Label: bzoj bzoj2730 Tarjan
Given an undirected graph, it is required to set some vertices as egress. After deleting any vertex in the graph, all the remaining vertices are connected to at least one egress to obtain the minimum number of egress and the number of minimum egress solutions.
First, we can see that the cut point is Tarjan.
First, suppose we scale down all vertices. Then we can get a tree and then we will find
The leaf node (which contains only one cut point and double point)
The main topic: given an no-map, require some points to be set to export requirements the graph of any one of the remaining points after the deletion of any point is connected with at least one outlet for the minimum number of exits and the minimum
And did a problem of cutting points.It can be found that if boom is not in the cutting point then there is no effect, so we only discuss the situation of cutting points.After finding all the cut points, the whole graph is divided into several unicom
;> Creating clusterconnecting to Node 127.0.0.1:7000:okconnecting to node 127.0.0.1:7001:okconnecting to node 127. 0.0.1:7002:okconnecting to node 127.0.0.1:7003:okconnecting to node 127.0.0.1:7004:okconnecting to node 127.0.0.1:7005: Ok>>> performing hash slots allocation on 6 nodes ... Using 6 masters:127.0.0.1:7000127.0.0.1:7001127.0.0.1:7002127.0.0.1:7003127.0.0.1:7004127.0.0.1:7005m: F3dd250e4bc145c8b9f864e82f65e00d1ba627be 127.0.0.1:7000 slots:0-2730
Gzip
A compression command that is more commonly used under Linux to compress a file into a compressed file with a. GZ ending
Preparatory work
[Root@localhost etc]# Cp/etc/man.config/tmp
[Root@localhost etc]# Cd/tmp
[Root@localhost tmp]# LL
Total 12
-rw-r--r--. 1 root root 2730 June 03:45 Chkconfig.txt
-rw-r--r--. 1 root root 4940 Aug 12:37 man.config
1. Compress man.config Files
[Root@localhost tmp]# gzip Man.config
[Root@localhost tmp]# L
Some matching concepts:
Perfect match, complete match, and best match
Staggered rail
Expandable rail
Algorithm principle of Hungary: Starting from the current matching M, check each uncovered point, and then start from it to find the Extensible path, find the Extensible path, and expand along the augmented path, until such a stop is not found.
Joj 2730
Http://blog.csdn.net/jxy859/article/details/6747413:
Adjacent Arrays
# Include
Adjacent table:
Jo
≤ DigitCILimit ≤ limit 105), the costs of cards.Output
If it is impossible to buy some cards and become able to jump to any cell, output-1. Otherwise output the minimal cost of buying such set of cards.Sample test (s) Input
3100 99 99001 1 1Output
2Input
510 20 30 40 501 1 1 1 1Output
-1Input
715015 10010 6006 4290 2730 2310 11 1 1 1 1 1 10Output
6Input
84264 4921 6321 6984 2316 8432 6120 10264264 4921 6321 6984 2316 8432 6120 1026Output
7237Note
In
in X2 must have Element A1 in X1, so that A1 Let's look back at the second question about missile interception. We define a partial order relationship ≤: A ≤ B, indicating that a appears no later than B and the value of A is not less than B. The longest anti-chain of this ordinal set is the longest ascending subsequence, and its non-ascending subsequence is the chain of the ordinal set. According to the Dilworth theorem, the minimum number of subsequences without ascending is the length of the
bus.
Each node has some related information, which is known to other nodes:
1) IP address and port of the node
2) some flag Spaces
3) key-slot of the node service
4) the last ping time sent through the cluster connection Bus
5) The last time pong was received
6) Number of backup nodes of the node
7) if it is a backup node, the ID of the master node (if the node is the master node, the value is 0000000
The cluster nodes command can be used to obtain information about all NODES in the CLUSTER, in
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.