Given a length m string f over a k-ary alphabet and a pos-itive integer n, we develop ecient algorithms to generate (a) all k-ary strings of length n that have no substring equal to f, (b) all k-ary circular strings of length n that have no substring equal to f, and (c) all k-ary necklaces of length n that have no substring equal to f, where f is an aperiodic necklace. Each of the algorithms runs in amortized time O(1) per string generated, independent of k, m, and n.
CITATION STYLE
Ruskey, F., & Sawada, J. (2000). Generating necklaces and strings with forbidden substrings. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1858, pp. 330–339). Springer Verlag. https://doi.org/10.1007/3-540-44968-x_33
Mendeley helps you to discover research relevant for your work.