当前位置:网站首页>7.5 simulation summary
7.5 simulation summary
2022-07-05 23:57:00 【Flame*】
I can't hold it Forget to open a place longlong One place forgot to take the mold Break defense Break defense
Time arrangement
1.00-3.00
Look at the question Then I thought about T1 The last two gears won't Everything else is made up
T2 Pushing for a long time still only leads to violence
T3 No idea
3.00-4.30
T1
4.30-5.00
Another push T2 But it will only be violent
5.00-5.50
Thought about it for a while T3 Then write it out and find it false Then I thought This thing and a The value of has nothing to do with The number of occurrences should be a combined number But there is no time to push
Topic analysis
T1
First of all, you can think of n 2 n^2 n2 How to do it : l , r l,r l,r At most n position ( Otherwise, it is impossible to combine the answers ) And the carry will not exceed 16, So subtract the offset and then simulate the violence
Then consider a Smaller approach
You can build a segment tree Then maintain all left endpoints for a right endpoint You can notice that the value on the line segment tree must not increase
Then there will only be 50 Kind of a k a^k ak
After enumeration, it can be divided into two parts on the line segment tree to determine whether it exists and find the corresponding interval length
It feels that the positive solution should be in the sense of modulus balabalabalaba But I don't know how to do this better ( Not sure 2 k 2^k 2k)
T2
Don't understand, don't understand, don't understand If I ask for the last and I will do )
T3
At first, I made up a greedy conclusion I found something wrong after writing it
There is no network flow ( It's impossible to determine the left and right points like the general matching
But you can feel it when you write This thing and a irrelevant It's a combination number. It should
边栏推荐
- Bao Yan notes II software engineering and calculation volume II (Chapter 13-16)
- 有什么不起眼却挣钱的副业?
- 【luogu P3295】萌萌哒(并查集)(倍增)
- "14th five year plan": emphasis on the promotion of electronic contracts, electronic signatures and other applications
- Do you regret becoming a programmer?
- 妙才周刊 - 8
- wx.getLocation(Object object)申请方法,最新版
- The difference of time zone and the time library of go language
- GD32F4xx uIP协议栈移植记录
- Redis high availability - master-slave replication, sentinel mode, cluster
猜你喜欢
The difference of time zone and the time library of go language
Senparc.Weixin.Sample.MP源码剖析
FFT 学习笔记(自认为详细)
【NOI模拟赛】Anaid 的树(莫比乌斯反演,指数型生成函数,埃氏筛,虚树)
开源crm客户关系统管理系统源码,免费分享
Transport layer protocol ----- UDP protocol
用列表初始化你的vector&&initializer_list简介
Zero rhino technology joined hands with the intelligence Club: the "causal faction" forum was successfully held, and the "causal revolution" brought the next generation of trusted AI
Zhongjun group launched electronic contracts to accelerate the digital development of real estate enterprises
【在线聊天】原来微信小程序也能回复Facebook主页消息!
随机推荐
教你在HbuilderX上使用模拟器运行uni-app,良心教学!!!
第16章 OAuth2AuthorizationRequestRedirectWebFilter源码解析
俄外交部:日韩参加北约峰会影响亚洲安全稳定
15 MySQL-存储过程与函数
There is no network after configuring the agent by capturing packets with Fiddler mobile phones
Initialize your vector & initializer with a list_ List introduction
Which side projects can be achieved? Is it difficult for we media to earn more than 10000 a month?
Configuring OSPF load sharing for Huawei devices
4 points tell you the advantages of the combination of real-time chat and chat robots
Open3D 点云随机添加噪声
哪些偏门项目可以做到?自媒体做到月赚一万以上很难吗?
激光slam学习记录
Huawei equipment is configured with OSPF and BFD linkage
Detailed explanation of APP functions of door-to-door appointment service
Chapter 16 oauth2authorizationrequestredirectwebfilter source code analysis
云呐|公司固定资产管理系统有哪些?
Senparc. Weixin. Sample. MP source code analysis
同事悄悄告诉我,飞书通知还能这样玩
FFT 学习笔记(自认为详细)
C file and folder operation