Welcome to Yumao′s Blog.
ZOJ Problem Set – 1350 The Drunk Jailer
, 2011年03月21日 , C Language , 评论 在〈ZOJ Problem Set – 1350 The Drunk Jailer〉中留言功能已關閉 ,

其實算是簡單題吧
用組數模擬下就出來了- –
哈。

The Drunk Jailer
Time Limit: 1 Second Memory Limit: 32768 KB
A certain prison contains a long hall of n cells, each right next to each other. Each cell has a prisoner in it, and each cell is locked.

One night, the jailer gets bored and decides to play a game. For round 1 of the game, he takes a drink of whiskey, and then runs down the hall unlocking each cell. For round 2, he takes a drink of whiskey, and then runs down the hall locking every other cell (cells 2, 4, 6, …). For round 3, he takes a drink of whiskey, and then runs down the hall. He visits every third cell (cells 3, 6, 9, …). If the cell is locked, he unlocks it; if it is unlocked, he locks it. He repeats this for n rounds, takes a final drink, and passes out.
(閱讀全文…)

关键字:, , , ,
Zoj2966 Build The Electric System
, 2010年04月13日 , C Language , 评论 在〈Zoj2966 Build The Electric System〉中留言功能已關閉 ,
Build The Electric System
Time Limit: 1 Second      Memory Limit: 32768 KB

In last winter, there was a big snow storm in South China. The electric system was damaged seriously. Lots of power lines were broken and lots of villages lost contact with the main power grid. The government wants to reconstruct the electric system as soon as possible. So, as a professional programmer, you are asked to write a program to calculate the minimum cost to reconstruct the power lines to make sure there's at least one way between every two villages.

Input

ZOJ Problem Set – 1006 Do the Untwist
, 2010年04月04日 , C Language , 评论 在〈ZOJ Problem Set – 1006 Do the Untwist〉中留言功能已關閉 ,
Do the Untwist

——————————————————————————–

Time Limit: 1 Second      Memory Limit: 32768 KB

——————————————————————————–

Cryptography deals with methods of secret communication that transform a message (the plaintext) into a disguised form (the ciphertext) so that no one seeing the ciphertext will be able to figure out the plaintext except the intended recipient. Transforming the plaintext to the ciphertext is encryption; transforming the ciphertext to the plaintext is decryption. Twisting is a simple encryption method that requires that the sender and recipient both agree on a secret key k, which is a positive integer.

The twisting method uses four arrays: plaintext and ciphertext are arrays of characters, and plaincode and ciphercode are arrays of integers. All arrays are of length n, where n is the length of the message to be encrypted. Arrays are origin zero, so the elements are numbered from 0 to n – 1. For this problem all messages will contain only lowercase letters, the period, and the underscore (representing a space).

(閱讀全文…)

关键字:, , , , , , ,
分页 (1): 1