By Vladosiya, history, 3 months ago, translation,

1800A - Is It a Cat?

Tutorial
Solution

1800B - Count the Number of Pairs

Idea: myav

Tutorial
Solution

1800C1 - Powering the Hero (easy version)

Tutorial
Solution

1800C2 - Powering the Hero (hard version)

Tutorial
Solution

1800D - Remove Two Letters

Idea: MikeMirzayanov

Tutorial
Solution

1800E1 - Unforgivable Curse (easy version)

Idea: Aris, talant

Tutorial
Solution

1800E2 - Unforgivable Curse (hard version)

Tutorial
Solution

1800F - Dasha and Nightmares

Idea: Gornak40

Tutorial
Solution

1800G - Symmetree

Tutorial
Solution
• +46

 » 3 months ago, # | ← Rev. 2 →   +12 P.S. I haven't found good articles about hashing root trees so I'll post one soon.UPD: Here it is
•  » » 3 months ago, # ^ |   +1 Isn't that blog enough for understanding hashing root trees? http://rng-58.blogspot.com/2017/02/hashing-and-probability-of-collision.html
•  » » » 3 months ago, # ^ | ← Rev. 2 →   +7 I just hope to make a bit better topic with showing approaches as main point.
•  » » 3 months ago, # ^ |   0 could u check my solution for e1 it gives a wrong answer when a char array is used but accepted when a string is used
 » 3 months ago, # |   -32 C1 was easier than A and B.
•  » » 3 months ago, # ^ |   +6 no it wasnt, A is easier
•  » » 3 months ago, # ^ |   0 Same for me! I suck at strings gotta practice.
 » 3 months ago, # |   +22 StringForces
 » 3 months ago, # |   0 i dont understand BFS solution of task E can anyone explain please?
•  » » 3 months ago, # ^ |   +1 There is an observation that if you turn the string to a graph where the edges are like this: $(i,i+k)$ when $i+k \le n$ , $(i,i+k+1)$ when $i+k+1 \le n$. So you can swap characters in indices in the same component however you like. You can try a few examples if you want.
•  » » » 3 months ago, # ^ |   0 thanks
 » 3 months ago, # |   0 F. i guess it should be bj = bi XOR (1<<26 -1) XOR (1<
 » 3 months ago, # |   0 Except C1, C2 and F, all other problems are about strings
•  » » 3 months ago, # ^ |   0 F is also string
•  » » » 3 months ago, # ^ |   0 ah sorry, I meant except C1, C2 and G
 » 3 months ago, # |   0 So many FST's on A, such a tricky easy question !
•  » » 3 months ago, # ^ |   +3 Amazing, I have never seen so many FST on a problem A
•  » » » 3 months ago, # ^ |   0 So many FST's on F too, jiangly and SSRS got hacked, I don't feel too bad now after getting hacked, XD
•  » » » 3 months ago, # ^ |   +1 what is FST . sorry i m a newbie
•  » » » » 3 months ago, # ^ |   +2 Failed System Test
 » 3 months ago, # |   +9 What does count(all(cnt), 0) == 26 mean in solution of E2? What is the logic behind this? Can anyone tell me, please
•  » » 3 months ago, # ^ | ← Rev. 4 →   +8 He is simply checking if count of all letters that are not in the interval [n-k; k] is equal. Count(all(cnt), 0) returns number of zero elements in the array.So, with this line: cnt[s[i] - 'a']++; he is counting letters in string s, and with this: cnt[t[i] - 'a']--; he is deleting letters from cnt, and when all letters were processed there will be only zeros in cnt if counts of letters were equal
•  » » » 3 months ago, # ^ |   0 Thanks!)
 » 3 months ago, # | ← Rev. 3 →   +2 D&G two hashing problems!
 » 3 months ago, # | ← Rev. 2 →   +19 E can be solved using disjoint set union. Just check whether each connected component are the same.
•  » » 3 months ago, # ^ |   0 can u plz elaborate more on this?
•  » » » 3 months ago, # ^ |   0
 » 3 months ago, # |   0 Can we solve c1 and C2 like this:-1) sort every non zero segment in place , intialiazed int bal=0; 2)iterate end of array if we get zero do bal++; else if bal>0 ad current element to ans and do bal--; Will this work? How can we implement this?
