<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Gray code for a regular language</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Antonio Bernini antonio.bernini@uni .it</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dipartimento di Matematica e Informatica \U. Dini", Universita degli Studi di Firenze</institution>
          ,
          <addr-line>Viale G.B. Morgagni 65, 50134 Firenze</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Elena Barcucci</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Renzo Pinzani</institution>
        </aff>
      </contrib-group>
      <fpage>87</fpage>
      <lpage>93</lpage>
      <abstract>
        <p>Given a sequence famgm 0 of strictly increasing positive integers such that a0 = 1, any non-negative integer N can be uniquely represented by N = Pi 0 diai, where di are non negative integers. The coe cients di form a string over a nite alphabet and all these strings form a language having di erent properties depending on the sequence. We investigate on the possibility of de ning a Gray code over the language arising from particular choices of famgm 0. We consider the sequence de ned by a two termed linear recurrence with constant coe cients having some particular properties.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In the present paper we consider a language of strings de ned in [BR01] over a particular alphabet. These
strings are the representations of integers by means of a system of numeration [Fra82] derived from certain
sequences. Given a strictly increasing sequence of non-negative integers 1 = a0 &lt; a1 &lt; a2 &lt; :::, it is possible to
represent each non-negative integer N by recording the quotient dn obtained by dividing N by the largest member
an of the sequence that is less than or equal to N , then dividing the remainder rn by an 1 and recording the
quotient dn 1 and so on until you get to d0, since dividing by 1 leaves a remainder of 0. The various quotients
form a string which is an element of the language. In [BR01] sequences are de ned by a two termed linear
recurrence depending on two parameters k and h, and the arising language, strictly depending on k and h, is
seen as a combinatorial interpretation of the sequence ai = kai 1 + hai 2. In this paper we aim at providing a
Gray code for the language derived from particular conditions on k and h.</p>
      <p>We point out that the considered language was introduced in order to provide a general solution to a previous
issue appeared in [BSS93], where the authors asked for a combinatorial interpretation of the recurrence fm+1 =
6fm fm 1, with f0 = 1, f1 = 7 (sequence M4423 of [SP96]). After some interesting answers (see [BBDD98,
PP90, Sul98]), in their paper [BR01] the authors gave a general combinatorial interpretation for the recurrences
of the form am = kam 1 + ham 2, under some conditions on h and k which include the most frequently occurring
two-termed recurrences. We also noted, in the previous paragraph, that this language is strictly linked to the
system of numeration presented in [Fra82]. This is based on a very simple iterated division algorithm which is
the main tool which produces the representation for any non-negative integer N , in terms of any sequence of
the form 1 = u0 &lt; u1 &lt; u2 &lt; : : : . Clearly, the particular choice of the sequence a ects the representation
of N , and in some particular cases interesting and useful representations can be obtained. In the references
within [Fra82] several application of di erent systems of numeration can be found, ranging from compressing
and partitioning large dictionaries, ranking permutations with repetitions, up to designing error-insensitive codes
for data transmission.</p>
      <p>The de nition of the Gray code in the present paper could be presented independently of the de nition of
numeration systems and without showing which are the links between the considered language and the sequence.
Nevertheless, in order to provide a self-contained paper and for the sake of completeness, we prefer to present
concepts and preliminaries useful for our purpose. Section 2 and Section 3 are devoted to the presentation of
some main notion about numeration systems and properties of the considered recurrence relations. In Section
4 we recall the de nition of the language introduced in [BR01] and nally we de ne a Gray code for listing its
elements.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>Given a sequence famgm 0 of positive integers such that a0 = 1 and am &lt; am+1 for each m 2 N, let N
be any non-negative integer. Consider the largest term an of the sequence such that an N . More precisely,
an = maxfam j am N g (for the particular case N = 0, see below). We divide N by an obtaining N = dnan +rn.
