Identification

Steps to Solve

  1. Identify the problem (core operation)
  2. Determine what needs to be hashed to achieve core operation
  3. Define the key value pair
  4. Choose the scan pattern
    1. Sliding Window
    2. Two Pointers
    3. Single Pass
    4. Bidirectional pass
  5. How should information be updated as you scan?
    1. Determine what is invariant at every step of the scan