The graph is called tree if it is connected and has no cycles. Suppose the tree is rooted at some vertex. Then tree is called to be perfect k k -ary tree if each vertex is either a leaf (has no children) or has exactly k k children. Also, in perfect k k -ary tree all leafs must have same depth.

For example, the picture below illustrates perfect binary tree with 15 15 vertices:

There is a perfect k k -ary tree with n n nodes. The nodes are labeled with distinct integers from 1 1 to n n , however you don't know how nodes are labelled. Still, you want to find the label of the root of the tree.

You are allowed to make at most 60⋅n 60⋅n queries of the following type:

  • "? a a b b c c ", the query returns "Yes" if node with label b b lies on the path from a a to c c and "No" otherwise.

Both a a and c c are considered to be lying on the path from a a to c c .

When you are ready to report the root of the tree, print

  • "! s s ", where s s is the label of the root of the tree.

It is possible to report the root only once and this query is not counted towards limit of 60⋅n 60⋅n queries.

Interaction

The first line of the standard input stream contains two integers n n and k k (3≤n≤1500 3≤n≤1500 , 2≤k<n 2≤k<n ) — the number of nodes in the tree and the value of k k .

It is guaranteed that n n is such that the tree forms a perfect k k -ary tree.

You can ask at most 60⋅n 60⋅n queries. To ask a query, print a line of form "? a a b b c c ", where 1≤a,b,c≤n 1≤a,b,c≤n . After that you should read a single line containing "Yes" or "No" depending on the answer of the query.

The tree is fixed for each test and it doesn't depend on your queries.

When you are ready to print the answer, print a line of the form "! s s ", where s s is the label of the root vertex and then terminate your program.

After printing each query do not forget to print end of line and flush the output. Otherwise you may get Idleness limit exceeded. To do this, use:

  • fflush(stdout) or cout.flush() in C++;
  • System.out.flush() in Java;
  • flush(output) in Pascal;
  • stdout.flush() in Python;
  • See documentation for other languages.

In case your program will make more than 60⋅n 60⋅n queries, but in other aspects would follow the interaction protocol and terminate coorectly, it will get verdict «Wrong Answer».

Hacks

To hack the solution use the following test format:

The first line should contain integers n n and k k (3≤n≤1500 3≤n≤1500 , 2≤k≤1500 2≤k≤1500 ) — the number of vertices and the k k parameter of the tree.

Of course, the value of n n must correspond to the size of the valid k k -ary tree of some depth.

The second line should contain a 1 ,a 2 ,…,a n  a1,a2,…,an (1≤a i ≤n 1≤ai≤n ) — the labels of the tree in the natural order, all labels must be distinct.

Let's call the following ordering of the tree vertices to be natural: first the root of the tree goes, then go all vertices on depth of one edge from root, ordered from left to right, then go all vertices on depth of two edges from root, ordered from left to right, and so on until the maximum depth.

This way, the a 1  a1 is the answer for the hack.

Example

Input
3 2

No

Yes
Output
? 1 3 2

? 1 2 3

! 2

Note

The tree in the example is as follows:

The input and output for example illustrate possible interaction on that test (empty lines are inserted only for clarity).

The hack corresponding to the example would look like:

3 2
2 3 1

题目:给定一个完全K叉树,节点数的N(其实的告诉了高度D,K没什么用),交互,可以询问(?,a,b,c),回答b是否再a到c的路径上,求根节点。

思路:我们先求出两个叶子节点X,Y,然后然他们之间的节点个数,如果=2D-1,则说明根在路径上,然后我们去试探路径上的点,如果这个点到X和Y的距离都是D,说明是根。

复杂度:首先得到一个根的概率是1/2;其次经过根节点的概率大于3/4; 每次的复杂度是O(N),次数显然小于60次;

#include<bits/stdc++.h>
#define rep(i,a,b) for(int i=a;i<=b;i++)
using namespace std;
const int maxn=;
int D,N,K,p[maxn],cnt; char s[];
int getleaf()
{
while(){
int x=(rand()%N)+,y=,F=; if(x==) y=;
rep(i,,N){
if(i==x) continue;
cout<<"?"<<" "<<i<<" "<<x<<" "<<y<<endl;
cin>>s;
if(s[]=='Y') {F=; break;}
}
if(!F) return x;
}
}
int getnum(int x,int y,int opt) //opt==1的时候记录路径
{
int num=; if(opt) cnt=;
rep(i,,N){
cout<<"?"<<" "<<x<<" "<<i<<" "<<y<<endl;
cin>>s;
if(s[]=='Y') {
num++; if(opt) p[++cnt]=i;
}
}
return num;
}
int main()
{
scanf("%d%d",&N,&K);
int tmp=,D=,tK=;while(tmp<N) tK*=K,tmp+=tK,D++;
while(true){
int x=getleaf();
int y=getleaf();
while(y==x) y=getleaf();
if(getnum(x,y,)!=D+D-) continue;
rep(i,,cnt) {
if(getnum(p[i],x,)==D){
cout<<"!"<<" "<<p[i]<<endl;
return ;
}
}
}
return ;
}

CF1061F:Lost Root(交互&概率)的更多相关文章

  1. Android DRM

    最近在了解Android DRM相关的一些知识,下面转一个ARM大佬分享的内容: 前言 本文简略地介绍了如何在Android下实现DRM(Digital Rights Management, 数字版权 ...

