@article{Gibbons2006,
author = {Gibbons, J.},
journal = {American Mathematical Monthly},
number = 4,
pages = {318--328},
publisher = {Citeseer},
title = {Unbounded spigot algorithms for the digits of pi},
url = {http://www.cs.ox.ac.uk/jeremy.gibbons/publications/spigot.pdf},
volume = 113,
year = 2006,
urldate = {2010-01-05},
collections = {Basically computer science}
}
@article{Quisquater,
author = {Quisquater, JJ and Quisquater, M},
journal = {Advances in Cryptology— \ldots},
title = {How to explain zero-knowledge protocols to your children},
url = {http://www.springerlink.com/index/UEBE1L72W9N9M8F8.pdf http://pages.cs.wisc.edu/{\~{}}mkowalcz/628.pdf},
urldate = {2010-03-24},
collections = {Attention-grabbing titles,Easily explained,Protocols and strategies},
year = 1989
}
@article{Socolar2010,
abstract = {We show that a single tile can fill space uniformly but not admit a periodic tiling. The space--filling tiling that can be built from copies of the tile has the structure of a union of honeycombs with lattice constants of {\$}2^n a{\$}, where {\$}a{\$} sets the scale of the most dense lattice and {\$}n{\$} takes all positive integer values. We present the tile, prove that the tilings it admits are not periodic, and discuss some of their remarkable properties, including their relation to a previously known tiling. We also clarify some subtleties in the definitions of the terms "nonperiodic tiling" and "aperiodic tile". For a reasonable interpretation of these terms, the tile presented here is the only known example of an aperiodic tile.},
author = {Socolar, Joshua E. S. and Taylor, Joan M.},
keywords = {Combinatorics,Other Condensed Matter},
month = {mar},
pages = 21,
title = {An aperiodic hexagonal tile},
url = {http://arxiv.org/abs/1003.4279 http://arxiv.org/pdf/1003.4279v2},
year = 2010,
archivePrefix = {arXiv},
eprint = {1003.4279},
primaryClass = {math.CO},
urldate = {2010-03-26}
}
@article{Avigad2008,
abstract = {We present a formal system, E, which provides a faithful model of the proofs in Euclid's Elements, including the use of diagrammatic reasoning.},
author = {Avigad, Jeremy and Dean, Edward and Mumma, John},
keywords = {Logic},
month = {oct},
title = {A formal system for Euclid's Elements},
url = {http://arxiv.org/abs/0810.4315 http://arxiv.org/pdf/0810.4315v3},
year = 2008,
archivePrefix = {arXiv},
eprint = {0810.4315},
primaryClass = {math.LO},
urldate = {2010-04-04}
}
@misc{Elsholtz2002,
abstract = {Heath-Brown [6] suggested a short proof of the two squares theorem, thereby simplifying ideas of Liouville. Zagier [15] suggested a particularly neat form of this, a "One sentence proof". It consists of two suitable involutions on the finite set of the solutions of p = x 2 +4yz in positive integers. A parity argument ensures the existence of a solution with y = z. The proof can be stated in one sentence since elementary calculations (namely to check that the mappings are well defined and are indeed involutory) can be left to the reader. The proof remained somewhat mysterious, since it is not obvious, where these mappings come from. In this paper we reveal this mystery and systematically explore similar proofs that can be given for related problems. We show that the very same method proves results on p = x 2 +2y 2 (see also Jackson [7]), p = x 2 2y 2 , p = 3x 2 + 4y 2 , and p = 3x 2 4y 2 .},
author = {Elsholtz, Christian},
title = {The liouville-heath-brown-zagier proof of the two squares theorem and generalizations},
url = {http://www.springerlink.com/content/319pwfjg26d8xl6g/ http://www.math.tugraz.at/{\~{}}elsholtz/WWW/papers/papers.html},
year = 2002,
urldate = {2010-07-16}
}
@article{Hall2001,
author = {Hall, Rachel W. and Josic, Kresimir},
journal = {The American Mathematical Monthly},
month = {apr},
number = 4,
pages = 347,
title = {The Mathematics of Musical Instruments},
url = {http://www.jstor.org/stable/2695241?origin=crossref},
volume = 108,
year = 2001,
urldate = {2010-07-24},
collections = {Music}
}
@article{KHOSHHAL2010,
author = {KHOSHHAL, ABBAS and DAKHEL, ASGHAR ALIZADEH and ETEMADI, AHMAD and ZERESHKI, SINA},
journal = {Journal of Food Process Engineering},
month = {feb},
pages = {298--313},
title = {ARTIFICIAL NEURAL NETWORK MODELING OF APPLE DRYING PROCESS},
url = {http://blackwell-synergy.com/doi/abs/10.1111/j.1745-4530.2009.00435.x},
volume = 33,
year = 2010,
urldate = {2010-08-21},
collections = {Basically computer science,Probability and statistics}
}
@book{Moritz2008,
