zoj 3777 状压dp

Problem Arrangement

Time Limit: 2 Seconds       Memory Limit: 65536 KB

The 11th Zhejiang Provincial Collegiate Programming Contest is coming! As a problem setter, Edward is going to arrange the order of the problems. As we know, the arrangement will have a great effect on the result of the contest. For example, it will take more time to finish the first problem if the easiest problem hides in the middle of the problem list.

There are N problems in the contest. Certainly, it's not interesting if the problems are sorted in the order of increasing difficulty. Edward decides to arrange the problems in a different way. After a careful study, he found out that the i-th problem placed in the j-th position will add Pij points of "interesting value" to the contest.

Edward wrote a program which can generate a random permutation of the problems. If the total interesting value of a permutation is larger than or equal to M points, the permutation is acceptable. Edward wants to know the expected times of generation needed to obtain the first acceptable permutation.

Input

There are multiple test cases. The first line of input contains an integer T indicating the number of test cases. For each test case:

The first line contains two integers N (1 <= N <= 12) and M (1 <= M <= 500).

The next N lines, each line contains N integers. The j-th integer in the i-th line is Pij (0 <= Pij <= 100).

Output

For each test case, output the expected times in the form of irreducible fraction. An irreducible fraction is a fraction in which the numerator and denominator are positive integers and have no other common divisors than 1. If it is impossible to get an acceptable permutation, output "No solution" instead.

Sample Input
2
3 10
2 4 1
3 2 2
4 5 3
2 6
1 3
2 4
Sample Output
3/1
No solution
求一些数的全排列,求对应的值超过某一个数m的期望
dp[st][c]表示状态st的时候得到分数c的个数。
状态st表示已经放了哪些数,并且将要放第(st中1的个数)个数。
求大于等于m的方案数,可以将大于m的都等价于等于m。
方程 dp[st'][c+ma[j][cnt]]+=dp[st][c]
ma[j][cnt]表示将第j个数放在第cnt个位置上。尼玛终于搞明白了。
#include<cstring>
#include<iostream>
#include<cstdio>
#include<vector>
#include<algorithm>
#include<cmath>
#include<queue>
#include<stack>
#include<string>
#include<cstdlib>
using namespace std;
#define re freopen("in.txt","r",stdin)
#define we freopen("out.txt","w",stdout)
#define maxn 511
#define maxm maxn*maxn/2
#define ll long long
#define ld long double


int ma[15][15];
int dp[1<<12][511];
int gcd(int a,int b)
{
    while(b){
        int t=a%b;
        a=b;
        b=t;
    }
    return a;
}
int main()
{
    int nc;
    re;
    scanf("%d",&nc);
    while(nc--){
        memset(dp,0,sizeof(dp));
        memset(ma,0,sizeof(ma));
        int n,m;
        scanf("%d%d",&n,&m);
        for(int i=0;i<n;i++)
            for(int j=0;j<n;j++)
            scanf("%d",&ma[i][j]);
        dp[0][0]=1;
        int all=1<<n;
        int cnt=0;
        for(int st=0;st<all;st++){
            cnt=0;
            for(int c=0;c<n;c++)
                if(st&(1<<c))cnt++;
            for(int c=0;c<=m;c++){
                if(dp[st][c]){
                    for(int j=0;j<n;j++)
                    if(!(st&(1<<j))){
                        dp[st|(1<<j)][min(m,c+ma[j][cnt])]+=dp[st][c];
                    }
                }
            }
        }
        int ans=dp[all-1][m];
        int b=1;
        for(int j=2;j<=n;j++)
            b*=j;
        int gc=gcd(ans,b);
        ans/=gc;
        b/=gc;
        if(ans)
            printf("%d/%d\n",b,ans);
        else puts("No solution");
    }
    return 0;
}


Antique Comedians of Malidinesia would like to play a new discovered comedy of Aristofanes. Putting it on a stage should be a big surprise for the audience so all the preparations must be kept absolutely secret. The ACM director suspects one of his competitors of reading his correspondece. To prevent other companies from revealing his secret, he decided to use a substitution cipher in all the letters mentioning the new play. Substitution cipher is defined by a substitution table assigning each character of the substitution alphabet another character of the same alphabet. The assignment is a bijection (to each character exactly one character is assigned -- not neccessary different). The director is afraid of disclosing the substitution table and therefore he changes it frequently. After each change he chooses a few words from a dictionary by random, encrypts them and sends them together with an encrypted message. The plain (i.e. non-encrypted) words are sent by a secure channel, not by mail. The recipient of the message can then compare plain and encrypted words and create a new substitution table. Unfortunately, one of the ACM cipher specialists have found that this system is sometimes insecure. Some messages can be decrypted by the rival company even without knowing the plain words. The reason is that when the director chooses the words from the dictionary and encrypts them, he never changes their order (the words in the dictionary are lexicographically sorted). String a1a2 ... ap is lexicografically smaller than b1b2 ... bq if there exists an integer i, i <= p, i <= q, such that aj=bj for each j, 1 <= j < i and ai < bi. The director is interested in which of his messages could be read by the rival company. You are to write a program to determine that. Input Output Sample Input 2 5 6 cebdbac cac ecd dca aba bac cedab 4 4 cca cad aac bca bdac Sample Output abcde Message cannot be decrypted.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值