Codeforces Round #345 (Div. 1) E. Clockwork Bomb 并查集
E. Clockwork Bomb
题目连接:
http://www.codeforces.com/contest/650/problem/E
Description
My name is James diGriz, I'm the most clever robber and treasure hunter in the whole galaxy. There are books written about my adventures and songs about my operations, though you were able to catch me up in a pretty awkward moment.
I was able to hide from cameras, outsmart all the guards and pass numerous traps, but when I finally reached the treasure box and opened it, I have accidentally started the clockwork bomb! Luckily, I have met such kind of bombs before and I know that the clockwork mechanism can be stopped by connecting contacts with wires on the control panel of the bomb in a certain manner.
I see n contacts connected by n - 1 wires. Contacts are numbered with integers from 1 to n. Bomb has a security mechanism that ensures the following condition: if there exist k ≥ 2 contacts c1, c2, ..., ck forming a circuit, i. e. there exist k distinct wires between contacts c1 and c2, c2 and c3, ..., ck and c1, then the bomb immediately explodes and my story ends here. In particular, if two contacts are connected by more than one wire they form a circuit of length 2. It is also prohibited to connect a contact with itself.
On the other hand, if I disconnect more than one wire (i. e. at some moment there will be no more than n - 2 wires in the scheme) then the other security check fails and the bomb also explodes. So, the only thing I can do is to unplug some wire and plug it into a new place ensuring the fact that no circuits appear.
I know how I should put the wires in order to stop the clockwork. But my time is running out! Help me get out of this alive: find the sequence of operations each of which consists of unplugging some wire and putting it into another place so that the bomb is defused.
Input
The first line of the input contains n (2 ≤ n ≤ 500 000), the number of contacts.
Each of the following n - 1 lines contains two of integers xi and yi (1 ≤ xi, yi ≤ n, xi ≠ yi) denoting the contacts currently connected by the i-th wire.
The remaining n - 1 lines contain the description of the sought scheme in the same format.
It is guaranteed that the starting and the ending schemes are correct (i. e. do not contain cicuits nor wires connecting contact with itself).
Output
The first line should contain k (k ≥ 0) — the minimum number of moves of unplugging and plugging back some wire required to defuse the bomb.
In each of the following k lines output four integers ai, bi, ci, di meaning that on the i-th step it is neccesary to unplug the wire connecting the contacts ai and bi and plug it to the contacts ci and di. Of course the wire connecting contacts ai and bi should be present in the scheme.
If there is no correct sequence transforming the existing scheme into the sought one, output -1.
Sample Input
3
1 2
2 3
1 3
3 2
Sample Output
1
1 2 1 3
Hint
题意
给你两棵树,你只能操作第一棵树,你每次操作是删除一条边,加一条边
但是都不能构成环,然后问你最少多少步。
题解:
可以强行用LCT做动态最小生成树无脑肝过去就好了。
我推荐rng58的做法:
我们从第一棵树的dfs顺序开始考虑,做到第u个点了,v是u的父亲,如果边(v,u)存在在第二棵树,显然我们就不用动这条边。否则的话,我们将u点连向第二棵树u点的父亲fa[u]就好了。
现在有一个问题,如果第二棵树中u点已经连了父亲fa[u]了,怎么办?
把(u,w)这条边变成(find(u),fa[find(u)])就好了。find是并查集,找到第一个在第一棵树不和自己第二棵树fa[u]相连接的点。
代码
#include<bits/stdc++.h>
using namespace std;
const int maxn = 5e5+7;
vector<int> E[2][maxn];
int fa[2][maxn];
int father[maxn];
int tot=0;
int ans[maxn][4];
void addans(int x,int y,int z,int p)
{
    ans[tot][0]=x,ans[tot][1]=y,ans[tot][2]=z,ans[tot][3]=p;
    tot++;
}
int fi(int u){
    return u != father[u] ? father[u] = fi( father[u] ) : u;
}
bool check(int id,int x,int y)
{
    if(x==0||y==0)return false;
    if(fa[id][x]==y||fa[id][y]==x)return true;
    return false;
}
void dfs(int id,int x,int f)
{
    fa[id][x]=f;
    for(int i=0;i<E[id][x].size();i++)
    {
        int v = E[id][x][i];
        if(v==f)continue;
        dfs(id,v,x);
    }
}
void solve(int x,int f)
{
    for(int i=0;i<E[0][x].size();i++)
    {
        int v = E[0][x][i];
        if(v==f)continue;
        solve(v,x);
        if(fa[1][v]!=x&&fa[1][x]!=v)
        {
            int p = fi(v);
            addans(x,v,p,fa[1][p]);
        }
    }
}
int main()
{
    int n;
    scanf("%d",&n);
    for(int i=1;i<n;i++)
    {
        int x,y;scanf("%d%d",&x,&y);
        E[0][x].push_back(y);
        E[0][y].push_back(x);
    }
    for(int i=1;i<n;i++)
    {
        int x,y;scanf("%d%d",&x,&y);
        E[1][x].push_back(y);
        E[1][y].push_back(x);
    }
    dfs(0,1,0);
    dfs(1,1,0);
    for(int i=1;i<=n;i++)
    {
        if(!check(0,i,fa[1][i]))
            father[i]=i;
        else
            father[i]=fa[1][i];
    }
    solve(1,0);
    cout<<tot<<endl;
    for(int i=0;i<tot;i++,cout<<endl)
        for(int j=0;j<4;j++)
            printf("%d ",ans[i][j]);
}												
											Codeforces Round #345 (Div. 1) E. Clockwork Bomb 并查集的更多相关文章
- Codeforces Round #345 (Div. 2) E. Table Compression 并查集
		
