Problem Description
You are maintaining a project that has n
methods numbered from 0
to n - 1
. You are given two integers n
and k
, and a 2D integer array invocations
, where invocations[i] = [a_i, b_i]
indicates that method a_i
invokes method b_i
. There is a known bug in method k
. Method k
, along with any method invoked by it, either directly or indirectly, are considered suspicious and we aim to remove them. A group of methods can only be removed if no method outside the group invokes any methods within it. Return an array containing all the remaining methods after removing all the suspicious methods. You may return the answer in any order. If it is not possible to remove all the suspicious methods, none should be removed.
Key Insights
- The problem can be represented as a directed graph where methods are nodes and invocations are directed edges.
- Methods that are directly or indirectly invoked by method
k
are considered suspicious and should be removed. - A method can only be safely removed if it is not invoked by any non-suspicious methods.
- Depth-First Search (DFS) or Breadth-First Search (BFS) can be used to traverse the graph and identify all suspicious methods.
Space and Time Complexity
Time Complexity: O(n + e), where n is the number of methods and e is the number of invocations.
Space Complexity: O(n + e) for storing the graph and the visited states.
Solution
To solve this problem, we can follow these steps:
- Construct a directed graph using an adjacency list representation from the
invocations
array. - Use DFS or BFS starting from method
k
to mark all suspicious methods that are directly or indirectly invoked byk
. - Create a set to keep track of methods that are invoked by any non-suspicious methods.
- Traverse the graph again to identify methods that are not suspicious and are not invoked by any suspicious methods.
- Return the list of remaining methods.