{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T13:00:16Z","timestamp":1648731616326},"reference-count":12,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Mathematics and Computation"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0096-3003(02)00161-3","type":"journal-article","created":{"date-parts":[[2003,2,10]],"date-time":"2003-02-10T14:24:14Z","timestamp":1044887054000},"page":"571-587","source":"Crossref","is-referenced-by-count":1,"title":["Solving large-scale constrained least-squares problems"],"prefix":"10.1016","volume":"137","author":[{"given":"Mohammedi R.","family":"Abdel-Aziz","sequence":"first","affiliation":[]},{"given":"Mahmoud M.","family":"El-Alem","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-3003(02)00161-3_BIB1","doi-asserted-by":"crossref","first-page":"3117","DOI":"10.1002\/nme.1620371807","article-title":"Safeguarded use of implicit restarted Lanczos technique for solving nonlinear structural eigensystems","volume":"37","author":"Abdel-Aziz","year":"1994","journal-title":"Int. J. Numer. Meth. Engng."},{"issue":"1","key":"10.1016\/S0096-3003(02)00161-3_BIB2","first-page":"79","article-title":"Solving constrained least-squares problems parametrically","volume":"1","author":"Abdel-Aziz","year":"1999","journal-title":"Far East J. Math. Sci."},{"key":"10.1016\/S0096-3003(02)00161-3_BIB3","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1007\/BF01934265","article-title":"An implicit shift bidiagonalization algorithm for ill-posed systems","volume":"34","author":"Bj\u0151rck","year":"1994","journal-title":"BIT"},{"key":"10.1016\/S0096-3003(02)00161-3_BIB4","series-title":"Least-squares methods","author":"Bj\u0151rck","year":"1996"},{"issue":"1","key":"10.1016\/S0096-3003(02)00161-3_BIB5","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1137\/S1052623492238881","article-title":"A global convergence theory for general trust-region-based algorithms for equality constrained optimization","volume":"7","author":"Dennis","year":"1997","journal-title":"SIAM J. Optimiz."},{"key":"10.1016\/S0096-3003(02)00161-3_BIB6","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/BF01396656","article-title":"Least-squares with quadratic constraint","volume":"36","author":"Gander","year":"1981","journal-title":"Numer. Math."},{"key":"10.1016\/S0096-3003(02)00161-3_BIB7","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/BF01385796","article-title":"Quadratically constrained least-squares and quadratic problems","volume":"59","author":"Golub","year":"1991","journal-title":"Numer. Math."},{"key":"10.1016\/S0096-3003(02)00161-3_BIB8","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1137\/0904038","article-title":"Computing a trust region step","volume":"4","author":"Mor\u00e9","year":"1983","journal-title":"SIAM J. Sci. Stat. Comput."},{"issue":"1 & 2","key":"10.1016\/S0096-3003(02)00161-3_BIB9","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/01630569608816690","article-title":"On pseudo-optimal parameter choices and stopping rules of regularization methods in banach spaces","volume":"17","author":"Plato","year":"1996","journal-title":"Numer. Funct. Anal. Optimiz."},{"key":"10.1016\/S0096-3003(02)00161-3_BIB10","unstructured":"D.C. Sorensen, Minimization of a large scale quadratic function subject to an ellipsoidal constraint, TR94-27, Department of Computational and Applied Mathematics, Rice University, Houston, TX, 1994. pp. 77251\u20131829"},{"issue":"1","key":"10.1016\/S0096-3003(02)00161-3_BIB11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1137\/0613025","article-title":"Implicit application of polynomial filters in a k-step Arnoldi method","volume":"13","author":"Sorensen","year":"1990","journal-title":"SIAM J. Matrix Anal. Appl."},{"issue":"2","key":"10.1016\/S0096-3003(02)00161-3_BIB12","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1137\/0719026","article-title":"Newton\u2019s method with a model trust region modification","volume":"19","author":"Sorensen","year":"1982","journal-title":"SIAM J. Numer. Anal."}],"container-title":["Applied Mathematics and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302001613?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302001613?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T21:55:34Z","timestamp":1555106134000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096300302001613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":12,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0096300302001613"],"URL":"https:\/\/doi.org\/10.1016\/s0096-3003(02)00161-3","relation":{},"ISSN":["0096-3003"],"issn-type":[{"value":"0096-3003","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}