1976
DOI: 10.1007/bf02241987
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm 29 efficient algorithms for doubly and multiply restricted partitions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

1976
1976
2013
2013

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Several algorithms are known to generate descending k-compositions in lexicographic [19,58], reverse lexicographic [43], and minimal-change [45] order. Hindenburg's eighteenth century algorithm [13, p.106] generates ascending kcompositions in lexicographic order and is regarded as the canonical method to generate partitions into a fixed number of parts: see Knuth [27,p.2], Andrews [4, p.232] or Reingold, Nievergelt & Deo [42, p.191].…”
Section: Related Workmentioning
confidence: 99%
“…Several algorithms are known to generate descending k-compositions in lexicographic [19,58], reverse lexicographic [43], and minimal-change [45] order. Hindenburg's eighteenth century algorithm [13, p.106] generates ascending kcompositions in lexicographic order and is regarded as the canonical method to generate partitions into a fixed number of parts: see Knuth [27,p.2], Andrews [4, p.232] or Reingold, Nievergelt & Deo [42, p.191].…”
Section: Related Workmentioning
confidence: 99%
“…Many algorithms for the enumeration or random generation of combinatorial objects can be found in the literature. In particular, sequential algorithms for the generation of all partitions of a given integer, either in general or subject to some restrictions, may be found in [11,15,12,[4][5][6]17]. As mentioned above, Ref.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of determining the different combinations of baud lengths amounts to the problem of generating all integer partitions for L (Kelleher and O'Sullivan, 2009). When additional constraints to baud lengths are applied, the problem is called the multiply restricted integer partitioning problem (Riha and James, 1976). An efficient algorithm for iterating through restricted partitions has been described by Riha and James (1976).…”
Section: Example: Range Spread Coherent Targetmentioning
confidence: 99%