  2. PRML读书会第八章 Graphical Models(贝叶斯网络,马尔科夫随机场)

    主讲人 网神 (新浪微博: @豆角茄子麻酱凉面) 网神(66707180) 18:52:10 今天的内容主要是: 1.贝叶斯网络和马尔科夫随机场的概念,联合概率分解,条件独立表示:2.图的概率推断in ...

  3. (转)Python实例手册

    原文地址:http://hi.baidu.com/quanzhou722/item/cf4471f8e23d3149932af2a7 实在是太好的资料了,不得不转 python实例手册 #encodi ...

  4. 转载 python实例手册

    python实例手册 #encoding:utf8# 设定编码-支持中文 0说明 手册制作: 雪松 更新日期: 2013-12-19 欢迎系统运维加入Q群: 198173206 # 加群请回答问题 请 ...

  5. 【转载】python实例手册

    今天写爬虫的时候遇到了问题,在网上不停地查找资料,居然碰到两篇好文章: 1.python实例手册   作者:没头脑的土豆 另一篇在这:shell实例手册 python实例手册 #encoding:ut ...

  6. Huffman编码实现文件的压缩与解压缩。

    以前没事的时候写的,c++写的,原理很简单,代码如下: #include <cstdio> #include <cstdlib> #include <iostream&g ...

  7. Python实例手册

    在电脑中突然发现一个这么好的资料,雪松大神制作,不敢独享,特与大家共享.连他的广告也一并复制了吧! python实例手册 #encoding:utf8 # 设定编码-支持中文 0说明 手册制作: 雪松 ...

  8. GPU加速:宽深度推理

    GPU加速:宽深度推理 Accelerating Wide & Deep Recommender Inference on GPUs 推荐系统推动了许多最流行的在线平台的参与.随着为这些系统提 ...

  9. Kali2搭建Metasploitable3靶机

    Metasploitable3简介 Metasploitable3是Metasploitable2的升级版本,它是一个虚拟靶机系统,里面含有大量未被修复的安全漏洞,它主要是用于metasploit-f ...

随机推荐

  1. layer官方演示与讲解(jQuery弹出层插件)

    1. 使用layer遇到困难?Fly社区虔诚为您解惑 2. layer 2.0 发布,以独立形式呈现的最后一个版本 3. Fork layer on Github,爱她,就给她加个星啵 当前版本:2. ...

  2. 数据挖掘-关联分析 Apriori算法和FP-growth 算法

    •1.关联分析概念 关联分析是从大量数据中发现项集之间有趣的关联和相关联系. ​ •定义:1.事务:每一条交易称为一个事务,如上图包含5个事务.2.项:交易的每一个物品称为一个项,例如豆奶,啤酒等. ...

  3. Python Web开发之路

    Flask相关 1.DBUtils数据库连接池 2.Flask之初体验 3.Flask之WTForms 4.Flask之信号 5.Flask之flask-session 6.Flask之flask-s ...

  4. c/c++值传递和引用传递

    今天看数据结构的时候,因为是c语言版的,刚开始学的时候就对指针搞的焦头烂额,今天,发现参数传递的时候,&符号也莫名其妙,搜了一篇好文,转载下来. 一. 函数参数传递机制的基本理论 函数参数传递 ...

  5. 使用 shell 脚本对 Linux 系统和进程资源进行监控

    Shell 简介 Shell 语言对于接触 LINUX 的人来说都比较熟悉,它是系统的用户界面,提供了用户与内核进行交互操作的一种接口.它接收用户输入的命令并把它送入内核去执行.实际上 Shell 是 ...

  6. open-falcon api相关

    本文描述通过被监控endpoint的名称获取该endpoint的eid和监控项,从而获取到该endpoint的监控历史数据,使用python代码的 api操作方法 注:同步open-falcon和ag ...

  7. TED #01#

    Laura Vanderkam: How to gain control of your free time 1.我们总是不缺乏时间去做重要的事情,即便我们再忙; “我没时间” 的同义词是“我不想做” ...

  8. Refactoring #001 Extract Method

    Example public void startup() { ServerSocket serverSocket = null; try { serverSocket = new ServerSoc ...

  9. 2017-2018-1 JaWorld 第三周作业

    2017-2018-1 JaWorld 第三周作业 团队展示 队员学号 队名 团队项目描述 队员风采 团队的特色 团队合照 团队初步合作 前两周的反思与总结 需要改进的地方 团队选题 *采访老师或有开 ...

  10. #include <ntifs.h>出现PEPROCESS redefinition问题处理

    转载:http://blog.csdn.net/ytfrdfiw/article/details/23334297 如果在自己的程序中,即包含ntddk.h和ntifs.h的时候,编译的时候会出现如下 ...