meijia","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,29]]},"reference":[{"key":"1320_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1137\/040616851","volume":"28","author":"A Beck","year":"2006","unstructured":"Beck, A., Ben-Tal, A., Teboulle, M.: Finding a global optimal solution for a quadratically constrained fractional quadratic problem with applications to the regularized total least squares. SIAM J. Matrix Anal. Appl. 28, 425\u2013445 (2006)","journal-title":"SIAM J. Matrix Anal. Appl."},{"issue":"1","key":"1320_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10107-007-0181-x","volume":"118","author":"A Beck","year":"2009","unstructured":"Beck, A., Teboulle, M.: A convex optimization approach for minimizing the ratio of indefinite quadratic functions over an ellipsoid. Math. Program. Ser. A. 118(1), 13\u201335 (2009)","journal-title":"Math. Program. Ser. A."},{"key":"1320_CR3","first-page":"51","volume":"72","author":"A Ben-Tal","year":"1996","unstructured":"Ben-Tal, A., Teboulle, M.: Hidden convexity in some nonconvex quadratically constrained quadratic programming. Math. Program. 72, 51\u201363 (1996)","journal-title":"Math. Program."},{"issue":"1","key":"1320_CR4","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s10107-015-0933-y","volume":"158","author":"E Hazan","year":"2016","unstructured":"Hazan, E., Koren, T.: A linear-time algorithm for trust region problems. Math. Program. 158(1), 363\u2013381 (2016)","journal-title":"Math. Program."},{"issue":"4","key":"1320_CR5","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1080\/10556788.2015.1029575","volume":"31","author":"VB Nguyen","year":"2016","unstructured":"Nguyen, V.B., Sheu, R.L., Xia, Y.: An SDP approach for quadratic fractional problems with a two-sided quadratic constraint. Optim. Methods Softw. 31(4), 701\u2013719 (2016)","journal-title":"Optim. Methods Softw."},{"issue":"3","key":"1320_CR6","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1137\/S003614450444614X","volume":"49","author":"I P\u00f3lik","year":"2007","unstructured":"P\u00f3lik, I., Terlaky, T.: A survey of the S-lemma. SIAM Rev. 49(3), 371\u2013418 (2007)","journal-title":"SIAM Rev."},{"issue":"2","key":"1320_CR7","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10589-013-9635-7","volume":"58","author":"TK Pong","year":"2014","unstructured":"Pong, T.K., Wolkowicz, H.: Generalizations of the trust region subproblem. Comput. Optim. Appl. 58(2), 273\u2013322 (2014)","journal-title":"Comput. Optim. Appl."},{"issue":"2","key":"1320_CR8","first-page":"273","volume":"77","author":"F Rendl","year":"1997","unstructured":"Rendl, F., Wolkowicz, H.: A semidefinite framework for thrust region subproblems with applications to large scale minimization. Math. Program. 77(2), 273\u2013299 (1997)","journal-title":"Math. Program."},{"issue":"3","key":"1320_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1023\/B:STCO.0000035301.49549.88","volume":"14","author":"AJ Smola","year":"2004","unstructured":"Smola, A.J., Sch\u00f6lkopf, B.: A tutorial on support vector regression. Stat. Comput. 14(3), 199\u2013222 (2004)","journal-title":"Stat. Comput."},{"issue":"2","key":"1320_CR10","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1137\/0805016","volume":"5","author":"R Stern","year":"1995","unstructured":"Stern, R., Wolkowicz, H.: Indefinite trust region subproblems and nonsymmetric eigenvalue perturbations. SIAM J. Optim. 5(2), 286\u2013313 (1995)","journal-title":"SIAM J. Optim."},{"key":"1320_CR11","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1137\/S0895479802419889","volume":"26","author":"RA Renaut","year":"2005","unstructured":"Renaut, R.A., Guo, H.: Efficient algorithms for solution of regularized total least squares. SIAM J. Matrix Anal. Appl. 26, 457\u2013476 (2005)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"1320_CR12","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1007\/s11590-016-1070-0","volume":"11","author":"J Wang","year":"2017","unstructured":"Wang, J., Xia, Y.: A linear-time algorithm for the trust region subproblem based on the hidden convexity. Optim. Lett. 11, 1639\u20131646 (2017)","journal-title":"Optim. Lett."},{"key":"1320_CR13","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s11590-014-0812-0","volume":"9","author":"S Wang","year":"2015","unstructured":"Wang, S., Xia, Y.: Strong duality for generalized trust region subproblem: S-lemma with interval bounds. Optim. Lett. 9, 1063\u20131073 (2015)","journal-title":"Optim. Lett."},{"issue":"5","key":"1320_CR14","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1080\/02331934.2013.840623","volume":"64","author":"Y Xia","year":"2015","unstructured":"Xia, Y.: On minimizing the ratio of quadratic functions over an ellipsoid. Optimization 64(5), 1097\u20131106 (2015)","journal-title":"Optimization"},{"issue":"1","key":"1320_CR15","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s10107-015-0907-0","volume":"156","author":"Y Xia","year":"2016","unstructured":"Xia, Y., Wang, S., Sheu, R.L.: S-Lemma with Equality and Its Applications. Math. Program. 156(1), 513\u2013547 (2016)","journal-title":"Math. Program."},{"key":"1320_CR16","unstructured":"Yakubovich, V.A.: S-procedure in nonlinear control theory. Vestnik Leningrad. Univ. 1, 62-77 (in Russian) (1971)"}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-018-1320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11590-018-1320-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-018-1320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T21:07:49Z","timestamp":1583960869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11590-018-1320-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,29]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1320"],"URL":"https:\/\/doi.org\/10.1007\/s11590-018-1320-4","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"type":"print","value":"1862-4472"},{"type":"electronic","value":"1862-4480"}],"subject":[],"published":{"date-parts":[[2018,8,29]]},"assertion":[{"value":"16 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}