{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T22:33:20Z","timestamp":1714516400653},"reference-count":30,"publisher":"EDP Sciences","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["RAIRO-Oper. Res."],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1051\/ro:2007007","type":"journal-article","created":{"date-parts":[[2007,4,4]],"date-time":"2007-04-04T14:55:41Z","timestamp":1175698541000},"page":"105-121","source":"Crossref","is-referenced-by-count":3,"title":["Convergence analysis of adaptive trust region methods"],"prefix":"10.1051","volume":"41","author":[{"given":"Zhen-Jun","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xiang-Sun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Shen","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2007,6,15]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1137\/0724077","volume":"24","author":"Byrd","year":"1987","journal-title":"SIAM J. Numer. Anal."},{"key":"R2","doi-asserted-by":"crossref","unstructured":"A.R. Conn, N.I.M. Gould and P.L. Toint,Trust-Region Methods,Society for Industrial and Applied Mathematics (SIAM), Philadelphia PA (2000).","DOI":"10.1137\/1.9780898719857"},{"key":"R3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1080\/00207169708804601","volume":"65","author":"Corradi","year":"1997","journal-title":"Int. J. Comput. Math."},{"key":"R4","first-page":"221","volume":"21","author":"Dai","year":"2003","journal-title":"J. Comput. Math."},{"key":"R5","unstructured":"R. Fletcher,Practical Method of Optimization, Unconstrained Optimization, Vol. 1, John Wiley, New York (1980)."},{"key":"R6","first-page":"865","volume":"22","author":"Fan","year":"2004","journal-title":"J. Comput. Math."},{"key":"R7","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.amc.2004.02.011","volume":"163","author":"Fu","year":"2005","journal-title":"Appl. Math. Comput."},{"key":"R8","first-page":"447","volume":"100","author":"Gertz","year":"2004","journal-title":"Math. Program. Ser. A"},{"key":"R9","doi-asserted-by":"crossref","unstructured":"N.I.M. Gould, D. Orban, A. Sartenaer and P.L. Toint, Sensitivity of trust-region algorithms to their parameters.4OR3(2005) 227\u2013241.","DOI":"10.1007\/s10288-005-0065-y"},{"key":"R10","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1017\/S0962492904000248","volume":"14","author":"Gould","year":"2005","journal-title":"Acta Numer."},{"key":"R11","first-page":"229","volume":"21","author":"Hei","year":"2003","journal-title":"J. Comput. Math."},{"key":"R12","unstructured":"J.J. Mor\u00e9, Recent developments in algorithms and software for trust region methods, inMathematical Programming: The State of the Art, edited by A. Bachem, M. Grotchel and B. Korte, Springer- Verlag, Berlin (1983) 258\u2013287."},{"key":"R13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/355934.355936","volume":"7","author":"Mor\u00e9","year":"1981","journal-title":"ACM Trans. Math. Software"},{"key":"R14","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1051\/ro\/1997310403311","volume":"31","author":"Mauricio","year":"1997","journal-title":"RAIRO Rech. Op\u00e9r."},{"key":"R15","doi-asserted-by":"crossref","unstructured":"J. Nocedal and S.J. Wright,Numerical Optimization. Springer-Verlag, New York (1999).","DOI":"10.1007\/b98874"},{"key":"R16","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1080\/1055678031000118491","volume":"18","author":"Ni","year":"2003","journal-title":"Optim. Methods Softw."},{"key":"R17","doi-asserted-by":"crossref","unstructured":"M.J.D. Powell, Convergence properties of a class minimization algorithms, inNonlinear Programming\u00a02, edited by O.L. Mangasarian, R.R. Meyer and S.M. Robinson, Academic Press, New York (1975) 1\u201327.","DOI":"10.1016\/B978-0-12-468650-2.50005-5"},{"key":"R18","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/BF02591998","volume":"29","author":"Powell","year":"1984","journal-title":"Math. Prog."},{"key":"R19","doi-asserted-by":"crossref","first-page":"1788","DOI":"10.1137\/S1064827595286955","volume":"18","author":"Sartenaer","year":"1997","journal-title":"SIAM J. Sci. Comput."},{"key":"R20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1137\/0722003","volume":"22","author":"Shultz","year":"1985","journal-title":"SIAM J. Numer. Anal."},{"key":"R21","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.amc.2003.07.008","volume":"156","author":"Sun","year":"2004","journal-title":"Appl. Math. Comput."},{"key":"R22","doi-asserted-by":"crossref","unstructured":"J. Sun, On piecewise quadratic Newton and trust region problems.Math. Programming, Ser.\u00a0B76(1997) 451\u2013467.","DOI":"10.1007\/BF02614393"},{"key":"R23","unstructured":"Z.J. Shi and H.Q. Wang,A new self-adaptive trust region method for unconstrained optimization. Technical Report, College of Operations Research and Management, Qufu Normal University (2004)."},{"key":"R24","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1023\/A:1018957708498","volume":"87","author":"Zhang","year":"1999","journal-title":"Ann. Oper. Res."},{"key":"R25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF02009555","volume":"12","author":"Zhang","year":"1996","journal-title":"Acta Math. Appl. Sinica"},{"key":"R26","doi-asserted-by":"crossref","unstructured":"X.S. Zhang, Trust region method in neural network.Acta Math. Appl. Sinica(English Ser.)13(1997) 342\u2013352.","DOI":"10.1007\/BF02009542"},{"key":"R27","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1360\/02ys9067","volume":"45","author":"Zhang","year":"2002","journal-title":"Science in China"},{"key":"R28","first-page":"53","volume":"5","author":"Zhang","year":"2001","journal-title":"OR Transactions"},{"key":"R29","doi-asserted-by":"crossref","unstructured":"Y.X. Yuan, A review of trust region algorithms for optimization, inICIAM 99 (Edinburgh), Oxford Univ. Press, Oxford (2000) 271\u2013282.","DOI":"10.1093\/oso\/9780198505143.003.0023"},{"key":"R30","first-page":"7","volume":"1","author":"Yuan","year":"1998","journal-title":"Information"}],"container-title":["RAIRO - Operations Research"],"original-title":[],"link":[{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro:2007007\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,12]],"date-time":"2024-02-12T18:57:43Z","timestamp":1707764263000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro:2007007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":30,"journal-issue":{"issue":"1"},"alternative-id":["ro0520"],"URL":"https:\/\/doi.org\/10.1051\/ro:2007007","relation":{},"ISSN":["0399-0559","1290-3868"],"issn-type":[{"value":"0399-0559","type":"print"},{"value":"1290-3868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}