{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:55Z","timestamp":1760061715746,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T00:00:00Z","timestamp":1372204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,26]]},"DOI":"10.1145\/2465506.2465951","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T19:13:21Z","timestamp":1372187601000},"page":"371-378","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Verified error bounds for real solutions of positive-dimensional polynomial systems"],"prefix":"10.1145","author":[{"given":"Zhengfeng","family":"Yang","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Lihong","family":"Zhi","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yijun","family":"Zhu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2013,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.2002.0563"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-011-9112-6"},{"key":"e_1_3_2_1_3_1","first-page":"2001","article-title":"Polar varieties and efficient real elimination","volume":"238","author":"Bank B.","year":"2000","journal-title":"MATHEMATISCHE ZEITSCHRIFT"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-009-0117-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/235809.235813"},{"key":"e_1_3_2_1_6_1","first-page":"69","volume":"21","author":"Beltr\u00e1n C.","year":"2012","journal-title":"Certified Numerical Homotopy Tracking. Experimental Mathematics"},{"key":"e_1_3_2_1_7_1","first-page":"99","volume-title":"Alorithm in Algebraic Geometry","author":"Camilla M. H.","year":"2008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Canny J.\n      \n  \n   \n  Computing roadmaps of general semi-algebraic sets\n  . In Applied Algebra Algebraic Algorithms and Error-Correcting Codes H. Mattson T. Mora and T. Rao Eds. vol. \n  539\n   of \n  Lecture Notes in Computer Science\n  . \n  Springer Berlin Heidelberg 1991 pp. \n  94\n  --\n  107\n  .   Canny J. Computing roadmaps of general semi-algebraic sets. In Applied Algebra Algebraic Algorithms and Error-Correcting Codes H. Mattson T. Mora and T. Rao Eds. vol. 539 of Lecture Notes in Computer Science. Springer Berlin Heidelberg 1991 pp. 94--107.","DOI":"10.1007\/3-540-54522-0_99"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00211-010-0332-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/050626636"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.839"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Collins G.\n      \n  \n   \n  Quantifier elimination for real closed fields by cylindrical algebraic decompostion\n  . vol. \n  33\n   of \n  Lecture Notes in Computer Science\n  . \n  1975 pp. \n  134\n  --\n  183\n  .   Collins G. Quantifier elimination for real closed fields by cylindrical algebraic decompostion. vol. 33 of Lecture Notes in Computer Science. 1975 pp. 134--183.","DOI":"10.1007\/3-540-07407-4_17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247069.1247116"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993886.1993910"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01202001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(88)80005-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hauenstein J. D. Numerically computing real points on algebraic sets. ArXiv e-prints (May 2011).  Hauenstein J. D. Numerically computing real points on algebraic sets. ArXiv e-prints (May 2011).","DOI":"10.1007\/s10440-012-9782-3"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2331130.2331136"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02573999"},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Control and Inform","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/10997703_15","volume-title":"Positive polynomials in control","author":"Henrion D.","year":"2005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Krawczyk R. Newton-algorithmen zur bestimmung von nullstellen mit fehlerschranken. Computing (1969) 187--201.  Krawczyk R. Newton-algorithmen zur bestimmung von nullstellen mit fehlerschranken. Computing (1969) 187--201.","DOI":"10.1007\/BF02234767"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Lasserre J. Moments Positive Polynomials and Their Applications. Imperial College Press 2009.  Lasserre J. Moments Positive Polynomials and Their Applications. Imperial College Press 2009.","DOI":"10.1142\/p665"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-007-9004-y"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-008-0015-6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.02.018"},{"key":"e_1_3_2_1_26_1","unstructured":"Li N. and Zhi L. Verified error bounds for isolated singular solutions of polynomial systems. Preprint arxiv.org\/pdf\/1201.3443.  Li N. and Zhi L. Verified error bounds for isolated singular solutions of polynomial systems. Preprint arxiv.org\/pdf\/1201.3443."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.10.028"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442829.2442866"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993886.1993925"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/0714040"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(10)80003-3"},{"key":"e_1_3_2_1_32_1","first-page":"123","volume-title":"Algorithmic and Quantitative Aspects of Real Algebraic Geometry in Mathematics and Computer Science","author":"Rouillier F.","year":"2001"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcom.2000.0563"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/312.316"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-1247-7_7"},{"key":"e_1_3_2_1_36_1","first-page":"3","article-title":"Verified error bounds for multiple roots of systems of nonlinear equations","volume":"54","author":"Rump S.","year":"2009","journal-title":"Numerical Algorithms"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/860854.860901"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2307\/1969640"},{"key":"e_1_3_2_1_39_1","unstructured":"Shen F. Wu W. and Xia B. Real Root Isolation of Polynomial Equations Based on Hybrid Computation. ArXiv e-prints July 2012.  Shen F. Wu W. and Xia B. Real Root Isolation of Polynomial Equations Based on Hybrid Computation. ArXiv e-prints July 2012."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcom.2000.0554"},{"key":"e_1_3_2_1_41_1","first-page":"749","volume-title":"The mathematics of numerical analysis (Park City, UT","author":"Sommese A. J.","year":"1995"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1142\/5763"},{"volume-title":"Technische Universit\u00e4t Kaiserslautern","year":"2007","author":"Spang S. J.","key":"e_1_3_2_1_43_1"},{"volume-title":"SIAM","year":"2004","author":"Stetter H.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/317275.317286"}],"event":{"name":"ISSAC'13: International Symposium on Symbolic and Algebraic Computation","sponsor":["SIGSAM ACM Special Interest Group on Symbolic and Algebraic Manipulation"],"location":"Boston Maine USA","acronym":"ISSAC'13"},"container-title":["Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465506.2465951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2465506.2465951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:36Z","timestamp":1750234716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465506.2465951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,26]]},"references-count":45,"alternative-id":["10.1145\/2465506.2465951","10.1145\/2465506"],"URL":"https:\/\/doi.org\/10.1145\/2465506.2465951","relation":{},"subject":[],"published":{"date-parts":[[2013,6,26]]},"assertion":[{"value":"2013-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}