Fibonacci strings turn out to constitute worst cases for a number of computer algorithms which find generic patterns in strings. Examples of such patterns are repetitions, Abelian squares, and "covers". In particular, we characterize in this paper the covers of a circular Fibonacci string C(F k ) and show that they are \Theta(jF k j 2 ) in number. We show also that, by making use of an appropriate encoding, these covers can be reported in \Theta(jF k j) time. By contrast, the fastest known algorithm for computing the covers of an arbitrary circular string of length n requires time O(n log n)
We present here GM-C, a Graph Categorical Multi-Combinator Machine, a new machine for the compilatio...
AbstractNotational definitions are pervasive in mathematical practic and are therefore supported in ...
We study the average behaviour of the well-known greedy algorithms for the one-dimensional knapsack ...
A (finite) Fibonacci stringFn is defined as follows: F0 = b, F1 = a; for every integer n ⩾ 2, Fn = F...
A (finite) Fibonacci string $F_n$ is defined as follows: $F_0 = b$, $F_1 = a$; for every integer $n ...
In many application areas (for instance, DNA sequence analysis) it becomes important to compute vari...
This note corrects an error in a paper recently published in this journal (An optimal algorithm to c...
Let x denote a given nonempty string of length n = |x| ⩾ 1. A string u is a cover of x if and only i...
We consider the problem of reporting the pairwise enclosures among a set of $n$ axes-parallel rectan...
In this paper we characterize all the covers of x in terms of an easily computed normal form for x. ...
This paper discusses how to count and generate strings that are ``distinct'' in two senses: p -disti...
Glover and Punnen (J. Oper. Res. Soc. 48 (1997) 502) asked whether there exists a polynomial time al...
Fibonacci strings turn out to constitute worst cases for a number of computer algorithms which find ...
This thesis presents a design style for implementing communicating sequential processes (CSP) as qua...
This paper gives an analysis of surfaces generated by subdividing control nets of arbitrary to...
We present here GM-C, a Graph Categorical Multi-Combinator Machine, a new machine for the compilatio...
AbstractNotational definitions are pervasive in mathematical practic and are therefore supported in ...
We study the average behaviour of the well-known greedy algorithms for the one-dimensional knapsack ...
A (finite) Fibonacci stringFn is defined as follows: F0 = b, F1 = a; for every integer n ⩾ 2, Fn = F...
A (finite) Fibonacci string $F_n$ is defined as follows: $F_0 = b$, $F_1 = a$; for every integer $n ...
In many application areas (for instance, DNA sequence analysis) it becomes important to compute vari...
This note corrects an error in a paper recently published in this journal (An optimal algorithm to c...
Let x denote a given nonempty string of length n = |x| ⩾ 1. A string u is a cover of x if and only i...
We consider the problem of reporting the pairwise enclosures among a set of $n$ axes-parallel rectan...
In this paper we characterize all the covers of x in terms of an easily computed normal form for x. ...
This paper discusses how to count and generate strings that are ``distinct'' in two senses: p -disti...
Glover and Punnen (J. Oper. Res. Soc. 48 (1997) 502) asked whether there exists a polynomial time al...
Fibonacci strings turn out to constitute worst cases for a number of computer algorithms which find ...
This thesis presents a design style for implementing communicating sequential processes (CSP) as qua...
This paper gives an analysis of surfaces generated by subdividing control nets of arbitrary to...
We present here GM-C, a Graph Categorical Multi-Combinator Machine, a new machine for the compilatio...
AbstractNotational definitions are pervasive in mathematical practic and are therefore supported in ...
We study the average behaviour of the well-known greedy algorithms for the one-dimensional knapsack ...