| AN INTRODUCTION TO THE | |
| USA COMPUTING OLYMPIAD | |
| Darren Yao | |
| 2020 | |
| R (cid:140) (cid:135) | |
| Java Edition | |
| Foreword | |
| This book was written as a comprehensive and up-to-date training resource for the USA | |
| Computing Olympiad. The goal was to create an “Art of Problem Solving” of sorts for the | |
| USACO: a one-stop-shop guide to prepare competitive programmers for the Bronze and Silver | |
| divisions of the USACO contests. | |
| My primary motivation for writing this book was the struggle to find the right resources | |
| when I first started doing USACO contests. When I eventually reached the Platinum division, | |
| new competitors often asked me for help in structuring their competitive programming | |
| practice. Since I always found myself explaining that the USACO lacked comprehensive | |
| training resources, I decided to write this book. | |
| I would like to thank a number of people for their contributions to this book. In particular, | |
| Michael Cao for writing sections 10.6 and 10.7 and helping with content revisions, Jason Chen | |
| for writing section 14.2 and extensive help with both content and LaTeX formatting, and | |
| Aaryan Prakash, Rishab Parthasarathy, Kevin Wang, and Stephanie Wu for their valuable | |
| and constructive feedback on early draft versions of the book. | |
| I’d also like to thank the USACO discord community for supporting me through my | |
| competitive programming journey; it was because of them that my competitive programming | |
| successes, and this book, are possible. | |
| Cover design by Dylan Yu. | |
| Author’s Profile | |
| Darren Yao is a USACO Platinum competitor. You can find his website at https: | |
| //darrenyao.com/. | |
| Copyright c(cid:13)2020 by Darren Yao | |
| All rights reserved. No part of this book may be reproduced or used in any manner without | |
| the prior written permission from the copyright owner. | |
| i | |
| Contents | |
| I Basic Techniques | |
| 1 The Beginning | |
| 1.1 Competitive Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 1.2 Contests and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 1.3 Competitive Programming Practice . . . . . . . . . . . . . . . . . . . . . . . | |
| 1.4 About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 2 Elementary Techniques | |
| 2.1 | |
| Input and Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 2.2 Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 3 Time/Space Complexity and Algorithm Analysis | |
| 3.1 Big O Notation and Complexity Calculations . . . . . . . . . . . . . . . . . . | |
| 3.2 Common Complexities and Constraints . . . . . . . . . . . . . . . . . . . . . | |
| 4 Built-in Data Structures | |
| 4.1 Dynamic Arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 4.2 Stacks and the Various Types of Queues | |
| . . . . . . . . . . . . . . . . . . . . | |
| 4.3 Sets and Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 4.4 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| II Bronze | |
| 5 Simulation | |
| 5.1 Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 5.2 Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 5.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 6 Complete Search | |
| 6.1 Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 6.2 Generating Permutations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 6.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 1 | |
| 2 | |
| 2 | |
| 3 | |
| 3 | |
| 4 | |
| 5 | |
| 5 | |
| 9 | |
| 10 | |
| 10 | |
| 11 | |
| 13 | |
| 13 | |
| 14 | |
| 16 | |
| 19 | |
| 20 | |
| 21 | |
| 21 | |
| 22 | |
| 23 | |
| 24 | |
| 24 | |
| 26 | |
| 27 | |
| ii | |
| CONTENTS | |
| 7 Additional Bronze Topics | |
| 7.1 Square and Rectangle Geometry . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 7.2 Ad-hoc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 7.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| III Silver | |
| 8 Sorting and comparators | |
| 8.1 Comparators | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 8.2 Sorting by Multiple Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 8.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 9 Greedy Algorithms | |
| Introductory Example: Studying Algorithms . . . . . . . . . . . . . . . . . . | |
| 9.1 | |
| 9.2 Example: The Scheduling Problem . . . . . . . . . . . . . . . . . . . . . . . | |
| 9.3 Failure Cases of Greedy Algorithms . . . . . . . . . . . . . . . . . . . . . . . | |
| 9.4 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10 Graph Theory | |
| 10.1 Graph Basics | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.2 Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.3 Graph Representations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.4 Graph Traversal Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.5 Floodfill | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.6 Disjoint-Set Data Structure | |
| 10.7 Bipartite Graphs | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 10.8 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 11 Prefix Sums | |
| 11.1 Prefix Sums . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 11.2 Two Dimensional Prefix Sums . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 11.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 12 Binary Search | |
| 12.1 Binary Search on the Answer | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 12.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 12.3 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 13 Elementary Number Theory | |
| 13.1 Prime Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 13.2 GCD and LCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 13.3 Modular Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 13.4 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| iii | |
| 28 | |
| 28 | |
| 28 | |
| 29 | |
| 31 | |
| 32 | |
| 32 | |
| 34 | |
| 34 | |
| 36 | |
| 36 | |
| 37 | |
| 38 | |
| 39 | |
| 40 | |
| 40 | |
| 41 | |
| 42 | |
| 47 | |
| 51 | |
| 54 | |
| 57 | |
| 58 | |
| 60 | |
| 60 | |
| 61 | |
| 63 | |
| 64 | |
| 64 | |
| 65 | |
| 66 | |
| 68 | |
| 68 | |
| 69 | |
| 70 | |
| 70 | |
| CONTENTS | |
| 14 Additional Silver Topics | |
| 14.1 Two Pointers | |
| . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 14.2 Line Sweep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 14.3 Bitwise Operations and Subsets . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 14.4 Ad-hoc Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| 14.5 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | |
| IV Problem Set | |
| 15 Parting Shots | |
| iv | |
| 71 | |
| 71 | |
| 73 | |
| 75 | |
| 78 | |
| 78 | |
| 80 | |
| 81 | |
| Part I | |
| Basic Techniques | |
| 1 | |
| Chapter 1 | |
| The Beginning | |
| 1.1 Competitive Programming | |
| Welcome to the world of competitive programming! If you’ve had some basic programming | |
| experience with Java (perhaps at the level of an introductory course like AP Computer Science | |
| A), and are interested in competitive programming, then this book is for you. (If your primary | |
| language is C++, we also have a C++ edition of this book; please refer to that instead). If | |
| you currently do not know how to code, there are numerous resources available online to help | |
| you learn. | |
| This book aims to guide you through your competitive programming journey by providing | |
| a framework in which to learn the important contest topics. From competitive programming, | |
| not only do you improve at programming, but you improve your problem-solving skills which | |
| will help you in other areas. If at any point you have questions, feedback, or notice any | |
| mistakes, please contact me at darren.yao@gmail.com. Best of luck, and enjoy the ride! | |
| The goal of competitive programming is to write code to solve given problems quickly. | |
| These problems are not open problems; they are problems that are designed to be solved in | |
| the short timeframe of a contest, and have already been solved by the problem writer and | |
| testers. In general, each problem in competitive programming is solved by a two-step process: | |
| coming up with the algorithm, and then implementing it into working code. The degree of | |
| mathematics knowledge varies from contest to contest, but generally the level of mathematics | |
| required is relatively elementary, and we will review important topics in this book. | |
| A contest generally lasts for several hours, and consists of a set of problems. For each | |
| problem, when you complete your code, you submit it to a grader, which checks the answers | |
| calculated by the your program against a set of predetermined test cases. For each problem, | |
| you are given a time limit and a memory limit that your program must satisfy. Grading | |
| varies between contests; sometimes there is partial credit for passing some cases, while other | |
| times grading is all-or-nothing. For those of you with experience in software development, | |
| note that competitive programming is quite different, as the goal is to write programs that | |
| compute the correct answer, run quickly, and can be implemented quickly. Note that nowhere | |
| was maintainability of code mentioned. This means that you should throw away everything | |
| you know about traditional code writing; you don’t need to bother documenting your code, | |
| because it only needs to be readable to you, during the contest. | |
| 2 | |
| CHAPTER 1. THE BEGINNING | |
| 3 | |
| 1.2 Contests and Resources | |
| The USA Computing Olympiad is a national programming competition that occurs four | |
| times a year, with December, January, February, and US Open contests. The regular contests | |
| are four hours long, and the US Open is five hours long. Each contest contains three problems. | |
| Solutions are evaluated and scored against a set of predetermined test cases that are not | |
| visible to the student. Scoring is out of 1000 points, with each problem being weighted | |
| equally. There are four divisions of contests: Bronze, Silver, Gold, and Platinum. After each | |
| contest, students who meet the contest-dependent cutoff for promotion will compete in the | |
| next division for future contests. | |
| While this book is primarily focused on the USACO, CodeForces is another contest | |
| programming platform that many students use for practice. CodeForces holds 2-hour contests | |
| very frequently, which are more focused on fast solving compared to USACO. However, we | |
| do think CodeForces is a valuable training platform, so many exercises and problems will | |
| come from there. We encourage you to create a CodeForces account and solve the provided | |
| problems there. CodeForces submissions are all-or-nothing; unlike USACO, there is no partial | |
| credit and you only receive credit for a problem if you pass all of the test cases. | |
| We will also include some exercises from Antti Laaksonen’s website CSES. It contains a | |
| selection of standard problems that you can use to learn and practice well-known algorithms | |
| and techniques. You should note that CSES’s grader is very slow, so don’t worry if you | |
| encounter a Time Limit Exceeded verdict; as long as you pass the majority of test cases | |
| within the time limit, and your time complexity is reasonable, you can consider the problem | |
| solved, and move on. | |
| 1.3 Competitive Programming Practice | |
| Reaching a high level in competitive programming requires dedication and motivation. | |
| For many people, their practice is inefficient because they do problems that are too easy, too | |
| hard, or simply of the wrong type. This book aims to correct that by providing comprehensive | |
| problem sets for each topic covered on the USA Computing Olympiad, as well as an extensive | |
| selection of problems across all topics in the final chapter. | |
| In the lower divisions, most problems use relatively elementary algorithms; the main | |
| challenge is deciding which algorithm to use, and implementing it correctly. In a contest, | |
| you should spend the bulk of your time thinking about the problem and coming up with the | |
| algorithm, rather than typing code. Thus, you should practice your implementation skills, | |
| so that during the contest, you can implement the algorithm quickly and correctly, without | |
| resorting to debugging. | |
| On Exercises and Practice Problems | |
| You improve at competitive programming by solving problems, so we strongly recommend | |
| that you make use of the included exercises in each section before moving on. Some of the | |
| problems will be easy, and some of them will be hard. This is because problems that you | |
| practice with should be of the appropriate difficulty. You don’t necessarily need to complete | |
| all the exercises at the end of each chapter, just do what you think is right for you. A | |
| CHAPTER 1. THE BEGINNING | |
| 4 | |
| problem at the right level of difficulty should be one of two types: either you struggle with | |
| the problem for a while before coming up with a working solution, or you miss it slightly and | |
| need to consult the solution for some small part. If you instantly come up with the solution, | |
| a problem is likely too easy, and if you’re missing multiple steps, it might be too hard. | |
| In general, especially on harder problems, I think it’s fine to read the solution relatively | |
| early on, as long as you’re made several different attempts at it and you can learn effectively | |
| from the solution. | |
| • On a bronze problem, read the solution after 15-20 minutes of no meaningful progress, | |
| after you’ve exhausted every idea you can think of. | |
| • On a silver problem, read the solution after 30-40 minutes of no meaningful progress. | |
| When you get stuck and consult the solution, you should not read the entire solution at | |
| once, and you certainly shouldn’t look at the solution code. Instead, it’s better to read the | |
| solution step by step until you get unstuck, at which point you should go back and finish the | |
| problem, and implement it yourself. Reading the full solution or its code should be seen as a | |
| last resort. | |
| IDEs and Text Editors | |
| Here’s some IDEs and text editors often used by competitive programmers: | |
| • Java: Visual Studio Code or IntelliJ/Eclipse | |
| • C++: Visual Studio Code, CodeBlocks, vim/gvim, Sublime Text. | |
| • Do not use online IDEs that display your code publicly, like the free version of ideone. | |
| This allows other users to copy your code, and you may get flagged for cheating. | |
| 1.4 About This Book | |
| This book aims to prepare students for the Bronze and Silver division of the USACO, with | |
| the goal of qualifying for Gold. We will do this by covering all the necessary algorithms, data | |
| structures, and skills to pass the Bronze and Silver contests. Many examples and practice | |
| problems have been provided; these are the most important part of studying competitive | |
| programming, so make sure you pay careful attention to the examples and solve the practice | |
| problems, which usually come from previous USACO contests. This book is intended for | |
| those who have some programming experience – Basic knowledge of Java at the level of | |
| an introductory class like AP Computer Science is expected. This book begins with some | |
| necessary background knowledge, which is then followed by lessons on common topics that | |
| appear on the Bronze and Silver divisions of USACO, and then examples. At the end of | |
| each chapter will be a set of problems from USACO, CodeForces, and CSES, where you can | |
| practice what you’ve learned in the chapter. | |
| The primary purpose of this book is to compile all of the topics needed for a beginner in | |
| one book, and provide all the resources needed, to make the process of studying for contests | |
| easier. | |
| Chapter 2 | |
| Elementary Techniques | |
| 2.1 | |
| Input and Output | |
| In your CS classes, you’ve probably implemented input and output using standard input | |
| and standard output, or using Scanner to read input and System.out.print to print output. | |
| In CodeForces and CSES, input and output are standard, and the above methods work. | |
| However, Scanner and System.out.print are slow when we have to handle inputting and | |
| outputting tens of thousands of lines. Thus, we use BufferedReader and PrintWriter | |
| instead, which are faster because they buffer the input and output and handle it all at once | |
| as opposed to parsing each line individually. | |
| However, in USACO, input is read from a file called problemname.in, and printing | |
| output to a file called problemname.out. Note that you’ll have to rename the .in and .out | |
| files. Essentially, replace every instance of the word template in the word below with the | |
| input/output file name, which should be given in the problem. | |
| In order to test a program, create a file called problemname.in, and then run the program. | |
| The output will be printed to problemname.out. | |
| Below, we have included Java example code for input and output in USACO. We import | |
| the entire util and io libraries for ease of use. The template is intentionally kept short so | |
| you can type it out, since use of prewritten code is not allowed in USACO as of the 2020-2021 | |
| season. | |
| import java.io.*; | |
| import java.util.*; | |
