{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T04:33:10Z","timestamp":1724473990497},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1985,6,1]],"date-time":"1985-06-01T00:00:00Z","timestamp":486432000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mathematical Programming"],"published-print":{"date-parts":[[1985,6]]},"DOI":"10.1007\/bf02591750","type":"journal-article","created":{"date-parts":[[2007,3,29]],"date-time":"2007-03-29T11:42:12Z","timestamp":1175168532000},"page":"220-228","source":"Crossref","is-referenced-by-count":71,"title":["Conditions for convergence of trust region algorithms for nonsmooth optimization"],"prefix":"10.1007","volume":"31","author":[{"given":"Y.","family":"Yuan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF02591750_CR1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/BFb0120959","volume":"17","author":"R. Fletcher","year":"1982","unstructured":"R. Fletcher, \u201cA model algorithm for composite NDO problems,\u201dMathematical Programming Studies 17 (1982) 67\u201376.","journal-title":"Mathematical Programming Studies"},{"key":"BF02591750_CR2","volume-title":"Practical methods of optimization, Vol. 1, Unconstrained optimization","author":"R. Fletcher","year":"1980","unstructured":"R. Fletcher,Practical methods of optimization, Vol. 1, Unconstrained optimization (John Wiley & Sons, New York, 1980)."},{"key":"BF02591750_CR3","volume-title":"Practical methods of optimization, Vol. 2, Constrained optimization","author":"R. Fletcher","year":"1981","unstructured":"R. Fletcher,Practical methods of optimization, Vol. 2, Constrained optimization (John Wiley & Sons, New York, 1981)."},{"key":"BF02591750_CR4","volume-title":"Numerical analysis","author":"R. Fletcher","year":"1982","unstructured":"R. Fletcher, \u201cSecond order correction for nondifferentiable optimization\u201d, in: G.A. Watson, ed.,Numerical analysis (Springer-Verlag, Berlin, 1982)."},{"key":"BF02591750_CR5","volume-title":"Mathematical programming, The state of the art","author":"J.J. M\u00f3re","year":"1983","unstructured":"J.J. M\u00f3re, \u201cRecent developments in algorithms and software for trust region methods,\u201d in: A. Bachem, M. Gr\u00f6tschel and B. Korte, eds,Mathematical programming, The state of the art (Springer-Verlag, Berlin-Heidelberg, 1983)."},{"key":"BF02591750_CR6","volume-title":"Nonlinear programming","author":"M.J.D. Powell","year":"1970","unstructured":"M.J.D. Powell, \u201cA new algorithm for unconstrained optimization\u201d, in: J.B. Rosen, O.L. Mangasarian, and K. Ritter, eds.,Nonlinear programming (Academic Press, New York, 1970)."},{"key":"BF02591750_CR7","volume-title":"Nonlinear programming 2","author":"M.J.D. Powell","year":"1975","unstructured":"M.J.D. Powell, \u201cConvergence properties of a classs of minimization algorithms\u201d, in: O.L. Mangasarian, R.R. Meyer and S.M. Robinson, eds.,Nonlinear programming 2 (Academic Press, New York, 1975)."},{"key":"BF02591750_CR8","unstructured":"M.J.D. Powell, \u201cOn the global convergence of trust region algorithms for unconstrained minimization\u201d, Report DAMTP 1982\/NA7, University of Cambridge."},{"key":"BF02591750_CR9","unstructured":"M.J.D. Powell, \u201cGeneral algorithms for discrete nonlinear approximation calculations\u201d, Report DAMPT 1983\/NA2, University of Cambridge."},{"key":"BF02591750_CR10","doi-asserted-by":"crossref","DOI":"10.1515\/9781400873173","volume-title":"Convex analysis","author":"R.T. Rockaffellar","year":"1970","unstructured":"R.T. Rockaffellar,Convex analysis (Princeton University Press, Princeton, New Jersey, 1970)."},{"key":"BF02591750_CR11","volume-title":"The theory of subgradent and its application to problems of optimization: Convex and not convex functions","author":"R.T. Rockafellar","year":"1981","unstructured":"R.T. Rockafellar, The theory of subgradent and its application to problems of optimization: Convex and not convex functions (Heldermann-Verlag, West Berlin, 1981)."},{"key":"BF02591750_CR12","volume-title":"Nonlinear optimization 1981","author":"D.C. Sorensen","year":"1982","unstructured":"D.C. Sorensen, \u201cTrust region methods for unconstrained optimization\u201d, in: M.J.D. Powell, ed.,Nonlinear optimization 1981 (Academic Press, London, 1982)."},{"key":"BF02591750_CR13","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1137\/0720042","volume":"20","author":"T. Steihaug","year":"1983","unstructured":"T. Steihaug, \u201cThe conjugate gradient method and trust regions in large scale optimization\u201d,SIAM Journal of Numerical Analysis 20 (1983) 626\u2013637.","journal-title":"SIAM Journal of Numerical Analysis"},{"key":"BF02591750_CR14","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1137\/0716076","volume":"16","author":"Ph.L. Toint","year":"1979","unstructured":"Ph.L. Toint, \u201cOn the superlinear convergence of an algorithm for a sparse minimization problem\u201d,SIAM Journal of Numerical Analysis 16 (1979) 1036\u20131045.","journal-title":"SIAM Journal of Numerical Analysis"},{"key":"BF02591750_CR15","unstructured":"Y. Yuan, \u201cAn example of only linearly convergence of the trust region algorithm for nonsmooth optimization\u201d, Report DAMTP 1983\/NA15, University of Cambridge."},{"key":"BF02591750_CR16","unstructured":"Y. Yuan, \u201cOn the superlinear convergence of a trust region algorithm for nonsmooth optimization\u201d, Report DAMTP 1983\/NA16, University of Cambridge."}],"container-title":["Mathematical Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02591750.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02591750\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02591750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:37:49Z","timestamp":1558381069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02591750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,6]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1985,6]]}},"alternative-id":["BF02591750"],"URL":"https:\/\/doi.org\/10.1007\/bf02591750","relation":{},"ISSN":["0025-5610","1436-4646"],"issn-type":[{"value":"0025-5610","type":"print"},{"value":"1436-4646","type":"electronic"}],"subject":[],"published":{"date-parts":[[1985,6]]}}}