{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:26:48Z","timestamp":1775078808051,"version":"3.50.1"},"reference-count":17,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Optimization Methods and Software"],"published-print":{"date-parts":[[2016,3,3]]},"DOI":"10.1080\/10556788.2015.1104677","type":"journal-article","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T12:16:25Z","timestamp":1448540185000},"page":"435-443","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Exploiting hardware capabilities in interior point methods"],"prefix":"10.1080","volume":"31","author":[{"given":"Csaba","family":"M\u00e9sz\u00e1ros","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1.2.84"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1137\/S0895479894278952"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-3449-1_6"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1287\/opre.38.2.240"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.03.050"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1137\/1031001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/BF00249643"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/BF01585995"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/355841.355847"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1137\/0614019"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.6.1.1"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1080\/10556789908805758"},{"issue":"4","key":"CIT0020","first-page":"289","volume":"13","author":"M\u00e9sz\u00e1ros C.","year":"2005","journal-title":"Central Eur. J. Oper. Res."},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/10556780903239410"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/s00291-003-0130-x"},{"key":"CIT0024","volume-title":"Computer Organization and Design","author":"Patterson D.","year":"2013","edition":"5"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.10.1.107"}],"container-title":["Optimization Methods and Software"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10556788.2015.1104677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,16]],"date-time":"2016-12-16T17:56:04Z","timestamp":1481910964000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10556788.2015.1104677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,26]]},"references-count":17,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2015,11,13]]},"published-print":{"date-parts":[[2016,3,3]]}},"alternative-id":["10.1080\/10556788.2015.1104677"],"URL":"https:\/\/doi.org\/10.1080\/10556788.2015.1104677","relation":{},"ISSN":["1055-6788","1029-4937"],"issn-type":[{"value":"1055-6788","type":"print"},{"value":"1029-4937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=goms20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=goms20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}