The graph is called tree if it is connected and has no cycles. Suppose the tree is rooted at some vertex. Then tree is called to be perfect k k -ary tree if each vertex is either a leaf (has no children) or has exactly k k children. Also, in perfect k k -ary tree all leafs must have same depth.

For example, the picture below illustrates perfect binary tree with 15 15 vertices:

There is a perfect k k -ary tree with n n nodes. The nodes are labeled with distinct integers from 1 1 to n n , however you don't know how nodes are labelled. Still, you want to find the label of the root of the tree.

You are allowed to make at most 60⋅n 60⋅n queries of the following type:

  • "? a a b b c c ", the query returns "Yes" if node with label b b lies on the path from a a to c c and "No" otherwise.

Both a a and c c are considered to be lying on the path from a a to c c .

When you are ready to report the root of the tree, print

  • "! s s ", where s s is the label of the root of the tree.

It is possible to report the root only once and this query is not counted towards limit of 60⋅n 60⋅n queries.

Interaction

The first line of the standard input stream contains two integers n n and k k (3≤n≤1500 3≤n≤1500 , 2≤k<n 2≤k<n ) — the number of nodes in the tree and the value of k k .

It is guaranteed that n n is such that the tree forms a perfect k k -ary tree.

You can ask at most 60⋅n 60⋅n queries. To ask a query, print a line of form "? a a b b c c ", where 1≤a,b,c≤n 1≤a,b,c≤n . After that you should read a single line containing "Yes" or "No" depending on the answer of the query.

The tree is fixed for each test and it doesn't depend on your queries.

When you are ready to print the answer, print a line of the form "! s s ", where s s is the label of the root vertex and then terminate your program.

After printing each query do not forget to print end of line and flush the output. Otherwise you may get Idleness limit exceeded. To do this, use:

  • fflush(stdout) or cout.flush() in C++;
  • System.out.flush() in Java;
  • flush(output) in Pascal;
  • stdout.flush() in Python;
  • See documentation for other languages.

In case your program will make more than 60⋅n 60⋅n queries, but in other aspects would follow the interaction protocol and terminate coorectly, it will get verdict «Wrong Answer».

Hacks

To hack the solution use the following test format:

The first line should contain integers n n and k k (3≤n≤1500 3≤n≤1500 , 2≤k≤1500 2≤k≤1500 ) — the number of vertices and the k k parameter of the tree.

Of course, the value of n n must correspond to the size of the valid k k -ary tree of some depth.

The second line should contain a 1 ,a 2 ,…,a n  a1,a2,…,an (1≤a i ≤n 1≤ai≤n ) — the labels of the tree in the natural order, all labels must be distinct.

Let's call the following ordering of the tree vertices to be natural: first the root of the tree goes, then go all vertices on depth of one edge from root, ordered from left to right, then go all vertices on depth of two edges from root, ordered from left to right, and so on until the maximum depth.

This way, the a 1  a1 is the answer for the hack.

Example

Input
3 2

No

Yes
Output
? 1 3 2

? 1 2 3

! 2

Note

The tree in the example is as follows:

The input and output for example illustrate possible interaction on that test (empty lines are inserted only for clarity).

The hack corresponding to the example would look like:

3 2
2 3 1

题目:给定一个完全K叉树,节点数的N(其实的告诉了高度D,K没什么用),交互,可以询问(?,a,b,c),回答b是否再a到c的路径上,求根节点。

思路:我们先求出两个叶子节点X,Y,然后然他们之间的节点个数,如果=2D-1,则说明根在路径上,然后我们去试探路径上的点,如果这个点到X和Y的距离都是D,说明是根。

复杂度:首先得到一个根的概率是1/2;其次经过根节点的概率大于3/4; 每次的复杂度是O(N),次数显然小于60次;

#include<bits/stdc++.h>
#define rep(i,a,b) for(int i=a;i<=b;i++)
using namespace std;
const int maxn=;
int D,N,K,p[maxn],cnt; char s[];
int getleaf()
{
while(){
int x=(rand()%N)+,y=,F=; if(x==) y=;
rep(i,,N){
if(i==x) continue;
cout<<"?"<<" "<<i<<" "<<x<<" "<<y<<endl;
cin>>s;
if(s[]=='Y') {F=; break;}
}
if(!F) return x;
}
}
int getnum(int x,int y,int opt) //opt==1的时候记录路径
{
int num=; if(opt) cnt=;
rep(i,,N){
cout<<"?"<<" "<<x<<" "<<i<<" "<<y<<endl;
cin>>s;
if(s[]=='Y') {
num++; if(opt) p[++cnt]=i;
}
}
return num;
}
int main()
{
scanf("%d%d",&N,&K);
int tmp=,D=,tK=;while(tmp<N) tK*=K,tmp+=tK,D++;
while(true){
int x=getleaf();
int y=getleaf();
while(y==x) y=getleaf();
if(getnum(x,y,)!=D+D-) continue;
rep(i,,cnt) {
if(getnum(p[i],x,)==D){
cout<<"!"<<" "<<p[i]<<endl;
return ;
}
}
}
return ;
}

CF1061F:Lost Root(交互&概率)的更多相关文章

  1. Android DRM

    最近在了解Android DRM相关的一些知识,下面转一个ARM大佬分享的内容: 前言 本文简略地介绍了如何在Android下实现DRM(Digital Rights Management, 数字版权 ...

