Google Code Jam Archive — Round 3 2010 problems


Round 3 was definitely the most difficult round of this year's Code Jam so far. Only the top 25 advanced to the Finals, and the problems were hellishly hard. Last year's winner, ACRush, struggled to stay in the top 25 after an incorrect submission of his B-large. Of course, none of the contestants knew that his submission was incorrect, as he stayed in the top spot on the scoreboard until the end of the round, when he dropped down to 24th place.

The last 20 minutes of the contest were a race among RAVEman, Gennady.Korotkevich and Burunduk1 to finish their last remaining problems. nika, winger and pashka joined the race to first place, each having 78 points with 5 minutes to go. With less than one minute to go, winger pulled out ahead with a full 100 points -- a clear win. Amazingly, just a few seconds later, Burunduk1 and Eryx joined him, having solved their last remaining problems as well. Burunduk1 ended up winning the round with 2 incorrect submissions over winger's 3.

Congratulations to all participants, and good luck to the top 25, who will compete in person at the World Finals in Google's Dublin office.


Problem A. De-RNG-ed Written by Igor Naverniouk. Prepared by Ante Derek and Igor Naverniouk

Problem B. Fence Written by David Arthur. Prepared by Xiaomin Chen and David Arthur.

Problem C. Hot Dog Proliferation Written and prepared by David Arthur.

Problem D. Different Sum Written and prepared by Petr Mitrichev.

Contest analysis presented by David Arthur, Xiaomin Chen, Petr Mitrichev, and Igor Naverniouk.

Solutions and other problem preparation provided by Marius Andrei, Xiaomin Chen, John Dethridge, and Bartholomew Furrow.

A. De-RNG-ed


I want to make an online poker website. A very important component of such a system is the random number generator. It needs to be fast and random enough. Here is a compromise I came up with. I need a way to generate random numbers of length at most D. My plan is to select a prime number P ≤ 10D. I am also going to pick non-negative integers A and B. Finally, I'm going to pick an integer seed S between 0 and P-1, inclusive.

To output my sequence of pseudo-random numbers, I'm going to first output S and then compute the new value of S like this:
S := (A*S + B) mod P.

Then I will output the new value of S as the next number in the sequence and update S again by using the same formula. I can repeat this as many times as I want.

Do you think that this is a good random number generator? Can you write a program that takes K consecutive elements of a sequence that was generated by my random number generator, and prints the next element of the sequence?


The first line of the input gives the number of test cases, T. T test cases follow. Each one starts with a line containing D and K. The next line contains K consecutive elements generated by a random number generator of the kind described above.


For each test case, output one line containing "Case #x: y", where x is the case number (starting from 1) and y is either the next number in the sequence, or the string "I don't know." if the answer is ambiguous.


Time limit: 30 seconds per test set.
Memory limit: 1GB.
1 ≤ T ≤ 100.
1 ≤ K ≤ 10.
The K integers will be consecutive elements of a sequence generated by a random number generator of the type described above.

Small dataset (Test set 1 - Visible)

1 ≤ D ≤ 4.

Large dataset (Test set 2 - Hidden)

1 ≤ D ≤ 6.


Sample Input
content_copy Copied!
2 10
0 1 2 3 4 5 6 7 8 9
3 1
1 5
6 6 6 6 6
Sample Output
content_copy Copied!
Case #1: 10
Case #2: I don't know.
Case #3: 6

B. Fence


We are looking into building a very long fence. We have already found a nice place to build it, and all that remains is to collect the materials.

From local hardware stores, we can buy unlimited numbers of wooden boards, each of which can come in a variety of different lengths. To avoid waste, we want to make sure that the total length of these boards is exactly equal to the length of the fence we are trying to build.

Given the length of the fence, and the possible board lengths that we can use, what is the minimum number of boards that we need to purchase in order to get exactly the right length?

Beware: the fence is going to be very long!


The first line of the input file contains the number of cases, T. T test cases follow.

Each test case consists of two lines. The first line contains space-separated integers L and N. These represent the total length of the fence, and the number of different board lengths that can be purchased. The second line contains N space-separated integers B1, B2, ..., BN, representing all the possible board lengths.


