{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:44:19Z","timestamp":1755218659886,"version":"3.43.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2000,5,1]],"date-time":"2000-05-01T00:00:00Z","timestamp":957139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,5,1]],"date-time":"2000-05-01T00:00:00Z","timestamp":957139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Reliable Computing"],"published-print":{"date-parts":[[2000,5]]},"DOI":"10.1023\/a:1009977508817","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T19:25:11Z","timestamp":1040585111000},"page":"219-223","source":"Crossref","is-referenced-by-count":0,"title":["Every Superinterval of the Function Range Can Be an Interval-Computations Enclosure"],"prefix":"10.1007","volume":"6","author":[{"given":"Misha","family":"Koshelev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"261626_CR1","volume-title":"Precise Numerical Analysis","author":"O. Aberth","year":"1988","unstructured":"Aberth, O.: Precise Numerical Analysis, Wm. C. Brown Publishers, Dubuque, Iowa, 1988."},{"key":"261626_CR2","volume-title":"Precise Numerical Analysis Using C++","author":"O. Aberth","year":"1998","unstructured":"Aberth, O.: Precise Numerical Analysis Using C++, Academic Press, Boston, 1998."},{"key":"261626_CR3","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/B978-0-12-708245-5.50008-7","volume-title":"Computer Arithmetic and Self-Validating Numerical Methods","author":"G. Alefeld","year":"1990","unstructured":"Alefeld, G.: Enclosure Methods, in: Ullrich, C. (ed.), Computer Arithmetic and Self-Validating Numerical Methods, Academic Press, Boston, 1990, pp. 55-72."},{"key":"261626_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-68952-9","volume-title":"Foundations of Constructive Mathematics","author":"M. J. Beeson","year":"1985","unstructured":"Beeson, M. J.: Foundations of Constructive Mathematics, Springer-Verlag, N.Y., 1985."},{"unstructured":"Bishop, E.: Foundations of Constructive Analysis, McGraw-Hill, 1967.","key":"261626_CR5"},{"key":"261626_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-61667-9","volume-title":"Constructive Analysis","author":"E. Bishop","year":"1985","unstructured":"Bishop, E. and Bridges, D. S.: Constructive Analysis, Springer, N.Y., 1985."},{"key":"261626_CR7","volume-title":"Constructive Functional Analysis","author":"D. S. Bridges","year":"1979","unstructured":"Bridges, D. S.: Constructive Functional Analysis, Pitman, London, 1979."},{"unstructured":"Hertling, P.: A Lower Bound for Range Enclosure in Interval Arithmetic, in: Chesnaux, J.-M., Jezequel, F., Lamotte, J.-L., and Vignes, J. (eds), Proceedings of the Third Real Numbers and Computers Conference, Paris, April 1998, pp. 103-115.","key":"261626_CR8"},{"unstructured":"Hertling, P.: A Quadratic Lower Bound for Range Computation in Interval Arithmetic, in: Proceedings of the International Conference on Interval Methods and Their Applications on Global Optimization INTERVAL'98, Nanjing, April 1998, pp. 49-51.","key":"261626_CR9"},{"key":"261626_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2793-7","volume-title":"Computational Complexity and Feasibility of Data Processing and Interval Computations","author":"V. Kreinovich","year":"1998","unstructured":"Kreinovich, V., Lakeyev, A., Rohn, J., and Kahl, P.: Computational Complexity and Feasibility of Data Processing and Interval Computations, Kluwer, Dordrecht, 1998."},{"key":"261626_CR11","doi-asserted-by":"crossref","DOI":"10.1090\/mmono\/060","volume-title":"Lectures on Constructive Mathematical Analysis","author":"B. A. Kushner","year":"1984","unstructured":"Kushner, B. A.: Lectures on Constructive Mathematical Analysis, American Mathematical Society, Providence, RI, 1984."},{"issue":"1","key":"261626_CR12","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/91.554456","volume":"5","author":"H. T. Nguyen","year":"1997","unstructured":"Nguyen, H. T., Kreinovich, V., Nesterov, V., and Nakamura, M.: On Hardware Support for Interval Computations and for Soft Computing: A Theorem, IEEE Transactions on Fuzzy Systems\n5(1) (1997), pp. 108-127.","journal-title":"IEEE Transactions on Fuzzy Systems"}],"container-title":["Reliable Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009977508817.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1009977508817\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009977508817.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T09:35:33Z","timestamp":1754472933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1009977508817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,5]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,5]]}},"alternative-id":["261626"],"URL":"https:\/\/doi.org\/10.1023\/a:1009977508817","relation":{},"ISSN":["1385-3139","1573-1340"],"issn-type":[{"type":"print","value":"1385-3139"},{"type":"electronic","value":"1573-1340"}],"subject":[],"published":{"date-parts":[[2000,5]]}}}