zoukankan      html  css  js  c++  java
  • PAT Advanced 1097 Deduplication on a Linked List (25分)(链表)

    Given a singly linked list L with integer keys, you are supposed to remove the nodes with duplicated absolute values of the keys. That is, for each value K, only the first node of which the value or absolute value of its key equals K will be kept. At the mean time, all the removed nodes must be kept in a separate list. For example, given L being 21→-15→-15→-7→15, you must output 21→-15→-7, and the removed list -15→15.

    Input Specification:

    Each input file contains one test case. For each case, the first line contains the address of the first node, and a positive N (≤) which is the total number of nodes. The address of a node is a 5-digit nonnegative integer, and NULL is represented by −.

    Then N lines follow, each describes a node in the format:

    Address Key Next
    
     

    where Address is the position of the node, Key is an integer of which absolute value is no more than 1, and Next is the position of the next node.

    Output Specification:

    For each case, output the resulting linked list first, then the removed list. Each node occupies a line, and is printed in the same format as in the input.

    Sample Input:

    00100 5
    99999 -7 87654
    23854 -15 00000
    87654 15 -1
    00000 -15 99999
    00100 21 23854
    
     

    Sample Output:

    00100 21 23854
    23854 -15 99999
    99999 -7 -1
    00000 -15 87654
    87654 15 -1

    考察了链表的去重,我们仅需要在两个vector里面分别加入即可

    #include <iostream>
    #include <vector>
    #include <unordered_map>
    using namespace std;
    struct node {
        int addr, val, next;
    };
    int main() {
        int start;
        int N;
        node tmp;
        vector<node> v, v_del;
        unordered_map<int, node> m;
        cin >> start >> N;
        while(N--) {
            cin >> tmp.addr >> tmp.val >> tmp.next;
            m[tmp.addr] = tmp;
        }
        unordered_map<int, bool> has;
        while(start != -1) {
            if(!has[abs(m[start].val)]) {
                v.push_back(m[start]);
                has[abs(m[start].val)] = true;
            }else v_del.push_back(m[start]);
            start = m[start].next;
        }
        for(int i = 0; i < v.size(); i++)
            if(i == 0) printf("%05d %d ", v[i].addr, v[i].val);
            else printf("%05d
    %05d %d ", v[i].addr, v[i].addr, v[i].val);
        printf("-1
    ");
        if(v_del.size() > 0) {
            for(int i = 0; i < v_del.size(); i++)
                if(i == 0) printf("%05d %d ", v_del[i].addr, v_del[i].val);
                else printf("%05d
    %05d %d ", v_del[i].addr, v_del[i].addr, v_del[i].val);
            printf("-1
    ");
        }
        return 0;
    }
  • 相关阅读:
    《基于B_S模式的教务管理系统设计与实现》论文笔记(三)
    《重修补考报名考务管理信息系统中的网络技术》论文笔记(二)
    《基于WEB的独立学院补考重修管理系统研究》论文笔记(一)
    重修安排管理系统的设计与实现 文献收集
    重修安排管理系统的设计与实现 文献收集
    《暗时间》读书笔记
    R、Python、Scala 和 Java,到底该使用哪一种大数据编程语言?
    编程和音乐真的很像吗?
    关于虚拟现实叙事方式的终极入门指南
    如何避免脆弱的代码
  • 原文地址:https://www.cnblogs.com/littlepage/p/12248945.html
Copyright © 2011-2022 走看看