{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:45:05Z","timestamp":1755218705010,"version":"3.43.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2000,8,1]],"date-time":"2000-08-01T00:00:00Z","timestamp":965088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,8,1]],"date-time":"2000-08-01T00:00:00Z","timestamp":965088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Reliable Computing"],"published-print":{"date-parts":[[2000,8]]},"DOI":"10.1023\/a:1009934614393","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T19:25:11Z","timestamp":1040585111000},"page":"303-320","source":"Crossref","is-referenced-by-count":13,"title":["Application of Bernstein Expansion to the Solution of Control Problems"],"prefix":"10.1007","volume":"6","author":[{"given":"J\u00fcrgen","family":"Garloff","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"273359_CR1","series-title":"Technical Report","first-page":"340","volume-title":"Applications of Quantifier Elimination Theory to Control Theory","author":"C. Abdallah","year":"1995","unstructured":"Abdallah, C., Dorato, P., Liska, R., Steinberg, S., and Yang, W.: Applications of Quantifier Elimination Theory to Control Theory, Technical Report EECE95-007, University of New Mexico, Department of Electrical and Computer Engineering, Albuquerque, 1995, cf. Proc. of the 4th IEEE Mediteranean Symposium on Control and Automation, Maleme, Crete, Greece, 1996, pp. 340-345."},{"key":"273359_CR2","volume-title":"Robust Control, Systems with Uncertain Physical Parameters","author":"J. Ackermann","year":"1993","unstructured":"Ackermann, J.: Robust Control, Systems with Uncertain Physical Parameters, Springer, London, 1993."},{"key":"273359_CR3","volume-title":"New Tools for Robustness of Linear Systems","author":"B. R. Barmish","year":"1994","unstructured":"Barmish, B. R.: New Tools for Robustness of Linear Systems, Macmillan, New York, 1994."},{"key":"273359_CR4","first-page":"155","volume-title":"Polynomials and Linear Control Systems","author":"S. Barnett","year":"1983","unstructured":"Barnett, S.: Polynomials and Linear Control Systems, Marcel Dekker, New York, 1983, p. 155."},{"key":"273359_CR5","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/BF01934696","volume":"28","author":"E. Baumann","year":"1988","unstructured":"Baumann, E.: Optimal Centred Forms, BIT\n28 (1988), pp. 80-87.","journal-title":"BIT"},{"key":"273359_CR6","unstructured":"Bose, N. K. and Delansky, J. F.: Tests for Robust Schur Interval Polynomials, in: Glasford, G. and Jabbour, K. (eds), 30th Midwest Symposium on Circuits and Systems, Elsevier Sci. Publ., 1988, pp. 1357-1361."},{"key":"273359_CR7","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S0947-3580(97)70062-1","volume":"3","author":"O. Didrit","year":"1997","unstructured":"Didrit, O., Jaulin, L., and Walter, E.: Guaranteed Analysis and Optimization of Parametric Systems with Application to Their Stability Degree, European J. Contr.\n3 (1997), pp. 68-80.","journal-title":"European J. Contr."},{"key":"273359_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0167-8396(88)90016-7","volume":"5","author":"R. T. Farouki","year":"1988","unstructured":"Farouki, R. T. and Rajan, V. T.: Algorithms for Polynomials in Bernstein Form, Computer Aided Geometric Design\n5 (1988), pp. 1-26.","journal-title":"Computer Aided Geometric Design"},{"key":"273359_CR9","doi-asserted-by":"crossref","unstructured":"Fiorio, G., Malan, S., Milanese, M., and Taragna, M.: Robust Performance Design of Fixed Structure Controllers for Systems with Uncertain Parameters, in: Proc. 32nd Conference on Decision and Control, San Antonio, Texas, 1993, pp. 3029-3031.","DOI":"10.1109\/CDC.1993.325757"},{"key":"273359_CR10","first-page":"197","volume-title":"Contributions to Computer Arithmetic and Self-Validating Numerical Methods","author":"H. C. Fischer","year":"1990","unstructured":"Fischer, H. C.: Range Computations and Applications, in: Ullrich, C. (ed.), Contributions to Computer Arithmetic and Self-Validating Numerical Methods, J. C. Baltzer, Amsterdam, 1990, pp. 197-211."},{"key":"273359_CR11","first-page":"642","volume":"124","author":"R. A. Frazer","year":"1929","unstructured":"Frazer, R. A. and Duncan, W. J.: On the Criteria for the Stability of Small Motions, Proc. Royal Soc. A\n124 (1929), pp. 642-654.","journal-title":"Proc. Royal Soc. A"},{"key":"273359_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-16437-5_5","volume-title":"Interval Mathematics 1985","author":"J. Garloff","year":"1986","unstructured":"Garloff, J.: Convergent Bounds for the Range of Multivariate Polynomials, in: Nickel, K. (ed.), Interval Mathematics 1985 (Lecture Notes in Computer Science\n212), Springer, Berlin, 1986, pp. 37-56."