•  » » 3 months ago, # ^ |   0 It can be implemented, but will be quite annoying implementation. We have to first store indexes of array where 0 comes, then we have to sort for srt(arr.begin()+start_0,arr.begin()+end_0) for all range of that 0. Then j pointer as last positive number before a 0 and so ans so. That is as per your logic.And if you are not good with priority_queues, we can implement double stack, 1 stack for storing numbers greater than 0 and other to push curr_max every time we get a number greater than 0.
•  » » » 3 months ago, # ^ |   0 I upsolved using priority queue,i was stuck on this implementation. Thanks ,sure this implementation is annoying
 » 3 months ago, # |   +10 Thank you for the contest, loved all the questions. Kudos to authors, coordinators. I may finally become expert after being a specialist for 6 months now, :')
 » 3 months ago, # |   0 Good tutorial. Thanks for explaining the solutions properly.
 » 3 months ago, # |   0 G is too obsivious for people who know hash of trees.
 » 3 months ago, # |   +6 I thought my solution of G could fail on system test by hash-collision, but unexpectedly my solution of A got FST. There should be something like "eow" in the pretest of A.
 » 3 months ago, # |   0 Looks like this would have been my expert round had I not made a stupid error and got a penalty for overflow on problem C. Still, I won't cry about +100 delta :)
•  » » 3 months ago, # ^ |   0 Let's push it today.
 » 3 months ago, # |   +2 Can not understand why O(26⋅n⋅log n) for F got TL. Can anyone suggest what I am doing wrong? https://codeforces.com/contest/1800/submission/195673951
•  » » 3 months ago, # ^ |   0 all you need is to lower your constant. change bitset to long long or using unordered_map instead of map. it finally runs 2000ms
•  » » 3 months ago, # ^ | ← Rev. 2 →   0 same my solution of O(26.n.log n) is also gave TLE on test 26 195813129 Can somebody please explain why is this happening? (also unordered map is also not working)
•  » » » 3 months ago, # ^ | ← Rev. 2 →   0 In your case I think that problem is that it is O(26 * 26 * n * log n) instead of O(26 * n * log n). Upd, actually it is O(26 * 26 * n + 26 * sum_of_len + 26 n * log n), but probably it also should be fine.
•  » » 3 months ago, # ^ |   +1 You are right it is because of the constant. If I use find from std::map instead of operator[] it pass tests. https://codeforces.com/contest/1800/submission/195806091 But anyway too close to TL.
•  » » » 3 months ago, # ^ |   0 yes, I also tried find instead of [] and it passed, can you please tell why is this happening shouldn't both take same O(log n) time?
•  » » 3 months ago, # ^ |   -10 Vladosiya Could you consider changing the time limit for F? The map based solution should also pass tests. It is div3 you should not care about constant too much.
•  » » » 3 months ago, # ^ |   0 I agree
 » 3 months ago, # | ← Rev. 3 →   0 I can't believe I failed the problem A. Checking the order wasn't enough. I should've checked whether it repeated too. Making it unique was also simpler.
 » 3 months ago, # |   +1 did not understand the "abudance" example in E1. Can anyone explain it to me?
•  » » 4 weeks ago, # ^ |   0 It is saying you can essentially swap two adjacent characters without affecting the rest of the string (provided that n>=5), by these steps.say I want to swap 'bc' axxbc cxxba bxxca axxcbI believe in the example there is a typo,"budka" should've been "budca"
 » 3 months ago, # |   0 Is there any particular name of hashing tree algorithm used in problem G also thanks for good editorial.
 » 3 months ago, # |   0 D is a nice problem. I worried about the cases where 2 removals are not overlapping. Did it worry you too? Consider: R1+R2+S+R3+R4 where S is a string, and removals of R1+R2 and R3+R4 gives the same results: S+R3+R4 = R1+R2+S then S[even index]=R1 and S[odd index]=R2. If S has even length, R3=R1 and R4=R2; if S has odd length, R3=R2 and R4=R1. Thankfully, this shows checking overlapping removals will cover the non-overlapping ones too.
