### pikmike's blog

By pikmike, history, 17 months ago, translation, 1175A - From Hero to Zero

Idea: Roms

Tutorial
Solution (Roms)

1175B - Catch Overflow!

Idea: PikMike

Tutorial
Solution (PikMike)

1175C - Electrification

Tutorial

1175D - Array Splitting

Tutorial
Solution (Roms)

1175E - Minimal Segment Cover

Tutorial
Solution 1 (PikMike)
Solution 2 (PikMike)

1175F - The Number of Subpermutations

Idea: Roms

Tutorial
Solution (Roms)

1175G - Yet Another Partiton Problem

Tutorial  Comments (89)
 » Can someone explain the idea of https://codeforces.com/contest/1175/submission/55197107? Seems he uses a deque, but why his solution is correct?
 » Less mathematical explanation of C,anyone ?
•  » » Let's consider this query: $n = 7$, $k = 4$, $a$ = {1, 4, 5, 7, 10, 14, 16}. Let's consider a range of $k = 4$ consecutive elements of $a$: {1, 4, 5, 7}. For some certain $x$, these are the 4 closest values in $a$. The 4th-closest value is the farther of 1 and 7. $f_k(x)$ is then $max(x - 1, 7 - x)$. To minimize this expression, we set $x$ to the average of 1 and 7. This is necessarily the minimum of $f_k(x)$ for all $x$ where the four closest elements of $a$ are from that set. Note that the first and last of this set must be $k$ apart, and we don't care about what's between them.No $x$ will ever occur where its closest $k$ elements of $a$ are not consecutive. So, we just need to find the minimum of the minimum $f_k(x)$'s from each of these ranges, i.e. the minimum value of $\frac{a_i+a_{i + k}}{2}$ for all valid $i$. This takes constant time for each check, so the solution is $O(n)$ time.There was certainly a gap in my logic somewhere here, but I think I got the point across. Sorry for explaining too much and overcomplicating. :P
•  » » » I looked back at my own solution; it seems like I did an unnecessary sort to end up with an $O(n\log(n))$ solve. I didn't realize until now why I had a 1200 ms test case. Wow.
•  » » » Your explanation is simple and exact.
•  » » » 16 months ago, # ^ | ← Rev. 2 →   Why do we take x as the average of a[i] and a[i+k] for calculation?
•  » » » » If $x$ is closer to one end, $f_k(x)$ is the distance to the farther one. To minimize "the distance to the farther one," $x$ can't be closer to either end. This happens at the average, where $x$ is equally far from both ends.If you look at the graphs for $y = x - p$ and $y = q - x$, it's two lines. When you take the maximum value of $y$ at all values of $x$, you get a v-shape. The bottom of this v (where the lines intersect) is where y is minimized, and with some calculation, you find this is the average of $p$ and $q$.
•  » » » » » Thanks:)
•  » » » for k>0 x should always be (a+a[n-1])/2 and for k=0 x= a??
•  » » 17 months ago, # ^ | ← Rev. 5 →   Suppose that you will brute force it, then you have a list of distances, and you sort it. You want the k-th element of it.Let the input be something like: [..., ?, ?, A, B, C, D, E, ?, ?, ...], with K = 3.Notice that if you choose C as the answer, the nearest points would be one of these: A, B, C B, C, D C, D, E All the other points will certainly be farther from C.So the problem is all about finding a segment with the lowest value for the farthest element in this interval, which is in the middle. Keep looking a window of size K and get the middle point of it. Choose any interval with the lowest of these values.Hope it helps :D
•  » » » Very Nice explanation thanks !
 » Did anyone write autor's solution in F?
•  » » 16 months ago, # ^ | ← Rev. 2 →   Although I didn't write it,I can explain it if you have any questions.
•  » » » I got the idea but I just found hashing multiset of numbers through xor sum very exotic.
•  » » » » I think it's exotic, too, but it taught me a new hash method.
•  » » » » » You tried to help me so let me try to help you.There is another way to hash multiset. So let number $i$ occurs in multiset $arr_i$ times. Then hash of multiset would be $\sum X^{arr_i}$ where $X$ is some prime number.Maybe that's widely known but I learned that several days ago.
•  » » » » » » 16 months ago, # ^ | ← Rev. 2 →   This hashing method really enhances my knowledge! I have never heard it before. Thanks a lot.
•  » » » » » » » You are welcome, but I got wrong!Hash of multiset equeals $\sum X^i$ for every $i$ from multiset. Now let $A$ and $B$ be some multisets. So now we can see that hash of $(A + B)$ is really easy to calculate cause it is just a sum of hash of $A$ and hash of $B$.
•  » » » » » » » » I got it. But can you remember the name of this algorithm?
•  » » » » » » » » » I found it in adamant's post. He called that just 'hashing of structures' and it is missing in English version. https://codeforces.com/blog/entry/48417?locale=en
•  » » » » » » » » » Thanks
 » For problem G, how to prove that $opt(i, j) < opt(i, j+1)$, where $opt(i, j)$ is the optimal value for calculating $dp[i][j]$? We need this in order to apply the Divide and Conquer DP optimization.
•  » » It seems like Um_nik tried to implement this DP optimization and it didn't work.DnC I was talking about is not an optimization. It described in this comment.
•  » » » Thank you! It seems that everyone who tried implementing this failed the 4th test case.
 » Can anyone explain the binary search solution (accepted) for problem C ? I was doing during the contest with binary search but couldn't get AC.
•  » » The idea is to binary search on minimum distance.Lets say distance is d then for all i (1 to n) we can form up segments [A[i] — d, A[i] + d]Now check if there are minimum k+1 intersections of these segments if yes it means we can find point x such that kth value would be d.
•  » » » Thanks spk got it after reading your solution.
•  » » » Sorry but could you explain the intersections part more?
 » anupamshah_ make a sliding window of length k(k points) and just take the midpoint of it's endpoints. Take the minimum length window.
 » 17 months ago, # | ← Rev. 2 →   can someone explain how binary lifting is applied in E ?
•  » » Basically the same way it's done on trees. After you precalculated $up[j][i]$ (the index of the last taken interval if you started from $i$ and took $2^j$ intervals greedily), you set the current interval $cur$ to the one which starts to the left or at $x$ and ends as much to the right as possible, then iterate over $j$ from $\log n$ down to $0$ and set $cur$ equal to $up[j][cur]$ if the right border of $up[j][cur]$ is strictly to the left of $y$. $2^j$ is added to answer then. In the end $up[cur]$ should be the interval which covers $y$.You just have to handle some cases carefully: if the first interval covers $y$ already and if -1 is reached. You can refer to my code in editorial for implementation.
•  » » » 17 months ago, # ^ | ← Rev. 2 →   So we are making up[j][i] for each position of i ? or we are doing it for each interval i ?
•  » » » » The way I described it, it's for each interval. However, doing it for each position is also possible, just the application slightly changes.
•  » » » » » Oh ok so we calculate for each segment the next segment that is left or equal to its right and is as long as possible and that will be up[i] for it and so on calculate for all even powers upto logn. And then apply Binary lifting technique to the queries. Am i right ?
•  » » » » » » Yup, that's right.
•  » » » » » » » Oh thanks a lot. Understood now. :)
•  » » » » » How to deal it for each position ?
•  » » » can you suggest problem on binary lifting , but not on trees .
•  » » sparseTable[i][j] = maximum position which can be reached from i'th point using (1 << j) intervals.Base Case : sparseTable[i] = max(sparseTable[i-1], be[i][j]). where be[i][j] = right endpoint of all intervals starting at i.Update : sparseTable[i][j] = sparseTable[sparseTable[i][j-1]][j-1] i.e. taking a jump of length (1 << (j-1)) from i and another one of length (1 << (j-1)) from point reached by previous jump.Query : Start from x. Consider all jumps of length power of two from largest to smallest. If by taking a jump we can reach a index less than y(note : not equal to y) update x to that index.
•  » » » Thanks for the explanation. It helped me !
 » 17 months ago, # | ← Rev. 2 →   For problem F, there is a way of two pointer approach to check if the interval is a permutation, instead of using random distribution.Assuming that we are going to handle the cases when $A \leq l \leq B \leq r \leq C$ and the maximum element is on the right of position $B$, let's set the current interval $[l, r]$ as $[B, B]$ and build a boolean array that records whether some value occur in the current interval.Then we enumerate and move $r$ from $B$ to $C$. During that process, we move $l$ to the leftmost such that there is no duplicated element in $[l, r]$ and $r + 1 - \max(a_{B}, a_{B + 1}, \ldots, a_{r}) \leq l \leq B$. After moving, we check if $l = r + 1 - \max(a_{B}, a_{B + 1}, \ldots, a_{r})$ and $\max(a_{l}, a_{l + 1}, \ldots, a_{r}) = \max(a_{B}, a_{B + 1}, \ldots, a_{r})$.Note that $l$ won't move right more than $(C - B)$ times, and of course won't move left more than $(C - A)$ times, so the complexity is guaranteed.
•  » » Any code of this solution?
•  » » » My linear submission during the contest: 55155285 (a bit shitty though)
 » Anyone keep getting wrong answer on test 5 for question B?
•  » » yes!! Me. I get :wrong answer 1st words differ — expected: '200000000', found: '0'and my sol is : https://codeforces.com/contest/1175/submission/55274658/Someone please help us!!
•  » » » You are checking for overflow only at the end. Even in the middle, the value of mul can exceed the size of long long int itself.
•  » » » » Yes I understand that, but you can't simply take it into account as, if we encounter an "end" before an "add", then that value will be discarded. SO, we have to check value of mul while we are adding it. Also, I am making sure it's maximum value is (2^32) only.
•  » » » » » 16 months ago, # ^ | ← Rev. 2 →   mul/=rem.top(); rem.pop();What about this? If mul is 2^32, isn't it wrong to divide it by rem.top() ? I think you meant to push 2^32 instead.
•  » » » » » » Heyy sandy999 thanks a for your help so far, but please check my latest solution considering the thing that you told me.It gives RE on test case 9. It shows divide by zero error. How is it even possible?
 » In problem F, you can easily test in constant time if a subsegment is a permutation of $1..x$ by precomputing the following: For each $r$, the value $c_r$ — the left end of the largest segment ending on $r$ such that it has unique values A sparse table for constant time maximum queries. A subsegment $l, r$ is a permutation if $l \geq c_r$ and $rangeMax(l,r) = r-l+1$.
•  » » Can you explain the calculation of value $c_r$?
•  » » » 16 months ago, # ^ | ← Rev. 3 →   for (int i=1; i<=n; i++) { c[i] = max(c[i-1], seen[a[i]]+1); seen[a[i]] = i; } where $a$ is the given $1$-indexed array, $seen$ is an array initially filled with zeros.
•  » » » » And how to search all subarray within time limit? For each i search from c[i] to i, or only search i which a[i] == 1?
•  » » » » » 16 months ago, # ^ | ← Rev. 2 →   I figured it out. Just use $c_r$, rmqMax and rmqMin to replace the hash function. Sorry for my dumb question.
•  » » 16 months ago, # ^ | ← Rev. 2 →   Very nice solution.While a sparse table is indeed the more intuitive way to do it, the problem can also be solved in linear time by exploiting the following fact: If a sequence of $n$ distinct positive elements has sum $\frac{n(n+1)}{2}$, then that sequence is a permutation of numbers $1$ through $n$.Here is my solution using that idea: 55276406
•  » » » Brilliant, thanks!
•  » » » sir , 1 2 3 4 5 — sum is 15 1 3 3 3 5 — sum is 15 so how your statement is correct ? can you explain my doubt i also thought this ?
•  » » » » Read carefully : He said first condition is that numbers in the given range must be unique and after that you can apply this n*(n+1)/2 part .
•  » » One can also replace sparse table with a stack of maximums to calculate previous maximum.
 » For problem C when k=0,x=a,and for any other k, x should be equal to (a+a[n-1])/2...plz explain the problem in this solution with a test case
 » 16 months ago, # | ← Rev. 2 →   Can someone please explain why he wrote : " That way the maximum value you can achieve is about 2^32*50000, which fits into the 64-bit integer. " in the solution of B Catch Overflow
•  » » 16 months ago, # ^ | ← Rev. 2 →   that maximum value : 2^32*50000 is the maximum value of res in his ediorial code. let's take this test case: 100000 for 100 // for 100 ... for 100 // 5 times add // add add add ... add // 99990 times of add end // end ... end // 5 times So after about 5 "for 100", cur.top() will be 1*10^10 and therefore cur.top() will be 2^32 from now on (2^32<10^10). As there are 99990 times of add, each time res+=cur.top() (which is res+=2^32). And finnally res will be 99990.2^32 — still fits the 64-bit integer. But if we don't take the min(INF, cur.top()*x) (INF is 2^32), then: First, stack cur will be overflowed because the value doesn't fit the 64-bit integer. (cur.top() can be 100^49999 as there are 49999 times of "for 100") Second, long long res will also be overflowed
