|
[1] Martin Aigner and Anping Li. Searching for Counterfeit Coins, Graphs and Combinatorics, 13(1):9-20, 1997. [2] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms (3rd edition), 2009. [3] Michael R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness, 1979. [4] Howard D. Grossman. The Twelve-Coin Problem, Scripta Mathematica XI, pages 360-361, 1945. [5] Richard K. Guy and Richard J. Nowakowski. Coin-Weighing Problems, The American Mathematical Monthly, 102(2):164-167, 1995. [6] Lorenz Halbeisen and Norbert Hungerbuhler. The General Counterfeit Coin Problem, Discrete Mathematics, 147(1-3):139-150, 1995. [7] Godfrey H. Hardy and Srinivasa Ramanujan. Asymptotic Formulae in Combinatory Analysis, Proceedings of the London Mathemetical Society, 2(17):75{115, 1918. [8] Tanya Khovanova and Konstantin Knop. Coins of Three Different Weights, e-Print archive, arXiv:1409.0250 [math.HO], 2014. [9] Eric Purdy. Lower Bounds for Coin Weighing Problems, ACM Transac-tions on Computation Theory (TOCT), 2(2):Article 3, 2011. [10] Laszlo Pyber. How to Find Many Counterfeit Coins? Graphs and Com-binatorics, 2(1):173-177, 1986. [11] Peng-Jun Wan and Ding-Zhu Du. A (log2 3 + 1=2) Competitive Algorithm for the Counterfeit Coin Problem, Discrete Mathematics, 163(1-3):173-200, 1997.
|