coding-interview|November 17, 2020|2 min read

Four Sum - Leet Code Solution

TL;DR

Sort the array, fix the first two elements with nested loops, then use two pointers for the remaining two. Skip duplicates at each level. O(n^3) time.

Four Sum - Leet Code Solution

Problem Statement

Given an array nums of n integers and an integer target, are there elements a, b, c, and d in nums such that a + b + c + d = target? Find all unique quadruplets in the array which gives the sum of target.

Notice that the solution set must not contain duplicate quadruplets.

Input: nums = [1,0,-1,0,-2,2], target = 0
Output: [[-2,-1,1,2],[-2,0,0,2],[-1,0,0,1]]

Input: nums = [], target = 0
Output: []

Solution

Lets take help of our two-sum problem.

Code

private List<List<Integer>> twoSum(int[] nums, int target, int start) {
  List<List<Integer>> res = new ArrayList<>();
  int l = start;
  int r = nums.length-1;
  while (l < r) {
    
    /**
      * second conditions are for avoiding duplicates.
      */
    
    if (nums[l] + nums[r] < target || (l > start && nums[l-1] == nums[l])) {
      l++;
    }
    else if (nums[l] + nums[r] > target || (r < nums.length-1 && nums[r] == nums[r+1])) {
      r--;
    }
    else {
      List<Integer> t = new ArrayList<>();
      t.add(nums[l]);
      t.add(nums[r]);
      res.add(t);
      l++;
      r--;
    }
  }
  
  return res;
}

// -2 -1 0 0 1 2
private List<List<Integer>> helper(int[] nums, int target, int startIndex, int k) {
  List<List<Integer>> res = new ArrayList<>();
  
  if (startIndex >= nums.length || nums[startIndex] * k > target || target > nums[nums.length - 1] * k) {
    return res;
  }
  else if (k == 2) {
    return twoSum(nums, target, startIndex);
  }
  else {
    for (int i=startIndex; i<nums.length; i++) {
      //This condition is to avoid duplicates
      if (i == startIndex || nums[i] != nums[i-1]) {
        List<List<Integer>> res2 = helper(nums, target-nums[i], i+1, k-1);
        for (List<Integer> t : res2) {
          List<Integer> newRes = new ArrayList<>();
          newRes.add(nums[i]);
          newRes.addAll(t);
          
          res.add(newRes);
        }
      }
    }
  }
  
  return res;
}

public List<List<Integer>> fourSum(int[] nums, int target) {
  //sorting will help in avoiding duplicates in easy manner
  Arrays.sort(nums);
  
  return helper(nums, target, 0, 4);
}
	

Complexity

O(n^2)

Related Posts

Leetcode Solution - Best Time to Buy and Sell Stock

Leetcode Solution - Best Time to Buy and Sell Stock

Problem Statement You are given an array prices where prices[i] is the price of…

Binary Tree - Level Order Traversal

Binary Tree - Level Order Traversal

Problem Statement Given a Binary tree, print out nodes in level order traversal…

Leetcode - Rearrange Spaces Between Words

Leetcode - Rearrange Spaces Between Words

Problem Statement You are given a string text of words that are placed among…

Leetcode - Maximum Non Negative Product in a Matrix

Leetcode - Maximum Non Negative Product in a Matrix

Problem Statement You are given a rows x cols matrix grid. Initially, you are…

Leetcode - Split a String Into the Max Number of Unique Substrings

Leetcode - Split a String Into the Max Number of Unique Substrings

Problem Statement Given a string s, return the maximum number of unique…

Replace all spaces in a string with %20

Replace all spaces in a string with %20

Problem Statement Replace all spaces in a string with ‘%20’ (three characters…

Latest Posts

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

If you’re a Senior Engineer (L5) preparing for Staff (L6+) roles at MAANG…

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF have been in the OWASP Top 10 for over a decade. They’re among the…

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

The OWASP Top 10 is the industry standard for web application security risks. If…

HTTP Cookies Security — Everything Developers Get Wrong

HTTP Cookies Security — Everything Developers Get Wrong

Cookies are the single most important mechanism for web authentication. Every…

Format String Vulnerabilities — The Read-Write Primitive Hiding in printf()

Format String Vulnerabilities — The Read-Write Primitive Hiding in printf()

Format string vulnerabilities are unique in the exploit world. Most memory…

Buffer Overflow Attacks — How Memory Corruption Actually Works

Buffer Overflow Attacks — How Memory Corruption Actually Works

Buffer overflows are the oldest and most consequential vulnerability class in…