},{"key":"273359_CR13","first-page":"154","volume":"2","author":"J. Garloff","year":"1993","unstructured":"Garloff, J.: The Bernstein Algorithm, Interval Computations 2 (1993), pp. 154-168.","journal-title":"Interval Computations"},{"key":"273359_CR14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/A:1008402513296","volume":"10","author":"J. Garloff","year":"1999","unstructured":"Garloff, J. and Graf, B.: Robust Schur Stability of Polynomials with Polynomial Parameter Dependency, Multidimensional Systems and Signal Processing\n10 (1999), pp. 189-199.","journal-title":"Multidimensional Systems and Signal Processing"},{"key":"273359_CR15","first-page":"339","volume-title":"Symbolic Methods in Control System Analysis and Design","author":"J. Garloff","year":"1999","unstructured":"Garloff, J. and Graf, B.: Solving Strict Polynomial Inequalities by Bernstein Expansion, in: Munro, N. (ed.), Symbolic Methods in Control System Analysis and Design, IEE, London, 1999, pp. 339-352."},{"key":"273359_CR16","first-page":"183","volume-title":"Robust Control Design","author":"J. Garloff","year":"1998","unstructured":"Garloff, J., Graf, B., and Zettler, M.: Speeding Up an Algorithm for Checking Robust Stability of Polynomials, in: B\u00e1ny\u00e1sz, Cs. (ed.), Robust Control Design, Elsevier Sci., Oxford, 1998, pp. 183-188."},{"key":"273359_CR17","series-title":"Techn. Rep.","volume-title":"Computation of Stability Regions","author":"B. Graf","year":"1998","unstructured":"Graf, B.: Computation of Stability Regions, Techn. Rep. no. 9801, Fachhochschule Konstanz, Fachbereich Informatik, 1998."},{"key":"273359_CR18","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1093\/imanum\/18.3.399","volume":"18","author":"N. Guglielmi","year":"1998","unstructured":"Guglielmi, N.: Delay Dependent Stability Regions for \u0398-Methods for Delay Differential Equations, IMA Journal of Numerical Analysis\n18 (1998), pp. 399-418.","journal-title":"IMA Journal of Numerical Analysis"},{"key":"273359_CR19","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BF02238236","volume":"55","author":"H. Hong","year":"1995","unstructured":"Hong, H. and Stahl, V.: Bernstein Form Is Inclusion Monotone, Computing\n55 (1995), pp. 43-53.","journal-title":"Computing"},{"issue":"1","key":"273359_CR20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1023\/A:1009942430877","volume":"4","author":"R. Hungerb\u00fchler","year":"1998","unstructured":"Hungerb\u00fchler, R. and Garloff, J.: Bounds for the Range of a Bivariate Polynomial over a Triangle, Reliable Computing\n4(1) (1998), pp. 3-13.","journal-title":"Reliable Computing"},{"key":"273359_CR21","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1016\/0005-1098(93)90106-4","volume":"29","author":"L. Jaulin","year":"1993","unstructured":"Jaulin, L. and Walter, E.: Set Inversion via Interval Analysis for Nonlinear Bounded-Error Estimation, Automatica\n29 (1993), pp. 1053-1064.","journal-title":"Automatica"},{"key":"273359_CR22","series-title":"Link\u00f6ping Studies in Science and Technology","volume-title":"Constructive Methods for Inequality Constraints in Control","author":"M. Jirstrand","year":"1998","unstructured":"Jirstrand, M. Constructive Methods for Inequality Constraints in Control, Link\u00f6ping Studies in Science and Technology, Dissertations, no. 527, Link\u00f6ping University, Department of Electrical Engineering, Link\u00f6ping, Sweden, 1998."},{"key":"273359_CR23","volume-title":"Inners and Stability of Dynamic Systems","author":"E. J. Jury","year":"1974","unstructured":"Jury, E. J.: Inners and Stability of Dynamic Systems, Wiley, New York, 1974; Krieger, FLA, 2nd edn., 1982.","edition":"2nd edn."},{"key":"273359_CR24","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/TCT.1963.1082100","volume":"10","author":"E. I. Jury","year":"1963","unstructured":"Jury, E. I. and Pavlidis, T.: Stability and Aperiodicity Constraints for System Design, IEEE Trans. Circuit Theory\n10 (1963), pp. 137-141.","journal-title":"IEEE Trans. Circuit Theory"},{"key":"273359_CR25","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1016\/S0005-1098(97)00028-9","volume":"33","author":"S. Malan","year":"1997","unstructured":"Malan, S., Milanese, M., and Taragna, M.: Robust Analysis and Design of Control Systems Using Interval Arithmetic, Automatica\n33 (1997), pp. 1363-1372.","journal-title":"Automatica"},{"key":"273359_CR26","doi-asserted-by":"crossref","unstructured":"Malan, S., Milanese, M., Taragna, M., and Garloff, J.: B\n3 Algorithm for Robust Performances Analysis in Presence of Mixed Parametric and Dynamic Perturbations, in: Proc. 31st Conf. Decision Contr., Tucson, AZ, 1992, pp. 128-133.","DOI":"10.1109\/CDC.1992.371776"},{"key":"273359_CR27","volume-title":"Computational Geometry, An Introduction through Randomized Algorithms","author":"K. Mulmuley","year":"1994","unstructured":"Mulmuley, K.: Computational Geometry, An Introduction through Randomized Algorithms, Prentice Hall, Englewood-Cliffs, 1994."