| public class template { | |
| public static void main(String[] args) throws IOException { | |
| BufferedReader r = new BufferedReader(new | |
| FileReader("template.in")); | |
| (cid:44)→ | |
| PrintWriter pw = new PrintWriter(new BufferedWriter(new | |
| (cid:44)→ | |
| FileWriter("template.out"))); | |
| StringTokenizer st = new StringTokenizer(r.readLine()); | |
| int n = Integer.parseInt(st.nextToken()); | |
| 5 | |
| CHAPTER 2. ELEMENTARY TECHNIQUES | |
| 6 | |
| r.close(); | |
| pw.close(); | |
| } | |
| } | |
| We have several important functions that are used in reading input and printing output: | |
| Method | |
| Description | |
| r.readLine() | |
| st.nextToken() | |
| Integer.parseInt | |
| Reads the next line of the input | |
| Reads the next token (up to a whitespace) and returns as a ‘String‘. | |
| Converts the ‘String‘ returned by the ‘StringTokenizer‘ to an ‘int‘. | |
| Double.parseDouble Converts the ‘String‘ returned by the ‘StringTokenizer‘ to a ‘double‘. | |
| Long.parseLong | |
| pw.println() | |
| pw.print() | |
| Converts the ‘String‘ returned by the ‘StringTokenizer‘ to a ‘long‘ | |
| Prints the argument to designated output stream and adds newline | |
| Prints the argument to designated output stream | |
| For example, if we’re reading the following input, | |
| 1 2 3 | |
| our code (inside the main method) will look like this: | |
| BufferedReader r = new BufferedReader(new FileReader("template.in")); | |
| PrintWriter pw = new PrintWriter(new BufferedWriter(new | |
| (cid:44)→ | |
| FileWriter("template.out"))); | |
| StringTokenizer st = new StringTokenizer(r.readLine()); | |
| int a = Integer.parseInt(st.nextToken()); | |
| int b = Integer.parseInt(st.nextToken()); | |
| int c = Integer.parseInt(st.nextToken()); | |
| r.close(); | |
| pw.close(); | |
| Now, let’s suppose we wanted to read this input, which is presented on different lines, | |
| with different data types: | |
| 100000000000 | |
| SFDFSDFSDFD | |
| 3 | |
| Then our code would be | |
| CHAPTER 2. ELEMENTARY TECHNIQUES | |
| 7 | |
| BufferedReader r = new BufferedReader(new FileReader("template.in")); | |
| PrintWriter pw = new PrintWriter(new BufferedWriter(new | |
| (cid:44)→ | |
| FileWriter("template.out"))); | |
| StringTokenizer st = new StringTokenizer(r.readLine()); | |
| long a = Long.parseLong(st.nextToken()); | |
| st = new StringTokenizer(r.readLine()); | |
| String b = st.nextToken(); | |
| st = new StringTokenizer(r.readLine()); | |
| int c = Integer.parseInt(st.nextToken()); | |
| r.close(); | |
| pw.close(); | |
| Note how we have to re-declare the ‘StringTokenizer‘ every time we read in a new line. | |
| For CodeForces, CSES, and other contests that use standard input and output, here is a | |
| nicer template, which essentially functions as a faster Scanner: | |
| import java.io.*; | |
| import java.util.*; | |
| public class template { | |
| static class InputReader { | |
| BufferedReader reader; | |
| StringTokenizer tokenizer; | |
| public InputReader(InputStream stream) { | |
| reader = new BufferedReader(new InputStreamReader(stream), 32768); | |
| tokenizer = null; | |
| } | |
| String next() { // reads in the next string | |
| while (tokenizer == null || !tokenizer.hasMoreTokens()) { | |
| try { | |
| tokenizer = new StringTokenizer(reader.readLine()); | |
| } catch (IOException e) { | |
| throw new RuntimeException(e); | |
| } | |
| } | |
| return tokenizer.nextToken(); | |
| } | |
| public int nextInt() { // reads in the next int | |
| return Integer.parseInt(next()); | |
| CHAPTER 2. ELEMENTARY TECHNIQUES | |
| 8 | |
| } | |
| public long nextLong() { // reads in the next long | |
| return Long.parseLong(next()); | |
| } | |
| public double nextDouble() { // reads in the next double | |
| return Double.parseDouble(next()); | |
| } | |
| } | |
| static InputReader r = new InputReader(System.in); | |
| static PrintWriter pw = new PrintWriter(System.out); | |
| public static void main(String[] args) { | |
| // YOUR CODE HERE | |
| pw.close(); // flushes the output once printing is done | |
| } | |
| } | |
| Here’s a brief description of the methods in our InputReader class, with an instance r, | |
| and PrintWriter with an instance pw. | |
| Method | |
| r.next() | |
| r.nextInt() | |
| r.nextLong() | |
| Description | |
| Reads the next token (up to a whitespace) and returns a String | |
| Reads the next token (up to a whitespace) and returns as an int | |
| Reads the next token (up to a whitespace) and returns as a long | |
| r.nextDouble() Reads the next token (up to a whitespace) and returns as a double | |
| Prints the argument to designated output stream and adds newline | |
| Prints the argument to designated output stream | |
| pw.println() | |
| pw.print() | |
| Here’s an example to show how input/output works. Let’s say we want to write a program | |
| that takes three numbers as input and prints their sum. | |
| // InputReader template code above | |
| static InputReader r = new InputReader(System.in); | |
| static PrintWriter pw = new PrintWriter(System.out); | |
| public static void main(String[] args) { | |
| int a = r.nextInt(); | |
| int b = r.nextInt(); | |
| int c = r.nextInt() | |
| pw.println(a + b + c); | |
| CHAPTER 2. ELEMENTARY TECHNIQUES | |
| 9 | |
| pw.close(); | |
| } | |
| 2.2 Data Types | |
| There are several main data types that are used in contests: 32-bit and 64-bit integers, | |
| floating point numbers, booleans, characters, and strings. | |
| The 32-bit integer supports values between −2 147 483 648 and 2 147 483 647, which is | |
| roughly equal to ± 2×109. If the input, output, or any intermediate values used in calculations | |
| exceed the range of a 32-bit integer, then a 64-bit integer must be used. The range of the | |
| 64-bit integer is between −9 223 372 036 854 775 808 and 9 223 372 036 854 775 807 which is | |
| roughly equal to ± 9 × 1018. Contest problems are usually set such that the 64-bit integer is | |
| sufficient. If it’s not, the problem will ask for the answer modulo m, instead of the answer | |
| itself, where m is a prime. In this case, make sure to use 64-bit integers, and take the | |
| remainder of x modulo m after every step using x %= m;. | |
| Floating point numbers are used to store decimal values. It is important to know that | |
| floating point numbers are not exact, because the binary architecture of computers can only | |
| store decimals to a certain precision. Hence, we should always expect that floating point | |
| numbers are slightly off. Contest problems will accommodate this by either asking for the | |
| greatest integer less than 10k times the value, or will mark as correct any output that is | |
| within a certain (cid:15) of the judge’s answer. | |
| Boolean variables have two possible states: true and false. We’ll usually use booleans to | |
| mark whether a certain process is done, and arrays of booleans to mark which components of | |
| an algorithm have finished. | |
| Character variables represent a single Unicode character. They are returned when you | |
| access the character at a certain index within a string. Characters are represented using the | |
| ASCII standard, which assigns each character to a corresponding integer; this allows us to do | |
| arithmetic with them, for example, System.out.println('f' - 'a'); will print 5. | |
| Strings are effectively arrays of characters. You can easily access the character at a certain | |
| index and take substrings of the string. String problems on USACO are generally very easy | |
| and don’t involve any special data structures. | |
| Chapter 3 | |
| Time/Space Complexity and | |
| Algorithm Analysis | |
| In programming contests, there is a strict limit on program runtime. This means that | |
| in order to pass, your program needs to finish running within a certain timeframe. For | |
| USACO, this limit is 4 seconds for Java submissions. A conservative estimate for the number | |
| of operations the grading server can handle per second is 108. | |
| 3.1 Big O Notation and Complexity Calculations | |
| We want a method of characterizing how many operations it takes to run each algorithm, | |
| in terms of the input size n. Fortunately, this can be done relatively easily using Big O | |
| notation, which expresses worst-case complexity as a function of n, as n gets arbitrarily large. | |
| Complexity is an upper bound for the number of steps an algorithm requires, as a function of | |
| the input size. In Big O notation, we denote the complexity of a function as O(f (n)), where | |
| f (n) is a function without constant factors or lower-order terms. We’ll see some examples of | |
| how this works, as follows. | |
| The following code is O(1), because it executes a constant number of operations. | |
| int a = 5; | |
| int b = 7; | |
| int c = 4; | |
| int d = a + b + c + 153; | |
| Input and output operations are also assumed to be O(1). | |
| In the following examples, we assume that the code inside the loops is O(1). | |
| The time complexity of loops is the number of iterations that the loop runs multiplied by | |
| the amount of operations per iteration. The following code examples are both O(n). | |
| for(int i = 1; i <= n; i++){ | |
| // constant time code here | |
| } | |
| 10 | |
| CHAPTER 3. TIME/SPACE COMPLEXITY AND ALGORITHM ANALYSIS | |
| 11 | |
| int i = 0; | |
| while(i < n){ | |
| // constant time node here | |
| i++; | |
| } | |
| Because we ignore constant factors and lower order terms, for loops where we loop up to | |
| 5n + 17 or n + 457737 would also be O(n): | |
| We can find the time complexity of multiple loops by multiplying together the time | |
| complexities of each loop. The following example is O(nm), because the outer loop runs O(n) | |
| iterations and the inner loop O(m). | |
| for(int i = 1; i <= n; i++){ | |
| for(int j = 1; j <= m; j++){ | |
| // constant time code here | |
| } | |
| } | |
| If an algorithm contains multiple blocks, then its time complexity is the worst time | |
| complexity out of any block. For example, if an algorithm has an O(n) block and an O(n2) | |
| block, the overall time complexity is O(n2). | |
| Functions of different variables generally are not considered lower-order terms with respect | |
| to each other, so we must include both terms. For example, if an algorithm has an O(n2) | |
| block and an O(nm) block, the overall time complexity would be O(n2 + nm). | |
| 3.2 Common Complexities and Constraints | |
| Complexity factors that come from some common algorithms and data structures are as | |
| follows: | |
| • Mathematical formulas that just calculate an answer: O(1) | |
| • Unordered set/map: O(1) per operation | |
| • Binary search: O(log n) | |
| • Ordered set/map or priority queue: O(log n) per operation | |
| • Prime factorization of an integer, or checking primality or compositeness of an integer: | |
| √ | |
| O( | |
| n) | |
| • Reading in n items of input: O(n) | |
| • Iterating through an array or a list of n elements: O(n) | |
| CHAPTER 3. TIME/SPACE COMPLEXITY AND ALGORITHM ANALYSIS | |
| 12 | |
| • Sorting: usually O(n log n) for default sorting algorithms (mergesort, for example | |
| Collections.sort or Arrays.sort on objects) | |
| • Java Quicksort (Arrays.sort function on primitives on pathological worst-case data | |
| sets, don’t use this in CodeForces rounds. . . ): O(n2). | |
| • Iterating through all subsets of size k of the input elements: O(nk). For example, | |
| iterating through all triplets is O(n3). | |
| • Iterating through all subsets: O(2n) | |
| • Iterating through all permutations: O(n!) | |
| Here are conservative upper bounds on the value of n for each time complexity. You can | |
| probably get away with more than this, but this should allow you to quickly check whether | |
| an algorithm is viable. | |
| n | |
| Possible complexities | |
| n ≤ 10 | |
| n ≤ 20 | |
| n ≤ 80 | |
| n ≤ 400 | |
| n ≤ 7500 | |
| n ≤ 7 · 104 | |
| n ≤ 5 · 105 | |
| n ≤ 5 · 106 | |
| n ≤ 1012 | |
| n ≤ 1018 O(log2 n), O(log n), O(1) | |
| O(n!), O(n7), O(n6) | |
| O(2n · n), O(n5) | |
| O(n4) | |
| O(n3) | |
| O(n2) | |
| √ | |
| n) | |
| O(n | |
| O(n log n) | |
| O(n) | |
| n log n), O( | |
| O( | |
| n) | |
| √ | |
| √ | |
| Chapter 4 | |
| Built-in Data Structures | |
| A data structure determines how data is stored. (is it sorted? indexed? what operations | |
| does it support?) Each data structure supports some operations efficiently, while other | |
| operations are either inefficient or not supported at all. This chapter introduces the data | |
| structures in the Java standard library that are frequently used in competitive programming. | |
| Java default Collections data structures are designed to store any type of object. However, | |
| we usually don’t want this; instead, we want our data structures to only store one type of | |
| data, like integers, or strings. We do this by putting the desired data type within the <> | |
| brackets when declaring the data structure, as follows: | |
| ArrayList<String> list = new ArrayList<String>(); | |
| This creates an ArrayList structure that only stores objects of type String. | |
| For our examples below, we will primarily use the Integer data type, but note that you | |
| can have Collections of any object type, including Strings, other Collections, or user-defined | |
| objects. | |
| Collections data types always contain an add method for adding an element to the | |
| collection, and a remove method which removes and returns a certain element from the | |
| collection. They also support the size() method, which returns the number of elements in | |
| the data structure, and the isEmpty() method, which returns true if the data structure is | |
| empty, and false otherwise. | |
| 4.1 Dynamic Arrays | |
| You’re probably already familiar with regular (static) arrays. Now, there are also dynamic | |
| arrays (ArrayList in Java) that support all the functions that a normal array does, and can | |
| resize itself to accommodate more elements. In a dynamic array, we can also add and delete | |
| elements at the end in O(1) time. | |
| However, we need to be careful that we only add elements to the end of the ArrayList; | |
| insertion and deletion in the middle of the ArrayList is O(n). | |
| 13 | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 14 | |
| ArrayList<Integer> list = new ArrayList<Integer>(); // declare the dynamic array | |
| list.add(2); // [2] | |
| list.add(3); // [2, 3] | |
| list.add(7); // [2, 3, 7] | |
| list.add(5); // [2, 3, 7, 5] | |
| list.set(1, 4); // sets element at index 1 to 4 -> [2, 4, 7, 5] | |
| list.remove(1); // removes element at index 1 -> [2, 7, 5] | |
| // this remove method is O(n); to be avoided | |
| list.add(8); // [2, 7, 5, 8] | |
| list.remove(list.size()-1); // [2, 7, 5] | |
| // here, we remove the element from the end of the list; this is O(1). | |
| System.out.println(list.get(2)); // 5 | |
| To iterate through a static or dynamic array, we can use either the regular for loop or the | |
| for-each loop. | |
| Arrays.sort(arr) is used to sort a static array, and Collections.sort(list) a dynamic | |
| array. The default sort function sorts the array in ascending order. | |
| In array-based contest problems, we’ll use one-, two-, and three-dimensional static arrays | |
| most of the time. However, we can also have static arrays of dynamic arrays, dynamic arrays | |
| of static arrays, and so on. Usually, the choice between a static array and a dynamic array is | |
| just personal preference. | |
| 4.2 Stacks and the Various Types of Queues | |
| Stacks | |
| A stack is a Last In First Out (LIFO) data structure that supports three operations: | |
| push, which adds an element to the top of the stack, pop, which removes an element from | |
| the top of the stack, and peek, which retrieves the element at the top without removing it, | |
| all in O(1) time. Think of it like a real-world stack of papers. | |
| Stack<Integer> s = new Stack<Integer>(); | |
| s.push(1); // [1] | |
| s.push(13); // [1, 13] | |
| System.out.println(s.size()); // 2 | |
| s.pop(); // [1] | |
| System.out.println(s.peek()); // 1 | |
| s.pop(); // [] | |
| System.out.println(s.size()); // 0 | |
| Queues | |
| A queue is a First In First Out (FIFO) data structure that supports three operations of | |
| add, insertion at the back of the queue, poll, deletion from the front of the queue, and peek, | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 15 | |
| which retrieves the element at the front without removing it, all in O(1) time. Java doesn’t | |
| actually have a Queue class; it’s only an interface. The most commonly used implementation | |
| is the LinkedList, declared as follows: Queue q = new LinkedList();. | |
| Queue<Integer> q = new LinkedList<Integer>(); | |
| q.add(1); // [1] | |
| q.add(3); // [3, 1] | |
| q.poll(); // [3] | |
| q.add(4); // [4, 3] | |
| System.out.println(q.size()); // 2 | |
| System.out.println(q.peek()); // 4 | |
| Deques | |
| A deque (usually pronounced “deck”) stands for double ended queue and is a combination | |
| of a stack and a queue, in that it supports O(1) insertions and deletions from both the | |
| front and the back of the deque. In Java, the deque class is called ArrayDeque. The four | |
| methods for adding and removing are addFirst, removeFirst, addLast, and removeLast. | |
| The methods for retrieving the first and last elements without removing are peekFirst and | |