For each test case, output one line containing "Case #x: M", where x is the case number (starting from 1) and M is as follows:

  • If it is possible to purchase one or more boards so that their total length is exactly equal to L, then M should be the minimum number of boards required to do this.
  • Otherwise, M should be the string "IMPOSSIBLE".


Time limit: 30 seconds per test set.
Memory limit: 1GB.
1 ≤ T ≤ 50.
1010L ≤ 1018.
1 ≤ N ≤ 100.

Small dataset (Test set 1 - Visible)

1 ≤ Bi ≤ 100.

Large dataset (Test set 2 - Hidden)

1 ≤ Bi ≤ 100000.


Sample Input
content_copy Copied!
10000000001 3
23 51 100
10000000001 3
100 52 22
Sample Output
content_copy Copied!
Case #1: 100000004


In the first example, the optimal strategy is to use 2 boards of length 23, 5 boards of length 51, and 99999997 boards of length 100. Of course, you could use just 100000001 boards of length 100 to get a total greater than L, but that is not allowed.

In the second example, it is only possible to get even lengths.

C. Hot Dog Proliferation


A number of hot dog vendors have started selling hot dogs at corners (intersections) along a very long east-west street. The problem is that multiple vendors might be selling at the same corner, and then they will take each other's business. All is not lost though! The hot dog vendors have a plan.

If there are ever two or more vendors at the same corner, then exactly two of the vendors can perform a move, which means:

  • One vendor moves one corner further to the east along the street.
  • The other vendor moves one corner further to the west along the street.
Remember that the street is really long, so there is no danger of running out of corners. Given the starting positions of all hot dog vendors, you should find the minimum number of moves they need to perform before the vendors are all separated (meaning they are all on different corners).

For example, suppose the street begins with the following number of hot dog vendors on each corner, listed in order from west to east:

... 0 0 2 1 2 0 0 ...
Then the vendors can be separated in three moves, as shown below:
... 0 0 2 1 2 0 0 ...
        +--- Do a move here

... 0 1 0 2 2 0 0 ...
          +--- Do a move here

... 0 1 1 0 3 0 0 ...
            +--- Do a move here

... 0 1 1 1 1 1 0 ...


Each street corner is labeled with an integer, positive or negative. For each i, corner i+1 refers to the next corner to the east from corner i. We will use this labeling system to describe corners in the input file.

The first line of the input file contains the number of cases, T. T test cases follow. Each case begins with the number of corners C that have at least one hot dog vendor in the starting configuration. The next C lines each contain a pair of space-separated integers P, V, indicating that there are V vendors at corner P.


For each test case, output one line containing "Case #x: M", where x is the case number (starting from 1) and M is the minimum number of moves that need to be performed before the vendors all end up at different corners from each other.


Time limit: 30 seconds per test set.
Memory limit: 1GB.
1 ≤ T ≤ 50.
1 ≤ C ≤ 200.
All P values are in the range [-1000000, 1000000].
Within each test case, all P values are distinct and listed in increasing order.
All V values are positive integers. The limit on the sum of all V values is listed below.
It will always be possible to separate the hot dog vendors in a finite number of moves.

Small dataset (Test set 1 - Visible)

The total number of hot dog vendors in each test case is at most 200.

Large dataset (Test set 2 - Hidden)

The total number of hot dog vendors in each test case is at most 100000.


Sample Input
content_copy Copied!
-1 2
0 1
1 2
-1000 1
2000 1
Sample Output
content_copy Copied!
Case #1: 3
Case #2: 0

D. Different Sum


We have come up with a wonderful problem for Google Code Jam 2010 that involves contestants solving a cryptarithm. But we need your help in creating testcases for the problem; more precisely, we're concerned with addition equations that are good enough (in the sense defined below) for conversion into cryptarithms.

You don't need to know what a cryptarithm is to solve this problem, as we'll provide all required definitions. We define a cryptarithm equation to be an addition equation written in such a way that all summands (numbers being added) and the sum are aligned to the same right border like this:


Additionally, for each column of a cryptarithm equation, all digits of the summands in that column must be different. Note that we don't include the sum in this constraint. So for example in the above equation the first column contains only digit 1, the second column contains digits 2,3 and 2, and the third column contains digits 4, 1 and 5. This equation is not a cryptarithm equation since the second column contains two 2's. However, it would be a cryptarithm equation if we replaced the last summand with 15 (and the sum with 170).

