zoukankan      html  css  js  c++  java
  • Leetcode: Shortest Way to Form String

    From any string, we can form a subsequence of that string by deleting some number of characters (possibly no deletions).
    
    Given two strings source and target, return the minimum number of subsequences of source such that their concatenation equals target. If the task is impossible, return -1.
    
     
    
    Example 1:
    
    Input: source = "abc", target = "abcbc"
    Output: 2
    Explanation: The target "abcbc" can be formed by "abc" and "bc", which are subsequences of source "abc".
    Example 2:
    
    Input: source = "abc", target = "acdbc"
    Output: -1
    Explanation: The target string cannot be constructed from the subsequences of source string due to the character "d" in target string.
    Example 3:
    
    Input: source = "xyz", target = "xzyxz"
    Output: 3
    Explanation: The target string can be constructed as follows "xz" + "y" + "xz".
     
    
    Constraints:
    
    Both the source and target strings consist of only lowercase English letters from "a"-"z".
    The lengths of source and target string are between 1 and 1000.

    Greedy

    Use two pointers, one for source: i, one for target: j. While j scan through target, try to match each char of j in source by moving i. Count how many times i goes through source end.

     1 class Solution {
     2     public int shortestWay(String source, String target) {
     3         char[] sc = source.toCharArray(), ta = target.toCharArray();
     4         boolean[] map = new boolean[26];
     5         for (char c : sc) {
     6             map[c - 'a'] = true;
     7         }
     8         
     9         int j = 0, res = 1;
    10         for (int i = 0; i < ta.length; i ++, j ++) {
    11             if (!map[ta[i] - 'a']) return -1;
    12             while (j < sc.length && sc[j] != ta[i]) j ++;
    13             if (j == sc.length) {
    14                 res ++;
    15                 j = -1;
    16                 i --;
    17             }
    18         }
    19         return res;
    20     }
    21 }
  • 相关阅读:
    凯撒密文的破解编程实现
    微软ping命令的源代码
    从编程到入侵
    永远的后门
    永远的后门
    奇妙的Base64编码
    用端口截听实现隐藏嗅探与攻击(二)
    奇妙的Base64编码
    Liferea 1.1.2
    Equinox Desktop Environment 1.1
  • 原文地址:https://www.cnblogs.com/EdwardLiu/p/11619711.html
Copyright © 2011-2022 走看看