• HDU


    As two icons of the Great Depression, Bonnie and Clyde represent the ultimate criminal couple. Stories were written, headlines captured, and films were made about the two bank robbers known as Romeo and Juliet in a getaway car. 

    The new generation of Bonnie and Clyde is no longer cold-blooded killers with guns. Due to the boom of internet, they turn to online banks and scheme to hack the safety system. The safety system consists of a number of computers connected by bidirectional cables. Since time is limited, they decide that they will attack exactly two computers A and B in the network, and as a result, other computers won't be able to transmit messages via A and B . The attack is considered successful if there are at least two computers (other than A and B ) that disconnected after the attack. 

    As they want to minimize the risk of being captured, they need to find the easiest way to destroy the safety system. However, a brief study of the network indicates that there are many ways to achieve their objective; therefore they kidnapped the computer expert, you, to help with the calculation. To simplify the problem, you are only asked to tell them how many ways there are to destroy the safety system.

    InputThere are multiple test cases in the input file. Each test case starts with two integers N (3<=N<=1000) and M (0<=M<=10000) , followed by M lines describing the connections between the N computers. Each line contains two integers A , B (1<=A, B<=N) , which indicates that computer A and B are connected by a bidirectional cable. 

    There is a blank line between two successive test cases. A single line with N = 0 and M = 0 indicates the end of input file.OutputFor each test case, output one integer number representing the ways to destroy the safety system in the format as indicated in the sample output.Sample Input

    4 4
    1 2
    2 3
    3 4
    4 1
    
    7 9
    1 2
    1 3
    2 3
    3 4
    3 5
    4 5
    5 6
    5 7
    6 7
    
    0 0

    Sample Output

    Case 1: 2 
    Case 2: 11


    题意:
    删除两个点,使图不联通,求方案数.
    思路:
    枚举第一个点,用割点判断第二点就行了.
    注意删除第一个点之后剩下联通块内部点的个数为1的情况.

    #include<iostream>
    #include<algorithm>
    #include<vector>
    #include<stack>
    #include<queue>
    #include<map>
    #include<set>
    #include<cstdio>
    #include<cstring>
    #include<cmath>
    #include<ctime>
    
    #define fuck(x) cerr<<#x<<" = "<<x<<endl;
    #define debug(a, x) cerr<<#a<<"["<<x<<"] = "<<a[x]<<endl;
    #define ls (t<<1)
    #define rs ((t<<1)|1)
    using namespace std;
    typedef long long ll;
    typedef unsigned long long ull;
    const int maxn = 10086;
    const int maxm = 200086;
    const int inf = 0x3f3f3f3f;
    const ll Inf = 999999999999999999;
    const int mod = 1000000007;
    const double eps = 1e-6;
    const double pi = acos(-1);
    
    int Head[maxn],cnt;
    struct edge{
        int Next,v;
    }e[maxm];
    void add_edge(int u,int v){
        e[cnt].Next=Head[u];
        e[cnt].v=v;
        Head[u]=cnt++;
    }
    
    int Index = 0;
    int dfn[maxn], low[maxn], root;
    bool vis[maxn];
    int exc,num;
    void dfs(int cur, int father) {
        if(cur==exc){ return;}
        num++;
        int child = 0;
        Index++;
        dfn[cur] = Index;
        low[cur] = Index;
        for (int k = Head[cur]; k != -1; k = e[k].Next) {
            if(e[k].v==exc){ continue;}
            if (dfn[e[k].v] == 0) {
                child++;
                dfs(e[k].v, cur);
                low[cur] = min(low[cur], low[e[k].v]);
                if (cur != root && low[e[k].v] >= dfn[cur]) {
                    if(!vis[cur]){
                        vis[cur]=true;
                    }
                }
                if (cur == root && child == 2) {
                    if(!vis[cur]){
                        vis[cur]=true;
                    }
                }
            } else if (e[k].v != father) {
                low[cur] = min(low[cur], dfn[e[k].v]);
            }
        }
    }
    
    
    int main() {
    //    ios::sync_with_stdio(false);
    //    freopen("in.txt", "r", stdin);
    
        int n,m;
        int cases=0;
        while (scanf("%d%d",&n,&m)!=EOF&&(n||m)){
            cases++;
            exc=cnt=Index=0;
            memset(Head,-1, sizeof(Head));
            memset(dfn,0,sizeof(dfn));
            memset(vis,0,sizeof(vis));
            for(int i=1;i<=m;i++){
                int x,y;
                scanf("%d%d",&x,&y);
                add_edge(x,y);
                add_edge(y,x);
            }
    
            int ans=0;
            for(int i=1;i<=n;i++) {
                memset(dfn, 0, sizeof(dfn));
                memset(vis, 0, sizeof(vis));
                Index=0;
                exc = i;
                int d1,d2;
                int tot = 0;
                dfn[exc]=-1;
                d1=d2=-1;
                for(int j=1;j<=n;j++){
                    if(!dfn[j]&&j!=exc){
                        tot++;
                        root=j;
                        num=0;
                        dfs(j,j);
                        if(d1==-1)d1=num;
                        else d2=num;
                    }
                }
                if(tot==1){//如果删除的点不是割点,那么和它组合的一定是割点(删除之后)
                    for(int j=1;j<=n;j++){
                        ans+=vis[j];
                    }
                }else if(tot==2){//这个点是割点,而且把原图分为了两部分
                    if(d1==d2&&d1==1){
                        ans+=0;
                    }//如果两部分的点数都是1,那么对答案没有贡献
                    else if(d1==1||d2==1){ans+=n-2;}//有一个是1,就不能删除那个独苗
                    else ans+=n-1;//既然都不是1,那就可以随便删除
                }else{
                    ans+=n-1;//有三块,可以任意删除
                }
            }printf("Case %d: %d
    ",cases,ans/2);
    
        }
    
        return 0;
    }
    View Code
  • 相关阅读:
    逆向笔记——PE文件相对虚拟地址(RVA)转文件偏移地址(FOA)
    逆向笔记——在PE任意一个节中添加代码
    FFT的物理意义
    Hilbert-Huang Transform: matlab 希尔伯特-黄变换: matlab实现
    交叉验证 Cross validation
    AAL template: ROI to brain lobe
    Types of intraclass correlation coefficience (ICC)
    统计:P值 & α值
    Notes: sensitivity & specificity
    Meet Github
  • 原文地址:https://www.cnblogs.com/ZGQblogs/p/11195980.html
Copyright © 2020-2023  润新知