abstract = {ON MATHEMATICS AND MATHEMATICIANS Formerly titled Memorabilia Mathematica or the Philomathss Quotation-Book By Robert Edouard Moritz DOVER PUBLICATIONS INC., NEW YORK Copyright 1914 by Robert Edouard Moritz Copyright 1942 by Cassia K. Moritz This new Dover edition first published in 1958 is an unabridged and unaltered republication of the first edition which was originally en titled Memorabilia, Mathematical, or The Philo maths Quotation-Book. Manufactured in the United States of America Dover Publications, Inc. 920 Broadway New York 10, N. Y. PREFACE EVERY one knows that the fine phrase God geometrizes is attributed to Plato, but few know where this famous passage is found, or the exact words in which it was first expressed. Those who, like the author, have spent hours and even days in the search of the exact statements, or the exact references, of similar famous passages, will not question the timeliness and usefulness of a book whose distinct purpose it is to bring together into a single volume exact quotations, with their exact references, bearing on one of the most time-honored, and even today the most active and most fruitful of all the sciences, the queen mother of all the sciences, that is, mathematics. It is hoped that the present volume will prove indispensable to every teacher of mathematics, to every writer on mathe matics, and that the student of mathematics and the related sciences will find its perusal not only a source of pleasure but of encouragement and inspiration as well. The layman will find it a repository of useful information covering a field of knowledge which, owing to the unfamiliar and hence repellant character of the language employed by mathematicians, ispeculiarly in accessible to the general reader. No technical processes or technical facility is required to understand and appreciate the wealth of ideas here set forth in the words of the worlds great thinkers. No labor has been spared to make the present volume worthy of a place among collections of a like kind in other fields. Ten years have been devoted to its preparation, years, which if they could have been more profitably, could scarcely have been more pleasurably employed. As a result there have been brought together over one thousand more or less familiar passages pertaining to mathematics, by poets, philosophers, historians, statesmen, scientists, and mathematicians. These have been gathered from over three hundred authors, and have been vi PREFACE grouped under twenty heads, and cross indexed under nearly seven hundred topics. The authors original plan was to give foreign quotations both in the original and in translation, but with the growth of mate rial this plan was abandoned as infeasible. It was thought to serve the best interest of the greater number of English readers to give translations only, while preserving the references to the original sources, so that the student or critical reader may readily consult the original of any given extract. In cases where the translation is borrowed the translators name is inserted in brackets immediately after the authors name. Brackets are also used to indicate inserted words or phrases made necessary to bring out the context. The absence of similar English works has made the authors work largely that of the pioneer. Rebi res Math6matiques et Math naticiens and Ahrens Scherz und Ernst in der Mathematik have indeed been frequentlyconsulted but rather with a view to avoid overlapping than to receive aid. Thus certain topics as the correspondence of German and French mathematicians, so excellently treated by Ahrens, have pur posely been omitted. The repetitions are limited to a small number of famous utterances whose absence from a work of this kind could scarcely be defended on any grounds. No one can be more keenly aware of the shortcomings of a work than its author, for none can have so intimate an acquaint ance with it...},
author = {Moritz, Robert Edoward},
pages = 448,
publisher = {READ BOOKS},
title = {On Mathematics and Mathematicians},
url = {http://books.google.com/books?id=2sML4rpqucEC{\&}pgis=1},
year = 2008,
urldate = {2010-08-24},
collections = {The act of doing maths}
}
@inproceedings{Kamel1994,
author = {Kamel, Ibrahim and Faloutsos, Christos},
booktitle = {PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES},
pages = {500--500},
publisher = {Citeseer},
title = {Hilbert R-tree: An improved R-tree using fractals},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.45.9180{\&}rep=rep1{\&}type=pdf},
volume = 8958546,
year = 1994,
urldate = {2010-08-31},
collections = {Basically computer science}
}
@article{Alpher1948,
