This document summarizes 9 problems from the ACM ICPC 2013-2014 Northeastern European Regional Contest. It provides an overview of the key algorithms and approaches for each problem, describing them concisely in 1-3 sentences per problem. The problems cover a range of algorithmic topics including exhaustive search, dynamic programming, graph algorithms, geometry, and more.
Application of Monte Carlo Tree Search in a Fighting Game AI (GCCE 2016)ftgaic
This are the presentation slides for the following paper:
Shubu Yoshida, Makoto Ishihara, Taichi Miyazaki, Yuto Nakagawa, Tomohiro Harada, and Ruck Thawonmas, "Application of Monte-Carlo Tree Search in a Fighting Game AI," accepted for presentation at the 5th IEEE Global Conference on Consumer Electronics (GCCE 2016), Kyoto, Japan, Oct. 11-14, 2016.
This week's session covers new work from Justin Thaler (GWU) et al on Lasso/Jolt.
Lasso is a new lookup argument (more on this below) with a dramatically faster prover. Our initial implementation provides roughly a 10x speedup over the lookup argument in the popular, well-engineered halo2 toolchain; we expect improvements of around 40x when optimizations are complete. To demonstrate, we’re releasing the open source implementation, written in Rust. We invite the community to help us make Lasso as fast and robust as possible.
The second, accompanying innovation to Lasso is Jolt, a new approach to zkVM (zero knowledge virtual machine) design that builds on Lasso. Jolt realizes the “lookup singularity” – a vision initially laid out by Barry Whitehat of the Ethereum Foundation for simpler tooling and lightweight, lookup-centric circuits (more on why this matters below). Relative to existing zkVMs, we expect Jolt to achieve similar or better performance – and importantly, a more streamlined and accessible developer experience. With Jolt, it will be easier for developers to write fast SNARKs in their high-level language of choice.
Lasso: https://people.cs.georgetown.edu/jthaler/Lasso-paper.pdf
Jolt: https://people.cs.georgetown.edu/jthaler/Jolt-paper.pdf
Application of Monte Carlo Tree Search in a Fighting Game AI (GCCE 2016)ftgaic
This are the presentation slides for the following paper:
Shubu Yoshida, Makoto Ishihara, Taichi Miyazaki, Yuto Nakagawa, Tomohiro Harada, and Ruck Thawonmas, "Application of Monte-Carlo Tree Search in a Fighting Game AI," accepted for presentation at the 5th IEEE Global Conference on Consumer Electronics (GCCE 2016), Kyoto, Japan, Oct. 11-14, 2016.
This week's session covers new work from Justin Thaler (GWU) et al on Lasso/Jolt.
Lasso is a new lookup argument (more on this below) with a dramatically faster prover. Our initial implementation provides roughly a 10x speedup over the lookup argument in the popular, well-engineered halo2 toolchain; we expect improvements of around 40x when optimizations are complete. To demonstrate, we’re releasing the open source implementation, written in Rust. We invite the community to help us make Lasso as fast and robust as possible.
The second, accompanying innovation to Lasso is Jolt, a new approach to zkVM (zero knowledge virtual machine) design that builds on Lasso. Jolt realizes the “lookup singularity” – a vision initially laid out by Barry Whitehat of the Ethereum Foundation for simpler tooling and lightweight, lookup-centric circuits (more on why this matters below). Relative to existing zkVMs, we expect Jolt to achieve similar or better performance – and importantly, a more streamlined and accessible developer experience. With Jolt, it will be easier for developers to write fast SNARKs in their high-level language of choice.
Lasso: https://people.cs.georgetown.edu/jthaler/Lasso-paper.pdf
Jolt: https://people.cs.georgetown.edu/jthaler/Jolt-paper.pdf
This is a detailed review of ACM International Collegiate Programming Contest (ICPC) Northeastern European Regional Contest (NEERC) 2016 Problems. It includes a summary of problem and names of problem authors and detailed runs statistics for each problem.
