HDOJ 题目2896 病毒侵袭(AC自动机)

病毒侵袭

Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)
Total Submission(s): 15352    Accepted Submission(s): 3901


Problem Description
当太阳的光辉逐渐被月亮遮蔽,世界失去了光明,大地迎来最黑暗的时刻。。。。在这样的时刻,人们却异常兴奋——我们能在有生之年看到500年一遇的世界奇观,那是多么幸福的事儿啊~~
但网路上总有那么些网站,开始借着民众的好奇心,打着介绍日食的旗号,大肆传播病毒。小t不幸成为受害者之一。小t如此生气,他决定要把世界上所有带病毒的网站都找出来。当然,谁都知道这是不可能的。小t却执意要完成这不能的任务,他说:“子子孙孙无穷匮也!”(愚公后继有人了)。
万事开头难,小t收集了好多病毒的特征码,又收集了一批诡异网站的源码,他想知道这些网站中哪些是有病毒的,又是带了怎样的病毒呢?顺便还想知道他到底收集了多少带病毒的网站。这时候他却不知道何从下手了。所以想请大家帮帮忙。小t又是个急性子哦,所以解决问题越快越好哦~~
 

Input
第一行,一个整数N(1<=N<=500),表示病毒特征码的个数。
接下来N行,每行表示一个病毒特征码,特征码字符串长度在20—200之间。
每个病毒都有一个编号,依此为1—N。
不同编号的病毒特征码不会相同。
在这之后一行,有一个整数M(1<=M<=1000),表示网站数。
接下来M行,每行表示一个网站源码,源码字符串长度在7000—10000之间。
每个网站都有一个编号,依此为1—M。
以上字符串中字符都是ASCII码可见字符(不包括回车)。
 

Output
依次按如下格式输出按网站编号从小到大输出,带病毒的网站编号和包含病毒编号,每行一个含毒网站信息。
web 网站编号: 病毒编号 病毒编号 …
冒号后有一个空格,病毒编号按从小到大排列,两个病毒编号之间用一个空格隔开,如果一个网站包含病毒,病毒数不会超过3个。
最后一行输出统计信息,如下格式
total: 带病毒网站数
冒号后有一个空格。
 

Sample Input
  
  
3 aaa bbb ccc 2 aaabbbccc bbaacc
 

Sample Output
  
  
web 1: 1 2 3 total: 1
 

Source
 

Recommend
gaojie   |   We have carefully selected several similar problems for you:   3065  2243  2825  3341  3247 
 
本来是很水的一道题,,标记一下,遍历输出过了,,想省些时用数组存一下吧,结果各种wa,,忘记题目要求升序输出了,最后发现也没省多少,,
ac代码
#include<stdio.h>
#include<string.h>
#include<stdlib.h>
int cmp(const void *a,const void *b)
{
    return *(int *)a-*(int *)b;
}
char str[1000010],key[520];
int head,tail;
int an[5050],num,vis[5050];
struct node
{
    node *fail;
    node *next[130];
    int cnt,id;
    node()
    {
        fail=NULL;
        cnt=0;
    //    id=0;
        for(int i=0;i<130;i++)
            next[i]=NULL;
    }
}*q[5000010];
node *root;
void insert(char *s,int id)
{
    int temp,len,i;
    node *p=root;
    len=strlen(s);
    for(i=0;i<len;i++)
    {
        temp=s[i]-31;//都是可见的字符,,不是小写字母
        if(p->next[temp]==NULL)
            p->next[temp]=new node();
        p=p->next[temp];
    }
    p->cnt=id;
    //p->id=id;
}
void build_ac()
{
    root->fail=NULL;
    q[tail++]=root;
    while(head!=tail)
    {
        node *p=q[head++];
        node *temp=NULL;
        for(int i=0;i<130;i++)
        {
            if(p->next[i]!=NULL)
            {
                if(p==root)
                {
                    p->next[i]->fail=root;
                }
                else
                {
                    temp=p->fail;
                    while(temp!=NULL)
                    {
                        if(temp->next[i]!=NULL)
                        {
                            p->next[i]->fail=temp->next[i];
                            break;
                        }
                        temp=temp->fail;
                    }
                    if(temp==NULL)
                    {
                        p->next[i]->fail=root;
                    }
                }
                q[tail++]=p->next[i];
            }
        }
    }
}
int query()
{
    int ans=0,cnt=0;
    int len=strlen(str);
    node *p=root,*temp;
    for(int i=0;i<len;i++)
    {
        int x=str[i]-31;
        while(p->next[x]==NULL&&p!=root)
        {
            p=p->fail;
        }
        p=p->next[x];
        if(p==NULL)
        {
            p=root;
        }
        temp=p;
        while(temp!=root&&temp->cnt!=0)
        {
            //ans+=temp->cnt;
            if(temp->cnt&&!vis[temp->cnt])
            {
                an[num++]=temp->cnt;
                vis[temp->cnt]=1;
            }
            /*if(temp->cnt&&!vis[temp->cnt])
                vis[temp->cnt]=1;*/
            temp=temp->fail;
            cnt++;
        }
    }
    //return ans;
    return cnt;
}
int main()
{
    int n;
    while(scanf("%d",&n)!=EOF)
    {
        int i;
        head=tail=0;
        root=new node();
        for(i=1;i<=n;i++)
        {
            scanf("%s",key);
            insert(key,i);
        }
        int m,j,kk;
        j=0;
        scanf("%d",&m);
        build_ac();
        for(i=1;i<=m;i++)
        {
            num=0;
            memset(vis,0,sizeof(vis));
            scanf("%s",str);
            int ans=query();
            if(ans)
            {
                j++;
                printf("web %d:",i);
                qsort(an,num,sizeof(an[0]),cmp);
            //    printf("%d\n",num);
                for(kk=0;kk<num;kk++)
                {
                    printf(" %d",an[kk]);
                }
                /*for(kk=1;kk<=n;kk++)
                {
                    if(vis[kk])
                        printf(" %d",kk);
                }*/
                printf("\n");
            }
        }
        printf("total: %d\n",j);
    }
}


Antique Comedians of Malidinesia would like to play a new discovered comedy of Aristofanes. Putting it on a stage should be a big surprise for the audience so all the preparations must be kept absolutely secret. The ACM director suspects one of his competitors of reading his correspondece. To prevent other companies from revealing his secret, he decided to use a substitution cipher in all the letters mentioning the new play. Substitution cipher is defined by a substitution table assigning each character of the substitution alphabet another character of the same alphabet. The assignment is a bijection (to each character exactly one character is assigned -- not neccessary different). The director is afraid of disclosing the substitution table and therefore he changes it frequently. After each change he chooses a few words from a dictionary by random, encrypts them and sends them together with an encrypted message. The plain (i.e. non-encrypted) words are sent by a secure channel, not by mail. The recipient of the message can then compare plain and encrypted words and create a new substitution table. Unfortunately, one of the ACM cipher specialists have found that this system is sometimes insecure. Some messages can be decrypted by the rival company even without knowing the plain words. The reason is that when the director chooses the words from the dictionary and encrypts them, he never changes their order (the words in the dictionary are lexicographically sorted). String a1a2 ... ap is lexicografically smaller than b1b2 ... bq if there exists an integer i, i <= p, i <= q, such that aj=bj for each j, 1 <= j < i and ai < bi. The director is interested in which of his messages could be read by the rival company. You are to write a program to determine that. Input Output Sample Input 2 5 6 cebdbac cac ecd dca aba bac cedab 4 4 cca cad aac bca bdac Sample Output abcde Message cannot be decrypted.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值