 » 3 months ago, # | ← Rev. 2 →   0 A,B,C1,C2,D were leaked on YT. This isn't fair. people think and try to solve and may get negative delta and others just copy and paste and get positive delta. I think Codeforses must prevent the new accounts and that solved less than N of problems in problem set to participate in Div 4 or 3like that one : 195674461 which is for Mohamed_712 and got +44 and this answer is 100% simmilar that was leaked !
•  » » 3 months ago, # ^ |   0 :)
 » 3 months ago, # | ← Rev. 2 →   0 [deleted] Oh, my method is the same with editorial.
 » 3 months ago, # | ← Rev. 2 →   0 Could someone explain why we need to do "1&" and "-1&" in calc() in the solution of problem F? I thought that they wouldn't take any effect since 1 & 1 = 1 and 1 & 0 = 0, but removing them indeed resulted in WA. Here's the WA submission: 195819749
•  » » 3 months ago, # ^ |   0 Oh I think I know why. The "-1&" is unnecessary but the "1&" is not. Sorry for the stupid question
•  » » » 3 months ago, # ^ | ← Rev. 2 →   +1 in the -1& case, i guess it just trying to find the mask where only the position of letter c is unset. So in my view, -1& is completely not required.
 » 3 months ago, # |   0 How to proof C? I am not convinced even the solution magically works.
•  » » 3 months ago, # ^ |   +6 As we know all the cards before we take action, we can just discard those that aren't good enough. That ensures the greedy solution using priority queue.
•  » » » 5 weeks ago, # ^ |   0 Adding to this explanation.. the priority queue doesn't tell us which hero will get which card, it simply tells us whether or not a card will be given to some hero. For example, assume our list is 1 8 3 0 0When we reach the first hero our priority queue contains {8, 3, 1} and we think to ourselves we will be using 8 because it is the highest card we have seen. We will give it to some hero but it might not be the first hero.When we reach the second hero our priority queue contains {3, 1} and we think to ourselves we will be using 3 as well. We've seen two heroes and we want to give them the two highest cards.After we are done iterating over the list we can visualize a new list containing just the cards we are going to use, as well as the heroes, which would be 8 3 0 0.At that point you can actually see which hero gets which exact card by using a stack.
 » 3 months ago, # |   0 I solved G without using hashing, but instead I "sorted" the subtrees in a certain order. Did I do a fakesolve? or is it a valid method?
•  » » 3 months ago, # ^ |   0 I also solve G without hashing, it seems like we have similar idea, I scan nodes in depth ascending order to maintain some equivalent groups among them.
 » 3 months ago, # |   +2 Really good contest!
 » 3 months ago, # | ← Rev. 2 →   +1 https://codeforces.com/contest/1800/submission/195826604, isn't the tc of this code same as the tc suggested for problem F? Why did it TLE? Can anyone help?
•  » » 3 months ago, # ^ |   +4 When viewing your code, I saw two variables: ev and od. They eat a lot of time and memory, because this is a hashmap array, try to pull them apart a little and reformat the code. If it's not clear what I'm saying, then here's an idea: do not cycle(1...n) cycle (0...26) and vice versa cycle(0...26) cycle(1...n) then you can remove huge arrays and put the use of hashmap into the cycle itself, made the code faster. Sorry for grammatical errors, I do not know English.
•  » » » 3 months ago, # ^ | ← Rev. 3 →   0 Check this. 195837788 sorry for replace.
•  » » » » 3 months ago, # ^ |   0 Thanks a lot, a minor tweak but it worked!
