Vasya.V's blog

By Vasya.V, 10 years ago, translation, In English,
1) Because of small constraints, just iterate n from 1 to T n and check
for (int n = 1; n <= Tn; n++)
    if (n * (n + 1) / 2 == Tn)
        cout << "YES\n";
cout << "NO\n";

2) Let's consider a graph, where the letters A , B , C are the vertexes and if  x < y , then the edge y -  > x exists. After that let's perform topological sort . If a cycle was found during this operation, put "Impossible" and exit. Otherwise put the answer.

Another approach is acceptable because of small constaints (by Connector in russian comments).
Just iterate over all of 3! permutaioins of the letters and check if they are sorted. If no such permutation, put "Impossible"

3) Let's iterate over all of  6! = 720 permutations. For every permutation let's try to put the first 3 words horizontally, the others - vertically:
  1. hor[0], ver[0] - left-up
  2. hor[2], ver[2] - right-down
  3. hor[1]: (len(ver[0]) - 1, 0)
  4. ver[1]: (0, len(hor[0]) - 1)
Now let's define N = len(ver[1]), M = len(hor[1]).
A Conditions for the solution existence
  1. len(hor[0]) + len(hor[2]) == M + 1 // edges of "eight"
  2. len(ver[0]) + len(ver[2]) == N + 1  // edges of "eight"
  3. len(hor[0]) >= 3 && len(hor[2]) >= 3 && len(ver[0]) >= 3 && len(ver[2]) >= 3 // "eight" is nondegenerate
  4. The letters at start/end of appropriate strings are match
  5. The letters on the intersection of hor[1], ver[1] are match
Now we have the right field of the size N x M, and update the answer
Note In C++ if you use vector<vector<char> > or vector<string> as the field type, then you can simply use operator "<" for updating.

4) Let's consider not the most efficient, but AC algorithm, with  the complexity O(mC n 5 log(C n 5)) .
Let's consider the 1 answer of the system: <number, v>. The amount of the variants of the password is C n v - not very large number in constaints of the problem, you can simply generate this variants. Declare this set of variants as current. Now, for the every answer let's generate a set of possible passwords, and let's declare the intersection of this set and current set as current. After m iterations we'll have some set. Then we'll erase elements from this set, which were in the answers of the system, and the answer of the problem will be the size of this set.

5) Let's consider an algorightm with complexity O((n + m)log(n + m)) .
Exclude from considiration every wall can't be achieved by canon:  x > v 2 / g
Because of α < =π / 4 :
  1. Function X max(α) is monotonous
  2. Function Y(α, x), when x is fixed, is monotonous
Such observation allows to assign to each wall a section of the attack angle [α1, α2] . If this canon shoots with angle within this section, it hits the wall. These angles can be obtained by solving equation (it will be biquadratic), but because of monotonous we can use binary search.
Sort walls by x . Now the initial problem has reduced to the problem: for every shoot it is need to obtain minimal index of the wall, when shoot angle is between attack angles for this wall. This problem can be solved by Segment Tree for Minimum with possibility to update on an interval. At first, fill tree with KInf. Next, for every wall let's perform update(α1 , α2 , index). Then let's iterate over requests. If getMin(α ) == KInf, then missle do not hit any wall and hit the land, otherwise it hit the wall with index getMin(α ).
  • Vote: I like it
  • +16
  • Vote: I do not like it

10 years ago, # |
  Vote: I like it 0 Vote: I do not like it
can u explain the 3rd one more?
it is so ambiguous to me!!
8 years ago, # |
  Vote: I like it -6 Vote: I do not like it

oh,I hate Segment Tree ,I hate TLE...

3 years ago, # |
  Vote: I like it 0 Vote: I do not like it

there is more efficient solution for div 2-D ?

2 years ago, # |
  Vote: I like it 0 Vote: I do not like it

Problem B can be solved using hashing, see submission

11 months ago, # |
Rev. 2   Vote: I like it 0 Vote: I do not like it

I did some pretty hardcore implementation in Div2B "so called proper brute force" can't be more brute have a look 60172369

  • »
    11 months ago, # ^ |
    Rev. 2   Vote: I like it 0 Vote: I do not like it

    We can see this problem as a directed graph, so we have to ensure that the following condition should be veryified to have an answer:
    1. Every node in the graph should have not one degree at the same time.
    2. There are no bidirectional edges.
    With the first condition we ensure that there isn't a cycle, with the second we don't have a contradiction.
    My sub: 60185706

4 weeks ago, # |
  Vote: I like it 0 Vote: I do not like it

For Problem B, After solving , I saw many solutions and some used graphs and some do loops and stuff. I wrote it using IF else haha. see it here.