Note that summands in a cryptarithm equation are always positive and written without leading zeros. The order of summands is not important (in other words, two equations which differ only in the order of the summands are considered the same).

The example above was in base 10, but we're also interested in cryptarithm equations in other bases. Note that a "digit" in base b could mean any integer between 0 and b-1. Here is a cryptarithm equation in base 23:


In this example, "I" stands for digit 18, "B" stands for digit 11, "J" stands for digit 19, and "F" stands for digit 15. In decimal notation, the two summands are 18*232 + 7*23 + 11 = 9694 and 19*232 + 19*23 + 19 = 10507, and the sum is 1*233 + 15*232 + 4*23 + 7 = 20201. Please note that denoting digits of 10 and more with letters was done purely for the clarity of the example; it doesn't really matter in this problem how exactly we denote such digits in writing.

How many cryptarithm equations are there with the given sum N in the given base B?

Since the answer might be very large, please output it modulo 1000000007.


The first line of the input gives the number of test cases, T. T lines follow. Each contains two positive integers N and B. All input numbers are given in base 10.


For each test case, output one line containing "Case #x: y", where x is the case number (starting from 1) and y is the number of different cryptarithm equations with the given sum. Since this number can be very big, please output it modulo 1000000007. Of course, the output itself should be in base 10.


Memory limit: 1GB.
1 ≤ T ≤ 20.

Small dataset (Test set 1 - Visible)

Time limit: 30 seconds.
1 ≤ N ≤ 100.
2 ≤ B ≤ 10.

Large dataset (Test set 2 - Hidden)

Time limit: 120 seconds.
1 ≤ N ≤ 1018.
2 ≤ B ≤ 70.


Sample Input
content_copy Copied!
6 10
8 4
Sample Output
content_copy Copied!
Case #1: 4
Case #2: 4


Here are the 4 cryptarithm equations with sum 6:

6   1   2   1
-   5   4   2
6   -   -   3
    6   6   -

And here are the 4 cryptarithm equations in base 4 with sum 8=204:

20   11   13   10
--    3    1    3
20   --   --    1
     20   20   --

Analysis — A. De-RNG-ed

Finding the next integer in the sequence means figuring out the values of A, B and P that fit the given numbers and using them to generate the next number.

This problem has a few special cases. In all of them, it is important to note that the value of P must always be larger than every element of the "randomly" generated sequence. (8 can never be a remainder after dividing by 7.) Also, the problem statement requires that P be no larger than 10D. Let's call all primes that satisfy both of these bounds "valid primes". Now, let's look at the special cases.

K = 1

First of all, when K is 1, the answer is always "I don't know." This is because we can pick any valid prime P, set A to 0 and B to 0 or 1. This will give us two different answers.

K = 2 and the two sequence elements are the same

In this case, the answer is unique because the next element of the sequence depends only on the current element. If two consecutive elements are the same, then the entire sequence consists of a single repeated number.

K > 2 and all the sequence elements are the same

Similarly, the next element must be the same as all other elements.

K = 2 and the two sequence elements are different

Here, the answer is always "I don't know." To see that, pick any valid prime and consider the cases A=0 and A=1. If we call the first element of the sequence x and the second element y, we can express y as a function of x, A, B and P: y = (A*x + B) % P. In both cases, we can solve this equation for B. The next element, z is then z = (A*y + B) % P, and it must be different in the two cases (A=0 and A=1) as long as x is different from y.

K = 3

We are going to brute force all valid primes and solve for A and B. We will then use these values to generate the next element of the sequence. If all the values we get this way are the same, then the answer is unique. If we get different valid answers, then the answer is "I don't know."

Let's call the 3 elements x, y and z. By writing y as a function of x and z as a function of y and subtracting y from z, we get
z - y = (A*y + B) - (A*x + B) = A*(y - x) (mod P).

We have already dealt with the case when x equals y, so we can assume that x and y are different, so we can divide by their difference. This lets us solve for A.
A = (z - y)*(y - x)-1 (mod P).
Computing the inverse of (y - x) can be done using the Euclidean algorithm, which runs in O(log(P)) time.