Problem statements are available here:
http://neerc.ifmo.ru/information/problems.pdf
The beginning of the following video has the actual review (in Russian): https://www.youtube.com/watch?v=fN25KkNYsjA
Пишем самый быстрый хеш для кэширования данныхRoman Elizarov
Типичный случай — приложению работающему с БД некоторые объекты нужны так часто, то их необходимо кэшировать в памяти. В этом случае их кладут в структуру данных типа хэш. Однако, бывают случаи, когда даже поиск в этом хэше становится узким местом приложения и решения из стандартных библиотек перестают устраивать по своей производительности.
Основной упор доклада будет не на конкретный алгоритм, а на та техниках дизайна быстрых алгоритмов — на что надо обращать внимание, как вообще подходить к решению подобных задач.
Slides from tech talk about the art of non-blocking waiting in Java with LockSupport.park/unpark and AbstractQueuedSynchronizer. Presented on JPoint 2016 Conference.
Многопоточное Программирование - Теория и ПрактикаRoman Elizarov
Многоядерные процессоры используются во всех серверах, рабочих станциях и мобильных устройствах. Написание многопоточных программ необходимо для обеспечения вертикальной масштабируемости, но, в отличие от однопоточных программ, их намного сложней отладить и протестировать, чтобы убедиться в корректности. Важно понимать какие именно гарантии дают те или иные конструкции языка и библиотеки при их многопоточном исполнении и какие подводные камни могут нарушить корректность кода. Доклад будет содержать краткое введение в теорию многопоточного программирования. Мы рассмотрим теоретические модели, которые используются для описания поведения многопоточных программ. Будут рассмотрены понятия последовательной согласованности и линеаризуемости (с примерами) и объяснено зачем это все-нужно программисту-практику. Будет показано как эти понятия применяются в модели памяти Java с примерами кода приводящего к неожиданным результатам с точки зрения человека, который с ней не знаком.
Доклад сделан для конференции Java Point Student Day 2016.
This is a detailed review of ACM International Collegiate Programming Contest (ICPC) Northeastern European Regional Contest (NEERC) 2015 Problems. It includes a summary of problem and names of problem authors and detailed runs statistics for each problem. Video of the actual presentation that was recorded during NEERC is here https://www.youtube.com/watch?v=vn7v1MuWXdU (in Russian)
Note: there were only preliminary stats avaialble, because problems review was happening before before the closing ceremony. This published presentation has full stats.
Михаил Елизаров «Man in the middle в действии!»Mail.ru Group
В офисе Mail.Ru Group прошла девятая встреча Defcon Moscow, посвящённая информационной безопасности.
Подробнее о встрече читайте в нашем блоге: http://team.mail.ru/.
Como desarrolladores tenemos que crear el mejor código posible; que sea eficiente y que realice correctamente las funciones para las que ha sido creado: calidad.
Una buena forma de conseguir esta buena calidad en nuestras apps de UWP es probando nuestro código. Creando unit tests (pruebas unitarias) para cada una de las diferentes funcionalidades e intentando acercarnos lo máximo posible a una cobertura completa. Pero de nada sirve obligar al equipo a cubrir un 80% de código; si las pruebas que realizan no aportan valor.
A lo largo de esta charla estudiaremos la mejor forma de probar el código de las apps Windows 10: Diferenciaremos entre los diferentes tipos de pruebas; sentaremos las bases de un buen unit test; aprenderemos a probar métodos asíncronos; usaremos visual studio; crearemos test doubles; y refactorizaremos para conseguir código "testeable", usando los patrones que más favorecen los tests, como es MVVM.
I am Craig D. I am a Stochastic Processes Assignment Expert at statisticsassignmenthelp.com. I hold a Master's in Statistics, from The University of Queensland. I have been helping students with their homework for the past 9 years. I solve assignments related to Stochastic Processes.
Visit statisticsassignmenthelp.com or email info@statisticsassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Stochastic Processes Assignments.
I am Luther H. I am a Stochastic Process Exam Helper at statisticsexamhelp.com. I hold a Masters' Degree in Statistics, from the University of Illinois, USA. I have been helping students with their exams for the past 8 years. You can hire me to take your exam in Stochastic Process.
Visit statisticsexamhelp.com or email support@statisticsexamhelp.com. You can also call on +1 678 648 4277 for any assistance with the Stochastic Process Exam.
