{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:33Z","timestamp":1750306113442,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,13]],"date-time":"2017-04-13T00:00:00Z","timestamp":1492041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,13]]},"DOI":"10.1145\/3049797.3049825","type":"proceedings-article","created":{"date-parts":[[2017,4,14]],"date-time":"2017-04-14T12:18:54Z","timestamp":1492172334000},"page":"143-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Coupling Policy Iterations with Piecewise Quadratic Lyapunov Functions"],"prefix":"10.1145","author":[{"given":"Assal\u00e9","family":"Adj\u00e9","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Perpignan Via Domitia, Perpignan, France"}]}],"member":"320","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Numerical Software Verification (NSV 2014)","author":"Adj\u00e9 A.","year":"2014","unstructured":"A. Adj\u00e9 . Policy iteration in finite templates domain . In Numerical Software Verification (NSV 2014) , 2014 . A. Adj\u00e9. Policy iteration in finite templates domain. In Numerical Software Verification (NSV 2014), 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46081-8_6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-8(1:1)2012"},{"key":"e_1_3_2_1_5_1","volume-title":"Asymptotic Cones and Functions in Optimization and Variational Inequalities","author":"Auslender A.","year":"2006","unstructured":"A. Auslender and M. Teboulle . Asymptotic Cones and Functions in Optimization and Variational Inequalities . Springer Science & Business Media , 2006 . A. Auslender and M. Teboulle. Asymptotic Cones and Functions in Optimization and Variational Inequalities. Springer Science & Business Media, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11439-2_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-011-9749-3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/070711815"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_46"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100036185"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2002.800666"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(02)00142-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_17"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2011.12.048"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.12.5.359"},{"key":"e_1_3_2_1_16_1","volume-title":"Dynamic Programming and Markov Processes","author":"Howard R. A.","year":"1960","unstructured":"R. A. Howard . Dynamic Programming and Markov Processes . MIT Press , Cambridge, MA , 1960 . R. A. Howard. Dynamic Programming and Markov Processes. MIT Press, Cambridge, MA, 1960."},{"key":"e_1_3_2_1_17_1","first-page":"646","volume-title":"ISCAS '03. Proceedings of the 2003 International Symposium on","volume":"3","author":"Johansson M.","unstructured":"M. Johansson . On Modeling , Analysis and Design of Piecewise Linear Control Systems . In Circuits and Systems, 2003 . ISCAS '03. Proceedings of the 2003 International Symposium on , volume 3 , pages III-- 646 --III--649 vol.3, May 2003. M. Johansson. On Modeling, Analysis and Design of Piecewise Linear Control Systems. In Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, volume 3, pages III--646--III--649 vol.3, May 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(81)90276-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2012.09.008"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0013091500014681"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2000.912814"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/1905733"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1430242"},{"key":"e_1_3_2_1_24_1","volume-title":"Semidefinite Programming. Interior point methods of mathematical programming, 5:369--398","author":"Ramana M. V.","year":"1997","unstructured":"M. V. Ramana and P. M. Pardalos . Semidefinite Programming. Interior point methods of mathematical programming, 5:369--398 , 1997 . M. V. Ramana and P. M. Pardalos. Semidefinite Programming. Interior point methods of mathematical programming, 5:369--398, 1997."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185632.2185651"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"P.\n      Schrammel\n     and \n      P.\n      Subotic\n  . \n  Logico-Numerical Max-Strategy Iteration\n  . In Roberto Giacobazzi Josh Berdine and Isabella Mastroeni editors Verification Model Checking and Abstract Interpretation volume \n  7737\n   of \n  Lecture Notes in Computer Science pages \n  414\n  --\n  433\n  . \n  Springer Berlin Heidelberg 2013\n  .  P. Schrammel and P. Subotic. Logico-Numerical Max-Strategy Iteration. In Roberto Giacobazzi Josh Berdine and Isabella Mastroeni editors Verification Model Checking and Abstract Interpretation volume 7737 of Lecture Notes in Computer Science pages 414--433. Springer Berlin Heidelberg 2013.","DOI":"10.1007\/978-3-642-35873-9_25"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25141-7_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24372-1_21"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1955.5.285"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90100-C"}],"event":{"name":"HSCC '17: 20th International Conference on Hybrid Systems: Computation and Control","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Pittsburgh Pennsylvania USA","acronym":"HSCC '17"},"container-title":["Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3049797.3049825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3049797.3049825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:26Z","timestamp":1750217786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3049797.3049825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,13]]},"references-count":29,"alternative-id":["10.1145\/3049797.3049825","10.1145\/3049797"],"URL":"https:\/\/doi.org\/10.1145\/3049797.3049825","relation":{},"subject":[],"published":{"date-parts":[[2017,4,13]]},"assertion":[{"value":"2017-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}