Once we have A, solving for B is easy:
B = y - A*x.

The answer is then A*z + B.

K > 3

In this case, we brute force P, use the first 3 elements of the sequence to solve for A and B, and check whether the remaining elements fit the sequence generated with these parameters.

Test Data
info We recommend that you practice debugging solutions without looking at the test data.

Analysis — B. Fence

The basic scenario here is very similar to the traditional change-making problem, except that the input can be (and actually is guaranteed to be) very large. A condition on the minimum size of the input is very unusual for a programming contest problem, and we didn't add it just for fun. Our solution really, truly does require that the fence length be at least 10^10.

Small Input

Before getting into the real solution though, let's discuss a simpler approach that at least solves the small input. Let's suppose the longest board is of length A ≤ 100. The key idea is that we should never use more than A boards of any size less than A. If we did, we could replace A of those boards with a smaller number of length-A boards. And that would of course be a better solution.

In particular, this means the total length of all shorter boards is at most N * A * A ≤ 1000000. Using a breadth-first search, we can find the optimal way of choosing these boards to get each length in that range. The cost of completing the fence using length-A boards can then be computed with a simple division.

By the way, you can actually replace N * A * A with just A * A in the above solution. Hopefully you will see why after reading the rest of the solution!

Large Input

The small-input solution does not actually take advantage of the minimum length of the fence. So the big question is: how could we possibly do that?

Well, the previous solution offers a bit of a hint. For a really long fence, it makes sense that in the end, we are going to want to make heavy use of the longest board just to cover up as much length as possible. So let's suppose the longest board has length A, and that L is equal to p*A + q for integers p, q with q < A. (Note that the problem statement guarantees p ≥ A.) Then we need to do one of the following things:

  • Use a number T0,q of shorter boards to create a fence of length 0*A + q, then use p boards of length A to cover the rest.
  • Use a number T1,q of shorter boards to create a fence of length 1*A + q, then use p-1 boards of length A to cover the rest.
  • ...
  • Use a number Tp,q of shorter boards to create a fence of length p*A + q, then use 0 boards of length A to cover the rest.

So we need to calculate p + Sp,q where Sp,q is defined to be min(T0,q - 0, T1,q - 1, ..., Tp,q - p). Intuitively, Sp,q can be thought of as measuring the minimal number of boards required to get a fence length of q mod A, subject to two modifications:

  • Every time the length increases by A, it means one less max-length board in the future, so you can subtract one from the total count.
  • The total length is not allowed to go over p*A + q.
And now, we can make concrete how the condition that L is very large simplifies things:

Lemma: The second condition in the definition of Sp,q is unnecessary.

Proof: We claim that Ti,q - i is minimized when i ≤ p, which will prove the lemma. So let's consider a minimal Ti,q - i. Then we have a set of boards b1, b2, ..., bm making a length of i*A + q. If i > p, then m > p ≥ A. But then, the set {b1, b1 + b2, ..., b1 + b2 + ... bm} contains at least A+1 numbers, so two of these numbers are congruent modulo A. Subtracting them, we can find a non-empty subset of {b1, b2, ..., bm} whose sum is a multiple of A. Therefore, we can replace that subset with boards of length A to get a strictly better solution, implying Ti,q - i could not have been optimal in the first place!

Okay, that's all very nice, but what's the solution? Well the previous lemma implies we need to calculate the minimum number of boards required to get a fence of length q mod A, subject to the fact that each time the total goes up by A, we will need one fewer board in the future. (For shorter fences, this approach just does not work. Our algorithm would make a very long fence with length correct modulo A, and then try to subtract length-A boards, which of course is not allowed!)

Anyway, once the problem has been reduced in this way, it can be done pretty straightforwardly with a breadth-first search. Our graph has one vertex for each residue modulo A. From each vertex, we add an edge for each possible board length. If adding that board involves wrapping past A, then it has weight 0. Otherwise, it has weight 1. So the final algorithm is: calculate the minimum distance in this graph to vertex q to get Sp,q, and finally add p.

Test Data
info We recommend that you practice debugging solutions without looking at the test data.

Analysis — C. Hot Dog Proliferation


This analysis will have nothing to do with hot dogs. Instead of a long street with billions of corners, let's think of the line of integers; instead of vendors, let's think of chips -- after all, chips are much easier to maneuver than real people with hot dog stands!

