Baltic Olympiad in Informatics: 2015 Day 2, Problem 2
Byteasar the hacker has qualified for this year's IHO, the International Hacking Olympiad. One of the tasks
in the Olympiad involves competing against a system operator. There are computers numbered from
to
,
connected in a ring topology, i.e. computers
and
are connected (for
), and also computers
and
are connected.
The competition is performed as a game between the hacker and the system operator:
- Byteasar moves first. Afterwards, the operator and Byteasar move alternately.
- In his first move, Byteasar chooses any computer and hacks it (for instance, by exploiting some operating system vulnerabilities).
- In his first move, the operator chooses any non-hacked computer and protects it (for instance, by installing latest security upgrades).
- In all his following moves, Byteasar either (a) does nothing or (b) chooses any computer that is neither hacked nor protected and is directly linked to any hacked computer, and hacks it.
- In all his following moves, the operator either (a) does nothing or (b) chooses any computer that is neither hacked nor protected and is directly linked to any protected computer, and protects it.
- The game ends as soon as both have done nothing in two subsequent moves.
At the beginning of the game none of the computers are hacked or protected.
Every computer has a certain value
which specifies the value of the data which is stored on it. For each
hacked computer
, Byteasar scores its value
. Byteasar is quite a good hacker, but has no idea of algorithms.
That is why he asks you to write a program that computes his maximum possible score, assuming that the
operator plays optimally.
Input Specification
The first line of input contains a positive integer
, specifying the number of computers. The second
line contains a sequence of
integers
; number
specifies the value of the data stored on computer
.
Output Specification
In the first and only line of output your program should write one integer: Byteasar's maximum possible score against an optimally playing operator.
Constraints
Subtask | Conditions (in each test case) | Points |
---|---|---|
1 | ||
2 | ||
3 | ||
4 |
Sample Input 1
4
7 6 8 4
Sample Output 1
13
Explanation for Sample 1
In the first example, Byteasar in his first move should hack computer
(scoring
). The operator's response will be protecting computer
. In the next move Byteasar can hack
computer
(scoring
). Finally, the operator will protect computer
.
Sample Input 2
5
1 1 1 1 1
Sample Output 2
3
Comments