},{"key":"273359_CR28","volume-title":"Interval Methods for Systems of Equations","author":"A. Neumaier","year":"1990","unstructured":"Neumaier, A.: Interval Methods for Systems of Equations, Cambridge University Press, Cambridge, 1990."},{"key":"273359_CR29","unstructured":"Ohta, Y.: Nonconvex Polygon Interval Arithmetic as a Tool for the Analysis and Design of Robust Control Systems, this issue, pp. 247-279."},{"key":"273359_CR30","volume-title":"Computer Methods for the Range of Functions","author":"H. Ratschek","year":"1984","unstructured":"Ratschek, H. and Rokne, J.: Computer Methods for the Range of Functions, Ellis Horwood, Chichester, 1984."},{"key":"273359_CR31","doi-asserted-by":"crossref","first-page":"47","DOI":"10.6028\/jres.074B.006","volume":"74B","author":"T. J. Rivlin","year":"1970","unstructured":"Rivlin, T. J.: Bounds on a Polynomial, J. Res. Nat. Bur. Standards Section B\n74B (1970), pp. 47-54.","journal-title":"J. Res. Nat. Bur. Standards Section B"},{"key":"273359_CR32","series-title":"Techn. Rep.","volume-title":"Computational Experiences with the Bernstein Algorithm","author":"C. Roguet","year":"1994","unstructured":"Roguet, C. and Garloff, J.: Computational Experiences with the Bernstein Algorithm, Techn. Rep. no. 9403, Fachhochschule Konstanz, Fachbereich Informatik, 1994."},{"key":"273359_CR33","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/BF02253209","volume":"18","author":"J. Rokne","year":"1977","unstructured":"Rokne, J.: Bounds for an Interval Polynomial, Computing\n18 (1977), pp. 225-240.","journal-title":"Computing"},{"key":"273359_CR34","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02253136","volume":"21","author":"J. Rokne","year":"1979","unstructured":"Rokne, J.: A Note on the Bernstein Algorithm for Bounds for Interval Polynomials, Computing\n21 (1979), pp. 159-170.","journal-title":"Computing"},{"key":"273359_CR35","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02253127","volume":"22","author":"J. Rokne","year":"1979","unstructured":"Rokne, J.: The Range of Values of a Complex Polynomial over a Complex Interval, Computing\n22 (1979), pp. 153-169.","journal-title":"Computing"},{"key":"273359_CR36","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/BF02241751","volume":"28","author":"J. Rokne","year":"1982","unstructured":"Rokne, J.: Optimal Computation of the Bernstein Algorithm for the Bound of an Interval Polynomial, Computing\n28 (1982), pp. 239-246.","journal-title":"Computing"},{"key":"273359_CR37","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/BF02551375","volume":"3","author":"L. Saydy","year":"1990","unstructured":"Saydy, L., Tits, A. L., and Abed, E. H.: Guardian Maps and the Generalized Stability of Parameterized Families of Matrices and Polynomials, Math. Contr., Signals, and Syst.\n3 (1990), pp. 345-371.","journal-title":"Math. Contr., Signals, and Syst."},{"key":"273359_CR38","unstructured":"Vehi, J., Rodellar, J., Sainz, M., and Armengol, J.: Analysis of the Robustness of Predictive Controllers via Modal Intervals, this issue, pp 281-301."},{"key":"273359_CR39","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/9.286277","volume":"39","author":"E. Walter","year":"1994","unstructured":"Walter, E. and Jaulin, L.: Guaranteed Characterization of Stability Domains via Set Inversion, IEEE Trans. Automat. Contr.\n39 (1994), pp. 886-889.","journal-title":"IEEE Trans. Automat. Contr."},{"key":"273359_CR40","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/9.661615","volume":"43","author":"M. Zettler","year":"1998","unstructured":"Zettler, M. and Garloff, J.: Robustness Analysis of Polynomials with Polynomial Parameter Dependency Using Bernstein Expansion, IEEE Trans. Automat. Contr.\n43 (1998), pp. 425-431.","journal-title":"IEEE Trans. Automat. Contr."}],"container-title":["Reliable Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009934614393.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1009934614393\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009934614393.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T09:31:43Z","timestamp":1754472703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1009934614393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,8]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,8]]}},"alternative-id":["273359"],"URL":"https:\/\/doi.org\/10.1023\/a:1009934614393","relation":{},"ISSN":["1385-3139","1573-1340"],"issn-type":[{"type":"print","value":"1385-3139"},{"type":"electronic","value":"1573-1340"}],"subject":[],"published":{"date-parts":[[2000,8]]}}}