Analysis & Design of Algorithms
Backtracking
N-Queens Problem
Hamiltonian circuit
Graph coloring
A presentation on unit Backtracking from the ADA subject of Engineering.
I am Travis W. I am a Computer Science Assignment Expert at programminghomeworkhelp.com. I hold a Master's in Computer Science, Leeds University. I have been helping students with their homework for the past 9 years. I solve assignments related to Computer Science.
Visit programminghomeworkhelp.com or email support@programminghomeworkhelp.com.You can also call on +1 678 648 4277 for any assistance with Computer Science assignments.
These questions are prepared by Classical Programming Experts and are asked during job interviews.The Solution to the given programs are prepared by Programming Experts and are often asked in job interviews. Knowing solution to these problems will help you clear your concepts.
I am Dennis L. I am an Algorithm Design Exam Expert at programmingexamhelp.com. I hold a Ph.D. in Computer Science from, the City University of New York. I have been helping students with their exams for the past 7 years. You can hire me to take your exam in Algorithm Design.
Visit programmingexamhelp.com or email support@programmingexamhelp.com. You can also call on +1 678 648 4277 for any assistance with the Algorithm Design Exam.
Mia Mia is a real time local search engine that enables people to search for a search provider anywhere with ease and convenience. Mia Mia is one of the best listing website for MBA Classes in Mumbai. We are also known for our systematic listing of various IPCC, Science coaching for CBSE, Engineering and other courses in Mumbai. QLI is a class where each student is our priority. Top MBA Institutes in Mumbai for CAT, XAT, NMAT and IIFT are listed on MiaMia.For details - visit: http://miamia.co.in/
I am Samantha K. I am a Network Design Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, McGill University, Canada. I have been helping students with their assignments for the past 13 years. I solve assignments related to Network Design.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Network Design Assignment.
Analysis and design of algorithms part 4Deepak John
Complexity Theory - Introduction. P and NP. NP-Complete problems. Approximation algorithms. Bin packing, Graph coloring. Traveling salesperson Problem.
Similar to ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review (20)
Lock-free algorithms for Kotlin CoroutinesRoman Elizarov
Presentation for SPTCC 2017 - http://neerc.ifmo.ru/sptcc/
Video (part 1): https://www.youtube.com/watch?v=W2dOOBN1OQI
Video (part 2): https://www.youtube.com/watch?v=iQsN_IDUTSc
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
1. ACM ICPC 2013{2014
Northeastern European Regional Contest
Problems Review
Roman Elizarov
December 1, 2013
2. Problem A. ASCII Puzzle
I The problem is solved by exhaustive search
I
3. ll each spot in the trivial puzzle from the top-left to the
bottom-right corner
I try to place each piece that
4. ts
I backtrack after trying all pieces for a place
I Must check which pieces can be placed on borders
I and place them only onto the corresponding borders
I otherwise time-limit will be exceeded
5. Problem B. Bonus Cards
I The problem is solved by dynamic programming
I Let k be the total number of tickets already distributed,
0 k n
I Let g be the number of ICPC card holders who already got
tickets, max(0; k b) g min(a; k)
I Let Ps;k;g be the probability of Dmitry getting a ticket with a
card that has s slots in each draw round
I s = 2 for ICPC card, and s = 1 for ACM card
I Use the following equation to compute the desired probability
Ps;0;0 for each s:
Ps;k;g =
s + 2(a g)Ps;k+1;g+1 + (b k + g)Ps;k+1;g
s + 2(a g) + (b k + g)
I Here s +2(a g)+(b k +g) is the total number of slots in
this draw round for Dmitry's card, for a g remaining ICPC
cards, and for b k + g remaining ACM cards
8. nd all cycles in the given graph G
I Build graph G0 with original vertices, and where each cycle in
G is a new vertex, and each edge which is a part of a cycle is
a new vertex (new vertices are in white)
G G0
1
3
2
13 12
5
4
6
7
8
9
10 11
14
15
1
3
2
13 12
5
4
6
7
8
9
10 11
14
15
9. Problem C. Cactus Automorphisms (2)
I Graph G0 is a tree
I G0 has an even diameter and has the unique center
I The center of G0 is either a vertex, a cycle or an edge in G
I Hang the graph G0 using its center as a root and count a
number of automorphisms on a tree in bottom-up fashion
I k identical children of a vertex can be rearranged for k!