 » 3 months ago, # |   +5 Literally StringFORCES!
 » 3 months ago, # |   0 Someone pls explain this conclusion in the last paragraph of tutorial of problem F:To count the number of pairs that include our word, we need to count the number of words with the characteristic $b_j=b_i\oplus(2^{26} − 1)$.
•  » » 3 months ago, # ^ |   0 Letter with odd count will be represented as digit 1, and that with even count will be digit 0. To find pair (i, j) which meets the condition, we should check if they miss a certain letter and all the remaining 25 letters have odd count. Note that $odd = odd + even$ is similar to $1 = 1 \oplus 0$. So the pairs we are finding are (i,j) which have $b_i \oplus b_j = 2^{26}-1$ (the right side is 26 1's). (In the implementation, we actually count words meeting $b_j = b_i \oplus ((2^{26}-1) \oplus 2^{c})$ to handle the missing letter $c$.)
 » 3 months ago, # |   0 I heard that many people did not want to understand priority_queue, so I can advise multiset. Or learn to write yourself at least a Treap).
 » 3 months ago, # | ← Rev. 2 →   0 Great tutorial!!!!
 » 3 months ago, # |   0 I had dp-ish thinking in D: Assume we know there are dp[i] ways for for some string S of length i, now we can add some new letter x at end, and we get S+x. Compared to just S not much changes, if we had dp[i] different ways, we can slap x at the end of all of them, and we still get dp[i] ways, however there's the new case where we remove last two characters from S+x... is this case new? When is it new? Since it's like we only removed last character from S, it will be different than anything what we have right now, if S[i-1] is not x. So: dp[i+1]=dp[i], +1 if S[i+1]==S[i-1]
 » 3 months ago, # |   0 What is the meaning of this line in solution F if (brr[i] >> c & 1 ^ 1)
•  » » 3 months ago, # ^ |   0 It aims to pick words that miss the certain letter c
•  » » 3 months ago, # ^ |   0 For example c = 2 which indicates the letter c.Consider string 01100 the last from 2 bits indicates c. brr[i] >> c will equate the value to 011. brr[i] >> c & 1 does 011 & 001 which gives value one gives c is available. xoring the value with 1 will make it 0. so we don't consider this string because it has letter c.
 » 3 months ago, # |   0 import java.util.*; import java.io.*; public class RemoveTwoLetters { public static void main(String[] args) throws IOException { BufferedReader br = new BufferedReader(new InputStreamReader(System.in)); PrintWriter pw = new PrintWriter(new BufferedOutputStream(System.out)); int t = Integer.parseInt(br.readLine().trim()); while (t-- > 0) { int n = Integer.parseInt(br.readLine().trim()); String s = br.readLine(); Set set = new HashSet<>(); for (int i = 1; i < n; i++) { StringBuilder sb = new StringBuilder(s.substring(0, i - 1)); sb.append(s.substring(i + 1)); set.add(sb.toString()); } pw.print(set.size()); pw.print('\n'); } pw.flush(); pw.close(); br.close(); } } I wrote this java solution to D, I got out of memory exception on test case 5, this could be optimized, reading insights about my solution would be fun. Please comment.
•  » » 3 months ago, # ^ |   0 same solution and same mle on test 5, except i used just string and scanner instead of those fancy things . Maybe pupil is not so close
•  » » » 3 months ago, # ^ |   0 That is not fancy thing this makes java IO faster, scanner sucks when on bulk IO.
•  » » 3 months ago, # ^ | ← Rev. 2 →   0 this would have given mle in cpp as well
•  » » » 3 months ago, # ^ |   0 Why so?
•  » » » » 3 months ago, # ^ |   0 You are trying to store 200 000 strings of size 200 000 in the memory. You would need 4 * 10^10 bytes of memory to do that, which is about 40 GB. Not to mention that substring has linear time complexity, so your overall solution is quadratic and would TLE even with enough memory.
