1: \begin{thebibliography}{10}
2: \bibitem[BabStein]{BabStein} Babson E., Steingr\'{\i}msson E.: Generalized permutation patterns and a classification of the Mahonian statistics, S\'em. Lothar. Combin. {\bf 44} (2000), Art. B44b, 18 pp.
3: \bibitem[Burstein]{Burstein} Burstein A., Enumeration of words with forbidden patterns, Ph.D.
4: thesis, University of Pennsylvania, 1998.
5: \bibitem[BurMans1]{BurMans1} Burstein A., Mansour T.: Words restricted by patterns with at
6: most 2 distinct letters, \emph{Electronic J. of Combinatorics}, to appear (2002).
7: \bibitem[BurMans2]{BurMans2} Burstein A., Mansour T.: Words restricted by $3$-letter
8: generalized multipermutation patterns, preprint CO/0112281.
9: \bibitem[BurMans3]{BurMans3} Burstein A., Mansour T.: Counting occurrences of some subword
10: patterns, preprint CO/0204320.
11: \bibitem[Claes]{Claes} A. Claesson: Generalised Pattern Avoidance, European J. Combin. {\bf 22} (2001), no. 7, 961--971.
12: \bibitem[GelbOlm]{GelbOlm} Gelbaum B., Olmsted J.: {\em Counterexamples in Analysis}, Holden-day, San Francisco, London, Amsterdam, (1964).
13: \bibitem[KitMans]{KitMans} Kitaev S., Mansour T.: Counting the occurrences of generalized patterns in words generated by a morphism, preprint CO/0210170.
14: \bibitem[Knuth]{Knuth} Knuth D. E.: {\em The Art of Computer Programming}, 2nd ed. Addison Wesley, Reading, MA, (1973).
15: \bibitem[Lothaire]{Lothaire} Lothaire M.: {\em Combinatorics on Words}, Encyclopedia of Mathematics, Vol. {\bf 17}, Addison-Wesley (1986). Reprinted in the {\em Cambridge Mathematical Library}, Cambridge University Press, Cambridge UK (1997).
16: \bibitem[Salomaa]{Salomaa} Salomaa A.: {\em Jewels of Formal Language Theory}, Computer Science Press (1981).
17: \bibitem[SimSch]{SimSch} Simion R., Schmidt F.: Restricted permutations, European J. Combin. {\bf 6}, no. 4 (1985), 383--406.
18: \end{thebibliography}
19: