We can all benefit by doing occasional "toy" programs, when artificial restrictions are set up, so that we are forced to push our abilities to the limit. … The art of tackling miniproblems with all our energy will sharpen our talents for the real problems. Donald E. Knuth Quarterfinal Central region of Russia Rybinsk, October 17-2013 1. Box of Bricks (64 Mb, 1 sec / test)........................................................................2 2. Hanoi tower (64 Mb, 1 sec / test)..........................................................................2 3. Plunder & Flee – 2 (64 Mb, 1 sec / test)................................................................4 4. Blobs' Exhibition (64 Mb, 1 sec / test)..................................................................5 5. Number Game (64 Mb, 1 sec / test).......................................................................6 6. Evil & Odious (64 Mb, 1 sec / test).......................................................................6 7. Checkers (64 Mb, 1 sec / test)...............................................................................7 8. Redirect (64 Mb, 3 sec / test).................................................................................8 9. Klingon Battle Bagel (64 Mb, 1 sec / test)..........................................................11 10. Meteorite (64 Mb, 1 sec / test)...........................................................................12 11. Triangles (64 Mb, 1 sec / test)...........................................................................13 Input file name Output file name: INPUT.TXT OUTPUT.TXT 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 1. Box of Bricks (64 Mb, 1 sec / test) Pasha assembled box of bricks in the form of a rectangular parallelepiped and thought over the question: what is a minimal number of bricks lay on the route between two opposite corners of the parallelepiped, if it is allowed to pass from brick to other brick through the common face, edge or vertex? In the figure opposite bricks are highlighted. Help Pasha to write a program that calculates minimal number of bricks on the route. Input Integer n, m, k – the size of rectangular parallelepiped (in bricks). Output Integer – the minimal number of bricks. Limitations 1 ≤ n, m, k ≤ 1000 Example Input.txt 3 3 3 2. Output.txt 3 Hanoi tower (64 Mb, 1 sec / test) Each programmer knows the puzzle “The Hanoi Tower”. We will briefly remind you the conditions of this task. There are 3 pivots: A, B, C. Initially, n disks of different diameter are placed on the pivot A: the smallest disk is placed on the top and every next one is placed in an increasing order of their diameters. The second and the third pivots are still empty. You have to move all the disks from pivot A to pivot B, using pivot C as an auxiliary. By one step you can take off 1 upper disk and put it either on an empty pivot or on another pivot over a disk with a bigger diameter. Almost all books on programming contain a recursive solution of this task. In the following example you can see the procedure, written in Pascal. Procedure Hanoi (A, B, C: integer; N:integer); Begin If N>0 then Begin Hanoi (A, C, B, N-1); Writeln(‘Disk ’, N, ‘ from ‘, A, ‘ to ‘, B); Hanoi (C, B, A, N-1) 2 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest End End; The number of step Disk From To Combination 0. AAA 1. 1 A B BAA 2. 2 A C BCA 3. 1 B C CCA 4. 3 A B CCB 5. 1 C A ACB 6. 2 C B ABB 7. 1 A B BBB Here, for example, the combination «BСA» indicate that the smallest disk is on pivot B, the medium one is on pivot С, the biggest one is on pivot A. The members of jury, in preparation for the championship, played this exciting game, from time to time making notes of current combinations (each on a separate sheet of paper). However, later, the sheets with recorded combinations were mixed. Write a program that establishes if the given combination is occurred during the game. Input The first line of an input file contains two integer n – the number of disks, and m – the number of combinations. The following m lines contain m combinations. Each combination contains n capital letters (“A”, “B” or “C”) – the disposition of the n disks between the pivots. The first (leftmost) letter designates position (a pivot name) of the smallest disk, the second letter – position of the second largest, and so on… Output The output file must contain m lines – m combinations sorted in order of their appearing in game. Limitations 1 ≤ n ≤ 250; 1 ≤ m ≤ 1000 Example Input.txt 3 4 ACB ВСА ABB BAA Output.txt BAA ВСА ACB ABB Input.txt 3 1 BCA Output.txt BCA 3 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 3. Plunder & Flee – 2 (64 Mb, 1 sec / test) Hacker Kirill successfully coped with the task that "Plunder & Flee Inc." management had set before him last year, and he was transferred to the central office. Now he faces a new challenge of improving the computer network in the central office. The network consists of n workstations coupled by n–1 network cables; each pair of workstations has at most a single connection. Information is relayed between stations until it reaches the recipient. Currently, the network is set up in such a way that only a single route exists between any two stations. The solution is cheap but it has a major shortcoming: any cable failure renders the network inoperable. The management asked Kirill to improve the network using the least possible number of additional cables so as to keep the network operational in case of a single cable failure. Write a program that, given the network structure, will determine the minimum number of additional cables necessary to improve the network as described above. Limitations 2 ≤ n ≤ 1000; 1 ≤ ai, bi ≤ n. Input The first line of the input file contains integer n, the number of workstations in the network. The following n–1 lines describe the communication links. They contain space-delimited numbers of workstations connected by cable i: integers ai and bi. The workstations are identified with natural numbers ranging from 1 to n. Output The first line of the output file should contain integer m, the number of additional cables. Then m lines should follow, each consisting of a space-delimited pair of integers denoting the numbers of newly connected stations. Example Input.txt 3 1 2 2 3 Output.txt 1 1 3 Input.txt 4 1 4 2 4 3 4 Output.txt 2 1 2 2 3 4 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 4. Blobs' Exhibition (64 Mb, 1 sec / test) Blobs, a renowned painter from Flower Town is about to have a solo show at the local art gallery. He presented k works to be exhibited but unfortunately the gallery has only n exhibit spaces. Each exhibit space is a wall-mounted painting holder. During preparations it turned out that the holders are designed for paintings of different weight. Holder number i can carry an exhibit weighting no more than di grams. As it is impossible to display all the works anyway, Blobs estimated the artistic value ai of each painting. He also weighted all of them to know the weights wi (in grams). Please help Blobs in selecting a set of paintings to be displayed, maximizing the total artistic value. Write a program that will map the set of paintings having the maximum total artistic value to the available exhibit spaces. If several optimal solutions exist, any of them will be accepted as correct. Limitations All numbers are integer. 1 ≤ n ≤ k ≤ 10 000; 1 ≤ di, aj, wj ≤ 1 000 000; 1 ≤ i ≤ n; 1 ≤ j ≤ k. Input The first line of the input file contains two space-delimited integers n and k. The second line contains n space-delimited integers describing maximum loads for holders: d1, d2, d3, … dn. Then k lines follow, with two space-delimited numbers each: aj and wj, the artistic value and the weight of the j-th painting. The paintings are listed in ascending order of numbers: the third line of input contains a1, w1, the fourth – a2, w2, the fifth – a3, w3, and so on. Output The output file should contain n integers separated with spaces—the numbers of paintings to be placed in corresponding exhibit spaces. Here, the number in position i is the number of painting to be displayed in the exhibit space i. If an exhibit space is empty then output 0 in the corresponding position. Example Input.txt 5 10 1 2 3 4 5 10 3 4 3 11 8 1 5 5 8 7 1 5 5 8 3 4 2 7 3 Output.txt 6 9 1 8 10 5 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 5. Number Game (64 Mb, 1 sec / test) Vasya, a school whiz kid, feels bored during math classes, so he occasionally plays different games with Petya, a non-achiever who shares a desk with him. Once, Vasya proposed to play the following game. Petya picks two successive prime numbers, multiplies them and tells the product to Vasya, who is to find out the numbers. First, Vasya had to explain that two primes are successive if there are no other primes between them. Petya was surprised to see how quickly Vasya figured out the numbers. Then Vasya proposed that they switch roles. Please help Petya to find the chosen numbers. Write a program to find two successive prime numbers x and y given their product. Limitations 2 ≤ x < y ≤ 106; x, y are successive prime numbers. Input The input file contains a single integer, the arithmetical product of x and y. Output The output file should contain two space-delimited integers x and y, the least of them going first. Example Input.txt 15 Input.txt 35 Input.txt 77 6. Output.txt 3 5 Output.txt 5 7 Output.txt 7 11 Evil & Odious (64 Mb, 1 sec / test) A non-negative integer is called evil if has an even number of ones in its binary representation. Similarly, a non-negative integer is called odious if has an odd number of ones in its binary representation. Let us write down evil and odious numbers in ascending order. Number index 1 2 3 4 5 6 7 8 9 10 11 12 13 14 … Evil number 0 3 5 6 9 10 12 15 17 18 20 23 24 27 … Odious 1 2 4 7 8 11 13 14 16 19 21 22 25 26 … number Let E(n) be the n-th evil number in this list. Similarly, let O(n) be the n-th odious number. Write a program to calculate the sum of n-th evil and odious numbers E(n) + O(n) given their index n. 6 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest Limitations 1 ≤ n ≤ 1 000 000. Input The input file contains a single integer, n. Output The output file should contain a single integer, the sum E(n) + O(n). Example Input.txt 1 Input.txt 10 7. Output.txt 1 Output.txt 37 Checkers (64 Mb, 1 sec / test) An 8×8 chess board is used to play checkers. Each player starts with 12 normal pieces (“men”) on the black squares of the three rows closest to their own side. During of the game, the pieces may only move on unoccupied black squares. The players take turns moving one of the pieces. A normal piece can slide diagonally forward to an adjacent square. Forward direction is defined as the direction toward the last row, which is the most distant from the player. A normal piece can capture an opponent's piece. To do so, the piece is moved two squares diagonally in any direction “jumping over” the opponent's piece, which is later removed from the board. If the new position of the jumping piece allows to capture another opponent's piece (either “man” or “king”) then the move is continued until the jumping piece reaches the position where capture is not possible. A single opponent's piece can be jumped over only once during a move. Captured pieces are removed from the board only when the move is finished. Jumping is mandatory. When there is more than one way for a player to jump, one may choose which sequence to make. Write a program that will analyze the given checkers position and determine the maximum number of black pieces that can be captured by white in a single move, assuming there are no “kings” in the game. Input The input file consists of 8 lines, 8 characters each. Capital Latin letters “W” are used to denote white pieces, “B” for black. Empty squares of the board are marked with period characters (“.”). Output The output file should contain a single integer, the maximum number of black pieces that can be captured by white in a single move, for the given position. 7 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest Example Input.txt ........ ........ .B.B.B.. ........ .B.B.... ........ .B.B.... W....... Input.txt ........ ........ .B.B.B.. ........ .B.B.... ........ ...B.... W....... 8. Output.txt 6 Output.txt 0 Redirect (64 Mb, 3 sec / test) It is well known that Web search deals with electronic documents available at certain addresses (links) on the net. However, the address of a document is not necessarily unique, and a single document may be accessed through multiple links. Let us consider a special case of this situation – link redirection. When the client requests a page at address A, the server responds with a special code providing the address of a new page B, and the client navigates to this address. This process is known as redirection. Page B may as well redirect the client to a new page C and so on. Thus, the same document is made available at addresses A, B and C. Redirection data can come from various sources, e. g. from a web crawler that takes link A during scheduled crawling and goes through the whole chain of redirects. Another source may be Twitter API: tweets always contain so-called shortened links (tinylinks), and links to the original documents can be obtained from the extended data in tweets. If you have multiple sources, conflicts may arise: suppose, first we obtained data from Twitter (A->B), then the crawler takes link A leading in D. Alternatively, the service may have been overloaded, and at first the crawler received an error attempting to retrieve document A, though later the service became operational, and the crawler reached the target document at the second attempt. Also, the link may become invalid if the document is outdated. If we want to compute some statistics for the document, say, the number of links to this document, we need a way to bring all the references to some “common denomi8 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest nator”. The most practical “denominator” is the final link in the redirect chain. U is said to be the final link in the redirect chain if there is no redirect U->V leading to link V. The final link in the redirect chain will be also called the true address of the document. You are given information about N redirects, each being a pair <ui vi> (1 ≤ i ≤ N,), where ui is the original link, and vi is the link this redirect leads to. The redirect may come in the form <ui NULL> meaning that link ui is invalid. The links are given in the order of entry, i. e., the redirect occurring later in the list contains more up-to-date information. Write a program to process the available information about redirects and to determine the true address of the document for each of the M links. When solving the problem, the following conflicts may arise: if the chain of redirects for some link U is looped we suppose that the true address of this link is NULL; if several redirection options exist for some link U we consider the latest redirect as the correct one; if there is no information about redirects for some link U we suppose that the true address of this link is U. Limitations 1 ≤ N, M ≤ 100 000 0<|vi|,|ui|,|qi|≤10. (The length of each vi, ui, qi will not exceed 10 characters.) Links may contain uppercase and lowercase letters, numbers, and the following 15 characters listed inside the quotation marks: “& ? ! # ; ( ) . % : + - _ ~ / ”. Input The first line of the input file contains integer N. Each of the following N lines contains two links ui vi separated by one or more space characters. Line number N+2 contains integer M. The following M lines contain links qi, for which the true addresses are to be found. Output The output file should contain M lines, each being the true address of link qi. Example Input.txt 2 youtu.be/J NULL t.co/iqrw youtu.be/J 1 t.co/iqrw Input.txt 5 ti.ny/doc1 ti.ny/doc2 ti.ny/doc2 ti.ny/doc1 Output.txt NULL Output.txt NULL NULL jfgi.ru 9 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest ti.ny/doc3 ti.ny/doc2 t.co/asdqt bit.ly/sos bit.ly/sos jfgi.ru 4 ti.ny/doc1 ti.ny/doc3 t.co/asdqt ya.ru ya.ru 10 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 9. Klingon Battle Bagel (64 Mb, 1 sec / test) Two opponents play a game on a checkered field of size N×M. The first player places several shapes of “Klingon battle bagel” spaceship in the field. The shape of the ship is a solid 3 × 3 square having a hole in the center (see Fig.). Ships X X X can touch the edges of the field and each other but cannot intersect. The second player tries to find all the ships, firing at the cells of the X X field. The second player has made K shots at different cells hitting the X X X ships, and F shots at other cells that missed. Write program to calculate the minimum and the maximum number of ships that can be located in the field. Input The number of rows N and the number of columns M of the playing field are given in the first line of the input file, separated with a space character. The second line contains the number of hits H and the number of misses F. Output Space-delimited values of the minimum and the maximum number of ships possibly located on the field. Output “BAZINGA!” (without quotation marks) if no solution exists for the input data. Limitations 1 ≤ N, M ≤ 100 000. 0 ≤ H, F ≤ N×M; 0 ≤ H, F ≤ N×M. Example Input.txt 7 7 1 1 Input.txt 7 7 5 13 Input.txt 3 3 9 0 Output.txt 1 4 Output.txt 1 4 Output.txt BAZINGA! 11 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 10. Meteorite (64 Mb, 1 sec / test) The Ministry of Emergency Situations (MES) was informed about the fall of a large meteorite that exploded in the atmosphere. The employees promptly examined the impact site and mapped the affected area in detail. It turned out that the affected area is bounded by a complex-shape polygon M. Unfortunately, there is a large city in this area. The boundaries of the city also represent a polygon, G. It is natural to expect that the major damage requiring the intervention of MES occurred at the intersection of polygons M and G. As an urgent measure, it was decided to calculate the number of separate parts of the city falling into the major damage zone. Note that none of the vertices of polygons M and G lies on the boundary of another polygon. Write a program that calculates the number of parts in the intersection of polygons M and G. Input The first line contains integer N, the number of vertices in polygon M. The following N lines contain the coordinates of the vertices of M in the order of contour traversal. Coordinate values are separated with one or several space characters. The next line contains integer K, the number of vertices in G, and the following K lines contain the coordinates of its vertices. Output Output a single number – the count of separate parts in the intersection of polygons M and G. Limitations 3 ≤ N, K ≤ 300 All coordinates are non-negative integers not exceeding 32000. Example Input.txt 4 0 0 3 5 7 1 4 3 3 2 2 2 0 7 2 Output.txt 2 12 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest 11. Triangles (64 Mb, 1 sec / test) N nails are hammered in the wall. Some pairs of nails are connected with wires, possibly multiple. You may assume that there are no wires connecting nail to itself. Each wire is colored: white, blue, or red. We say that three wires form a triangle if there is a cycle connecting three nails. We call a triangle multi-colored if it is formed by wires of three distinct colors. Write a program to compute the number of multi-colored triangles for a given list of wires. Input The first line of the input file contains two space-delimited numbers N and M—the number of nails and the number of wires. Each of the following M lines contains three integers: numbers of nails being connected by a wire, and the color of that wire. The color is indicated by integers 1, 2, or 3. Output The output file should contain a single integer, the number of multi-colored triangles. Limitations 2 ≤ N ≤1000 0 ≤ M ≤ 3000 Example Input.txt 4 8 1 2 1 1 3 1 2 3 1 1 3 2 1 4 3 1 4 3 4 3 1 3 4 2 Output.txt 4 Example explanation The multi-colored triangles are formed by the following triples of wires: • (1,3,1), (3,4,2), (1,4,3); • (1,3,1), (3,4,2), (1,4,3); • (1,3,2), (4,3,1), (1,4,3); • (1,3,2), (4,3,1), (1,4,3). 13 2011-2012 ACM Central Region of Russia Quarterfinal Programming Contest Please note. In the example, the first and the second triangles, as well as the third and the fourth ones seem to be identical, however, given that there are two wires of the same color between the nails #1 and #4, the triangles are considered to be different as different wires are used to form the triangles. © RSATU, 2013 (http://www.rsatu.ru) Task authors: © Sergey G. Volchenkov, 2013 © Vladimir N. Pinaev, 2013 © Michael Y. Kopachev, 2013 © Alexander Kiselyov, 2013 © Oleg Strekalovsky, 2013 (volchenkov@yandex.ru) (vpinaev@mail.ru) (rybkmu@mail.ru) (diver.ru@gmail.com) (o.strekalovsky@yandex.ru) 14
© Copyright 2024