We denote the number of total chips by n. Also, let's call a configuration stable if no two chips occupy the same integer point.

If you play around with the game for a while or if you have good (and brave!) intuition, you might realize that the problem statement is a little misleading. It turns out that no matter which move you do at each step, the final configuration, as well as the total number of moves you need to perform, will always be the same.

Indeed, this is a famous theorem for "chip-firing games", and our scenario is a special kind of chip-firing game. Intuitively, the reason why your choices don't matter is that (a) if you ignore a move now, you will still have to do it later, and (b) one move will not change the effect of another move down the line. This means that while you can control the order of moves, you will always do the same set of moves in the end, and they will always have the same effect.

This observation is enough to solve the small input. Just keep doing moves until the configuration stabilizes, and count how long it took. For the large input though, more insight is required. A configuration might require over 10^13 moves to stabilize, so simulating them one at a time is out of the question. The obvious optimization is to do several moves at once for very large piles. Surprisingly however, this does not help very much.

There are a few different ways to proceed, and we will discuss two of them.

Preliminary Observations

One very useful way of understanding this game is in terms of invariants. The first of these is pretty obvious, but the other requires either some special insight or some experience to see. In each move, we take two chips at some position x and send them to positions x-1 and x+1. Notice that:

(x-1) + (x+1) = x + x
(x-1)2 + (x+1)2 = x2 + x2 + 2.
This immediately leads to the following two observations:

Observation 1. The sum of the positions of all the chips never changes.

Observation 2. The sum of the squared positions of all the chips increases by 2 during each move.

So how do we use these observations? They aren't necessary, but they will have their uses as you will see. The former one will help us quickly construct a configuration with certain known properties from the initial configuration (more on this later). And with the latter observation, computing the number of steps becomes the same task as constructing the final configuration. For example, using Observation 2, we can easily estimate that the number of steps could be on the order of n3, thereby verifying that straightforward simulation really is hopeless.

Adding one chip

One good approach is to add chips one at a time, at each step doing enough moves to completely stabilize the configuration. The question is: how do we do this last part efficiently? So let's consider adding a chip to a stable configuration.

If the new chip arrives at a position where there was no chip before, we are done. Otherwise, it lands on a segment, and the picture looks something like this:

The two "."s represents empty positions. If you play around with a couple examples, you should be able to see that the ending result will always be two segments, one starting from the position of the left "." in the picture, and the other ending at the position of the right ".". We might also view the result as a single segment with a hole. Furthermore, you might also realize that if there were A points to the left of our new chip in the original configuration, and B points to the right, then the two new segments will have lengths B+1 and A+1 respectively, and the total number of moves required will be (A+1)*(B+1).

We could also have computed the position of the hole using Observation 1. The sum of the positions in the initial configuration is (1+2+...+15)+4, and we know in the new configuration that the sum is (0+1+...+16)-H, where H is the position of the hole. Therefore, H must be 12. The final picture is

We could then use Observation 2 to easily determine how many moves were required to get here.

So here is one possible solution to the problem. Add the chips one by one. At each stage, we have up to n disjoint segments. If the new chip lands on an unoccupied position, it forms a segment unto itself; otherwise, it transforms one segment into two as described above. In either case, the new segments might touch the ones to their left and/or right, and we merge them if that happens.

All that's left is to figure out how to store these segments in your program. If you are clever, you might realize that if we add the chips from left to right, then each new chip will always be on or next to one of the last two segments. You could then use a stack to store all the segments -- all the operations will be on the top two elements of the stack. This approach gives an O(n) solution. If you missed this last insight, you could also use a binary search tree (e.g. an STL set) to get an O(n log n) solution.

Adding one pile

In our problem, we have C piles of chips, and usually C is much smaller than n. We now sketch a lightning-fast solution that runs in O(C) time. This level of insight is not necessary to solve the problem, but it's still pretty interesting. As you will see, it is essential to understand the details of the above O(n) solution.

Instead of adding one chip at a time, we will try to process all the chips from a single position at the same time.

First let's resolve the case when there is only one pile of n chips at position x. By symmetry and the discussions in the previous section, it is easy to see that the stable configuration is a segment centered at x if n is odd; and a segment centered at x with a hole in the center if n is even.