| peekLast. | |
| ArrayDeque<Integer> deque = new ArrayDeque<Integer>(); | |
| deque.addFirst(1); // [1] | |
| deque.addLast(2); // [1, 2] | |
| deque.addFirst(3); // [3, 1, 2] | |
| deque.addFirst(4); // [3, 1, 2, 4] | |
| deque.removeLast(); // [3, 1, 2] | |
| deque.removeFirst(); // [1, 2] | |
| Priority Queues | |
| A priority queue supports the following operations: | |
| insertion of elements, deletion of | |
| the element considered highest priority, and retrieval of the highest priority element, all in | |
| O(log n) time according to the number of elements in the priority queue. Priority is based on | |
| a comparator function, but by default the lowest element is at the front of the priority queue. | |
| The priority queue is one of the most important data structures in competitive programming, | |
| so make sure you understand how and when to use it. By default, the Priority Queue puts | |
| the lowest element at the front of the queue. | |
| PriorityQueue<Integer> pq = new PriorityQueue<Integer>(); | |
| pq.add(4); // [4] | |
| pq.add(2); // [4, 2] | |
| pq.add(1); // [4, 2, 1] | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 16 | |
| pq.add(3); // [4, 3, 2, 1] | |
| System.out.println(pq.peek()); // 1 | |
| pq.poll(); // [4, 3, 2] | |
| pq.poll(); // [4, 3] | |
| pq.add(5); // [5, 4, 3] | |
| 4.3 Sets and Maps | |
| A set is a collection of objects that contains no duplicates. There are two types of sets: | |
| unordered sets (HashSet in Java), and ordered set (TreeSet in Java). | |
| Unordered Sets | |
| The unordered set works by hashing, which is assigning a usually-unique code to every | |
| variable/object which allows insertions, deletions, and searches in O(1) time, albeit with a | |
| high constant factor, as hashing requires a large constant number of operations. However, | |
| as the name implies, elements are not ordered in any meaningful way, so traversals of an | |
| unordered set will return elements in some arbitrary order. The operations on an unordered | |
| set are add, which adds an element to the set if not already present, remove, which deletes | |
| an element if it exists, and contains, which checks whether the set contains that element. | |
| HashSet<Integer> set = new HashSet<Integer>(); | |
| set.add(1); // [1] | |
| set.add(4); // [1, 4] in arbitrary order | |
| set.add(2); // [1, 4, 2] in arbitrary order | |
| set.add(1); // [1, 4, 2] in arbitrary order | |
| // the add method did nothing because 1 was already in the set | |
| System.out.println(set.contains(1)); // true | |
| set.remove(1); // [2, 4] in arbitrary order | |
| System.out.println(set.contains(5)); // false | |
| set.remove(0); // [2, 4] in arbitrary order | |
| // if the element to be removed does not exist, nothing happens | |
| for(int element : set){ | |
| System.out.println(element); | |
| } | |
| // You can iterate through an unordered set, but it will do so in arbitrary | |
| (cid:44)→ | |
| order | |
| Ordered Sets | |
| The second type of set data structure is the ordered or sorted set. Insertions, deletions, | |
| and searches on the ordered set require O(log n) time, based on the number of elements | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 17 | |
| in the set. As well as those supported by the unordered set, the ordered set also allows | |
| four additional operations: first, which returns the lowest element in the set, last, which | |
| returns the highest element in the set, lower, which returns the greatest element strictly less | |
| than some element, and higher, which returns the least element strictly greater than it. | |
| TreeSet<Integer> set = new TreeSet<Integer>(); | |
| set.add(1); // [1] | |
| set.add(14); // [1, 14] | |
| set.add(9); // [1, 9, 14] | |
| set.add(2); // [1, 2, 9, 14] | |
| System.out.println(set.higher(7)); // 9 | |
| System.out.println(set.higher(9)); // 14 | |
| System.out.println(set.lower(5)); // 2 | |
| System.out.println(set.first()); // 1 | |
| System.out.println(set.last()); // 14 | |
| set.remove(set.higher(6)); // [1, 2, 14] | |
| System.out.println(set.higher(23); // ERROR, no such element exists | |
| The primary limitation of the ordered set is that we can’t efficiently access the kth largest | |
| element in the set, or find the number of elements in the set greater than some arbitrary x. | |
| These operations can be handled using a data structure called an order statistic tree, but | |
| that is beyond the scope of this book. | |
| Maps | |
| A map is a set of ordered pairs, each containing a key and a value. In a map, all keys | |
| are required to be unique, but values can be repeated. Maps have three primary methods: | |
| one to add a specified key-value pairing, one to retrieve the value for a given key, and one | |
| to remove a key-value pairing from the map. Like sets, maps can be unordered (HashSet | |
| in Java) or ordered (TreeSet in Java). In an unordered map, hashing is used to support | |
| O(1) operations. In an ordered map, the entries are sorted in order of key. Operations are | |
| O(log n), but accessing or removing the next key higher or lower than some input k is also | |
| supported. | |
| Unordered Maps | |
| In the unordered map, the put(key, value) method assigns a value to a key and places | |
| the key and value pair into the map. The get(key) method returns the value associated with | |
| the key. The containsKey(key) method checks whether a key exists in the map. Lastly, | |
| remove(key) removes the map entry associated with the specified key. All of these operations | |
| are O(1), but again, due to the hashing, this has a high constant factor. | |
| HashMap<Integer, Integer> map = new HashMap<Integer, Integer>(); | |
| map.put(1, 5); // [(1, 5)] | |
| map.put(3, 14); // [(1, 5); (3, 14)] | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 18 | |
| map.put(2, 7); // [(1, 5); (3, 14); (2, 7)] | |
| map.remove(2); // [(1, 5); (3, 14)] | |
| System.out.println(map.get(1)); // 5 | |
| System.out.println(map.containsKey(7)); // false | |
| System.out.println(map.containsKey(1)); // true | |
| Ordered Maps | |
| The ordered map supports all of the operations that an unordered map supports, and | |
| additionally supports firstKey/firstEntry and lastKey/lastEntry, returning the lowest | |
| key/entry and the highest key/entry, as well as higherKey/higherEntry and lowerKey/ | |
| lowerEntry, returning the lowest key/entry strictly higher than the specified key, or the | |
| highest key/entry strictly lower than the specified key. | |
| TreeMap<Integer, Integer> map = new TreeMap<Integer, Integer>(); | |
| map.put(3, 5); // [(3, 5)] | |
| map.put(11, 4); // [(3, 5); (11, 4)] | |
| map.put(10, 491); // [(3, 5); (10, 491); (11, 4)] | |
| System.out.println(map.firstKey()); // 3 | |
| System.out.println(map.firstEntry()); // (3, 5) | |
| System.out.println(map.lastEntry()); // (11, 4) | |
| System.out.println(map.higherEntry(4)); // (10, 491) | |
| map.remove(11); // [(3, 5); (10, 491)] | |
| System.out.println(map.lowerKey(4)); // 3 | |
| System.out.println(map.lowerKey(3)); // ERROR | |
| A note on unordered sets and maps: In USACO contests, they’re generally fine, but in | |
| CodeForces contests, you should always use sorted sets and maps. This is because the built-in | |
| hashing algorithm is vulnerable to pathological data sets causing abnormally slow runtimes, | |
| in turn causing failures on some test cases. | |
| Multisets | |
| Lastly, there is the multiset, which is essentially a sorted set that allows multiple copies | |
| of the same element. While there is no Multiset in Java, we can implement one using the | |
| TreeMap from values to their respective frequencies. We declare the TreeMap implementation | |
| globally so that we can write functions for adding and removing elements from it. | |
| static TreeMap<Integer, Integer> multiset = new TreeMap<Integer, Integer>(); | |
| public static void main(String[] args){ | |
| ... | |
| } | |
| CHAPTER 4. BUILT-IN DATA STRUCTURES | |
| 19 | |
| static void add(int x){ | |
| if(multiset.containsKey(x)){ | |
| multiset.put(x, multiset.get(x) + 1); | |
| } else { | |
| multiset.put(x, 1); | |
| } | |
| } | |
| static void remove(int x){ | |
| multiset.put(x, multiset.get(x) - 1); | |
| if(multiset.get(x) == 0){ | |
| multiset.remove(x); | |
| } | |
| } | |
| The first, last, higher, and lower operations still function as intended; just use firstKey, | |
| lastKey, higherKey, and lowerKey respectively. | |
| 4.4 Problems | |
| Again, note that CSES’s grader is very slow, so don’t worry if you encounter a Time | |
| Limit Exceeded verdict; as long as you pass the majority of test cases within the time limit, | |
| you can consider the problem solved, and move on. | |
| 1. CSES Problem Set Task 1621: Distinct Numbers | |
| https://cses.fi/problemset/task/1621 | |
| 2. CSES Problem Set Task 1084: Apartments | |
| https://cses.fi/problemset/task/1084 | |
| 3. CSES Problem Set Task 1091: Concert Tickets | |
| https://cses.fi/problemset/task/1091 | |
| 4. CSES Problem Set Task 1163: Traffic Lights | |
| https://cses.fi/problemset/task/1163 | |
| 5. CSES Problem Set Task 1164: Room Allocation | |
| https://cses.fi/problemset/task/1164 | |
| Part II | |
| Bronze | |
| 20 | |
| Chapter 5 | |
| Simulation | |
| In many problems, we can simply simulate what we’re told to do by the problem statement. | |
| Since there’s no formal algorithm involved, the intent of the problem is to assess competence | |
| with one’s programming language of choice and knowledge of built-in data structures. At | |
| least in USACO Bronze, when a problem statement says to find the end result of some | |
| process, or to find when something occurs, it’s usually sufficient to simulate the process. | |
| 5.1 Example 1 | |
| Alice and Bob are standing on a 2D plane. Alice starts at the point (0, 0), and Bob | |
| starts at the point (R, S) (1 ≤ R, S ≤ 1000). Every second, Alice moves M units to the | |
| right, and N units up. Every second, Bob moves P units to the left, and Q units down. | |
| (1 ≤ M, N, P, Q ≤ 10). Determine if Alice and Bob will ever meet (be at the same point at | |
| the same time), and if so, when. | |
| INPUT FORMAT: | |
| The first line of the input contains R and S. | |
| The second line of the input contains M , N , P , and Q. | |
| OUTPUT FORMAT: | |
| Please output a single integer containing the number of seconds after the start at which Alice | |
| and Bob meet. If they never meet, please output −1. | |
| Solution | |
| We can simulate the process. After inputting the values of R, S, M , N , P , and Q, we can | |
| keep track of Alice’s and Bob’s x- and y-coordinates. To start, we initialize variables for their | |
| respective positions. Alice’s coordinates are initially (0, 0), and Bob’s coordinates are (R, S) | |
| respectively. Every second, we increase Alice’s x-coordinate by M and her y-coordinate by | |
| N , and decrease Bob’s x-coordinate by P and his y-coordinate by Q. | |
| Now, when do we stop? First, if Alice and Bob ever have the same coordinates, then we | |
| are done. Also, since Alice strictly moves up and to the right and Bob strictly moves down | |
| and to the left, if Alice’s x- or y-coordinates are ever greater than Bob’s, then it is impossible | |
| for them to meet. Example code will be displayed below (Here, as in other examples, input | |
| processing will be omitted): | |
| 21 | |
| CHAPTER 5. SIMULATION | |
| 22 | |
| int ax = 0; int ay = 0; // alice's x and y coordinates | |
| int bx = r; int by = s; // bob's x and y coordinates | |
| int t = 0; // keep track of the current time | |
| while(ax < bx && ay < by){ | |
| // every second, update alice's and bob's coordinates and the time | |
| ax += m; ay += n; | |
| bx -= p; by -= q; | |
| t++; | |
| } | |
| if(ax == bx && ay == by){ // if they are in the same location | |
| out.println(t); // they meet at time t | |
| } else { | |
| out.println(-1); // they never meet | |
| } | |
| out.close(); // flush the output | |
| 5.2 Example 2 | |
| There are N buckets (5 ≤ N ≤ 105), each with a certain capacity Ci (1 ≤ Ci ≤ 100). One | |
| day, after a rainstorm, each bucket is filled with Ai units of water (1 ≤ Ai ≤ Ci). Charlie | |
| then performs the following process: he pours bucket 1 into bucket 2, then bucket 2 into | |
| bucket 3, and so on, up until pouring bucket N − 1 into bucket N . When Charlie pours | |
| bucket B into bucket B + 1, he pours as much as possible until bucket B is empty or bucket | |
| B + 1 is full. Find out how much water is in each bucket once Charlie is done pouring. | |
| INPUT FORMAT: | |
| The first line of the input contains N . | |
| The second line of the input contains the capacities of the buckets, C1, C2, . . . , Cn. | |
| The third line of the input contains the amount of water in each bucket A1, A2, . . . , An. | |
| OUTPUT FORMAT: | |
| Please print one line of output, containing N space-separated integers: the final amount of | |
| water in each bucket once Charlie is done pouring. | |
| Solution: | |
| Once again, we can simulate the process of pouring one bucket into the next. The amount of | |
| water poured from bucket B to bucket B + 1 is the smaller of the amount of water in bucket | |
| B (after all previous operations have been completed) and the remaining space in bucket | |
| B + 1, which is CB+1 − AB+1. We can just handle all of these operations in order, using an | |
| array C to store the maximum capacities of each bucket, and an array A to store the current | |
| water level in each bucket, which we update during the process. Example code is below (note | |
| that arrays are zero-indexed, so the indices of our buckets go from 0 to N − 1 rather than | |
| from 1 to N ). | |
| CHAPTER 5. SIMULATION | |
| 23 | |
| for(int i = 0; i < n-1; i++){ | |
| int amt = Math.min(A[i], C[i+1]-A[i+1]); | |
| // the amount of water to be poured is the lesser of | |
| // the amount of water in the current bucket and | |
| // the amount of additional water that the next bucket can hold | |
| A[i] -= amt; // remove the amount from the current bucket | |
| A[i+1] += amt; // add it to the next bucket | |
| } | |
| for(int i = 0; i < n; i++){ | |
| pw.print(A[i] + " "); | |
| // print the amount of water in each bucket at the end | |
| } | |
| pw.println(); // print newline | |
| pw.close(); // flush the output | |
| 5.3 Problems | |
| 1. USACO December 2018 Bronze Problem 1: Mixing Milk | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=855 | |
| 2. USACO December 2017 Bronze Problem 3: Milk Measurement | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=761 | |
| 3. USACO US Open 2017 Bronze Problem 1: The Lost Cow | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=735 | |
| 4. USACO February 2017 Bronze Problem 3: Why Did the Cow Cross the Road III | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=713 | |
| 5. USACO January 2016 Bronze Problem 3: Mowing the Field | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=593 | |
| 6. USACO December 2017 Bronze Problem 2: The Bovine Shuffle | |
| http://usaco.org/index.php?page=viewproblem2&cpid=760 | |
| 7. USACO February 2016 Bronze Problem 2: Circular Barn | |
| http://usaco.org/index.php?page=viewproblem2&cpid=616 | |
| Chapter 6 | |
| Complete Search | |
| In many problems (especially in Bronze), it’s sufficient to check all possible cases in | |
| the solution space, whether it be all elements, all pairs of elements, or all subsets, or all | |
| permutations. Unsurprisingly, this is called complete search (or brute force), because it | |
| completely searches the entire solution space. | |
| 6.1 Example 1 | |
| You are given N (3 ≤ N ≤ 5000) integer points on the coordinate plane. Find the square | |
| of the maximum Euclidean distance (aka length of the straight line) between any two of the | |
| points. | |
| INPUT FORMAT: | |
| The first line contains an integer N . | |
| The second line contains N integers, the x-coordinates of the points: x1, x2, . . . , xn (−1000 ≤ | |
| xi ≤ 1000). | |
| The third line contains N integers, the y-coordinates of the points: y1, y2, . . . , yn (−1000 ≤ | |
| yi ≤ 1000). | |
| OUTPUT FORMAT: | |
| Print one integer, the square of the maximum Euclidean distance between any two of the | |
| points. | |
| Solution: | |
| We can brute-force every pair of points and find the square of the distance between them, | |
| by squaring the formula for Euclidean distance: distance2 = (x2 − x1)2 + (y2 − y1)2. Thus, | |
| we store the coordinates in arrays X[] and Y[], such that X[i] and Y[i] are the x- and | |
| y-coordinates of the ith point, respectively. Then, we iterate through all possible pairs of | |
| points, using a variable max to store the maximum square of distance between any pair seen | |
| so far, and if the square of the distance between a pair is greater than our current maximum, | |
| 24 | |
| CHAPTER 6. COMPLETE SEARCH | |
| 25 | |
| we set our current maximum to it. | |
| Algorithm: Finds the maximum Euclidean distance between any two of the given | |
| points | |
| Function maxDist | |
| : points an array of n ordered pairs | |
| Input | |
| Output : the maximum Euclidean distance between any two of the points | |
| max ← 0 | |
| for i ← 1 to n do | |
| for j ← i + 1 to n do | |
| if dist(points[i], points[j])2 > max then | |
| max ← dist(points[i], points[j])2 | |
| end | |
| end | |
| end | |
| return max | |
| int max = 0; // storing the current maximum | |