 » 3 months ago, # |   0 What does the -1 & do inside the F solution? For me it looks like no-op because -1 has 1111...111 binary representation and bitwise-and with such number shouldn't change the second numberIt's just my understanding so that someone can point out what is wrong with it — I don't know much about bitwise operations
•  » » 3 months ago, # ^ |   0 It does nothing and removing it won't have any problem. Here's a such AC code: 195838110
•  » » » 10 days ago, # ^ |   0 Can you explain why do we need to keep distinct maps based on parity of lengths? As per my understanding, if we can find two strings such (b_i ^ b_j) = 25, won't the odd length of the s_i.s_j concatenation hold already? In that case, do we really need to count masks of odd length strings and even length strings separately?
 » 3 months ago, # |   0 Can someone please tell me why my submission 195888152 with unodered_map doesn't work while the solution with map 195888396 works.
•  » » 3 months ago, # ^ |   0 https://codeforces.com/blog/entry/62393Simply use map/set instead of unordered_map/unordered_set, unless you want to use a custom hash function.
•  » » 3 months ago, # ^ |   0 Actually, it has nothing to do with hash collisions. When you iterate over your map you add new elements by using operator[]. This leads to visiting some characters multiple times in the case of unordered maps. By iterating over a copy of the map your code gets accepted: 196522048
•  » » » 3 months ago, # ^ |   0 I'll keep that in mind. Next time for sure.
 » 3 months ago, # |   0 When it comes to B, why are we adding min(k,max(small[i],big[i])) / 2 I don't think we need to divide by 2. For example if we have 2 big letters(there are no small letters) and k = 1, min will return 1 and after division we will get 0 even though we can make one whole pair.
•  » » 3 months ago, # ^ |   0 You're right, I think the formula is wrong in text of solution, but in code its correctly $\min\left(k,\frac{\max\left(small\left[i\right],big\left[i\right]\right)}{2}\right)$
 » 3 months ago, # |   0 F is easy but I didn't solve it ontime, otherwise I would be Expert now :V
 » 3 months ago, # |   0 1800F - 31 - Dasha and Nightmares I tried solving it using bitsets in C++ but it ended up giving WA on TC3.Can anyone help me with my approach. 195952648
 » 3 months ago, # |   0 In tutorial for F: "Observation 1: the product of odd numbers is odd, so the condition for the length of nightmare is automatically completed." What does this have to do with concatenation? shouldn't we be checking if sum is odd?
•  » » 3 months ago, # ^ | ← Rev. 2 →   0 Since the number of different letters in the final string is exactly 25 (i.e. odd) and the number of occurrences of each letter is odd, therefore the length of the final string is odd (odd numbers summed up an odd number of times gives an odd number). So, we don't have to worry about satisfying this condition separately, as it will be satisfied automatically.
•  » » » 3 months ago, # ^ |   0 oh okay, i thought it refeers to the first condition
 » 3 months ago, # |   0 Is the argument given in the tutorial for D sufficient? i.e. what about potential over counting (the argument only considers consecutive positions)? Or is this obvious?
 » 3 months ago, # |   0 In problem 1800E2 — Unforgivable Curse (hard version) it is enough to check if index of mismatching character in string s and string t is within the limit k <= index <= n — (k + 1). accepted Code
 » 3 months ago, # | ← Rev. 2 →   0 Can someone explain why am I getting Wrong Answer in Problem F by using unordered_map and Accepted using map.UNORDERED MAP Solution
•  » » 3 months ago, # ^ |   0