Let's define an H-segment to be a segment with a hole. It is a tuple (x, y, z), where x < y ≤ z, representing a segment of chips from position x to position z, inclusive, but with position y empty. Note that, when y = z, the hole is at the very end, and it is actually a normal segment.

Our solution adds the piles one by one. And we keep a stack of existing H-segments from the left to the right. When a new pile comes, it is transformed into a new H-segment. If the H-segment does not overlap with any existing H-segments, we are done. Otherwise, it overlaps with the topmost H-segment in the stack; that is, it creates some positions with two chips. But using the observations from the last section, we know that if we resolve the conflicts one at a time, we will always have at most one hole. That means the result will be another H-segment. If the new one overlaps with the current top H-segment in the stack, we continue with the same resolving process. We do this until the stack is empty, or the H-segment is disjoint from the top of the stack. Then we push the new one and proceed to the next pile.

It remains only to explain how to compute a new H-segment quickly. And the answer is: just use Observation 1 again! When resolving two H-segments, we know S -- the sum of the positions in them; we also know the total number of chips K, so (remember the hole), z = x+K. We need to decide the start position x. Depending on y, the sum S satisfies

K(2x + K - 1) / 2 ≤ S < K(2x + K + 1) / 2
There is a unique x satisfying this, and it can be solved in constant time. We can then find y exactly like we did in the O(n) solution.

More Information

If you liked this problem, you might also enjoy reading the following classical paper on chip-firing games:
- Anders Björner, László Lovász, and Peter Shor Chip-firing games on graphs. European Journal of Combinatorics, Volume 12 , Issue 4 (July 1991).

Test Data
info We recommend that you practice debugging solutions without looking at the test data.

Analysis — D. Different Sum

The small input

The solution for the small input of this problem was quite straightforward. One could iterate over all possible ways to partition N into a sum of positive integers, and verify that each column has distinct digits.

Since there are 190569292 partitions of 100 into a sum of positive integers, this algorithm might not run fast enough. However, we can optimize it with an easy observation: the summands must be distinct. That brings the total number of partitions of 100 down to just 444793, which is small enough for our needs.

But if you want to cut the search space down even further, you can use backtracking. This is a general technique that works as follows in this problem: as you're generating the partition, you can check if there's a column that has two equal digits after adding each number, not just in the end. That way, many bad partitions get filtered out early and you have even less possibilities to check.

The large input

In order to approach the large input, we need to rotate ourselves 90 degrees. In the above solution, we've generated our cryptarithm from top to bottom. Now, we will generate it from right to left.

First, we check all possibilities for the digits in the rightmost (least significant) column such that the last digit of their sum matches the required one. Then, we continue with the digits for the next-to-rightmost column, and so on.

Suppose we have already filled a few rightmost columns. We can note that the things that are relevant for us now is the value V of carry from the already filled columns to the next one, the amount K of summands in the column that was just filled, and the boolean flag F indicating whether there has been a zero in the column that was just filled (this flag is important since it affects whether we can terminate the corresponding number now). When we know the values of V, K and F, the actual digits in the already filled columns don't affect the further execution of the algorithm.

This observation logically leads us to the following Dynamic Programming solution: let's calculate Count[i, V, K, F] which is defined as the number of ways to place the digits in the last i columns in such a way that the sum in those columns matches N, there's a carry of V, the number of summands that have at least i digits is K, and F is 1 when there's a summand that starts with zero, 0 otherwise.

In order to calculate Count[i+1,...] given Count[i,...], we need to consider all possible ways to place up to K digits in the i+1-th rightmost column. K is up to B (since all digits in one column are different, the number of summands doesn't exceed the number of different digits), which can be up to 100 in the large input. From the first glance, this gives us at least 100! (factorial of 100) possibilities, rendering our idea still useless.

But now's when another Dynamic Programming idea comes into play! One can notice that we don't need to know exactly all digits of the i+1-th column. The important thing for us is the amount of those digits, the sum of those digits, and whether one of them is zero. When we know those, we can multiply our answer by an appropriate number (which will be a product of binomial coefficients and factorials) to account for various ways to attach those digits to the already formed numbers in the first i columns.