| for(int i = 0; i < n; i++){ // for each first point | |
| for(int j = i+1; j < n; j++){ // for each second point | |
| int dx = x[i] - x[j]; | |
| int dy = y[i] - y[j]; | |
| max = Math.max(max, dx*dx + dy*dy); | |
| // if the square of the distance between the two points is greater than | |
| // our current maximum, then update the maximum | |
| } | |
| } | |
| pw.println(max); | |
| A couple notes: first, since we’re iterating through all pairs of points, we start the j loop | |
| from j = i + 1 so that point i and point j are never the same point. Furthermore, it makes | |
| it so that each pair is only counted once. In this problem, it doesn’t matter whether we | |
| double-count pairs or whether we allow i and j to be the same point, but in other problems | |
| where we’re counting something rather than looking at the maximum, it’s important to be | |
| careful that we don’t overcount. Secondly, the problem asks for the square of the maximum | |
| Euclidean distance between any two points. Some students may be tempted to maintain the | |
| maximum distance in a variable, and then square it at the end when outputting. However, | |
| the problem here is that while the square of the distance between two integer points is always | |
| an integer, the distance itself isn’t guaranteed to be an integer. Thus, we’ll end up shoving a | |
| non-integer value into an integer variable, which truncates the decimal part. Using a floating | |
| point variable isn’t likely to work either, due to precision errors (use of floating point decimals | |
| should generally be avoided when possible). | |
| CHAPTER 6. COMPLETE SEARCH | |
| 26 | |
| 6.2 Generating Permutations | |
| A permutation is a reordering of a list of elements. Some problems will ask for an | |
| ordering of elements that satisfies certain conditions. In these problems, if N ≤ 10, we can | |
| probably iterate through all permutations and check each permutation for validity. For a list | |
| of N elements, there are N ! ways to permute them, and generally we’ll need to read through | |
| each permutation once to check its validity, for a time complexity of O(N · N !). | |
| In Java, we’ll have to implement this ourselves, which is called Heap’s Algorithm (no | |
| relation to the heap data structure). What’s going to be in the check function depends on | |
| the problem, but it should verify whether the current permutation satisfies the constraints | |
| given in the problem. | |
| As an example, here are the permutations generated by Heap’s Algorithm for [1, 2, 3]: | |
| [1, 2, 3], [2, 1, 3], [3, 1, 2], [1, 3, 2], [2, 3, 1], [3, 2, 1] | |
| Algorithm: Iterate over all permutations of a given input array, performing some | |
| action on each permutation | |
| Function generatePermutations | |
| Input : An array arr, and its length k | |
| if k = 1 then | |
| process the current permutation | |
| else | |
| generatePermutations (arr, k − 1) | |
| for i ← 0 to k − 1 do | |
| if k is even then | |
| swap indices i and k − 1 of arr | |
| else | |
| swap indices 0 and k − 1 of arr | |
| end | |
| generatePermutations (arr, k − 1) | |
| end | |
| end | |
| Code for iterating over all permutations is as follows: | |
| // this method is called with k equal to the length of arr | |
| static void generate(int[] arr, int k){ | |
| if(k == 1){ | |
| check(arr); // check the current permutation for validity | |
| } else { | |
| generate(arr, k-1); | |
| for(int i = 0; i < k-1; i++){ | |
| if(k % 2 == 0){ | |
| swap(arr, i, k-1); | |
| // swap indices i and k-1 of arr | |
| CHAPTER 6. COMPLETE SEARCH | |
| 27 | |
| } else { | |
| swap(arr, 0, k-1); | |
| // swap indices 0 and k-1 of arr | |
| } | |
| generate(arr, k-1); | |
| } | |
| } | |
| } | |
| 6.3 Problems | |
| 1. USACO February 2020 Bronze Problem 1: Triangles | |
| http://usaco.org/index.php?page=viewproblem2&cpid=1011 | |
| 2. USACO January 2020 Bronze Problem 2: Photoshoot | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=988 | |
| (Hint: Figure out what exactly you’re complete searching) | |
| 3. USACO December 2019 Bronze Problem 1: Cow Gymnastics | |
| http://usaco.org/index.php?page=viewproblem2&cpid=963 | |
| (Hint: Brute force over all possible pairs) | |
| 4. USACO February 2016 Bronze Problem 1: Milk Pails | |
| http://usaco.org/index.php?page=viewproblem2&cpid=615 | |
| 5. USACO January 2018 Bronze Problem 2: Lifeguards | |
| http://usaco.org/index.php?page=viewproblem2&cpid=784 | |
| (Hint: Try removing each lifeguard one at a time). | |
| 6. USACO December 2019 Bronze Problem 2: Where Am I? | |
| http://usaco.org/index.php?page=viewproblem2&cpid=964 | |
| (Hint: Brute force over all possible substrings) | |
| 7. (Permutations) USACO December 2019 Bronze Problem 3: Livestock Lineup | |
| http://usaco.org/index.php?page=viewproblem2&cpid=965 | |
| 8. (Permutations) CSES Problem Set Task 1624: Chessboard and Queens | |
| https://cses.fi/problemset/task/1624 | |
| 9. USACO US Open 2016 Bronze Problem 3: Field Reduction | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=641 | |
| (Hint: For this problem, you can’t do a full complete search; you have to do a reduced | |
| search) | |
| 10. USACO December 2018 Bronze Problem 3: Back and Forth | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=857 | |
| (This problem is relatively hard) | |
| Chapter 7 | |
| Additional Bronze Topics | |
| 7.1 Square and Rectangle Geometry | |
| The extent of “geometry” problems on USACO Bronze are usually quite simple and | |
| limited to intersections and unions of squares and rectangles. These usually only include two | |
| or three squares or rectangles, in which case you can simply draw out cases on paper, which | |
| should logically lead to a solution. | |
| In Java, the Rectangle class may be of use for finding intersections and unions of | |
| rectangles. | |
| Here are some of the functions that the Rectangle class has: | |
| • Find whether a certain point or rectangle is contained within another rectangle | |
| • Find the intersection or union of two rectangles | |
| • Translate, scale, or shrink rectangles | |
| For exact details and documentation, refer to the Rectangle class page on the official | |
| javadoc: https://docs.oracle.com/javase/7/docs/api/java/awt/Rectangle.html | |
| The problems given at the end of the chapter should encompass all the techniques you | |
| need to know for geometry problems in the Bronze division. | |
| 7.2 Ad-hoc | |
| Ad-hoc problems are problems that don’t fall into any standard algorithmic category | |
| with well known solutions. They are usually unique problems intended to be solved with | |
| unconventional techniques. In ad-hoc problems, it’s helpful to look at the constraints given in | |
| the problem and devise potential time complexities of solutions; this, combined with details | |
| in the problem statement itself, may give an outline of the solution. | |
| Unfortunately, since ad-hoc problems don’t have solutions consisting of well known | |
| algorithms, we can’t systematically teach you how to do them. The best way of learning how | |
| to do ad-hoc is to practice. Of course, the problem solving intuition from math contests (if | |
| you did them) is quite helpful, but otherwise, you can develop this intuition from practicing | |
| ad-hoc problems. | |
| 28 | |
| CHAPTER 7. ADDITIONAL BRONZE TOPICS | |
| 29 | |
| While solving these problems, make sure to utilize what you’ve learned about the built-in | |
| data structures and algorithmic complexity analysis, from chapters 2, 3, and 4. Since ad-hoc | |
| problems comprise a significant portion of bronze problems, we’ve included a large selection | |
| of them below for your practice. | |
| 7.3 Problems | |
| Square and Rectangle Geometry | |
| 1. USACO December 2017 Bronze Problem 1: Blocked Billboard | |
| http://usaco.org/index.php?page=viewproblem2&cpid=759 | |
| 2. USACO December 2018 Bronze Problem 1: Blocked Billboard II | |
| http://usaco.org/index.php?page=viewproblem2&cpid=783 | |
| 3. CodeForces Round 587 (Div. 3) Problem C: White Sheet | |
| https://codeforces.com/contest/1216/problem/C | |
| 4. USACO December 2016 Bronze Problem 1: Square Pasture | |
| http://usaco.org/index.php?page=viewproblem2&cpid=663 | |
| Ad-hoc problems | |
| 5. USACO January 2016 Bronze Problem 1: Promotion Counting | |
| http://usaco.org/index.php?page=viewproblem2&cpid=591 | |
| 6. USACO January 2020 Bronze Problem 1: Word Processor | |
| http://usaco.org/index.php?page=viewproblem2&cpid=987 | |
| 7. USACO US Open 2019 Bronze Problem 1: Bucket Brigade | |
| http://usaco.org/index.php?page=viewproblem2&cpid=939 | |
| 8. USACO January 2018 Bronze Problem 3: Out of Place | |
| http://usaco.org/index.php?page=viewproblem2&cpid=785 | |
| 9. USACO December 2016 Bronze Problem 2: Block Game | |
| http://usaco.org/index.php?page=viewproblem2&cpid=664 | |
| 10. USACO February 2020 Bronze Problem 3: Swapity Swap | |
| http://usaco.org/index.php?page=viewproblem2&cpid=1013 | |
| (This problem is quite hard for bronze.) | |
| 11. USACO February 2018 Bronze Problem 1: Teleportation | |
| http://usaco.org/index.php?page=viewproblem2&cpid=807 | |
| 12. USACO February 2018 Bronze Problem 2: Hoofball | |
| http://usaco.org/index.php?page=viewproblem2&cpid=808 | |
| CHAPTER 7. ADDITIONAL BRONZE TOPICS | |
| 30 | |
| 13. USACO US Open 2019 Bronze Problem 3: Cow Evolution | |
| http://usaco.org/index.php?page=viewproblem2&cpid=941 | |
| (Warning: This problem is extremely difficult for bronze.) | |
| Part III | |
| Silver | |
| 31 | |
| Chapter 8 | |
| Sorting and comparators | |
| 8.1 Comparators | |
| Java has built-in functions for sorting: Arrays.sort(arr) for arrays, and Collections. | |
| sort(list) for ArrayLists. However, if we use custom objects, or if we want to sort elements | |
| in a different order, then we’ll need to use a Comparator. | |
| Normally, sorting functions rely on moving objects with a lower value ahead of objects | |
| with a higher value if sorting in ascending order, and vice versa if in descending order. This | |
| is done through comparing two objects at a time. What a Comparator does is compare two | |
| objects as follows, based on our comparison criteria: | |
| • If object x is less than object y, return a negative number | |
| • If object x is greater than object y, return a positive number | |
| • If object x is equal to object y, return 0. | |
| In addition to returning the correct number, comparators should also satisfy the following | |
| conditions: | |
| • The function must be consistent with respect to reversing the order of the arguments: | |
| if compare(x, y) is positive, then compare(y, x) should be negative and vice versa | |
| • The function must be transitive. If compare(x, y) > 0 and compare(y, z) > 0, then | |
| compare(x, z) > 0. Same applies if the compare functions return negative numbers. | |
| • Equality must be consistent. | |
| If compare(x, y) = 0, then compare(x, z) and | |
| compare(y, z) must both be positive, both negative, or both zero. Note that they | |
| don’t have to be equal, they just need to have the same sign. | |
| Java has default functions for comparing ints, longs, and doubles. The Integer.compare(), | |
| Long.compare(), and Double.compare() functions take two arguments x and y and compare | |
| them as described above. | |
| Now, there are two ways of implementing this in Java: Comparable, and Comparator. | |
| They essentially serve the same purpose, but Comparable is generally easier and shorter to | |
| 32 | |
| CHAPTER 8. SORTING AND COMPARATORS | |
| 33 | |
| code. Comparable is a function implemented within the class containing the custom object, | |
| while Comparator is its own class. For our example, we’ll use a Person class that contains a | |
| person’s height and weight, and sort in ascending order by height. | |
| If we use Comparable, we’ll need to put implements Comparable<Person> into the | |
| heading of the class. Furthermore, we’ll need to implement the compareTo method. Essentially, | |
| compareTo(x) is the compare function that we described above, with the object itself as the | |
| first argument: compare(self, x). | |
| static class Person implements Comparable<Person>{ | |
| int height, weight; | |
| public Person(int h, int w){ | |
| height = h; weight = w; | |
| } | |
| public int compareTo(Person p){ | |
| return Integer.compare(height, p.height); | |
| } | |
| } | |
| When using Comparable, we can just call Arrays.sort(arr) or Collections.sort(list) | |
| on the array or list as usual. | |
| If instead we choose to use Comparator, we’ll need to declare a second Comparator class, | |
| and then implement that: | |
| static class Person{ | |
| int height, weight; | |
| public Person(int h, int w){ | |
| height = h; weight = w; | |
| } | |
| } | |
| static class Comp implements Comparator<Person>{ | |
| public int compare(Person a, Person b){ | |
| return Integer.compare(a.height, b.height); | |
| } | |
| } | |
| When using Comparator, the syntax for using the built-in sorting function requires | |
| a second argument: Arrays.sort(arr, new Comp()), or Collections.sort(list, new | |
| Comp()). | |
| If we instead wanted to sort in descending order, this is also very simple. Instead of the | |
| comparing function returning Integer.compare(x, y) of the arguments, it should instead | |
| return -Integer.compare(x, y). | |
| CHAPTER 8. SORTING AND COMPARATORS | |
| 34 | |
| 8.2 Sorting by Multiple Criteria | |
| Now, suppose we wanted to sort a list of Persons in ascending order, primarily by height | |
| and secondarily by weight. We can do this quite similarly to how we handled sorting by one | |
| criterion earlier. What the compareTo function needs to do is to compare the weights if the | |
| heights are equal, and otherwise compare heights, as that’s the primary sorting criterion. | |
| static class Person implements Comparable<Person>{ | |
| int height, weight; | |
| public Person(int h, int w){ | |
| height = h; weight = w; | |
| } | |
| public int compareTo(Person p){ | |
| if(height == p.height){ | |
| return Integer.compare(weight, p.weight); | |
| } else { | |
| return Integer.compare(height, p.height); | |
| } | |
| } | |
| } | |
| Sorting with more criteria is done similarly. | |
| An alternative way of representing custom objects is with arrays. Instead of using a custom | |
| object to store data about each person, we can simply use int[], where each int array is of | |
| size 2, and stores pairs of height, weight, probably in the form of a list like ArrayList<int[]>. | |
| Since arrays aren’t objects in the usual sense, we need to use Comparator. Example for | |
| sorting by the same two criteria as above: | |
| static class Comp implements Comparator<int[]>{ | |
| public int compare(int[] a, int[] b){ | |
| if(a[0] == b[0]){ | |
| return Integer.compare(a[1], b[1]); | |
| } else { | |
| return Integer.compare(a[0], b[0]); | |
| } | |
| } | |
| } | |
| I don’t recommend using arrays to represent objects, mostly because it’s confusing, but | |
| it’s worth noting that some competitors do this. | |
| 8.3 Problems | |
| 1. USACO US Open 2018 Silver Problem 2: Lemonade Line | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=835 | |
| CHAPTER 8. SORTING AND COMPARATORS | |
| 35 | |
| 2. CodeForces Round 633 (Div. 2) Problem B: Sorted Adjacent Differences | |
| https://codeforces.com/problemset/problem/1339/B | |
| 3. CodeForces Round 579 (Div. 3) Problem E: Boxers | |
| https://codeforces.com/problemset/problem/1203/E | |
| 4. USACO January 2019 Silver Problem 3: Mountain View | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=896 | |
| 5. USACO US Open 2016 Silver Problem 1: Field Reduction | |
| http://www.usaco.org/index.php?page=open16results | |
| Chapter 9 | |
| Greedy Algorithms | |
| Greedy algorithms are algorithms that select the most optimal choice at each step, instead | |
| of looking at the solution space as a whole. This reduces the problem to a smaller problem at | |
| each step. However, as greedy algorithms never recheck previous steps, they sometimes lead | |
| to incorrect answers. Moreover, in a certain problem, there may be more than one possible | |
| greedy algorithm; usually only one of them is correct. This means that we must be extremely | |
| careful when using the greedy method. However, when they are correct, greedy algorithms | |
| are extremely efficient. | |
| Greedy is not a single algorithm, but rather a way of thinking that is applied to problems. | |
| There’s no one way to do greedy algorithms. Hence, we use a selection of well-known examples | |
| to help you understand the greedy paradigm. | |
| Usually, when using a greedy algorithm, there is a heuristic or value function that | |
| determines which choice is considered most optimal. | |
| 9.1 | |
| Introductory Example: Studying Algorithms | |
| Steph wants to improve her knowledge of algorithms over winter break. She has a total of | |
| X (1 ≤ X ≤ 104) minutes to dedicate to learning algorithms. There are N (1 ≤ N ≤ 100) | |
| algorithms, and each one of them requires ai (1 ≤ ai ≤ 100) minutes to learn. Find the | |
| maximum number of algorithms she can learn. | |
| The solution is quite simple. The first observation we make is that Steph should prioritize | |
| learning algorithms from easiest to hardest; in other words, start with learning the algorithm | |
| that requires the least amount of time, and then choose further algorithms in increasing order | |
