当前位置:网站首页>Leetcode problem solving -- 98 Validate binary search tree
Leetcode problem solving -- 98 Validate binary search tree
2022-07-06 03:07:00 【Snowy solitary boat】
Recursive version
public boolean isValidBST(TreeNode root) {
return range(root,Integer.MIN_VALUE-1L,Integer.MAX_VALUE+1L);
}
public boolean range(TreeNode node,long min,long max){
if (node==null) return true;
if (node.val<=min||node.val>=max) return false;
return range(node.left,min,node.val)&&range(node.right,node.val,max);
}
Wrong thinking :
Before saying the right way of thinking , Let me first talk about the pit I stepped on , I was thinking about recursion , Then judge whether the value of the left node is greater than or equal to the root node or the value of the right node is less than or equal to the root node , Just go back to false, But in fact, this is not possible , Please look at the chart below.
7 / \ 2 5 / \ 1 9
According to the above idea, the result is true, This is because the upper limit of the left subtree is ignored , And the right subtree has the error caused by the lower limit
The right way of thinking :
Use the upper and lower limits to judge
- Because the root node has no upper and lower limits , Therefore, the maximum and minimum values that can be stored by the variable type are used as the upper and lower limits
- If the node is null Go straight back to true
- If the node is not null, And the node value is not within the range specified by the upper and lower limits ,return false
- Continue to judge subtree , But should pay attention to , The upper limit of the left subtree is the value of the current subtree , The lower limit of the right subtree is the value of the current subtree
Iteration version
public boolean isValidBST(TreeNode root) {
Stack<TreeNode> stack = new Stack<>();
TreeNode node = root;
long prev = Integer.MIN_VALUE-1L;
while (!stack.isEmpty()||node!=null){
while (node!=null){
stack.push(node);
node = node.left;
}
node = stack.pop();
if (node.val<=prev) return false;
prev = node.val;
node = node.right;
}
return true;
}
Ideas :
BSTree In the middle order traversal of , The value of the previous node to be traversed must be less than the value of the next node to be traversed , Therefore, a node that stores the value of the previous traversed node is added prev Variables for comparison
This scheme is based on the understanding of the iterative method of middle order traversal , If a little partner doesn't know , And I want to know more about the explanation idea of middle order traversal iteration , Sure Click here to jump
边栏推荐
- Eight super classic pointer interview questions (3000 words in detail)
- RobotFramework入门(二)appUI自动化之app启动
- 如何精准识别主数据?
- Daily question brushing plan-2-13 fingertip life
- I sorted out a classic interview question for my job hopping friends
- 4. File modification
- Differences and application scenarios between resulttype and resultmap
- Master data management theory and Practice
- Communication between microservices
- My C language learning record (blue bridge) -- under the pointer
猜你喜欢
JS regular filtering and adding image prefixes in rich text
Huawei, H3C, Cisco command comparison, mind map form from the basic, switching, routing three directions [transferred from wechat official account network technology alliance station]
Which ecology is better, such as Mi family, graffiti, hilink, zhiting, etc? Analysis of five mainstream smart brands
微服务注册与发现
BUUCTF刷题笔记——[极客大挑战 2019]EasySQL 1
Era5 reanalysis data download strategy
Misc (eternal night), the preliminary competition of the innovation practice competition of the National College Students' information security competition
【 kubernets series】 a Literature Study on the Safe exposure Applications of kubernets Service
Linear regression and logistic regression
Eight super classic pointer interview questions (3000 words in detail)
随机推荐
tcpdump: no suitable device found
Derivation of anti Park transform and anti Clarke transform formulas for motor control
C语言sizeof和strlen的区别
Communication between microservices
IPv6 jobs
Pure QT version of Chinese chess: realize two-man, man-machine and network games
[network security interview question] - how to penetrate the test file directory through
Microsoft speech synthesis assistant v1.3 text to speech tool, real speech AI generator
淘宝焦点图布局实战
[kubernetes series] learn the exposed application of kubernetes service security
Yyds dry inventory comparison of several database storage engines
How to accurately identify master data?
纯Qt版中国象棋:实现双人对战、人机对战及网络对战
Function knowledge points
Daily question brushing plan-2-13 fingertip life
微服务间通信
ERA5再分析资料下载攻略
如何精准识别主数据?
Summary of Bible story reading
resulttype和resultmap的区别和应用场景