{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T06:55:40Z","timestamp":1719989740179},"reference-count":17,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":1461,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational and Applied Mathematics"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1016\/j.cam.2015.11.005","type":"journal-article","created":{"date-parts":[[2015,11,14]],"date-time":"2015-11-14T12:47:38Z","timestamp":1447505258000},"page":"776-788","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Strong stability preserving explicit peer methods"],"prefix":"10.1016","volume":"296","author":[{"given":"Zolt\u00e1n","family":"Horv\u00e1th","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8030-421X","authenticated-orcid":false,"given":"Helmut","family":"Podhaisky","sequence":"additional","affiliation":[]},{"given":"R\u00fcdiger","family":"Weiner","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cam.2015.11.005_br000005","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/0021-9991(88)90177-5","article-title":"Efficient implementation of essentially non-oscillatory shock-capturing schemes","volume":"77","author":"Shu","year":"1988","journal-title":"J. Comput. Phys."},{"key":"10.1016\/j.cam.2015.11.005_br000010","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1007\/BF01933264","article-title":"Contractivity of Runge\u2013Kutta methods","volume":"31","author":"Kraaijevanger","year":"1991","journal-title":"BIT"},{"key":"10.1016\/j.cam.2015.11.005_br000015","series-title":"Strong Stability Preserving Runge\u2013Kutta and Multistep Time Discretizations","author":"Gottlieb","year":"2011"},{"key":"10.1016\/j.cam.2015.11.005_br000020","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1017\/S0962492906220014","article-title":"General linear methods","volume":"15","author":"Butcher","year":"2006","journal-title":"Acta Numer."},{"key":"10.1016\/j.cam.2015.11.005_br000025","series-title":"General Linear Methods for Ordinary Differential Equations","author":"Jackiewicz","year":"2009"},{"key":"10.1016\/j.cam.2015.11.005_br000030","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1137\/060661739","article-title":"Stepsize conditions for general monotonicity in numerical inital value problems","volume":"45","author":"Spijker","year":"2007","journal-title":"SIAM J. Numer. Anal."},{"issue":"267","key":"10.1016\/j.cam.2015.11.005_br000035","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1090\/S0025-5718-09-02209-1","article-title":"Computation of optimal monotonicity preserving general linear methods","volume":"78","author":"Ketcheson","year":"2009","journal-title":"Math. Comp."},{"key":"10.1016\/j.cam.2015.11.005_br000040","doi-asserted-by":"crossref","first-page":"3130","DOI":"10.1137\/090766206","article-title":"Optimal explicit strong-stability-preserving general linear methods","volume":"32","author":"Constantinescu","year":"2009","journal-title":"SIAM J. Sci. Comput."},{"key":"10.1016\/j.cam.2015.11.005_br000045","unstructured":"C. Bresten, S. Gottlieb, Z. Grant, D. Higgs, D. Ketcheson, A. Nemeth, Explicit strong stability preserving multistep Runge\u2013Kutta methods, 2014. arXiv:1307.8058."},{"key":"10.1016\/j.cam.2015.11.005_br000050","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.camwa.2007.04.026","article-title":"Explicit two-step peer methods","volume":"55","author":"Weiner","year":"2008","journal-title":"Comput. Math. Appl."},{"key":"10.1016\/j.cam.2015.11.005_br000055","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/j.cam.2008.02.014","article-title":"Superconvergent explicit two-step peer methods","volume":"223","author":"Weiner","year":"2009","journal-title":"J. Comput. Appl. Math."},{"key":"10.1016\/j.cam.2015.11.005_br000060","doi-asserted-by":"crossref","first-page":"2618","DOI":"10.1137\/10080960X","article-title":"Strong stability preserving two-step Runge\u2013Kutta methods","volume":"49","author":"Ketcheson","year":"2011","journal-title":"SIAM J. Numer. Anal."},{"key":"10.1016\/j.cam.2015.11.005_br000065","series-title":"Solving Ordinary Differential Equations, I. Nonstiff Problems","author":"Hairer","year":"1993"},{"key":"10.1016\/j.cam.2015.11.005_br000070","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10543-012-0415-z","article-title":"Two-step peer methods with continuous output","volume":"53","author":"Schmitt","year":"2013","journal-title":"BIT"},{"key":"10.1016\/j.cam.2015.11.005_br000075","series-title":"Strong stability preserving explicit peer methods, Technical Report 04","author":"Horv\u00e1th","year":"2014"},{"key":"10.1016\/j.cam.2015.11.005_br000080","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0771-050X(80)90013-3","article-title":"A family of embedded Runge\u2013Kutta formulae","volume":"6","author":"Dormand","year":"1980","journal-title":"J. Comput. Appl. Math."},{"key":"10.1016\/j.cam.2015.11.005_br000085","series-title":"Numerical Solution of Time-Dependent Advection\u2013Diffusion\u2013Reaction Equations","author":"Hundsdorfer","year":"2003"}],"container-title":["Journal of Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377042715005506?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377042715005506?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T01:36:39Z","timestamp":1585704999000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377042715005506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":17,"alternative-id":["S0377042715005506"],"URL":"https:\/\/doi.org\/10.1016\/j.cam.2015.11.005","relation":{},"ISSN":["0377-0427"],"issn-type":[{"value":"0377-0427","type":"print"}],"subject":[],"published":{"date-parts":[[2016,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Strong stability preserving explicit peer methods","name":"articletitle","label":"Article Title"},{"value":"Journal of Computational and Applied Mathematics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cam.2015.11.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}