E. Table Compression 题目连接: http://www.codeforces.com/contest/651/problem/E Description Little Petya ...
 - Codeforces Round #345 (Div. 2)      E. Table Compression    并查集+智商题
		
E. Table Compression time limit per test 4 seconds memory limit per test 256 megabytes input standar ...
 - Codeforces Round #345 (Div. 1) C. Table Compression (并查集)
		
Little Petya is now fond of data compression algorithms. He has already studied gz, bz, zip algorith ...
 - Codeforces Round #245 (Div. 2) B. Balls Game 并查集
		
B. Balls Game Time Limit: 1 Sec Memory Limit: 256 MB 题目连接 http://codeforces.com/contest/430/problem ...
 - Codeforces Round #603 (Div. 2) D. Secret Passwords 并查集
		
D. Secret Passwords One unknown hacker wants to get the admin's password of AtForces testing system, ...
 - Codeforces Round #600 (Div. 2) D题【并查集+思维】
		
题意:给你n个点,m条边,然后让你使得这个这个图成为一个协和图,需要加几条边.协和图就是,如果两个点之间有一条边,那么左端点与这之间任意一个点之间都要有条边. 思路:通过并查集不断维护连通量的最大编号 ...
 - Codeforces Round #600 (Div. 2) - D. Harmonious Graph(并查集)
		
题意:对于一张图,如果$a$与$b$连通,则对于任意的$c(a<c<b)$都有$a$与$c$连通,则称该图为和谐图,现在给你一张图,问你最少添加多少条边使图变为和谐图. 思路:将一个连通块 ...
 - Codeforces Round #582 (Div. 3)  G. Path Queries  (并查集计数)
		
题意:给你带边权的树,有\(m\)次询问,每次询问有多少点对\((u,v)\)之间简单路径上的最大边权不超过\(q_i\). 题解:真的想不到用最小生成树来写啊.... 我们对边权排序,然后再对询问的 ...
 - cf之路,1,Codeforces Round #345 (Div. 2)
		
cf之路,1,Codeforces Round #345 (Div. 2) ps:昨天第一次参加cf比赛,比赛之前为了熟悉下cf比赛题目的难度.所以做了round#345连试试水的深浅..... ...
 
随机推荐
- sqlmap参数说明
			
--delay 设置每隔几秒测试一次注入 --safe-url 设置sqlmap要访问的正常url --safe-freq 设置每测试多少条注入语句后才去访问safe-url --code 设置能正常 ...
 - perl HTML::LinkExtor模块(1)
			
use LWP::Simple; use HTML::LinkExtor; $html = get("http://www.baidu.com"); $link = HTML::L ...
 - 某labs上传writeup-上传漏洞总结
			
github:https://github.com/d0ef/upload-labs 第一题:通过JS判断的直接抓包改了就ok. 第二题:只要Content-Type信息为图片的就可以 第三题:通过上 ...
 - 通用套接字选项和TCP套接字选项
			
1. 套接字选项函数原型: #include <sys/socket.h> int getsockopt(int sockfd, int level, int optname, void ...
 - VPS性能综合测试(7):服务器压力测试,VPS系统负载测试
			
1.可能有的VPS主机使用性能测评工具得出的结果很优秀,但是最终运用到实际生产时却发现VPS主机根本无法承受理论上应该达到的流量压力,这时我们就不得不要怀疑VPS商是不是对VPS主机的参数进行了“篡改 ...
 - ArcGIS Server配置端口
			
写在前面,GIS服务器必须连通到外网,基于某些情况,可能一个机组有多态服务器,担任不同的角色,有Web服务器.数据库服务器和GIS服务器等,但是可能购买时只有一个外网IP,这样是不行的.JS脚本运行在 ...
 - Java初次见面
			
1.Java语言特点(运行环境JRE[操作系统,api,dll]): a.跨平台:Java自带的虚拟机很好地实现了跨平台性.Java源程序代码经过编译后生成二进制的字节码是与平台无关的,但是可被Jav ...
 - 使用 Visual Studio 部署 .NET Core 应用 ——.Net Core 部署到Ubuntu 16.04
			
.Net Core 部署到Ubuntu 16.04 中的步骤 1.安装工具 1.apache 2..Net Core(dotnet-sdk-2.0) 3.Supervisor(进程管理工具,目的是服务 ...
 - HIbernate学习笔记1 之 简介
			
一.Hibernate的概念 hibernate是数据访问层的框架,对JDBC进行了封装,是针对数据库访问提出的面向对象的解决方案.使用它可以直接访问对象,自动将此访问转换为SQL执行,从而达到间接访 ...
 - 关于在C#中对函数重载理解
			
函数重载是个什么概念,才接触的这个概念的时候我也是完全昏了,还在自己看看了书后就理解了.那什么是函数重载呢?我个人理解的是在同一个作用域下有多个同名的函数,但是他们的形参的类型是不同的,或者参数个数是 ...