{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:04:41Z","timestamp":1760061881984,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,22]],"date-time":"2012-07-22T00:00:00Z","timestamp":1342915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0728977, CCF-0917093"],"award-info":[{"award-number":["CCF-0728977, CCF-0917093"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,22]]},"DOI":"10.1145\/2442829.2442875","type":"proceedings-article","created":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T19:25:33Z","timestamp":1361561133000},"page":"319-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Near optimal tree size bounds on a simple real root isolation algorithm"],"prefix":"10.1145","author":[{"given":"Vikram","family":"Sharma","sequence":"first","affiliation":[{"name":"Institute of Mathematical Sciences Chennai, India"}]},{"given":"Chee K.","family":"Yap","sequence":"additional","affiliation":[{"name":"New York University New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2012,7,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.15388\/NA.2005.10.4.15110"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019199917103"},{"volume-title":"AMS","year":"1990","author":"Borgwardt K. H.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2011.08.022"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Burr F. Krahmer and C. Yap. Continuous amortization: A non-probabilistic adaptive analysis technique. Electronic Colloquium on Computational Complexity (ECCC) TR09(136) December 2009.  M. Burr F. Krahmer and C. Yap. Continuous amortization: A non-probabilistic adaptive analysis technique. Electronic Colloquium on Computational Complexity (ECCC) TR09(136) December 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/800205.806346"},{"key":"e_1_3_2_1_7_1","unstructured":"T. H. Corman C. E. Leiserson R. L. Rivest and C. Stein. Introduction to Algorithms. The MIT Press and McGraw-Hill Book Company Cambridge Massachusetts and New York second edition 2001.   T. H. Corman C. E. Leiserson R. L. Rivest and C. Stein. Introduction to Algorithms . The MIT Press and McGraw-Hill Book Company Cambridge Massachusetts and New York second edition 2001."},{"key":"e_1_3_2_1_9_1","first-page":"239","article-title":"Localization of an algebraic hypersurface by the exclusion algorithm. Applicable Algbebra in Engineering","volume":"2","author":"Dedieu J.-P.","year":"1992","journal-title":"Communication and Computing"},{"key":"e_1_3_2_1_10_1","first-page":"113","volume-title":"Trends in Mathematics","author":"Du Z.","year":"2007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145768.1145786"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837934.1837980"},{"key":"e_1_3_2_1_13_1","unstructured":"The GNU Multi Precision Library Since 1991 v5.0.1: February 2010. http:\/\/gmplib.org.  The GNU Multi Precision Library Since 1991 v5.0.1: February 2010. http:\/\/gmplib.org."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1577190.1577202"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J. Johnson. Algorithms for polynomial real root isolation. In B. Caviness and J. Johnson editors Quantifier Elimination and Cylindrical Algebraic Decomposition Texts and monographs in Symbolic Computation pages 269--299. Springer 1998.  J. Johnson. Algorithms for polynomial real root isolation. In B. Caviness and J. Johnson editors Quantifier Elimination and Cylindrical Algebraic Decomposition Texts and monographs in Symbolic Computation pages 269--299. Springer 1998.","DOI":"10.1007\/978-3-7091-9459-1_13"},{"volume-title":"Oxford Computing Laboratory","year":"2010","author":"Kamath N.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2331684.2331710"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.2000.0427"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-011-9345-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/37402.37422"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2010.02.002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/93267.93276"},{"key":"e_1_3_2_1_23_1","unstructured":"R. E. Moore. Interval Analysis. Prentice Hall Englewood Cliffs NJ 1966.  R. E. Moore. Interval Analysis . Prentice Hall Englewood Cliffs NJ 1966."},{"volume-title":"Cambridge University Press","year":"1990","author":"Neumaier A.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144595288554"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057432.1057465"},{"key":"e_1_3_2_1_27_1","unstructured":"H. Ratschek and J. Rokne. Computer Methods for the Range of Functions. Horwood Publishing Limited Chichester West Sussex UK 1984.  H. Ratschek and J. Rokne. Computer Methods for the Range of Functions . Horwood Publishing Limited Chichester West Sussex UK 1984."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/258726.258792"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(87)90022-7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2003.08.015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993886.1993938"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.017"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/142920.134024"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/990308.990310"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/0606031"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.10.010"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2005.06.007"},{"volume-title":"Oxford University Press","year":"2000","author":"Yap C. K.","key":"e_1_3_2_1_38_1"}],"event":{"name":"ISSAC'12: International Symposium on Symbolic and Algebraic Computation","sponsor":["Grenoble University Grenoble University","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAM ACM Special Interest Group on Symbolic and Algebraic Manipulation"],"location":"Grenoble France","acronym":"ISSAC'12"},"container-title":["Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2442829.2442875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2442829.2442875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:40Z","timestamp":1750234720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2442829.2442875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,22]]},"references-count":37,"alternative-id":["10.1145\/2442829.2442875","10.1145\/2442829"],"URL":"https:\/\/doi.org\/10.1145\/2442829.2442875","relation":{},"subject":[],"published":{"date-parts":[[2012,7,22]]},"assertion":[{"value":"2012-07-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}