| of time required. Let’s look at the following example: | |
| X = 15, | |
| N = 6, | |
| ai = {4, 3, 8, 4, 7, 3} | |
| After sorting the array, we have {3, 3, 4, 4, 7, 8}. Within the maximum of 15 minutes, Steph | |
| can learn four algorithms in a total of 3 + 3 + 4 + 4 = 14 minutes. The implementation | |
| of this algorithm is very simple. We sort the array, and then take as many elements as | |
| possible while the sum of times of algorithms chosen so far is less than X. Sorting the array | |
| takes O(N log N ) time, and iterating through the array takes O(N ) time, for a total time | |
| complexity of O(N log N ). | |
| 36 | |
| CHAPTER 9. GREEDY ALGORITHMS | |
| 37 | |
| // read in the input, store the algorithms in int[] algorithms | |
| Arrays.sort(algorithms); | |
| int minutes = 0; // number of minutes used so far | |
| int i = 0; | |
| while(minutes + algorithms[i] <= x){ | |
| // while there is enough time, learn more algorithms | |
| minutes += algorithms[i]; | |
| i++; | |
| } | |
| pw.println(i); // print the ans | |
| pw.close(); | |
| 9.2 Example: The Scheduling Problem | |
| There are N events, each described by their starting and ending times. Jason would like | |
| to attend as many events as possible, but he can only attend one event at a time, and if he | |
| chooses to attend an event, he must attend the entire event. Traveling between events is | |
| instantaneous. | |
| Earliest Ending Next Event (Correct) | |
| The correct approach to this problem is to always select the next possible event that ends | |
| as soon as possible. | |
| A brief explanation of correctness is as follows. If we have two events E1 and E2, with | |
| E2 ending later than E1, then it is always optimal to select E1. This is because selecting E1 | |
| gives us more choices for future events. If we can select an event to go after E2, then that | |
| event can also go after E1, because E1 ends first. Thus, the set of events that can go after E2 | |
| is a subset of the events that can go after E1, making E1 the optimal choice. | |
| For the following code, let’s say we have the array events of events, which each contain a | |
| start and an end point. We’ll be using the following static class to store each event (a review | |
| of the previous chapter!) | |
| static class Event implements Comparable<Event>{ | |
| int start; int end; | |
| public Event(int s, int e){ | |
| start = s; end = e; | |
| } | |
| public int compareTo(Event e){ | |
| CHAPTER 9. GREEDY ALGORITHMS | |
| 38 | |
| return Integer.compare(this.end, e.end); | |
| } | |
| } | |
| // read in the input, store the events in Event[] events. | |
| Arrays.sort(events); // sorts by comparator we defined above | |
| int currentEventEnd = -1; // end of event currently attending | |
| int ans = 0; // how many events were attended? | |
| for(int i = 0; i < n; i++){ // process events in order of end time | |
| if(events[i].start >= currentEventEnd){ // if event can be attended | |
| // we know that this is the earliest ending event that we can attend | |
| // because of how the events are sorted | |
| currentEventEnd = events[i].end; | |
| ans++; | |
| } | |
| } | |
| pw.println(ans); | |
| pw.close(); | |
| Earliest Starting Next Event (Incorrect) | |
| To emphasize the importance of selecting the right criteria, we review an incorrect solution | |
| that always selects the next possible event that begins as soon as possible. Let’s look at the | |
| following example, where the selected events are highlighted in red: | |
| In this case, the greedy algorithm selects to attend only one event. However, the optimal | |
| solution would be the following: | |
| 9.3 Failure Cases of Greedy Algorithms | |
| We’ll provide a few common examples of when greedy fails, so that you can avoid falling | |
| into obvious traps and wasting time getting wrong answers in contest. | |
| CHAPTER 9. GREEDY ALGORITHMS | |
| 39 | |
| Coin Change | |
| This problem gives several coin denominations, and asks for the minimum number of | |
| coins needed to make a certain value. The greedy algorithm of taking the largest possible | |
| coin denomination that fits in the remaining capacity can be used to solve this problem only | |
| in very specific cases (it can be proven that it works for the American as well as the Euro | |
| coin systems). However, it doesn’t work in the general case. | |
| Knapsack | |
| The knapsack problem gives a number of items, each having a weight and a value, and | |
| we want to choose a subset of these items. We are limited to a certain weight, and we want | |
| to maximize the value of the items that we take. | |
| Let’s take the following example, where we have a maximum capacity of 4: | |
| Item Weight Value Value Per Weight | |
| A | |
| B | |
| C | |
| 3 | |
| 2 | |
| 2 | |
| 18 | |
| 10 | |
| 10 | |
| 6 | |
| 5 | |
| 5 | |
| If we use greedy based on highest value first, we choose item A and then we are done, as | |
| we don’t have remaining weight to fit either of the other two. Using greedy based on value | |
| per weight again selects item A and then quits. However, the optimal solution is to select | |
| items B and C, as they combined have a higher value than item A alone. In fact, there is no | |
| working greedy solution. The solution to this problem uses dynamic programming, which is | |
| beyond the scope of this book. | |
| 9.4 Problems | |
| 1. USACO December 2015 Silver Problem 2: High Card Wins | |
| http://usaco.org/index.php?page=viewproblem2&cpid=571 | |
| 2. USACO February 2018 Silver Problem 1: Rest Stops | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=810 | |
| 3. USACO February 2017 Silver Problem 1: Why Did The Cow Cross The Road | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=714 | |
| Chapter 10 | |
| Graph Theory | |
| Graph theory is one of the most important topics at the Silver level and above. Graphs | |
| can be used to represent many things, from images to wireless signals, but one of the simplest | |
| analogies is to a map. Consider a map with several cities and highways connecting the cities. | |
| Some of the problems relating to graphs are: | |
| • If we have a map with some cities and roads, what’s the shortest distance I have to | |
| travel to get from point A to point B? | |
| • Consider a map of cities and roads. Is city A connected to city B? Consider a region to | |
| be a group of cities such that each city in the group can reach any other city in said | |
| group, but no other cities. How many regions are in this map, and which cities are in | |
| which region? | |
| 10.1 Graph Basics | |
| Graphs are made up of nodes and edges, where nodes are connected by edges. Graphs | |
| can have either weighted edges, in which each edge has a certain length, or unweighted, in | |
| which case all edges have the same length. Edges are either directed, which means they can | |
| be traveled upon in one direction, or undirected, which means that they can be traveled | |
| upon in both directions. | |
| 4 | |
| 2 | |
| 6 | |
| 5 | |
| 1 | |
| 3 | |
| 5 | |
| 5 | |
| 2 | |
| 1 | |
| 4 | |
| 4 | |
| 2 | |
| −1 | |
| 2 | |
| 3 | |
| 3 | |
| 5 | |
| 6 | |
| Figure 10.1: An undirected unweighted graph (left) and a directed weighted graph (right) | |
| 40 | |
| CHAPTER 10. GRAPH THEORY | |
| 41 | |
| A connected component is a set of nodes within which any node can reach any other | |
| node. For example, in this graph, nodes 1, 2, and 3 are a connected component, nodes 4 and | |
| 5 are a connected component, and node 6 is its own component. | |
| 3 | |
| 1 | |
| 2 | |
| 6 | |
| 4 | |
| 5 | |
| Figure 10.2: Connected components in a graph | |
| 10.2 Trees | |
| A tree is a special type of graph satisfying two constraints: it is acyclic, meaning there | |
| are no cycles, and the number of edges is one less than the number of nodes. Trees satisfy | |
| the property that for any two nodes A and B, there is exactly one way to travel between A | |
| and B. | |
| 1 | |
| 6 | |
| 3 | |
| 7 | |
| 2 | |
| 5 | |
| 4 | |
| Figure 10.3: A tree graph | |
| The root of a tree is the one vertex that is placed at the top, and is where we usually | |
| start our tree traversals from. Usually, problems don’t tell us where the tree is rooted at, and | |
| it usually doesn’t matter either; trees can be arbitrarily rooted (here, we’ll use the convention | |
| of rooting at index 1). | |
| Every node except the root node has a parent. The parent of a node s is defined as | |
| follows: On the path from the root to s, the node that is one closer to the root than s is the | |
| parent of s. Each non-root node has a unique parent. | |
| Child nodes are the opposite. They lie one farther away from the root than their parent | |
| node. Unlike parent nodes, these are not unique. Each node can have arbitrarily many child | |
| nodes, and nodes can also have zero children. If a node s is the parent of a node t, then t is | |
| the child node of s. | |
| A leaf node is a node that has no children. Leaf nodes can be identified quite easily | |
| because there is only one edge adjacent to them. | |
| CHAPTER 10. GRAPH THEORY | |
| 42 | |
| In our example tree above, node 1 is the root, nodes 2 and 3 are children of node 1, nodes | |
| 4, 5, and 6 are children of 2, and node 7 is the child of 3. Nodes 4, 5, 6, and 7 are leaf nodes. | |
| 10.3 Graph Representations | |
| Usually, in a graph with N edges and M edges, we’ll number the nodes 0 through N − 1. | |
| If the problem gives the nodes numbered 1 through N , simply decrease the endpoint node | |
| numbers of edges by 1 as you input them, in order to accommodate zero-indexing of arrays. | |
| However, in problem statements, input and output, the node labels will usually be 1 through | |
| N , so that’s what we’ll use in our examples. | |
| Graphs will usually be given in an input format similar to the following: First, integers | |
| N and M denoting the number of nodes and edges, respectively. Then, M lines, each with | |
| integers a and b, representing edges; if the graph is undirected, then there is an edge between | |
| nodes a and b, and if the graph is directed, then there is an edge from a to b. | |
| For example, the input below would be for the following graph (without the comments): | |
| 6 7 // 6 nodes, 7 edges | |
| // the following lines represent edges. | |
| 1 2 | |
| 1 4 | |
| 1 5 | |
| 2 3 | |
| 2 4 | |
| 3 5 | |
| 4 6 | |
| 4 | |
| 2 | |
| 6 | |
| 5 | |
| 1 | |
| 3 | |
| Figure 10.4: The graph corresponding to the above input | |
| Graphs can be represented in three ways: Adjacency List, Adjacency Matrix, and Edge | |
| List. Regardless of how the graph is represented, it’s important that it be stored globally | |
| and statically, because we need to be able to access it from outside the main method, and | |
| call the graph searching and traversal methods on it. | |
| CHAPTER 10. GRAPH THEORY | |
| 43 | |
| Adjacency List | |
| The adjacency list is the most commonly used method of storing graphs. When we use | |
| DFS, BFS, Dijkstra’s, or other single-source graph traversal algorithms, we’ll want to use an | |
| adjacency list. In an adjacency list, we maintain a length N array of lists. Each list stores | |
| the neighbors of one node. In an undirected graph, if there is an edge between node a and | |
| node b, we add a to the list of b’s neighbors, and b to the list of a’s neighbors. In a directed | |
| graph, if there is an edge from node a to node b, we add b to the list of a’s neighbors, but | |
| not vice versa. | |
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 1 | |
| 3 | |
| 6 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 3 | |
| 9 | |
| 5 | |
| Figure 10.5: An example of a weighted undirected graph | |
| Adjacency list representation of the graph in fig. 10.5: | |
| adj[0] | |
| adj[1] | |
| adj[2] | |
| adj[3] | |
| adj[4] | |
| adj[5] | |
| (1, 9), (3, 4), (4, 3) | |
| (0, 9), (2, 5), (3, 2) | |
| (1, 5), (4, 4), (5, 1) | |
| (0, 4), (1, 2), (5, 3) | |
| (0, 3), (2, 4) | |
| (2, 1), (3, 3) | |
| Adjacency lists take up O(N + M ) space, because each node corresponds to one list of | |
| neighbors, and each edge corresponds to either one or two endpoints (directed vs undirected). | |
| In an adjacency list, we can find (and iterate through) the neighbors of a node easily. Hence, | |
| the adjacency list is the graph representation we should be using most of the time. | |
| Often, we’ll want to maintain a array visited, which is a boolean array representing | |
| whether each node has been visited. When we visit node k (0-indexed), we mark visited[k] | |
| true, so that we know not to return to it. | |
| Code for setting up an adjacency list is as follows: | |
| static int n, m; // number of nodes and edges | |
| static ArrayList<Integer>[] adj; // adjacency list | |
| public static void main(String[] args){ | |
| n = r.nextInt(); // reads in number of nodes | |
| m = r.nextInt(); // reads in number of edges | |
| CHAPTER 10. GRAPH THEORY | |
| 44 | |
| adj = new ArrayList[n]; // adjacency list | |
| // Java doesn't allow ArrayList<Integer>[n] | |
| boolean[] visited = new boolean[n]; | |
| for(int i = 0; i < n; i++){ | |
| adj[i] = new ArrayList<Integer>(); // initializes the ArrayLists | |
| } | |
| for(int i = 0; i < m; i++){ // reading in each of the m edges | |
| int a = r.nextInt()-1; // we subtract 1 because our array is | |
| zero-indexed | |
| (cid:44)→ | |
| int b = r.nextInt()-1; | |
| adj[a].add(b); | |
| adj[b].add(a); // omit this line if the graph is directed | |
| } | |
| } | |
| If we’re dealing with a weighted graph, we’ll declare an Edge class or struct that stores | |
| two variables: the second endpoint of the edge, and the weight of the edge, and we store an | |
| array of lists of edges rather than an array of lists of integers. | |
| static class Edge{ | |
| int to; | |
| int weight; | |
| public Edge(int to, int weight){ | |
| this.to = to; | |
| this.edge = edge; | |
| } | |
| } | |
| Adjacency Matrix | |
| Another way of representing graphs is the adjacency matrix, which is an N by N 2- | |
| dimensional array that stores for each pair of indices (a, b), stores whether there is an | |
| edge between a and b. Start by initializing every entry in the matrix to zero (this is done | |
| automatically in Java), and then for undirected graphs, for each edge between indices a and | |
| b, set adj[a][b] and adj[b][a] to 1 (if unweighted) or the edge weight (if weighted). If | |
| the graph is directed, for an edge from a to b, only set adj[a][b]. | |
| CHAPTER 10. GRAPH THEORY | |
| 45 | |
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 1 | |
| 3 | |
| 6 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 3 | |
| 9 | |
| 5 | |
| Figure 1.5 repeated for convenience | |
| Adjacency matrix representation of the graph in fig. 1.5: | |
| × 0 1 2 3 4 5 | |
| 0 0 9 0 4 3 0 | |
| 1 9 0 5 2 0 0 | |
| 2 0 5 0 0 4 1 | |
| 3 4 2 0 0 0 3 | |
| 4 3 0 4 0 0 0 | |
| 5 0 0 1 3 0 0 | |
| At the Silver level, we generally won’t be using the adjacency matrix much, but it’s helpful | |
| to know if it does come up. The primary use of the adjacency matrix is the Floyd-Warshall | |
| algorithm, which is beyond the scope of this book. | |
| Code for setting up an adjacency matrix is as follows: | |
| static int n, m; // number of nodes and edges | |
| static int[][] adj; // adj matrix | |
| public static void main(String[] args){ | |
| n = r.nextInt(); | |
| m = r.nextInt(); | |
| adj = new int[n][n]; | |
| for(int i = 0; i < m; i++){ // read in each of the m edges | |
| int a = r.nextInt()-1; | |
| int b = r.nextInt()-1; | |
| adj[a][b] = 1; // or set equal to w if graph is weighted | |
| adj[b][a] = 1; // or set equal to w if graph is weighted; | |
| // ignore above line if graph is directed | |
| } | |
| } | |
| CHAPTER 10. GRAPH THEORY | |
| 46 | |
| Edge List | |
| The last graph representation is the edge list. Usually, we use this in weighted undirected | |
| graphs when we want to sort the edges by weight (for DSU, for example; see section 10.6). | |
| In the edge list, we simply store a single list of all the edges, in the form (a, b, w) where a | |
| and b are the nodes that the edge connects, and w is the edge weight. Note that in an edge | |
| list, we do NOT add each edge twice; there is only one place for us to add the edges, so we | |
| only do so once. | |
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 1 | |
| 3 | |
| 6 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 3 | |
| 9 | |
| 5 | |
| Figure 1.5 repeated for convenience | |
| Edge list representation of the graph in fig. 1.5: | |
| (0, 1, 9), (0, 3, 4), (0, 4, 3), (1, 3, 2), (3, 5, 3), (2, 4, 4), (2, 1, 5), (2, 5, 1) | |
| We’ll need an edge class, such as the following: | |
| static class Edge implements Comparable<Edge>{ | |
| int a, b, w; | |
| public Edge(int a, int b, int w){ | |
| this.a = a; | |
| this.b = b; | |
| this.w = w; | |
| } | |
| public int compareTo(Edge e){ // sort order is ascending, by weight | |
| // to sort in descending order, just negate the value of the compare | |
| function. | |
| return Integer.compare(w, e.w); | |
| (cid:44)→ | |
| } | |
| } | |
| Code for the edge list is as follows, using the above edge class: | |
| static int n, m; // number of nodes and edges | |
| static ArrayList<Edge> edges; | |
| CHAPTER 10. GRAPH THEORY | |
| 47 | |
| public static void main(String[] args){ | |
| n = r.nextInt(); | |
| m = r.nextInt(); | |