combinations
I children of a cycle in G can be rearranged for 2 combinations
if the sequence of children on this cycle can be reversed
I The root of tree G0 needs a special attention when it
corresponds to a cycle in G
I it may have rotational symmetries and/or a mirror symmetry
I it may have a lot of children, so an ecient algorithm (like
Knuth-Morris-Pratt) must be used to
16. x q when q is a
sux of p
I 1-edges of this graph constitute a
trie for a given set of words
I but it is not an optimal solution
I Minimum spanning tree in this
weighted directed graph
corresponds to the problem answer
I use Chu{Liu/Edmonds algorithm
a
ab
abc
abcd
c
cd
cde
cdef
cdefa
1
1
1
1
1
1
1
1
1
0
0
0
An example for words
abcd and cdefa
17. Problem E. Easy Geometry
I Let (x; yt (x)) be the top point of the polygon at a given
coordinate x and (x; yb(x)) be the bottom point of the
polygon
I these functions can be computed by a binary search
I Let sw(x) be the max generalized square of a rectangle of the
18. xed width w with the left edge at x
sw(x) = w (minfyt (x); yt (x + w)g maxfyb(x); yb(x + w)g)
I Let s(w) = max
x
sw(x) be the max square of a rectangle of the
19. xed width w
I sw(x) is convex, so s(w) can be found by a ternary search
I Let s = max
w
s(w) be the max square of a rectangle | the
answer to the problem
I s(w) is convex, so s can be found by a ternary search
20. Problem F. Fraud Busters
I This is the simplest problem in the contest
I It is solved by going over a list of codes and checking each
one against a code that was recognized by the scanner
21. Problem G. Green Energy
I Compute coordinate z for each point | coordinate of the
projection onto a line perpendicular to the sun
I Place the largest tower at a point with the max z coordinate
I Place other towers in any order on points with decreasing z
coordinates so that they do not obscure each other
I If min z coordinate is reached and some towers are left, then
place them anywhere
tower
shadows
y z
x
22. Problem H. Hack Protection
I Compute cumulative xor values xi =
ji
j=1aj (
for xor )
I this way, xor for any subarray [i ; j) is equal to xi
xj
I Create a map M which keeps for each value of xi the list of
indices i with this value of xi
I Compute bi ;j | the
23. rst index at or after i where j-th bit of
ai becomes zero
I Loop for all i0 from 1 to n
I using bi ;j one can quickly
24. nd consecutive ranges [ik ; ik+1) of
indices where and of subarrays [i0; t) (ik t ik+1) has the
same value b
I note, that there are at most 32 such ranges for each i0
I use a map M to
25. nd a list of all indices with value of xi0
b
I use a binary search on this list (twice) to
26. nd how many
indices from this list are in the range [ik ; ik+1)
I that is the number of matching values for all subarrays [i0; t)
27. Problem I. Interactive Interception
I The state space of a point can be kept in array of min and
max possible position for each speed
I There are at most 105 possible speeds, so this array can be
scanned in a loop on each turn
I Find R that splits a state space roughly in half using binary
search
I Use check 0 R query
I Update the state space after reading the answer
I Repeat until the point's position can be unambiguously
determined
28. Problem J. Join the Conversation
I The problem is solved by dynamic programming
I For each author maintain a map M from an author to a pair
of an index and a length of the maximal conversation with the
last message from this author
I Process messages in order,
29. nd all mentions in a message, and
update map M for the author of this message
I if you
30. nd mentions by looking at `@' then do not forget to
check for a space before it
I the easiest way to
32. Problem K. Kabaleo Lite
I n = 1 is a special case
I the answer depends on the chip of the last player
I For n 1 analyze the best strategy for other players:
I they place all chips onto the chips of your hidden color h
I they will obscure as many as possible of your chips on the
board, and will place as many as possible of other colors onto
the board
I Compute the maximal possible number of chips of each color
on the board according to the above
I Check each possible move of yours to
33. nd the answer
I you win only if the number of your color h on the board
exceeds any other number
I you need to maintain the number of only two best other color
to