•  » » 3 months ago, # ^ | ← Rev. 3 →   0 Actually, it has nothing to do with hash collisions. When you iterate over your map you add new elements by using operator[]. This leads to visiting some masks multiple times in the case of unordered maps. By iterating over a copy of the map your code gets accepted: 196526230
•  » » » 3 months ago, # ^ |   0 Thanks. But I'm still wondering that order of elements in unordered map changes while traversing as I was not updating the map, just traversing it.
•  » » » » 3 months ago, # ^ |   0 If you call operator[] on an element that didn't exist before in the map, it gets created. As the map is unordered, you don't know where it gets inserted in the traversing order.
 » 3 months ago, # |   0 Why is it that in problem D just checking ith and (i+2)th characters continuously gives the right answer? It doesn't seem that intuitive to me. Can anyone explain?
•  » » 3 months ago, # ^ |   0 Hey just check thatWhen we remove first and second two letters second letter is removed both times. If first and third letter is same it produces same results when removing first two and second two.Example when i and i + 2 are equal "aaab" First two letters removed gives "ab" Second two letter removed gives "ab"So here we reduce by ans by 1 because ab is already produced.Example when not "aabb" First two letters removed -> "bb" Second two letter removed -> "ab"Here we don't. When both are not equal it produces different outputs It doesn't matter what other parts of string consists of.
 » 3 months ago, # |   0 Hey did he write evenness in b in the explanation and used b as availability in the code? (Problem F)
 » 3 months ago, # | ← Rev. 3 →   0 can anyone tell why this solution is not working for solution of A? https://codeforces.com/contest/1800/submission/197229297#:~:text=Judged-,197229297,-Practice%3A
 » 3 months ago, # |   0 tried really hard but i coulden't understand the tutorial of E1 and E2. Could someone please explain the logic. Thanks :((
•  » » 3 months ago, # ^ |   0 is it true that we can swap any char with any other char in the string given that i-k>=0 and i+k
 » 3 months ago, # |   0 Here is my solution for problem F. Can anybody tell me where am I getting wrong? My submission link
 » 3 months ago, # |   0 I'm not sure how the calc function does what it does. Specifically why subtracting itr and itl provides the number of pairs that do not contain c!
 » 5 weeks ago, # |   0 I solved D with hashing but it required a huge prime;204035708 #include"bits/stdc++.h" using namespace std; #define ll long long #define m 9007199254740991 void solve() { int n; cin >> n; string s; cin >> s; vector hash1(n + 2), hash2(n + 2); for (ll p = 1, i = 0; i < n; i++) { hash1[i + 1] = (hash1[i] + (((s[i] - 'a' + 1) * p) % m)) % m; p = (p * 31) % m; } for (ll i = 2, p = 1; i < n; i++) { hash2[i + 1] = (hash2[i] + (((s[i] - 'a' + 1) * p ) % m)) % m; p = (p * 31) % m; } unordered_set st; for (int i = 2; i <= n; i++) { ll temp = (hash2[n] - hash2[i] + m) % m; temp = (temp + hash1[i - 2]) % m; st.insert(temp); } cout << st.size() << '\n'; } int main() { int tc; cin >> tc; while (tc--) { solve(); } return 0; } 
 » 5 weeks ago, # |   0 So many problems based on strings
 » 25 minutes ago, # |   0 .ComplaintFrame { display: inline-block; position: absolute; top: 0; right: -1.4em; } .ComplaintFrame a { text-decoration: none; color: #ff8c00; opacity: 0.5; } .ComplaintFrame a:hover { opacity: 1; } ._ComplaintFrame_popup p, ._ComplaintFrame_popup button { margin-top: 1rem; } ._ComplaintFrame_popup input[type=submit] { padding: 0.25rem 2rem; } ._ComplaintFrame_popup ul { margin-top: 1em !important; margin-bottom: 1em !important; } In Promblem D, Lets X(i,i+1) = string obtained after chars at index i,i+1 removed Then Why X(i,i+1) and Y(j,j+1) are guarenteed to be distinct ? Why cant they be same ?