| edges = new ArrayList<Edge>(); | |
| for(int i = 0; i < m; i++){ // for each of the m edges | |
| int a = r.nextInt()-1; | |
| int b = r.nextInt()-1; | |
| // subtract 1 to maintain zero-indexing of vertices | |
| int w = r.nextInt(); | |
| edges.add(new Edge(a, b, w)); // add the edge to the list | |
| } | |
| Collections.sort(edges); | |
| } | |
| 10.4 Graph Traversal Algorithms | |
| Graph traversal is the process of visiting or checking each vertex in a graph. This is useful | |
| when we want to determine which vertices can be visited, whether there exists a path from | |
| one vertex to another, and so forth. There are two algorithms for graph traversal, namely | |
| depth-first search (DFS) and breadth-first search (BFS). | |
| Depth-first search | |
| Depth-first search continues down a single path to the end, then it backtracks to check | |
| other vertices. Depth-first search will process all nodes that are reachable (connected by | |
| edges) to the starting node. Let’s look at an example of how this works. Depth first-search | |
| can start at any node, but by convention we’ll start the search at node 1. We’ll use the | |
| following color scheme: blue for nodes we have already visited, red for nodes we are currently | |
| processing, and black for nodes that have not been visited yet. | |
| The DFS starts from node 1 and then goes to node 2, as it’s the only neighbor of node 1: | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| Now, the DFS goes to node 3 and then 4, following a single path to the end until it has no | |
| more nodes to process: | |
| CHAPTER 10. GRAPH THEORY | |
| 48 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| Lastly, the DFS backtracks to visit node 5, which was skipped over previously. | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| Depth-first search is implemented recursively because it allows for much simpler and shorter | |
| code. The algorithm is as follows: | |
| Algorithm: Recursive implementation for depth-first traversal of a graph | |
| Function DFS | |
| Input : start, the 0-indexed number of the starting vertex | |
| visted(start) ← true | |
| foreach vertex k adjacent to start do | |
| if visited(k) is false then | |
| DFS (k) | |
| end | |
| end | |
| Code: | |
| static void dfs(int node){ | |
| visited[node] = true; | |
| for(int next : adj[node]){ | |
| if(!visited[next]){ | |
| dfs(next); | |
| } | |
| } | |
| } | |
| Breadth-first search | |
| Breadth-first search visits nodes in order of distance away from the starting node; it first | |
| visits all nodes that are one edge away, then all nodes that are two edges away, and so on. | |
| Let’s use the same example graph that we used earlier: The BFS starts from node 1 and | |
| then goes to node 2, as it’s the only neighbor of node 1: | |
| CHAPTER 10. GRAPH THEORY | |
| 49 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| Now, the BFS goes to node 3, and then node 5, because both of them are two edges away | |
| from node 1: | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| Lastly, the BFS visits node 4, which is farthest. | |
| 1 | |
| 2 | |
| 5 | |
| 3 | |
| 4 | |
| The breadth-first search algorithm cannot be implemented recursively, so it’s significantly | |
| longer. Thus, when both BFS and DFS work, DFS is usually the better option. | |
| BFS can be used for finding the distance away from a starting node for all nodes in an | |
| unweighted graph, as we show below: | |
| CHAPTER 10. GRAPH THEORY | |
| 50 | |
| The algorithm is as follows: | |
| Algorithm: Breadth-first traversal of a graph | |
| Function BFS | |
| Input : start, the 0-indexed number of the starting vertex | |
| foreach vertex v do | |
| dist[v] ← −1 | |
| visited[v] ← false | |
| end | |
| dist[start] ← 0 | |
| Let q be a queue of integers | |
| Add start to q | |
| while q is not empty do | |
| Pop the first element from q, call it v | |
| foreach neighbor u of v do | |
| if node u has not yet been visited then | |
| dist[u] ← dist[v] + 1 | |
| Add u to q | |
| end | |
| end | |
| end | |
| Once the BFS finishes, the array dist contains the distances from the start node to each | |
| node. | |
| Example code is below. Note that the array dist[] is initially filled with −1’s to denote | |
| that none of the nodes have been processed yet. | |
| static void bfs(int k){ | |
| Arrays.fill(dist, -1); // fill distance array with -1's | |
| Queue<Integer> q = new LinkedList<Integer>(); | |
| dist[k] = 0; | |
| q.add(k); | |
| while(!q.isEmpty()){ | |
| int v = q.poll(); | |
| for(int e : adj[v]){ | |
| if(dist[e] == -1){ | |
| dist[e] = dist[v] + 1; | |
| q.add(e); | |
| } | |
| } | |
| } | |
| } | |
| CHAPTER 10. GRAPH THEORY | |
| 51 | |
| Iterative DFS | |
| If you encounter stack overflows while using recursive DFS, you can write an iterative | |
| DFS, which is just BFS but with nodes stored on a stack rather than a queue. | |
| 10.5 Floodfill | |
| Floodfill is an algorithm that identifies and labels the connected component that a | |
| particular cell belongs to, in a multi-dimensional array. Essentially, it’s DFS, but on a grid, | |
| and we want to find the connected component of all the connected cells with the same number. | |
| For example, let’s look at the following grid and see how floodfill works, starting from the | |
| top-left cell. The color scheme will be the same: red for the node currently being processed, | |
| blue for nodes already visited, and uncolored for nodes not yet visited. | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 2 | |
| 1 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| As opposed to an explicit graph where the edges are given, a grid is an implicit graph. | |
| This means that the neighbors are just the nodes directly adjacent in the four cardinal | |
| directions. | |
| Usually, grids given in problems will be N by M , so the first line of the input contains the | |
| numbers N and M . In this example, we will use an two-dimensional integer array to store the | |
| grid, but depending on the problem, a two-dimensional character array or a two-dimensional | |
| boolean array may be more appropriate. Then, there are N rows, each with M numbers | |
| containing the contents of each square in the grid. Example input might look like the following | |
| (varies between problems): | |
| CHAPTER 10. GRAPH THEORY | |
| 52 | |
| 3 4 | |
| 1 1 2 1 | |
| 2 3 2 1 | |
| 1 3 3 3 | |
| And we’ll want to input the grid as follows: | |
| static int[][] grid; | |
| static int n, m; | |
| public static void main(String[] args){ | |
| int n = r.nextInt(); | |
| int m = r.nextInt(); | |
| grid = new int[n][m]; | |
| for(int i = 0; i < n; i++){ | |
| for(int j = 0; j < m; j++){ | |
| grid[i][j] = r.nextInt(); | |
| } | |
| } | |
| } | |
| When doing floodfill, we will maintain an N × M array of booleans to keep track of | |
| which squares have been visited, and a global variable to maintain the size of the current | |
| component we are visiting. Make sure to store the grid, the visited array, dimensions, and | |
| the current size variable globally. | |
| This means that we want to recursively call the search function from the squares above, | |
| below, and to the left and right of our current square. The algorithm to find the size of a | |
| connected component in a grid using floodfill is as follows (we’ll also maintain a 2d visited | |
| CHAPTER 10. GRAPH THEORY | |
| 53 | |
| array): | |
| Algorithm: Floodfill of a graph | |
| Function main | |
| // Input/output, global vars, etc hidden | |
| for i ← 0 to n − 1 do | |
| for j ← 0 to m − 1 do | |
| if the square at (i, j) is not visited then | |
| currentSize ← 0 | |
| floodfill(i, j, grid[i][j]) | |
| Process the connected component | |
| end | |
| end | |
| end | |
| Function floodfill | |
| : r, c, color | |
| Input | |
| // row and column index of starting square, target color | |
| if r or c is out of bounds then | |
| return | |
| end | |
| if the cell at (r, c) is the wrong color then | |
| return | |
| end | |
| if the square at (r, c) has already been visited then | |
| return | |
| end | |
| visited[r][c] ← true | |
| currentSize ← currentSize + 1 | |
| floodfill(r, c + 1, color) | |
| floodfill(r, c − 1, color) | |
| floodfill(r − 1, c, color) | |
| floodfill(r + 1, c, color) | |
| The code below shows the global/static variables we need to maintain while doing floodfill, | |
| and the floodfill algorithm itself. | |
| static int[][] grid; // the grid itself | |
| static int n, m; // grid dimensions, rows and columns | |
| static boolean[][] visited; // keeps track of which nodes have been visited | |
| static int currentSize = 0; // reset to 0 each time we start a new component | |
| public static void main(String[] args){ | |
| /** | |
| * input code and other problem-specific stuff here | |
| */ | |
| CHAPTER 10. GRAPH THEORY | |
| 54 | |
| for(int i = 0; i < n; i++){ | |
| for(int j = 0; j < m; j++){ | |
| if(!visited[i][j]){ | |
| currentSize = 0; | |
| floodfill(i, j, grid[i][j]); | |
| // start a floodfill if the square hasn't already been visited, | |
| // and then store or otherwise use the component size | |
| // for whatever it's needed for | |
| } | |
| } | |
| } | |
| } | |
| static void floodfill(int r, int c, int color){ | |
| if(r < 0 || r >= n || c < 0 || c >= m) return; // if outside grid | |
| if(grid[r][c] != color) return; // wrong color | |
| if(visited[r][c]) return; // already visited this square | |
| visited[r][c] = true; // mark current square as visited | |
| currentSize++; // increment the size for each square we visit | |
| // recursively call floodfill for neighboring squares | |
| floodfill(r, c+1, color); | |
| floodfill(r, c-1, color); | |
| floodfill(r-1, c, color); | |
| floodfill(r+1, c, color); | |
| } | |
| 10.6 Disjoint-Set Data Structure | |
| Let’s say we want to construct a graph, one edge at a time. We also want to be able to | |
| add additional nodes, and query whether two nodes are connected. We can naively solve | |
| this problem by adding the edges and running a floodfill each time, before finally checking | |
| whether two nodes have the same color. This yields a time complexity of O(nm) for a graph | |
| of n nodes and m edges. | |
| However, we can do better than this using a data structure known as Disjoint-Set Union, | |
| or DSU for short. This data structure supports two operations: | |
| • Add an edge between two nodes. | |
| • Check if two nodes are connected. | |
| To achieve this, we store sets as trees, with the root of the tree representing the “parent” | |
| of the set. Initially, we store each node as its own set. Then, we combine their sets when we | |
| add an edge between two nodes. The image below illustrates this structure. | |
| CHAPTER 10. GRAPH THEORY | |
| 55 | |
| In this graph, 1 is the parent of the set containing 3, 2, and 4. | |
| To implement this, let’s store the parent of each node in the tree represented by that | |
| node’s set. Then, to merge two sets, we set the parent of one tree’s root to the other tree’s | |
| root, like so: | |
| The following methods demonstrate this idea: | |
| static int[] parent; //stores the parent nodes | |
| static void initialize(int N){ | |
| for(int i = 0; i < N; i++){ | |
| parent[i] = i; //initially, the root of each set is the node itself | |
| } | |
| } | |
| static int find(int x){ //finds the root of the set of x | |
| if(x == parent[x]){ //if x is the parent of itself, it is the root | |
| return x; | |
| } | |
| else{ | |
| return find(parent[x]); //otherwise, recurse to the parent of x | |
| } | |
| CHAPTER 10. GRAPH THEORY | |
| 56 | |
| } | |
| static void union(int a, int b){ //merges the sets of a and b | |
| int c = find(a); //find the root of a | |
| int d = find(b); //find the root of b | |
| if(c != d){ | |
| parent[d] = c; //merge the sets by setting the parent of d to c | |
| } | |
| } | |
| However, this naive implementation of a DSU isn’t much better than simply running a | |
| floodfill. As the recursing up the tree of a set to find it’s root can be time-consuming for | |
| trees with long chains, the runtime ultimately degrades to still being O(nm) for n nodes and | |
| m edges. | |
| Now that we understand the general idea of a DSU, we can improve the runtime of this | |
| implementation using an optimization known as path compression. The general idea is to | |
| reassign nodes in the tree as you are recursively calling the find method to prevent long | |
| chains from forming. Here is a rewritten find method representing this idea: | |
| static int find(int x){ | |
| if(x == parent[x]){ | |
| return x; | |
| } | |
| else{ | |
| // we set the direct parent to the root of the set to reduce path length | |
| return parent[x] = find(parent[x]); | |
| } | |
| } | |
| The following image demonstrates how the tree with parent 1 is compressed after find(6) | |
| is called. All of the bolded nodes in the final tree were visited during the recursive operation, | |
| and now point to the root. | |
| CHAPTER 10. GRAPH THEORY | |
| 57 | |
| With this new optimization, the runtime reduces to O(n log n), far better than our naive | |
| algorithm. Further optimizations can reduce the runtime of DSU to nearly constant. However, | |
| those techniques and the proof of complexity for these optimizations are both unnecessary for | |
| and out of the scope of the USACO Silver division, so they will not be included in this book. | |
| 10.7 Bipartite Graphs | |
| A bipartite graph is a graph such that each node can be colored in one of two colors, | |
| such that no two adjacent nodes have the same color. For example, the following graph is | |
| bipartite: | |
| 1 | |
| 2 | |
| 4 | |
| 3 | |
| 5 | |
| A graph is bipartite if and only if there are no cycles of odd length. For example, the | |
| following graph is not bipartite, because it contains a cycle of length 3. | |
| 1 | |
| 3 | |
| 2 | |
| 4 | |
| The following image depicts how a bipartite graph splits vertices into two “groups” | |
| depending on their color. | |
| CHAPTER 10. GRAPH THEORY | |
| 58 | |
| In order to check whether a graph is bipartite, we use a modified breadth-first search. | |
| Algorithm: Bipartiteness check | |
| Function bipartite | |
| : a graph | |
| Input | |
| Output : whether the graph is bipartite or not | |
| Assign color 1 to the starting vertex | |
| // Use the following modified bfs | |
| foreach vertex v processed in bfs do | |
| d ← dist(start, v) | |
| if d is odd then | |
| Assign color 2 to vertex v | |
| else | |
| Assign color 1 to vertex v | |
| end | |
| foreach vertex w adjacent to v do | |
| if w and v are the same color then | |
| return false // not bipartite | |
| end | |
| end | |
| end | |
| return true // bipartite | |
| 10.8 Problems | |
| DFS/BFS Problems | |
| 1. USACO January 2018 Silver Problem 3: MooTube | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=788 | |
| CHAPTER 10. GRAPH THEORY | |
| 59 | |
| 2. USACO December 2016 Silver Problem 3: Moocast | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=668 | |
| 3. USACO US Open 2016 Silver Problem 3: Closing the Farm | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=644 | |
| DSU Problems | |
| Many of these problems do not require DSU. However, they become much easier to do if | |
| you understand it. | |
| 4. USACO US Open Silver Problem 3: The Moo Particle | |
| http://usaco.org/index.php?page=viewproblem2&cpid=1040 | |
| 5. USACO January 2018 Silver Problem 3: MooTube | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=788 | |
| 6. USACO December 2019 December Problem 3: Milk Visits | |
| http://usaco.org/index.php?page=viewproblem2&cpid=968 | |
| 7. USACO US Open 2016 Gold Problem 2: Closing the Farm | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=646 | |
| 8. USACO January Contest 2020 Silver Problem 3: Wormhole Sort | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=992 | |
| Other Graph Problems | |
| 9. (Bipartite Graphs) USACO February 2019 Silver Problem 3: The Great Revegetation | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=920 | |
| 10. CodeForces Round 595 (Div. 3) Problem B2: Books Exchange | |
| https://codeforces.com/problemset/problem/1249/B2 | |
| Chapter 11 | |
| Prefix Sums | |
| 11.1 Prefix Sums | |
| Let’s say we have an integer array arr with N elements, and we want to process Q queries | |
| to find the sum of the elements between two indices a and b, inclusive, with different values | |
| of a and b for every query. For the purposes of this chapter, we will assume that the original | |
| array is 1-indexed, meaning arr[0] = 0 (which is a dummy index), and the actual array | |
| elements occupy indices 1 through N (this means that the array actually has length N + 1). | |
| Let’s use the following example 1-indexed array arr, with N = 6: | |
| Index i | |
| arr[i] | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 2 | |
| 6 | |
| 3 | |
| 4 | |
| 4 | |
| 2 | |
| 5 | |
| 5 | |
| 6 | |
| 3 | |
| Naively, for every query, we can iterate through all entries from index a to index b to add | |
| them up. Since we have Q queries and each query requires a maximum of O(N ) operations | |
| to calculate the sum, our total time complexity is O(N Q). For most problems of this nature, | |
| the constraints will be N, Q ≤ 105, so N Q is on the order of 1010. This is not acceptable; it | |
| will almost always exceed the time limit. | |
| Instead, we can use prefix sums to process these array sum queries. We designate a prefix | |