 » Question about problem $F.$I understand that it is necessary for $f(l,r)$ to be equal to the xor of the first $r-l+1$ positive integers. However, how do we know this is sufficient to conclude that $a_l, a_{l+1}, \cdots, a_r$ are indeed a permutation of $1,2,\cdots, r-l+1?$ For example, the list of numbers $1,1,3,7$ has a total xor of $4,$ but this is also the xor of $1,2,3,4.$ Thus, how does the solution know that simply checking this condition is sufficient to show a subpermutation?
•  » » The author's solution first performs hashing by replacing each number $1..N$ with a random 128-bit number (two 64-bit numbers actually). It compares the xors of those replaced numbers, not the original ones.
•  » » » After replacing with 128 bit numbers, collision probability is not zero. Am I right?
 » For problem E solution 2 how are they claiming that all the queries can be done in linear time? Path compression will take logarithmic time. Can anybody please explain..
 » In problem F ( The number of subpermutation ) why we have taken 128 bit strings for hashing purpose , i mean why we did not take 64 bit string or 128+64 bit string ?? and How to select number of string bits required to be on safe side ?
•  » » I tried by changing the bits used for hashing and submitting the authors soln in this manner 128 -> 64 -> 50 -> 40 -> 30 -> 28 -> 26 -> 24and it gave WA when 24 bits were used , then i tried 25 bits and it worked ? one more query is it possible to design testcases to break higher bits soln .
 » Excuse me for my poor English, but I really can't find anything that is about "partiton" and the problem G at the same time.Is it actually "partition" or something?Searched "partiton" at https://fanyi.baidu.com/ and only got the explanation for "partition", so ...
 » Shouldn't we take (k+1) instead of k because f(x) is d(k+1) ?
 » for problem d ， how can i get that idea,which features can inspire me?
 » Can someone please explain the second technique i.e. path compression style in the editorial of Problem E. I tried but can understand it completely. I tried to google path compression but can't find anything other than path compression in DSU.
 » can any one explain problem C Electrification 3 2 1 2 5 why we chose 3 not 2? coz if we chose 3= 1 2 5 we get 2 1 2 after sort==1 2 2 for k=2 we get 2 but if we choose 2 1 2 5 we get 1 0 3 after sort= 0 1 3 now we can clearly say for k=2 '1' is smaller for 2.
•  » » You take the $k+1$'th number after sorting, so if you choose 2, you get 3.
•  » » » no its not that.we r choosing directly 3 coz index 3 is smaller in 3
 » is question C electrification actually diificult or i m only spending hours on this??
 » Can someone explain better how the second optimization is applied in Div2-E ?
 » For problem F, I think of hash a subarray as (x + a[l])(x + a[l+1])...(x + a[r]) with random value of x and random prime small modulo such as 10000079 then ultilize FFT but it seems not work because of the the probability of repetition is too high :<<
 » Roms in your solution for problem F, it is asked to map each no. to a random 128-bit string. I believe for that purpose, you are using a pair to store it. But you are using mt19937 which as per this blog can only generate 32-bit numbers, and to generate 64-bit numbers you should be using mt19937_64. So, isn't the model solution only mapping nos. to random 64-bit numbers? Can you please check?
•  » » Thanks, fixed now.
 » Does DP approach for problem D got Time Exceed? Apart from it, could you help me how to use DP for D problem?
•  » » I know of an O(n*k) solution for problem D using dp. Are you interested in it?
•  » » » it's a sure tle though
 » 7 months ago, # | ← Rev. 2 →   My solution for problem B using logarithm to avoid overflow. (https://codeforces.com/problemset/submission/1175/74378404)
 » For question D My logic: keep on getting index with minimum prefix sum till now, in order to have those indices with minimum effect in my answer using a priority_queue? I get WA on test case 7. Can you tell me why am i wrong? Can't find a test case for it. Any help is much appreciated. Thanks a lot Problem 1175D - Array Splitting My submission : 77223612
 » I did C with order statistics, binary searching the distance
•  » » Can you please explain how you solved it using binary search? Like on what basics to check left or right path.
 » 4 months ago, # | ← Rev. 2 →   How do I make my $nlogn*logn$ Binary Search + Prefix Sums solution pass on C?https://codeforces.com/contest/1175/submission/85123220