Generating necklaces and strings with forbidden substrings

14Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Given a length m string f over a k-ary alphabet and a pos-itive integer n, we develop ecient algorithms to generate (a) all k-ary strings of length n that have no substring equal to f, (b) all k-ary circular strings of length n that have no substring equal to f, and (c) all k-ary necklaces of length n that have no substring equal to f, where f is an aperiodic necklace. Each of the algorithms runs in amortized time O(1) per string generated, independent of k, m, and n.

Cite

CITATION STYLE

APA

Ruskey, F., & Sawada, J. (2000). Generating necklaces and strings with forbidden substrings. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1858, pp. 330–339). Springer Verlag. https://doi.org/10.1007/3-540-44968-x_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free