| sum array prefix[]. First, since we’re 1-indexing the array, set prefix[0] = 0, then for | |
| indices k such that 1 ≤ k ≤ n, define the prefix sum array as follows: | |
| prefix[k] = | |
| k | |
| (cid:88) | |
| i=1 | |
| arr[i] | |
| Basically, what this means is that the element at index k of the prefix sum array stores the | |
| sum of all the elements in the original array from index 1 up to k. This can be calculated | |
| easily in O(N ) by the following formula: | |
| prefix[k] = prefix[k-1] + arr[k] | |
| For the example case, our prefix sum array looks like this: | |
| Index i | |
| prefix[i] | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 2 | |
| 7 | |
| 3 | |
| 11 | |
| 4 | |
| 13 | |
| 5 | |
| 18 | |
| 6 | |
| 21 | |
| 60 | |
| CHAPTER 11. PREFIX SUMS | |
| 61 | |
| Now, when we want to query for the sum of the elements of arr between (1-indexed) | |
| indices a and b inclusive, we can use the following formula: | |
| b | |
| (cid:88) | |
| i=a | |
| arr[i] = | |
| b | |
| (cid:88) | |
| i=1 | |
| arr[i] − | |
| a−1 | |
| (cid:88) | |
| i=1 | |
| arr[i] | |
| Using our definition of the elements in the prefix sum array, we have | |
| b | |
| (cid:88) | |
| i=a | |
| arr[i] = prefix[b] − prefix[a-1] | |
| Since we are only querying two elements in the prefix sum array, we can calculate subarray | |
| sums in O(1) per query, which is much better than the O(N ) per query that we had before. | |
| Now, after an O(N ) preprocessing to calculate the prefix sum array, each of the Q queries | |
| takes O(1) time. Thus, our total time complexity is O(N + Q), which should now pass the | |
| time limit. | |
| Let’s do an example query and find the subarray sum between indices a = 2 and b = 5, | |
| inclusive, in the 1-indexed arr. From looking at the original array, we see that this is | |
| (cid:80)5 | |
| i=2 arr[i] = 6 + 4 + 2 + 5 = 17. | |
| Index i | |
| arr[i] | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 2 | |
| 6 | |
| 3 | |
| 4 | |
| 4 | |
| 2 | |
| 5 | |
| 5 | |
| 6 | |
| 3 | |
| Using prefix sums: prefix[5] − prefix[1] = 18 − 1 = 17. | |
| Index i | |
| prefix[i] | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 2 | |
| 7 | |
| 3 | |
| 11 | |
| 4 | |
| 13 | |
| 5 | |
| 18 | |
| 6 | |
| 21 | |
| 11.2 Two Dimensional Prefix Sums | |
| Now, what if we wanted to process Q queries for the sum over a subrectangle of a N | |
| rows by M columns matrix in two dimensions? Let’s assume both rows and columns are | |
| 1-indexed, and we use the following matrix as an example: | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 4 | |
| 7 | |
| 0 | |
| 5 | |
| 7 | |
| 6 | |
| 5 | |
| 0 | |
| 6 | |
| 11 | |
| 1 | |
| 4 | |
| 0 | |
| 11 | |
| 9 | |
| 3 | |
| 2 | |
| 0 | |
| 8 | |
| 4 | |
| 2 | |
| 3 | |
| Naively, each sum query would then take O(N M ) time, for a total of O(QN M ). This is | |
| too slow. | |
| Let’s take the following example region, which we want to sum: | |
| CHAPTER 11. PREFIX SUMS | |
| 62 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 4 | |
| 7 | |
| 0 | |
| 5 | |
| 7 | |
| 6 | |
| 5 | |
| 0 | |
| 6 | |
| 11 | |
| 1 | |
| 4 | |
| 0 | |
| 11 | |
| 9 | |
| 3 | |
| 2 | |
| 0 | |
| 8 | |
| 4 | |
| 2 | |
| 3 | |
| Manually summing all the cells, we have a submatrix sum of 7 + 11 + 9 + 6 + 1 + 3 = 37. | |
| The first logical optimization would be to do one-dimensional prefix sums of each row. | |
| Then, we’d have the following row-prefix sum matrix. The desired subarray sum of each row | |
| in our desired region is simply the green cell minus the red cell in that respective row. We do | |
| this for each row, to get (28 − 1) + (14 − 4) = 37. | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 4 | |
| 7 | |
| 0 | |
| 6 | |
| 8 | |
| 10 | |
| 12 | |
| 0 | |
| 12 | |
| 19 | |
| 11 | |
| 16 | |
| 0 | |
| 23 | |
| 28 | |
| 14 | |
| 18 | |
| 0 | |
| 31 | |
| 32 | |
| 16 | |
| 21 | |
| Now, if we wanted to find a submatrix sum, we could break up the submatrix into a | |
| subarray for each row, and then add their sums, which would be calculated using the prefix | |
| sums method described earlier. Since the matrix has N rows, the time complexity of this is | |
| O(QN ). This is better, but still usually not fast enough. | |
| To do better, we can do two-dimensional prefix sums. In our two dimensional prefix sum | |
| array, we have | |
| prefix[a][b] = | |
| a | |
| (cid:88) | |
| b | |
| (cid:88) | |
| i=1 | |
| j=1 | |
| arr[i][j] | |
| This can be calculated as follows for row index 1 ≤ i ≤ n and column index 1 ≤ j ≤ m: | |
| prefix[i][j] = prefix[i-1][j] + prefix[i][j-1] − prefix[i-1][j-1] + arr[i][j] | |
| The submatrix sum between rows a and A and columns b and B, can thus be expressed as | |
| follows: | |
| A | |
| (cid:88) | |
| B | |
| (cid:88) | |
| arr[i][j] = prefix[A][B] − prefix[a-1][B] | |
| i=a | |
| j=b | |
| − prefix[A][b-1] + prefix[a-1][b-1] | |
| Summing the blue region from above using the 2d prefix sums method, we add the value | |
| of the green square, subtract the values of the red squares, and then add the value of the | |
| gray square. In this example, we have 65 − 23 − 6 + 1 = 37, as expected. | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 0 | |
| 1 | |
| 2 | |
| 6 | |
| 13 | |
| 0 | |
| 6 | |
| 14 | |
| 24 | |
| 36 | |
| 0 | |
| 12 | |
| 31 | |
| 42 | |
| 58 | |
| 0 | |
| 23 | |
| 51 | |
| 65 | |
| 83 | |
| 0 | |
| 31 | |
| 63 | |
| 79 | |
| 100 | |
| Since no matter the size of the submatrix we are summing, we only need to access 4 values | |
| of the 2d prefix sum array, this runs in O(1) per query after an O(N M ) preprocessing. This | |
| is fast enough. | |
| CHAPTER 11. PREFIX SUMS | |
| 11.3 Problems | |
| 63 | |
| 1. USACO December 2015 Silver Problem 3: Breed Counting | |
| http://usaco.org/index.php?page=viewproblem2&cpid=572 | |
| 2. USACO January 2016 Silver Problem 2: Subsequences Summing to Sevens | |
| http://usaco.org/index.php?page=viewproblem2&cpid=595 | |
| 3. USACO December 2017 Silver Problem 1: My Cow Ate My Homework | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=762 | |
| 4. USACO January 2017 Silver Problem 2: Hoof, Paper, Scissors | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=691 | |
| 5. (2D Prefix Sums) USACO February 2019 Silver Problem 2: Painting the Barn | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=919 | |
| Chapter 12 | |
| Binary Search | |
| 12.1 Binary Search on the Answer | |
| You’re probably already familiar with the concept of binary searching for a number in | |
| a sorted array. However, binary search can be extended to binary searching on the answer | |
| itself. When we binary search on the answer, we start with a search space, where we know | |
| the answer lies in. Then, each iteration of the binary search cuts the search space in half, | |
| so the algorithm tests O(log N ) values, which is efficient and much better than testing each | |
| possible value in the search space. | |
| Similarly to how binary search on an array only works on a sorted array, binary search | |
| on the answer only works if the answer function is monotonic. Let’s say we have a function | |
| check(x) that returns true if the answer of x is possible, and false otherwise. Usually, in | |
| such problems, we’ll want to find the maximum or minimum value of x such that check(x) | |
| is true. | |
| In order for binary search to work, the search space must look like something of the | |
| following form, using a check function as we described above. | |
| true true true true true false false false false | |
| Then, we find the point at which true becomes false, using binary search. | |
| Below, we present two algorithms for binary search. The first implementation may be | |
| more intuitive, because it’s closer to the binary search most students learned, while the | |
| 64 | |
| CHAPTER 12. BINARY SEARCH | |
| 65 | |
| second implementation is shorter. | |
| Algorithm: Binary searching for the answer | |
| Function binarySearch1 | |
| left ← lower bound of search space | |
| right ← upper bound of search space | |
| ans ← −1 | |
| while left ≤ right do | |
| mid ← (left + right)/2 | |
| if check(mid) then | |
| left ← mid + 1 | |
| ans ← mid | |
| else | |
| right ← mid − 1 | |
| end | |
| return ans | |
| Algorithm: Binary searching for the answer | |
| Function binarySearch2 | |
| pos ← 0 | |
| max ← upper bound of search space | |
| for (a = max; a ≥ 1; a /= 2) do | |
| while check(pos + a) do | |
| pos ← pos + a | |
| end | |
| end | |
| return pos | |
| 12.2 Example | |
| Source: Codeforces Round 577 (Div. 2) Problem C | |
| https://codeforces.com/contest/1201/problem/C | |
| Given an array arr of n integers, where n is odd, we can perform the following operation | |
| on it k times: take any element of the array and increase it by 1. We want to make the | |
| median of the array as large as possible, after k operations. | |
| Constraints: 1 ≤ n ≤ 2 · 105, 1 ≤ k ≤ 109 and n is odd. | |
| The solution is as follows: we first sort the array in ascending order. Then, we binary | |
| search for the maximum possible median. We know that the number of operations required | |
| to raise the median to x increases monotonically as x increases, so we can use binary search. | |
| For a given median value x, the number of operations required to raise the median to x is | |
| n | |
| (cid:88) | |
| i=(n+1)/2 | |
| max(0, x − arr[i]) | |
| CHAPTER 12. BINARY SEARCH | |
| 66 | |
| If this value is less than or equal to k, then x can be the median, so our check function | |
| returns true. Otherwise, x cannot be the median, so our check function returns false. | |
| Solution code (using the second implementation of binary search): | |
| static int n; | |
| static long k; | |
| static long[] arr; | |
| public static void main(String[] args) { | |
| n = r.nextInt(); k = r.nextLong(); | |
| arr = new long[n]; | |
| for(int i = 0; i < n; i++){ | |
| arr[i] = r.nextLong(); | |
| } | |
| Arrays.sort(arr); | |
| pw.println(search()); | |
| pw.close(); | |
| } | |
| // binary searches for the correct answer | |
| static long search(){ | |
| long pos = 0; long max = (long)2E9; | |
| for(long a = max; a >= 1; a /= 2){ | |
| while(check(pos+a)) pos += a; | |
| } | |
| return pos; | |
| } | |
| // checks whether the number of given operations is sufficient | |
| // to raise the median of the array to x | |
| static boolean check(long x){ | |
| long operationsNeeded = 0; | |
| for(int i = (n-1)/2; i < n; i++){ | |
| operationsNeeded += Math.max(0, x-arr[i]); | |
| } | |
| if(operationsNeeded <= k){ return true; } | |
| else{ return false; } | |
| } | |
| 12.3 Problems | |
| 1. USACO December 2018 Silver Problem 1: Convention | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=858 | |
| CHAPTER 12. BINARY SEARCH | |
| 67 | |
| 2. USACO January 2016 Silver Problem 1: Angry Cows | |
| http://usaco.org/index.php?page=viewproblem2&cpid=594 | |
| 3. USACO January 2017 Silver Problem 1: Cow Dance Show | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=690 | |
| 4. Educational Codeforces Round 60 Problem C: Magic Ship | |
| https://codeforces.com/problemset/problem/1117/C (Also uses prefix sums) | |
| 5. USACO January 2020 Silver Problem 2: Loan Repayment | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=991 | |
| (Warning: extremely difficult for silver) | |
| Chapter 13 | |
| Elementary Number Theory | |
| 13.1 Prime Factorization | |
| A number a is called a divisor or a factor of a number b if b is divisible by a, which means | |
| that there exists some integer k such that b = ka. Conventionally, 1 and n are considered | |
| divisors of n. A number n > 1 is prime if its only divisors are 1 and n. Numbers greater | |
| than 1 that are not prime are composite. | |
| Every number has a unique prime factorization: a way of decomposing it into a product | |
| of primes, as follows: | |
| n = p1 | |
| a1p2 | |
| a2 · · · pk | |
| ak | |
| where the pi are distinct primes and the ai are positive integers. | |
| Now, we will discuss how to find the prime factorization of an integer. | |
| Algorithm: Finds the prime factorization of a number | |
| Function factor | |
| : n, the number to be factorized | |
| Input | |
| Output : v, a list of all the prime factors | |
| v ← empty list | |
| for i ← 2 to (cid:98) | |
| n(cid:99) do | |
| √ | |
| while n is divisible by i do | |
| n ← n/i | |
| Add i to the list v | |
| end | |
| end | |
| return v ; | |
| √ | |
| √ | |
| This algorithm runs in O( | |
| n) time, because the for loop checks divisibility for at most | |
| n values. Even though there is a while loop inside the for loop, dividing n by i quickly | |
| reduces the value of n, which means that the outer for loop runs less iterations, which actually | |
| speeds up the code. | |
| 68 | |
| CHAPTER 13. ELEMENTARY NUMBER THEORY | |
| 69 | |
| Let’s look at an example of how this algorithm works, for n = 252. | |
| i | |
| n | |
| 2 252 | |
| 2 126 | |
| 63 | |
| 2 | |
| 21 | |
| 3 | |
| 7 | |
| 3 | |
| v | |
| {} | |
| {2} | |
| {2, 2} | |
| {2, 2, 3} | |
| {2, 2, 3, 3} | |
| At this point, the for loop terminates, because i is already 3 which is greater than (cid:98) | |
| 7(cid:99). In | |
| the last step, we add 7 to the list of factors v, because it otherwise won’t be added, for a | |
| final prime factorization of {2, 2, 3, 3, 7}. | |
| √ | |
| 13.2 GCD and LCM | |
| The greatest common divisor (GCD) of two integers a and b is the largest integer | |
| that is a factor of both a and b. In order to find the GCD of two numbers, we use the | |
| Euclidean Algorithm, which is as follows: | |
| gcd(a, b) = | |
| (cid:40) | |
| a | |
| gcd(b, a mod b) | |
| b = 0 | |
| b (cid:54)= 0 | |
| This algorithm is very easy to implement using a recursive function, as follows: | |
| public int gcd(int a, int b){ | |
| if(b == 0) return a; | |
| return gcd(b, a % b); | |
| } | |
| Finding the GCD of two numbers can be done in O(log n) time, where n = min(a, b). | |
| The least common multiple (LCM) of two integers a and b is the smallest integer | |
| divisible by both a and b. | |
| The LCM can easily be calculated from the following property with the GCD: | |
| lcm(a, b) = | |
| a · b | |
| gcd(a, b) | |
| If we want to take the GCD or LCM of more than two elements, we can do so two at a time, | |
| in any order. For example, | |
| gcd(a1, a2, a3, a4) = gcd(a1, gcd(a2, gcd(a3, a4))) | |
| CHAPTER 13. ELEMENTARY NUMBER THEORY | |
| 70 | |
| 13.3 Modular Arithmetic | |
| In modular arithmetic, instead of working with integers themselves, we work with their | |
| remainders when divided by m. We call this taking modulo m. For example, if we take | |
| m = 23, then instead of working with x = 247, we use x mod 23 = 17. Usually, m will be a | |
| large prime, given in the problem; the two most common values are 109 + 7, and 998 244 353. | |
| Modular arithmetic is used to avoid dealing with numbers that overflow built-in data types, | |
| because we can take remainders, according to the following formulas: | |
| (a + b) mod m = (a mod m + b mod m) mod m | |
| (a − b) mod m = (a mod m − b mod m) mod m | |
| (a · b) | |
| (mod m) = ((a mod m) · (b mod m)) mod m | |
| ab mod m = (a mod m)b mod m | |
| Under a prime moduli, division does exist; however it’s rarely used in problems and is | |
| beyond the scope of this book. | |
| 13.4 Problems | |
| 1. CodeForces VK Cup 2012 Wildcard Round 1 | |
| https://codeforces.com/problemset/problem/162/C | |
| Chapter 14 | |
| Additional Silver Topics | |
| 14.1 Two Pointers | |
| The two pointers method iterates two pointers across an array, to track the start and end | |
| of an interval, or two values in a sorted array that we are currently checking. Both pointers | |
| are monotonic; meaning each pointer starts at one end of the array and only move in one | |
| direction. | |
| 2SUM Problem | |
| Given an array of N elements (1 ≤ N ≤ 105), find two elements that sum to X. We can | |
| solve this problem using two pointers; sort the array, then set one pointer at the beginning | |
| and one pointer at the end of the array. Then, we consider the sum of the numbers at the | |
| indices of the pointers. If the sum is too small, advance the left pointer towards the right, | |
| and if the sum is too large, advance the right pointer towards the left. Repeat until either | |
| the correct sum is found, or the pointers meet (in which case there is no solution). | |
| Let’s take the following example array, where N = 6 and X = 15 | |
| First, we sort the array: | |
| 1 | |
| 7 | |
| 11 | |
| 10 | |
| 5 | |
| 13 | |
| 1 | |
| 5 | |
| 7 | |
| 10 | |
| 11 | |
| 13 | |
| We then place the left pointer at the start of the array, and the right pointer at the end | |
| of the array. | |
| 1 | |
| 5 | |
| 7 | |
| 10 | |
| 11 | |
| 13 | |
| Then, run and repeat this process: If the sum of the pointer elements is less than X, | |
| move the left pointer one step to the right. If the sum is greater than X, move the right | |
| pointer one step to the left. The example is as follows. First, the sum 1 + 13 = 14 is too | |
| small, so we move the left pointer one step to the right. | |
| 1 | |
| 5 | |
| 7 | |
| 10 | |
| 11 | |
| 13 | |
| 71 | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 72 | |
| Now, 5 + 13 = 18 overshoots the sum we want, so we move the right pointer one step to | |
| the left. | |
| 1 | |
| 5 | |
| 7 | |
| 10 | |
| 11 | |
| 13 | |