  2. PRML读书会第八章 Graphical Models(贝叶斯网络,马尔科夫随机场)

    主讲人 网神 (新浪微博: @豆角茄子麻酱凉面) 网神(66707180) 18:52:10 今天的内容主要是: 1.贝叶斯网络和马尔科夫随机场的概念,联合概率分解,条件独立表示:2.图的概率推断in ...

  3. (转)Python实例手册

    原文地址:http://hi.baidu.com/quanzhou722/item/cf4471f8e23d3149932af2a7 实在是太好的资料了,不得不转 python实例手册 #encodi ...

  4. 转载 python实例手册

    python实例手册 #encoding:utf8# 设定编码-支持中文 0说明 手册制作: 雪松 更新日期: 2013-12-19 欢迎系统运维加入Q群: 198173206 # 加群请回答问题 请 ...

  5. 【转载】python实例手册

    今天写爬虫的时候遇到了问题,在网上不停地查找资料,居然碰到两篇好文章: 1.python实例手册   作者:没头脑的土豆 另一篇在这:shell实例手册 python实例手册 #encoding:ut ...

  6. Huffman编码实现文件的压缩与解压缩。

    以前没事的时候写的,c++写的,原理很简单,代码如下: #include <cstdio> #include <cstdlib> #include <iostream&g ...

  7. Python实例手册

    在电脑中突然发现一个这么好的资料,雪松大神制作,不敢独享,特与大家共享.连他的广告也一并复制了吧! python实例手册 #encoding:utf8 # 设定编码-支持中文 0说明 手册制作: 雪松 ...

  8. GPU加速:宽深度推理

    GPU加速:宽深度推理 Accelerating Wide & Deep Recommender Inference on GPUs 推荐系统推动了许多最流行的在线平台的参与.随着为这些系统提 ...

  9. Kali2搭建Metasploitable3靶机

    Metasploitable3简介 Metasploitable3是Metasploitable2的升级版本,它是一个虚拟靶机系统,里面含有大量未被修复的安全漏洞,它主要是用于metasploit-f ...

随机推荐

  1. 4.7 Routing -- Redirecting

    一.Transitioning and Redirection 从一个route调用transitionTo或者从一个controller调用transitionToRoute将会停止任何进程中的任何 ...

  2. SQL Server与Oracle对表添加列的不同点

    逛了博客园两年有余,不知道该发表些什么.要么觉得自己太菜,要么觉得要发的内容都可以搜索到,发表了还颇有抄袭味道.想想后都不得了之了. 搞了开发快一年了,有时候零零碎碎的东西需要整理一下,梳理后才能做到 ...

  3. ng-深度学习-课程笔记-10: 机器学习策略2(Week2)

    1 误差分析( Carrying out error analysis ) 假设你训练了一个猫的二分类模型,在开发集上的错误率是10%,你想分析这10%的错误率来自哪里,怎么做呢? 先把这些错分的图片 ...

  4. springcloud15---zuul-fallback

    package com.itmuch.cloud; import org.springframework.boot.SpringApplication; import org.springframew ...

  5. centos6.5/6.6配置java环境以及数据库

    配置java环境 一.解压jdk 二.配置环境变量 1.修改修改/etc/profile文件(推荐开发环境使用,因为所有用户shell都有权使用这些环境变量,可能带来环境问题) 在profile末尾加 ...

  6. selenium+java破解滑动验证码

    2019-04-16更新 修复极验页面改版,这次采用极验官方的demo地址:https://www.geetest.com/demo/slide-bind.html 截止2019-04-16,极验和腾 ...

  7. Django:用户登录实例

    Django:用户登录实例 一.源代码 1,login.html代码(登录界面): <!DOCTYPE html> <html lang="zh-CN"> ...

  8. Spring注解@Value

    本文参考自: https://blog.csdn.net/ryelqy/article/details/77453713 @Value能让我们在java代码中使用property文件的属性,使用@Va ...

  9. linux及安全《Linux内核设计与实现》第四章——20135227黄晓妍

    第四章 进程调度 进程调度程序是一个内核子系统 分配有限的处理器时间和资源 最大限度利用时间的原则(只要有可执行的进程,那么总会有进程执行) 基本工作:从一组处于等待(阻塞)状态的可执行进程中选择一个 ...

  10. KALI视频学习31-35

    (三十一)Kali漏洞利用之SET Social Enginnering Toolkit(SET)是一个开源.Python驱动的社会工程学渗透测试工具,提供了非常丰富的攻击向量库.是开源的社会工程学套 ...