Obviously, for the remainder rn, it is clear that rn &lt; an. If we divide rn by an 1, we get rn = dn 1an 1 + rn 1,
with rn 1 &lt; an 1. Then, iterating this procedure until the division by a0 = 1 (where of course the remainder is
0), we have:</p>
      <p>N
rn
rn 1
r3
r2
r1
=
=
=
=
=
=
=
=
dnan + rn
dn 1an 1 + rn 1
dn 2an 2 + rn 2
d2a2 + r2
d1a1 + r1</p>
      <p>Expression (1) is the representation of N in the numeration system S = fa0; a1; a2; : : : : : :g, and the string
dndn 1 : : : d1d0 is associated to the number N (in what follows the term \representation" equivalently refers to
the expression (1) or to its associated string). The method presented here can be applied to every non-negative
integer and in the case N = 0, clearly, all the coe cients di are 0 (in other words the representation of 0 is
simply the string 0). Moreover, we have</p>
      <p>ri = di 1ai 1 + di 2ai 2 + : : : : : : + d1a1 + d0a0 &lt; ai ;
for each i</p>
      <p>0.</p>
      <p>It is possible to show [Fra82] that if N = Pn</p>
      <p>i 0 diai with
diai + di 1ai 1 + : : : + d1a1 + d0a0 &lt; ai+1
for each i 0, then the representation N = Pin 0 diai is unique. For the sake of completeness, we recall the
complete theorem:
Theorem 2.1. Let 1 = a0 &lt; al &lt; a2 &lt; : : : be any
integer N has precisely one representation in the system S = fa0; a1; a2; :::g of the form N =
nite or in nite sequence of integers. Any non-negative
n
X diai where the
i 0
di are non-negative integers satisfying (3).</p>
      <p>As an example, consider the well-known sequence of Pell numbers (sequence M1413 in [SP96]) pm =
1; 2; 5; 12; 29; : : : de ned by p0 = 1, p1 = 2, pm = 2pm 1 + pm 2. The representation of N = 16 is
associated to the string 1020.
3</p>
    </sec>
    <sec id="sec-3">
      <title>The language and the alphabet</title>
      <p>The next step is the de nition of the language arising from the representations of non-negative numbers.
Given m &gt; 0, we consider all the integers ` 2 f0; 1; 2; : : : ; am 1g. According to the scheme of the previous
section, the representations of the integers j with am 1 j &lt; am is j = dm 1am 1 + dm 2am 2 + : : : + d0a0 (so
that the associated string is dm 1dm 2 : : : d0), while, following the same scheme, the remaining integers have a
representation with less than m digits. For example: the representation of am 1 1 = dm 2am 2 + : : : + d0a0
has m 1 digits. For our purpose (the construction of a Gray code), we require that all the representations of
the considered integers ` 2 f0; 1; 2; : : : ; am 1g have m digits, so we pad the string on the left with 0's until we
have m digits: the representation of am 1 1 becomes am 1 1 = 0am 1 + dm 2am 2 + : : : + d0a0 (therefore,
the associated string is 0dm 2 : : : d0).</p>
      <p>With this little adjustment, we now de ne the following sets:
(2)
(3)
L0 = f"g ,
L = Sm 0 Lm.</p>
      <p>Lm = fdm 1 : : : d0j the string dm 1 : : : d0 is the representation of each ` &lt; am in the</p>
      <p>numeration system famgm 0 g.</p>
      <p>Finally, we denote by L the language obtained by taking the union of all the sets Lm:
We remark that each element of Lm has precisely m digits, so that some string dm 1 : : : d0 can admit a pre x
constituted by a certain number of consecutive 0's. Moreover, each Lm contains precisely am elements (which
are the representations of each ` 2 f0; 1; : : : ; am 1g).
L0
L1
L2
L3</p>
      <p>It is not di cult to realize that the alphabet of the language L strictly depends on the sequence famgm 0.
