{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:38:34Z","timestamp":1769063914124,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/tcsi.2012.2215731","type":"journal-article","created":{"date-parts":[[2012,10,18]],"date-time":"2012-10-18T15:30:34Z","timestamp":1350574234000},"page":"164-177","source":"Crossref","is-referenced-by-count":18,"title":["Dissipativity Enforcement via Perturbation of Para-Hermitian Pencils"],"prefix":"10.1109","volume":"60","author":[{"given":"Tobias","family":"Brull","sequence":"first","affiliation":[]},{"given":"Christian","family":"Schroder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10543-007-0143-y"},{"key":"ref30","author":"schrder","year":"2008","journal-title":"Palindromic and Even Eigenvalue ProblemsAnalysis and Numerical Methods"},{"key":"ref10","author":"freund","year":"2006","journal-title":"Numerical Computation of Nearby Positive Real Systems in the Descriptor Case"},{"key":"ref11","author":"freund","year":"2006","journal-title":"Nonlinear Semidefinite Programming Sensitivity Convergence and an Application in Passive Reduced Order Modeling"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3166\/ejc.8.275-298"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2005.1583449"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/100817048"},{"key":"ref15","author":"schrder","year":"2007","journal-title":"Passivation of LTI Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2010.5653885"},{"key":"ref17","article-title":"Passivity enforcement of descriptor systems via structured perturbation of hamiltonian matrix pencils","author":"voigt","year":"2011","journal-title":"Talk at Meeting of the GAMM Activity Group Dynamics and Control Theory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/10079464X"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/040609355"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2012.01.028"},{"key":"ref4","author":"gantmacher","year":"1959","journal-title":"The Theory of Matrices I"},{"key":"ref27","article-title":"An implicitly-restarted Krylov method for real symmetric\/skew-symmetric eigenproblems","author":"mehrmann","year":"2009","journal-title":"Linear Algebra and its Applications"},{"key":"ref3","author":"anderson","year":"1973","journal-title":"Network Analysis and Synthesis"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EPEP.2003.1250053"},{"key":"ref29","author":"schrder","year":"2007","journal-title":"DFG Research Center Matheon Mathematics for key technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/59.910786"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1999.781313"},{"key":"ref7","first-page":"25","article-title":"On passivity check and compensation of macromodels from tabulated data","author":"saraswat","year":"2003","journal-title":"Proc Ser 7th IEEE Workshop Signal Propagation on Interconnects"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718713"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/10556780410001654232"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2004.834527"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00498-011-0065-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)90466-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2953-5"},{"key":"ref24","author":"stewart","year":"1990","journal-title":"Matrix Perturbation Theory"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2008.03.015"},{"key":"ref26","author":"golub","year":"1996","journal-title":"Matrix Computations"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0039443"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8919\/6403532\/06298986.pdf?arnumber=6298986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T12:51:33Z","timestamp":1640263893000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6298986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":31,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2012.2215731","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}