\BOOKMARK [1][-]{section.1}{Introduction}{}% 1
\BOOKMARK [1][-]{section.2}{Proper polycubes and tainted trees}{}% 2
\BOOKMARK [1][-]{section.3}{Computation of Gn,t\(n-1\)}{}% 3
\BOOKMARK [1][-]{section.4}{Perimeter formulas for Gn,t\(n-2\)}{}% 4
\BOOKMARK [1][-]{section.5}{Pr\374fer-like bijection for edge-labeled trees}{}% 5
\BOOKMARK [1][-]{section.6}{Computing Gn,t\(n-2\)}{}% 6
\BOOKMARK [1][-]{section.7}{Application}{}% 7
\BOOKMARK [1][-]{section.8}{Conclusions}{}% 8
\BOOKMARK [1][-]{appendix.A}{The case Txyz}{}% 9
\BOOKMARK [1][-]{appendix.B}{The case Txyzx}{}% 10