In general it is possible to set an upper bound for the digits di. From (3), we deduce diai &lt; ai+1 Pij=10 djaj,
so that, since the numbers are all integers:
diai
ai+1
1
i 1
X djaj &lt; ai+1
j=0</p>
      <p>1 ;
di
ai+1
ai
1</p>
      <p>:
t = max
i
ai+1
ai
1</p>
      <p>:
81 if m = 0
&gt;
am = &lt;k if m = 1
&gt;:kam 1 + ham 2 if m
2</p>
      <p>Therefore, the alphabet for Lm is given by f0; 1; : : : ; sg with s =
and, denoting by
the alphabet for L , we have</p>
      <p>max
i=0;1;:::;m 1
= f0; 1; : : : ; tg with
ai+1
ai
1
;
In this paper we focus our attention on sequences de ned by linear recurrences of the form am = kam 1 + ham 2,
with suitable initial conditions and some restrictions on k and h. More precisely, we consider sequences of the
form:
(4)
where k 2 N+ and h 2 Z . Using standard techniques for solving recurrences (see for example [Aig07]) it is
possible to show the the general term of the sequence is</p>
      <p>1
am = pk2 + 4h
k + pk2 + 4h</p>
      <p>!m+1
2</p>
      <p>1
pk2 + 4h
k
pk2 + 4h</p>
      <p>!m+1
2
and, following [BR01], we require the condition k2 + 4h
m 0 (which are the hypothesis of Theorem 2.1).
0 which assures that am
0 and am+1 &gt; am for each</p>
      <p>Actually, here we further restrict to a more limiting case for k and h. More precisely we consider the case
k h 0, which, of course, implies k2 + 4h 0. From [BR01] it is possible to deduce that in this case the
alphabet of the language L is = f0; 1; : : : ; kg. The language L is the set of words w 2 such that
1. w = drdr 1 : : : d1d0 with di 2
2. if di = k, then di 1 &lt; h, for i = 1; 2; : : : ; r;
3. d0 6= k.</p>
      <p>In the above list, point 2. is due to the fact that, if N &lt; ai+1 is an integer such that di = k, then, if also di 1 = h,
it is N kai + hai 1 = ai+1, which is in contrast with N &lt; ai+1. Moreover, since in the representation of N it
is r1 &lt; a1 = k, we have d0 &lt; k.</p>
      <p>We recall [BR01] that the following unambiguous regular grammar generates L :</p>
      <p>S ! T 0jT 1j
T ! T 0jT 1j
jT (h
jT (h</p>
      <sec id="sec-3-1">
        <title>1)jShj</title>
      </sec>
      <sec id="sec-3-2">
        <title>1)jShj</title>
        <p>jS(k
jS(k)j .
if i and j are symbols, then ij L is the list obtained by concatenating i to each string of i L (or equivalently
ij L = i (j L));
if L is a list of word, L is the list in the reverse order;
if L is a list of word, (L)i is L if i is even and L if i is odd;
if L and M are two lists, L</p>
        <p>M is their concatenation;
if Lj ; Lj+1; : : : ; Lj+r are lists,
r
`=0Lj+` is the list Lj : : : Lj+r.</p>
        <p>if L is a list of words, then f irst(L) is the rst element of L and last(L) is the last element of L.
With the above notation it is not di cult to realize that L can be de ned as follows:
&gt;
&gt;
&gt;&gt;&gt;0 Ln 1 [ 1 Ln 1 [ : : : [ (k
&gt;
&gt;
&gt;:k0 Ln 2 [ k1 Ln 2 [ : : : [ k(h
1) Ln 1[
1) Ln 2 if n
2 :</p>
        <p>Note that from the recursive construction of Ln (n 2), if an element w 2 Ln starts with k, then k is
followed by a symbol di erent from h, according to the de nition of the language L in the previous section. If
w starts with a symbol di erent from k, then it can be concatenated to any element of Ln 1.</p>
        <p>We propose the following de nition providing a particular placement of the elements of L which reveals itself
to be a Gray code.</p>
        <p>De nition 4.1. Given k 2 N, h 2 Z, with k
f0; 1; 2; : : : ; kg:
h
0; we de ne the string list Ln over the alphabet
=
Ln =
8 "
&gt;f g
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
&lt;&gt;f0; 1; : : : ; k</p>
        <p>1g
&gt;8f"g
&gt;
&gt;
&gt;
&gt;
&gt;
&lt;
&gt;
&gt;
&gt;
&gt;
&gt;
&gt;
:
Ln =
f0; 1; : : : ; k</p>
        <p>1g
ik=01 i (Ln 1)k+i
ih=01 ki (Ln 2)k+i
Theorem 4.2. The string list Ln is a Gray code with Hamming distance equal to one.</p>
        <p>Proof. We proceed by induction on n. If n = 1, then L1 is trivially seen to be a Gray code. Suppose that
Li is a Gray code for i = 2; : : : ; n 1 where n 2 and consider the list Ln. The sub-lists arising from each
parenthesis in the third case of (6) are Gray codes since the lists Ln 1 and Ln 2 (which are Gray codes by the
inductive hypothesis) are read alternatively from left to right and vice versa (depending on the parity of k + 1).
Therefore, we have to check only the Hamming distance between last (k 1) (Ln 1)k+i with i = k 1 and
f irst k0 (Ln 2)k+i with i = 0.</p>
        <p>In the case of k even we have:
last (k
1) (Ln 1)k+k 1
= last (k
1) Ln 1 = (k
1)last(Ln 1) = (k
1)f irst(Ln 1) ;
and
Easily, from (6), we have
f irst k0 (Ln 2)k+0</p>
        <p>= f irst (k0 Ln 2) = k0f irst(Ln 2) :
f irst(Ln 1) = 0f irst(Ln 2) ;
then the only di erent digit between (k
code.</p>
        <p>The proof in the case of k odd can be conducted with similar arguments.</p>
        <p>1)f irst(Ln 1) and k0f irst(Ln 2) is the rst one. So Ln is a Gray
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Further developments</title>
      <p>In the present paper we considered the recurrence relation de ned by am = kam 1 + ham 2 with k h 0,
which is one of the two cases analysed in [BR01]. The other interesting case is k h 0 which again leads to
a strictly increasing sequence de ning a language L 0 over an alphabet 0 slightly di erent from , with di erent
properties. We think that also in this case it is possible to de ne a Gray code for listing the elements of L 0,
with Hamming distance 1.</p>
      <p>It could be interesting to investigate on the possibilities to characterize the language in terms of restricted
words, following the line of [BBBP17b] or [Ber17] where sets of pattern avoiding words and recurrence relations
are considered.</p>
      <p>Acknowledgements</p>
      <p>This work is partially supported by the GNCS 2018 project \Proprieta combinatorie e rilevamento di pattern
in strutture discrete lineari e bidimensionali".
[Aig07] M. Aigner. Discrete Mathematics. American Mathematical Society, USA, 2007.
[BBBP17a] E. Barcucci, A. Bernini, S. Bilotta and R. Pinzani. Cross-bi x-free sets in two dimensions. Theoretical</p>
      <p>Computer Science, 664:29{38, 2017.
[BBBP17b] E. Barcucci, A. Bernini, S. Bilotta and R. Pinzani. Non-overlapping matrices. Theoretical Computer</p>
      <p>Science, 658:36{45, 2017.
[BBDD98] E. Barcucci, S. Brunetti, A. Del Lungo and F. Del Ristoro. A combinatorial interpretation of the
sequence fn+1 = 6fn fn 1. Discrete Mathematics, 190:235{240, 1998.
[BR01] E. Barcucci and S. Rinaldi. Some linear recurrences and their combinatorial interpretation by means of
regular languages. Theoretical Computer Science, 255:679{686, 2001.
[Ber17] A. Bernini. Restricted binary strings and generalized Fibonacci numbers. Lecture Notes in Computer
Science, 10248:32{43, 2017.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [BBPSV14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bernini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bilotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sabri</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vajnovszki</surname>
          </string-name>
          .
          <article-title>Pre x partitioned Gray code for particular cross-bi x-free sets</article-title>
          .
