SPY //2010 ACM-ICPC Multi-University Training Contest(10)——Host by HEU

SPY

Time Limit : 2000/1000ms (Java/Other)   Memory Limit : 65536/32768K (Java/Other)
Total Submission(s) : 25   Accepted Submission(s) : 10
Font: Times New Roman | Verdana | Georgia
Font Size: ← →

Problem Description

The National Intelligence Council of X Nation receives a piece of credible information that Nation Y will send spies to steal Nation X’s confidential paper. So the commander of The National Intelligence Council take measures immediately, he will investigate people who will come into NationX. At the same time, there are two List in the Commander’s hand, one is full of spies that Nation Y will send to Nation X, and the other one is full of spies that Nation X has sent to Nation Y before. There may be some overlaps of the two list. Because the spy may act two roles at the same time, which means that he may be the one that is sent from Nation X to Nation Y, we just call this type a “dual-spy”. So Nation Y may send “dual_spy” back to Nation X, and it is obvious now that it is good for Nation X, because “dual_spy” may bring back NationY’s confidential paper without worrying to be detention by NationY’s frontier So the commander decides to seize those that are sent by NationY, and let the ordinary people and the “dual_spy” in at the same time .So can you decide a list that should be caught by the Commander?
A:the list contains that will come to the NationX’s frontier.
B:the list contains spies that will be sent by Nation Y.
C:the list contains spies that were sent to NationY before.

Input

There are several test cases.
Each test case contains four parts, the first part contains 3 positive integers A, B, C, and A is the number which will come into the frontier. B is the number that will be sent by Nation Y, and C is the number that NationX has sent to NationY before.
The second part contains A strings, the name list of that will come into the frontier.
The second part contains B strings, the name list of that are sent by NationY.
The second part contains C strings, the name list of the “dual_spy”.
There will be a blank line after each test case.
There won’t be any repetitive names in a single list, if repetitive names appear in two lists, they mean the same people.

Output

Output the list that the commander should caught (in the appearance order of the lists B).if no one should be caught, then , you should output “No enemy spy”

Sample Input

8 4 3
Zhao Qian Sun Li Zhou Wu Zheng Wang
Zhao Qian Sun Li
Zhao Zhou Zheng
2 2 2
Zhao Qian
Zhao Qian
Zhao Qian

Sample Output

Qian Sun Li
No enemy spy

Author

lx_c

Source

2010 ACM-ICPC Multi-University Training Contest(10)——Host by HEU
#include<iostream>
#include<string>
#include<map>
using namespace std;
map<string,int>s1,s2,s3,s4;
string str[10001];
int main()
{
    int n,m,k;
    while(cin>>n>>m>>k)
    {
        s1.clear();
        s2.clear();
        s3.clear();
        s4.clear();
        for(int i=0;i<n;i++)
        {
            string s;
            cin>>s;
            s1[s]=1;
        }
        for(int i=0;i<m;i++)
        {
            string s;
            cin>>s;
            s2[s]=1;
            str[i]=s;
        }
        for(int i=0;i<k;i++)
        {
            string s;
            cin>>s;
            s3[s]=1;
        }
        int num=0;
        map<string,int>::iterator it;
        map<string,int>::iterator iter1;
        map<string,int>::iterator iter2;
        for(it=s2.begin();it!=s2.end();it++)
        {
            iter1=s1.find(it->first);
            iter2=s3.find(it->first);
            if(iter1!=s1.end()&&iter2==s3.end())
            {
                num++;
                s4[it->first]=1;
            }
        }
        map<string,int>::iterator iter3;
        if(num==0) cout<<"No enemy spy"<<endl;
        else
        {
             int nn=0;
             for(int i=0;i<m;i++)
             {
                 iter3=s4.find(str[i]);
                 if(iter3!=s4.end())
                 {
                     if(nn!=0) cout<<" ";
                     cout<<str[i],nn++;
                 }
             }
             cout<<endl;
        }
    }
    return 0;
}
### 关于 Activiti-Demo6-Springboot 项目 #### 源码结构与配置 对于 `activiti-demo6-springboot` 项目而言,在启动类上的注解进行了特定设置以适应应用需求。具体来说,通过排除默认的安全自动配置来定制化应用程序的行为[^1]。 ```java package com.demo.springboot_activiti_demo; import org.activiti.spring.boot.SecurityAutoConfiguration; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; @SpringBootApplication(exclude = SecurityAutoConfiguration.class) public class Demo3Application { public static void main(String[] args) { SpringApplication.run(Demo3Application.class, args); } } ``` 此段代码展示了如何在 Spring Boot 应用程序中集成并初始化 Activiti 流程引擎的同时禁用了安全模块的自动化配置。 #### 数据库连接与更新策略 为了确保数据库能够正确同步流程定义以及历史记录的变化,设置了如下属性: - 自动更新模式开启 (`database-schema-update: true`) - 历史级别设为完全 (`history-level: full`),意味着会保存所有的运行时数据和历史信息。 - 使用 Druid 连接池管理 MySQL 数据源,并指定了详细的 JDBC URL 参数以便更好地兼容性和性能优化[^2]。 ```yaml spring: activiti: database-schema-update: true history-level: full db-history-used: true datasource: driver-class-name: com.p6spy.engine.spy.P6SpyDriver url: jdbc:p6spy:mysql://localhost:3306/activiti?characterEncoding=utf8&useSSL=false&serverTimezone=Asia/Shanghai&allowPublicKeyRetrieval=true username: root password: root type: com.alibaba.druid.pool.DruidDataSource ``` 这些配置项有助于简化开发过程中的环境搭建工作量,并提供了良好的灵活性用于调整生产环境中所需的各项参数。 #### 获取完整的项目示例 如果希望获取更全面的功能实现案例,则可以从 GitHub 上找到更多资源。例如,有一个名为 `kft-activiti-demo` 的仓库提供了一个不依赖 Maven 构建工具版本的打包文件可供下载[^3]。 虽然上述链接指向的是一个具体的分支或标签下的压缩包形式发布版,但对于寻找相似功能特性的开发者来说仍然是很有价值的学习材料之一。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值