So we run a separate Dynamic Programming that calculates Count2[K, S, F] which is defined as the number of ways to place K distinct digits in a column such that their sum is S and F denotes whether one of them is zero. K is up to B, S is O(B2), meaning we get O(B3) states, which is small enough.

The main Dynamic Programming has O(B2*number_of_digits) states, and using the Count2 table each state can be processed in O(B2) by looking at the number of digits in the i+1-th column and the carry to the i+2-th column (the required sum in the i+1-th column is uniquely determined by the carry to it, the carry from it, and the corresponding digit of N). The total runtime of this solution is thus O(B4*number_of_digits).

Test Data
info We recommend that you practice debugging solutions without looking at the test data.

Statistics — A. De-RNG-ed

Test set 1: 273 correct solutions (73.8% solve rate)

kinaba C++, 17:15
ACRush C++, 17:32
ftc C++, 19:16
Thoughtful yellow wolverine 20:38
qizichao C++, 21:36
a9108 C++, 994 bytes
Ra16bit C++, 1003 bytes
zibada Python, 1077 bytes
Fumiya C++, 1250 bytes
domeng C++, 1297 bytes

Test set 2: 179 correct solutions (48.4% solve rate)

ACRush C++, 17:32
ftc C++, 19:16
qizichao C++, 21:36
dzhulgakov C++, 22:04
Progbeat C++, 24:33
Ra16bit C++, 1286 bytes
meret C++, 1535 bytes
zibada Python, 1611 bytes
qizichao C++, 1632 bytes
moon5ckq C++, 1667 bytes

Statistics — B. Fence

Test set 1: 250 correct solutions (67.6% solve rate)

hos.lyric C++, 8:39
pasin30055 C++, 12:28
ashmelev C++, 14:05
eatmore Java, 16:03
Astein C++, 16:42
qwaker.00 C++, 695 bytes
omeometo C++, 719 bytes
Qinz C++, 721 bytes
zibada Python, 787 bytes
linguo Python, 805 bytes

Test set 2: 77 correct solutions (20.8% solve rate)

eatmore Java, 16:03
meret C++, 28:16
alantian C++, 30:02
bmerry C++, 31:26
Jonick Java, 36:28
Milanin C++, 1035 bytes
oldherl C++, 1059 bytes
Zhuojie C++, 1084 bytes
meret C++, 1096 bytes
Rydberg C++, 1137 bytes

Statistics — C. Hot Dog Proliferation

Test set 1: 217 correct solutions (58.6% solve rate)

tourist aka Gennady.Korotkevich Pascal, 23:43
blmarket C++, 24:17
Dumbear2 C++, 27:30
theli Python, 28:08
kinaba C++, 30:32
AEtheReal C++, 591 bytes
Milanin C++, 601 bytes
Hackson C++, 603 bytes
theli Python, 623 bytes
linguo Python, 674 bytes

Test set 2: 20 correct solutions (5.4% solve rate)

Stigius C++, 42:19
Eryx C++, 50:28
tikitikirevenge C++, 53:25
Jacob aka Dlougach C++, 66:28
xreborner C++, 73:45
meret C++, 1082 bytes
Jacob aka Dlougach C++, 1218 bytes
Orfest C++, 1499 bytes
Stigius C++, 1529 bytes
qizichao C++, 1680 bytes

Statistics — D. Different Sum

Test set 1: 102 correct solutions (27.6% solve rate)

winger Java, 39:39
Shinta Java, 50:26
rng_58 aka rng..58 C++, 56:42
wz12 57:41
Nerevar C++, 62:02
omeometo C++, 746 bytes
moon5ckq C++, 774 bytes
lxhgww C++, 784 bytes
Vegetable C++, 823 bytes
LiuKe C++, 914 bytes

Test set 2: 23 correct solutions (6.2% solve rate)

winger Java, 39:39
rng_58 aka rng..58 C++, 56:42
Burunduk1 C++, 75:22
andrewzta Java, 86:09
TripleM C++, 87:12
rng_58 aka rng..58 C++, 2368 bytes
msg555 C++, 2813 bytes
Burunduk1 C++, 2892 bytes
Vasyl C++, 2956 bytes
TripleM C++, 3127 bytes