          <source>Cryptography and Communication</source>
          ,
          <volume>6</volume>
          :
          <fpage>359</fpage>
          {
          <fpage>369</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [BBPSV15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bernini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bilotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sabri</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vajnovszki</surname>
          </string-name>
          .
          <article-title>Gray code orders for q-ary words avoiding a given factor</article-title>
          .
          <source>Acta Informatica</source>
          ,
          <volume>52</volume>
          :
          <fpage>573</fpage>
          {
          <fpage>592</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [BBPV15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bernini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bilotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vajnovszki</surname>
          </string-name>
          .
          <article-title>A trace partitioned Gray code for q-ary generalized Fibonacci strings</article-title>
          .
          <source>Journal of Discrete Mathematical Sciences and Cryptography</source>
          ,
          <volume>18</volume>
          :
          <fpage>751</fpage>
          {
          <fpage>761</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [BBPV17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bernini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bilotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vajnovszki</surname>
          </string-name>
          .
          <article-title>A Gray code for cross-bi x-free sets</article-title>
          .
          <source>Mathematical Structures in Computer Science</source>
          ,
          <volume>27</volume>
          :
          <fpage>184</fpage>
          {
          <fpage>196</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [BGPP07]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bernini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Grazzini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Pergola</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          .
          <article-title>A general exhaustive generation algorithm for Gray structures</article-title>
          .
          <source>Acta Informatica</source>
          ,
          <volume>44</volume>
          :
          <fpage>361</fpage>
          -
          <lpage>376</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [BPP12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bilotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Pergola</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          .
          <article-title>A new approach to cross-bi x-free sets</article-title>
          .
          <source>IEEE Transactions on Information Theory</source>
          ,
          <volume>58</volume>
          :
          <fpage>4058</fpage>
          {
          <fpage>4063</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [BSS93]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Shapiro</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Simion</surname>
          </string-name>
          .
          <article-title>Some q-analogues of the Schroder numbers arising from combinatorial statistics on lattice paths</article-title>
          .
          <source>Journal of Statistical Planning and Inference</source>
          ,
          <volume>34</volume>
          :
          <fpage>35</fpage>
          {
          <fpage>55</fpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Fra82]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Fraenkel</surname>
          </string-name>
          . Systems of numeration.
          <source>American Mathematical Monthly</source>
          ,
          <volume>92</volume>
          :
          <fpage>105</fpage>
          {
          <fpage>114</fpage>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Gra53]
          <string-name>
            <given-names>F.</given-names>
            <surname>Gray</surname>
          </string-name>
          .
          <article-title>Pulse code communication</article-title>
          .
          <source>US Patent</source>
          <volume>2</volume>
          (
          <issue>632</issue>
          ),
          <volume>058</volume>
          ,
          <year>1953</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Ham50]
          <string-name>
            <given-names>R. W.</given-names>
            <surname>Hamming</surname>
          </string-name>
          .
          <article-title>Error detecting and error correcting codes</article-title>
          .
          <source>The Bell System Technical Journal</source>
          ,
          <volume>29</volume>
          :
          <fpage>147</fpage>
          {
          <fpage>160</fpage>
          ,
          <year>1950</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [PP90]
          <string-name>
            <given-names>E.</given-names>
            <surname>Pergola</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Pinzani</surname>
          </string-name>
          .
          <article-title>A combinatorial interpretation of the area of Schroder paths</article-title>
          .
          <source>Electronic Journal of Combinatorics</source>
          ,
          <volume>6</volume>
          :
          <fpage>R40</fpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [SP96]
          <string-name>
            <given-names>N. J. A.</given-names>
            <surname>Sloane</surname>
          </string-name>
          and S. Plou e.
          <source>The Encyclopedia of Integer Sequences</source>
          . Academic Press, New York,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [Sul98]
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Sulanke</surname>
          </string-name>
          .
          <article-title>Bijective recurrences concerning Schroder paths</article-title>
          .
          <source>Electronic Journal of Combinatorics</source>
          ,
          <volume>5</volume>
          :
          <fpage>R47</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>