| At this point we have 5 + 11 = 16, still too big. We continue moving the right pointer to | |
| the left. | |
| 1 | |
| 5 | |
| 7 | |
| 10 | |
| 11 | |
| 13 | |
| Now, we have the correct sum, and we are done. | |
| Code is as follows: | |
| int left = 0; int right = n-1; | |
| while(left < right){ | |
| if(arr[left] + arr[right] == x){ | |
| break; | |
| } else if(arr[left] + arr[right] < x){ | |
| left++; | |
| } else { | |
| right--; | |
| } | |
| } | |
| // if left >= right after the loop ends, no answer exists. | |
| Subarray Sum | |
| Given an array of N (1 ≤ N ≤ 105) positive elements, find a contiguous subarray that | |
| sums to X. | |
| We can do this in a similar manner to how we did the 2SUM problem: except this time we | |
| start both pointers at the left, and the pointers mark the beginning and end of the subarray | |
| we are currently checking. We advance the right pointer one step to the right if the total of | |
| the current subarray is too small, advance the left pointer one step to the right if the current | |
| total is too large, and we are done when we find the correct total. | |
| Maximum subarray sum | |
| Another problem that isn’t quite solved by two pointers, but is somewhat related, is the | |
| maximum subarray sum problem. | |
| Given an array of N integers (1 ≤ N ≤ 105), which can be positive or negative, find the | |
| maximum sum of a contiguous subarray. | |
| We can solve this problem using Kadane’s algorithm, which works as follows: we iterate | |
| through the elements of the array, and for each index i, we maintain the maximum subarray | |
| sum of a subarray ending at i in the variable current, and the maximum subarray sum of a | |
| subarray ending at or before i, in the variable best. | |
| Example code is below. | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 73 | |
| int best = 0; int current = 0; | |
| for(int i = 0; i < n; i++){ | |
| current = Math.max(0, current + arr[i]); | |
| best = Math.max(best, current); | |
| } | |
| 14.2 Line Sweep | |
| Line sweep is the technique of sorting a set of points or line segments and then processing | |
| them in order (this usually means from left to right). The name line sweep comes from the | |
| fact that we are sweeping an imaginary vertical line across the plane containing the points or | |
| segments. | |
| To describe this technique, we’ll be using the 2019 US Open problem, “Cow Steeplechase | |
| II”. | |
| http://usaco.org/index.php?page=viewproblem2&cpid=943 | |
| In this problem, we are given some line segments and asked to find one line segment and | |
| remove it such that the resulting segments form no intersections. It is guaranteed that this is | |
| always possible. | |
| First of all, let’s observe it is sufficient to find any two line segments that intersect. Once | |
| we have done this, the solution is guaranteed to be one of these two segments. Then, out of | |
| the two, the segment with multiple intersections is the answer (because removing any other | |
| segment decreases the number of intersections by at most 1, and only removing the segment | |
| with multiple intersections ensures there are no intersections). | |
| If both segments have one intersection, that means the intersect with each other, so we | |
| should return the one with the smallest index (as per the problem statement). Now, the | |
| problem reduces to two parts: checking if two line segments intersect, and processing the line | |
| segments using a line sweep. | |
| Checking If Two Segments Intersect | |
| To check if two line segments intersect, we will use a fact from algebra: if we have the | |
| points A = (xa, ya), B = (xb, yb), and C = (xc, yc), then the (signed) area of (cid:52)ABC, denoted | |
| [ABC], is (xb − xa)(yc − ya) − (xc − xa)(yb − ya). This can be derived from the cross product | |
| of the vectors | |
| −→ | |
| AB and | |
| −→ | |
| AC. | |
| The part that will help us is the fact that this area is signed, which means that [ABC] is | |
| positive if A, B, and C occur in counterclockwise order, | |
| negative if A, B, and C occur in clockwise order, and | |
| zero if A, B, and C are collinear. | |
| Then, the key observation is that two segments P Q and XY intersect if the two conditions | |
| hold: | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 74 | |
| • [XP Q] and [Y P Q] have different signs | |
| • [P XY ] and [QXY ] have different signs | |
| For example, in the figure below, [X1P1Q1] and [Q1X1Y1] are positive because their vertices | |
| occur in counterclockwise order, and [Y1P1Q1] and [P1X1Y1] are negative because their vertices | |
| occur in clockwise order. Therefore, we know that X1Y1 and P1Q1 intersect. Similarly, on | |
| the right, we know that [P2X2Y2] and [Q2X2Y2] have vertices both going in clockwise order, | |
| so their signed areas are the same, and therefore P2Q2 and X2Y2 don’t intersect. | |
| X1 | |
| P1 | |
| Q1 | |
| P2 | |
| X2 | |
| Q2 | |
| Y1 | |
| Y2 | |
| If the two conditions hold and some of the signs are zero, then this means that the segments | |
| intersect at their endpoints. If the problem does not count these as intersecting, then consider | |
| zero to have the same sign as both positive and negative. | |
| However, there is a special case. If the signs of all four areas are zero, then all four points | |
| lie on a line. To check if they intersect in this case, we just check whether one point is | |
| between the others. In particular, we check if P or Q is on XY or if X is on P Q. We don’t | |
| need to check if Y is on P Q because if the segments do intersect, we will have two instances | |
| of points on the other segments. | |
| Here’s a full implementation: | |
| public class Point { | |
| public int x, y; | |
| public Point(int x, int y){ | |
| this.x = x; this.y = y; | |
| } | |
| } | |
| public static int sign(Point A, Point B, Point C) { | |
| int area = (B.x-A.x) * (C.y-A.y) - (C.x-A.x) * (B.y-A.y); | |
| if (area > 0) return 1; | |
| if (area < 0) return -1; | |
| return 0; | |
| } | |
| public static boolean between(Point P, Point X, Point Y) { | |
| return ((X.x <= P.x && P.x <= Y.x) || (Y.x <= P.x && P.x <= X.x)) | |
| && ((X.y <= P.y && P.y <= Y.y) || (Y.y <= P.y && P.y <= X.y)); | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 75 | |
| } | |
| public static boolean intersectQ(Point P, Point Q, Point X, Point Y) { | |
| int[] signs = {sign(P, X, Y), sign(Q, X, Y), sign(X, P, Q), sign(Y, P, Q)}; | |
| if (signs[0] == 0 && signs[1] == 0 && signs[2] == 0 && signs[3] == 0) | |
| return between(P, X, Y) || between(Q, X, Y) || between(X, P, Q); | |
| return signs[0] != signs[1] && signs[2] != sign[3]; | |
| } | |
| Processing Line Segments | |
| Let’s break apart the N line segments into 2N events, one for each start and end point. | |
| We’ll store whether some event is a start point or an end point, and which start points | |
| correspond to each end point. | |
| Then, we process the endpoints in order of x coordinate from left to right, maintaining a | |
| set of currently processed segments, which is sorted by y. When we hit an endpoint, we either | |
| add or remove a segment from the set, depending on whether we start or end a segment. | |
| Every time we add a segment, we check it for intersection with the segment above it and the | |
| segment below it. In addition, every time we remove a segment, we check the segment above | |
| it and the segment below it for intersection. Once we find an intersection, we are done. | |
| 14.3 Bitwise Operations and Subsets | |
| Binary Representations of Integers | |
| In programming, numbers are stored as binary representations. This means that a number | |
| x is represented as | |
| n | |
| (cid:88) | |
| ai2i, | |
| x = | |
| i=0 | |
| where the ais are either 0 or 1 and n = (cid:98)log2 x(cid:99). | |
| For example: | |
| 17 = 24 + 20 = 100012 | |
| Each digit in the binary representation, which is either 0 or 1, is called a bit. | |
| Bitwise Operations | |
| There are several binary operations on binary numbers called bitwise operations. These | |
| operations are applied separately for each bit position. The common binary operations are | |
| shown in table 14.1: | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 76 | |
| Bit A Bit B A and B A or B A xor B | |
| 1 | |
| 1 | |
| 0 | |
| 0 | |
| 1 | |
| 0 | |
| 1 | |
| 0 | |
| 1 | |
| 0 | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 1 | |
| 0 | |
| 0 | |
| 1 | |
| 1 | |
| 0 | |
| Table 14.1: The outputs of bitwise operations on two bits | |
| The AND operation (&) returns 1 if and only if both bits are 1. | |
| 19 & 27 | |
| 1 0 0 1 1 = 19 | |
| AN D 1 1 0 1 1 = 27 | |
| 1 0 0 1 1 = 19 | |
| = | |
| The OR operation (|) returns 1 if either bit is 1. | |
| 19 | 27 | |
| 1 0 0 1 1 = 19 | |
| OR 1 1 0 1 1 = 27 | |
| = 1 1 0 1 1 = 27 | |
| The XOR operation (∧) returns 1 if and only if exactly one of the bits is 1. | |
| 19 ∧ 26 | |
| 1 0 0 1 1 = 19 | |
| XOR 1 1 0 1 1 = 27 | |
| 0 1 0 0 0 = 8 | |
| = | |
| Finally, the left shift operator x << k multiplies x by 2k. Watch for overflow and use the | |
| long data type if necessary. For example: | |
| 1 << 5 = 1 · 25 = 32 | |
| 7 << 2 = 7 · 22 = 28 | |
| Exercises | |
| Calculate by converting the numbers to binary, applying the bit operations, and then | |
| converting back to decimal numbers: | |
| (a) 19 & 34 | |
| (b) 14 | 29 | |
| (c) 10 ∧ 19 | |
| (d) 3 << 5 | |
| Answer: 2 | |
| Answer: 31 | |
| Answer: 25 | |
| Answer: 96 | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 77 | |
| Generating Subsets | |
| Occasionally in a problem we’ll want to iterate through every possible subset of a given | |
| set, either to find a subset that satisfies some condition, or to find the number of subsets that | |
| satisfy some condition. Also, some problems might ask you to find the number of partitions | |
| of a set into 2 groups that satisfy a certain condition. In this case, we will iterate through all | |
| possible subsets, and check each subset for validity (first adding the non-selected elements to | |
| the second subset if necessary). | |
| In a set of N elements, there are 2N possible subsets, because for each of the N elements, | |
| there are two choices: either in the subset, or not in the subset. Subset problems usually | |
| require a time complexity of O(N · 2N ), because each subset has an average of O(N ) elements. | |
| Now, let’s look at how we can generate the subsets. We can represent subsets as binary | |
| numbers from 0 to 2N − 1. Then, each bit represents whether or not a certain element is in | |
| the subset. Let’s look at an example set of a, b, c. | |
| number binary | |
| subset | |
| 0 | |
| 1 | |
| 2 | |
| 3 | |
| 4 | |
| 5 | |
| 6 | |
| 7 | |
| 000 | |
| 001 | |
| 010 | |
| 011 | |
| 100 | |
| 101 | |
| 110 | |
| 111 | |
| { } | |
| {a} | |
| {b} | |
| {a, b} | |
| {c} | |
| {a, c} | |
| {b, c} | |
| {a, b, c} | |
| Algorithm: The algorithm for generating all subsets of a given input array | |
| Function generateSubsets | |
| Input : An array arr, and its length n | |
| for i ← 0 to 2n − 1 do | |
| Declare list | |
| for j = 0 to n-1 do | |
| if the bit in the binary representation of i corresponding to 2j is 1 then | |
| Add arr[j] to the list | |
| end | |
| end | |
| Process the list | |
| end | |
| In the following code, our original set is represented by the array arr[] with length n. | |
| int ans = 0; | |
| for(int i = 0; i < (1<<n); i++){ | |
| // this loop iterates through the 2^n subsets, one by one. | |
| // 1 << n is a shortcut for 2^n | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 78 | |
| ArrayList<Integer> list = new ArrayList<Integer>(); | |
| // we create a new list for each subset and add | |
| // the elements to it | |
| for(int j = 0; j < n; j++){ | |
| if((i & (1 << j)) > 0){ | |
| // (1 << j) is the number where only the bit representing 2^j is 1. | |
| list.add(arr[j]); // if the respective bit of i is 1, | |
| // add that element to the list | |
| } | |
| } | |
| if(valid(list)){ | |
| // code is not included here, but this method will vary depending on the | |
| // problem to check if a certain subset is valid | |
| // and increments the answer counter if so. | |
| ans++; | |
| } | |
| } | |
| 14.4 Ad-hoc Problems | |
| The silver division also often has ad hoc problems. They primarily rely on non-standard | |
| algorithmic thinking and problem solving ability. You develop these skills by solving problems; | |
| thus, we don’t have much content to teach you about ad hoc problems, but we provide a | |
| selection of problems at the end of the chapter for your practice. | |
| 14.5 Problems | |
| Two Pointers | |
| 1. CSES Problem Set Task 1640: Sum of Two Values | |
| https://cses.fi/problemset/task/1640 | |
| 2. CSES Problem Set Task 1643: Maximum Subarray Sum | |
| https://cses.fi/problemset/task/1643 | |
| Line Sweep | |
| 3. USACO US Open 2019 Silver Problem 2: Cow Steeplechase II | |
| http://usaco.org/index.php?page=viewproblem2&cpid=943 | |
| Subsets | |
| 4. (Subsets) CSES Problem Set Task 1623: Apple Division | |
| https://cses.fi/problemset/task/1623 | |
| CHAPTER 14. ADDITIONAL SILVER TOPICS | |
| 79 | |
| Ad hoc problems | |
| 5. USACO February 2016 Silver Problem 1: Circular Barn | |
| http://usaco.org/index.php?page=viewproblem2&cpid=618 | |
| 6. USACO US Open 2019 Silver Problem 1: Left Out | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=942 | |
| 7. USACO February 2019 Silver Problem 1: Sleepy Cow Herding | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=918 | |
| 8. USACO January 2017 Silver Problem 3: Secret Cow Code | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=692 | |
| 9. USACO January 2020 Silver Problem 1: Berry Picking | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=990 | |
| 10. USACO December 2019 Silver Problem 2: Meetings | |
| http://www.usaco.org/index.php?page=viewproblem2&cpid=967 | |
| (Warning: extremely difficult) | |
| Part IV | |
| Problem Set | |
| 80 | |
| Chapter 15 | |
| Parting Shots | |
| You improve at competitive programming primarily by doing problems, so we leave you | |
| with an extensive selection of CodeForces problems for your practice. This consists of five | |
| problem sets of ten problems each, increasing in difficulty. The problems mostly use topics | |
| covered in the book, but may require some ingenuity to find the solution. If you get stuck, | |
| you can search for the editorial. Best of luck! | |
| Set 1 | |
| 1. https://codeforces.com/problemset/problem/1227/B | |
| 2. https://codeforces.com/problemset/problem/1196/B | |
| 3. https://codeforces.com/problemset/problem/1195/B | |
| 4. https://codeforces.com/problemset/problem/1294/B | |
| 5. https://codeforces.com/problemset/problem/1288/B | |
| 6. https://codeforces.com/problemset/problem/1293/A | |
| 7. https://codeforces.com/problemset/problem/1213/B | |
| 8. https://codeforces.com/problemset/problem/1207/B | |
| 9. https://codeforces.com/problemset/problem/1324/B | |
| 10. https://codeforces.com/problemset/problem/1327/A | |
| Set 2 | |
| 1. https://codeforces.com/problemset/problem/1182/B | |
| 2. https://codeforces.com/problemset/problem/1183/D | |
| 3. https://codeforces.com/problemset/problem/1183/C | |
| 4. https://codeforces.com/problemset/problem/1133/C | |
| 81 | |
| CHAPTER 15. PARTING SHOTS | |
| 82 | |
| 5. https://codeforces.com/problemset/problem/1249/B2 | |
| 6. https://codeforces.com/problemset/problem/1194/B | |
| 7. https://codeforces.com/problemset/problem/1271/C | |
| 8. https://codeforces.com/problemset/problem/1326/C | |
| 9. https://codeforces.com/problemset/problem/1294/C | |
| 10. https://codeforces.com/problemset/problem/1272/B | |
| Set 3 | |
| 1. https://codeforces.com/problemset/problem/1169/B | |
| 2. https://codeforces.com/problemset/problem/1102/D | |
| 3. https://codeforces.com/problemset/problem/978/F | |
| 4. https://codeforces.com/problemset/problem/1196/C | |
| 5. https://codeforces.com/problemset/problem/1154/D | |
| 6. https://codeforces.com/problemset/problem/1272/D | |
| 7. https://codeforces.com/problemset/problem/1304/C | |
| 8. https://codeforces.com/problemset/problem/1296/C | |
| 9. https://codeforces.com/contest/1263/problem/D | |
| 10. https://codeforces.com/contest/1339/problem/C | |
| Set 4 | |
| 1. https://codeforces.com/problemset/problem/1281/B | |
| 2. https://codeforces.com/problemset/problem/1196/D2 | |
| 3. https://codeforces.com/problemset/problem/1165/D | |
| 4. https://codeforces.com/problemset/problem/1238/C | |
| 5. https://codeforces.com/problemset/problem/1234/D | |
| 6. https://codeforces.com/problemset/problem/1198/B | |
| 7. https://codeforces.com/problemset/problem/1198/A | |
| 8. https://codeforces.com/problemset/problem/1077/D | |
| 9. https://codeforces.com/problemset/problem/1303/C | |
| 10. https://codeforces.com/problemset/problem/1098/A | |
| CHAPTER 15. PARTING SHOTS | |
| 83 | |
| Set 5 | |
| 1. https://codeforces.com/problemset/problem/1185/D | |
| 2. https://codeforces.com/problemset/problem/1195/D2 | |
| 3. https://codeforces.com/problemset/problem/1154/E | |
| 4. https://codeforces.com/contest/1195/problem/C | |
| 5. https://codeforces.com/problemset/problem/1196/E | |
| 6. https://codeforces.com/problemset/problem/1328/D | |
| 7. https://codeforces.com/problemset/problem/1253/D | |
| 8. https://codeforces.com/problemset/problem/1157/E | |
| 9. https://codeforces.com/problemset/problem/1185/C2 | |
| 10. https://codeforces.com/problemset/problem/1209/D | |