{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T06:21:49Z","timestamp":1672986109163},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci. China"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s11704-008-0006-y","type":"journal-article","created":{"date-parts":[[2008,3,27]],"date-time":"2008-03-27T10:44:08Z","timestamp":1206614648000},"page":"55-66","source":"Crossref","is-referenced-by-count":3,"title":["On the verification of polynomial system solvers"],"prefix":"10.1007","volume":"2","author":[{"given":"Changbo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Marc","family":"Moreno Maza","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yuzhen","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-55826-9","volume-title":"Computer Algebra Handbook","author":"J. Grabmeier","year":"2003","unstructured":"Grabmeier J, Kaltofen E, Weispfenning V. Computer Algebra Handbook. Berlin: Springer, 2003"},{"issue":"1\u20132","key":"6_CR2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1006\/jsco.1999.0269","volume":"28","author":"P. Aubry","year":"1999","unstructured":"Aubry P, Lazard D, Moreno Maza M. On the theories of triangular sets. Journal of Symbolic Computation, 1999, 28(1\u20132): 105\u2013124","journal-title":"Journal of Symbolic Computation"},{"issue":"2","key":"6_CR3","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1006\/jsco.1999.0355","volume":"30","author":"D. Wang","year":"2000","unstructured":"Wang D. Computing triangular systems and regular systems. Journal of Symbolic Computation, 2000, 30(2): 221\u2013236","journal-title":"Journal of Symbolic Computation"},{"key":"6_CR4","first-page":"192","volume-title":"Proceedings of ISSAC","author":"L. Donati","year":"1989","unstructured":"Donati L, Traverso C. Experimenting the Gr\u00f6bner basis algorithm with the ALPI system. In: Proceedings of ISSAC. New York: ACM Press, 1989, 192\u2013198"},{"issue":"1\u20132","key":"6_CR5","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1006\/jsco.1999.0270","volume":"28","author":"P. Aubry","year":"1999","unstructured":"Aubry P, Moreno Maza M. Triangular sets for solving polynomial systems: a comparative implementation of four methods. Journal of Symbolic Computation, 1999, 28(1\u20132): 125\u2013154","journal-title":"Journal of Symbolic Computation"},{"key":"6_CR6","first-page":"103","volume-title":"Proceedings of ISSAC","author":"J. Backelin","year":"1991","unstructured":"Backelin J, Fr\u00f6berg R. How we proved that there are exactly 924 cyclic 7-roots. In: Watt S M, Proceedings of ISSAC. New York: ACM Press, 1991, 103\u2013111"},{"key":"6_CR7","unstructured":"Sit W. Computations on quasi-algebraic sets. In: Proceedings of IMACS ACA, 1998"},{"key":"6_CR8","unstructured":"Lemaire F, Moreno Maza M, Xie Y. The regularChains library. In: Kotsireas I S, ed. Proceedings of Maple Conference 2005. 2005, 355\u2013368"},{"key":"6_CR9","unstructured":"The Computational Mathematics Group. The BasicMath library NAG Ltd, Oxford, UK, 1998. http:\/\/www.nag.co.uk\/projects\/FRISCO.html"},{"key":"6_CR10","unstructured":"Wang D. Epsilon 0.618. http:\/\/www-calfor.lip6.fr\/wang\/epsilon"},{"key":"6_CR11","unstructured":"Manubens M, Montes A. Improving DISPGB Algorithm Using the Discriminant Ideal, 2006. http:\/\/www.citebase.org\/abstract?id5oai:arXiv.org:math\/0601763"},{"key":"6_CR12","unstructured":"The SymbolicData Project, 2000\u20132006. http:\/\/www.SymbolicData.org"},{"key":"6_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7091-6202-6","volume-title":"Elimination Methods","author":"D. Wang","year":"2001","unstructured":"Wang D. Elimination Methods. Berlin: Springer, 2001"},{"key":"6_CR14","volume-title":"Proceedings of Transgressive Computing 2006","author":"F. Boulier","year":"2006","unstructured":"Boulier F, Lemaire F, Moreno Maza M. Well known theorems on triangular systems. In: Proceedings of Transgressive Computing 2006. Spain: University of Granada, 2006"},{"key":"6_CR15","series-title":"Technical Report","volume-title":"On triangular decompositions of algebraic varieties","author":"M. Moreno Maza","year":"1999","unstructured":"Moreno Maza M. On triangular decompositions of algebraic varieties. Technical Report TR 4\/99, NAG Ltd, Oxford, UK, 1999. http:\/\/www.csd.uwo.ca\/:_moreno"},{"key":"6_CR16","volume-title":"Commutative Algebra. GTM 150","author":"D. Eisenbud","year":"1994","unstructured":"Eisenbud D. Commutative Algebra. GTM 150. Berlin: Springer, 1994"},{"key":"6_CR17","volume-title":"Algebraic Geometry","author":"R. Hartshorne","year":"1997","unstructured":"Hartshorne R. Algebraic Geometry. Berlin: Springer-Verlag, 1997"},{"issue":"11","key":"6_CR18","doi-asserted-by":"crossref","first-page":"5479","DOI":"10.1081\/AGB-120015663","volume":"30","author":"J. O\u2019Halloran","year":"2002","unstructured":"O\u2019Halloran J, Schilmoeller M. Gr\u00f6bner bases for constructible sets. Journal of Communications in Algebra, 2002, 30(11):5479\u20135483","journal-title":"Journal of Communications in Algebra"},{"key":"6_CR19","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-540-75187-8_7","volume-title":"Proceedings of Computer Algebra in Scientific Computing","author":"C. Chen","year":"2007","unstructured":"Chen C, Golubitsky O, Lemaire F, et al. Comprehensive triangular decomposition. In: Proceedings of Computer Algebra in Scientific Computing. Berlin: Springer, LNCS, 2007, 4770:73\u2013101"}],"container-title":["Frontiers of Computer Science in China"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-008-0006-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-008-0006-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-008-0006-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:00:45Z","timestamp":1559422845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-008-0006-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["6"],"URL":"https:\/\/doi.org\/10.1007\/s11704-008-0006-y","relation":{},"ISSN":["1673-7350","1673-7466"],"issn-type":[{"value":"1673-7350","type":"print"},{"value":"1673-7466","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}