Published in

Association for Computing Machinery (ACM), ACM Transactions on Algorithms, 2(7), p. 1-19, 2011

DOI: 10.1145/1921659.1921671

Links

Tools

Export citation

Search in Google Scholar

Constrained pattern matching

Journal article published in 2011 by Yongwook Choi ORCID, Wojciech Szpankowski
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Constrained sequences are strings satisfying certain additional structural restrictions (e.g., some patterns are forbidden). They find applications in communication, digital recording, and biology. In this article, we restrict our attention to the so-called ( d , k ) constrained binary sequences in which any run of zeros must be of length at least d and at most k , where 0≤ d < k . In many applications, one needs to know the number of occurrences of a given pattern w in such sequences, for which we coin the term constrained pattern matching . For a given word w , we first estimate the mean and the variance of the number of occurrences of w in a ( d , k ) sequence generated by a memoryless source. Then we present the central limit theorem and large deviations results. As a by-product, we enumerate asymptotically the number of ( d , k ) sequences with exactly r occurrences of w , and compute Shannon entropy of ( d , k ) sequences with a given number of occurrences of w . We also apply our results to detect under- and overrepresented patterns in neuronal data (spike trains), which satisfy structural constraints that match the framework of ( d , k ) binary sequences. Throughout this article we use techniques of analytic combinatorics such as combinatorial calculus, generating functions, and complex asymptotics.