author = {Alpher, R. and Bethe, H. and Gamow, G.},
journal = {Physical Review},
month = {apr},
number = 7,
pages = {803--804},
title = {The Origin of Chemical Elements},
url = {http://en.wikipedia.org/wiki/Alpher{\%}E2{\%}80{\%}93Bethe{\%}E2{\%}80{\%}93Gamow{\_}paper},
volume = 73,
year = 1948,
urldate = {2010-09-03},
collections = {Basically physics}
}
@inproceedings{Weber2002,
author = {Weber, K.},
booktitle = {Proceedings from the 2nd International Conference for the Teaching of Mathematics},
title = {The role of instrumental and relational understanding in proofs about group isomorphisms},
url = {http://www.math.uoc.gr/{\~{}}ictm2/Proceedings/pap86.pdf},
year = 2002,
urldate = {2010-09-03},
collections = {The act of doing maths}
}
@article{Grunbaum2006,
author = {Gr{\"{u}}nbaum, Branko},
journal = {Notices of the American Mathematical Society},
number = {ICM},
pages = {2--5},
title = {What symmetry groups are present in the Alhambra?},
url = {http://www.ams.org/notices/200606/comm-grunbaum.pdf},
year = 2006,
urldate = {2010-09-06},
collections = {History,Easily explained}
}
@article{Markowsky1992,
author = {Markowsky, George},
journal = {The College Mathematics Journal},
month = {jan},
number = 1,
pages = 2,
title = {Misconceptions about the Golden Ratio},
url = {http://www.jstor.org/stable/2686193?origin=crossref},
volume = 23,
year = 1992,
urldate = {2010-09-29},
collections = {Easily explained}
}
@article{Brunvand1963,
author = {Brunvand, J.H.},
journal = {Journal of American Folklore},
number = 299,
pages = {42--68},
publisher = {JSTOR},
title = {A classification for shaggy dog stories},
url = {http://www.jstor.org/stable/538078},
volume = 76,
year = 1963,
urldate = {2011-01-12},
collections = {Lists and catalogues,Animals}
}
@article{Shoemake1985,
abstract = {Solid bodies roll and tumble through space. In computer animation, so do cameras. The rotations of these objects are best described using a four coordinate system, quaternions, as is shown in this paper. Of all quaternions, those on the unit sphere are most suitable for animation, but the question of how to construct curves on spheres has not been much explored. This paper gives one answer by presenting a new kind of spline curve, created on a sphere, suitable for smoothly in-betweening (i.e. interpolating) sequences of arbitrary rotations. Both theory and experiment show that the motion generated is smooth and natural, without quirks found in earlier methods.},
author = {Shoemake, Ken},
journal = {International Conference on Computer Graphics and Interactive Techniques},
keywords = {B-spline,B{\'{e}}zier curve,animation,approximation,in-betweening,interpolation,quaternion,rotation,spherical geometry,spline},
number = 3,
pages = 245,
title = {Animating rotation with quaternion curves},
url = {http://portal.acm.org/citation.cfm?doid=325334.325242},
volume = 19,
year = 1985,
urldate = {2011-01-12}
}
@article{Raymer2007,
abstract = {It is well known that a jostled string tends to become knotted; yet the factors governing the "spontaneous" formation of various knots are unclear. We performed experiments in which a string was tumbled inside a box and found that complex knots often form within seconds. We used mathematical knot theory to analyze the knots. Above a critical string length, the probability P of knotting at first increased sharply with length but then saturated below 100{\%}. This behavior differs from that of mathematical self-avoiding random walks, where P has been proven to approach 100{\%}. Finite agitation time and jamming of the string due to its stiffness result in lower probability, but P approaches 100{\%} with long, flexible strings. We analyzed the knots by calculating their Jones polynomials via computer analysis of digital photos of the string. Remarkably, almost all were identified as prime knots: 120 different types, having minimum crossing numbers up to 11, were observed in 3,415 trials. All prime knots with up to seven crossings were observed. The relative probability of forming a knot decreased exponentially with minimum crossing number and M{\"{o}}bius energy, mathematical measures of knot complexity. Based on the observation that long, stiff strings tend to form a coiled structure when confined, we propose a simple model to describe the knot formation based on random "braid moves" of the string end. Our model can qualitatively account for the observed distribution of knots and dependence on agitation time and string length.},
author = {Raymer, Dorian M and Smith, Douglas E},
doi = {10.1073/pnas.0611320104},
issn = {0027-8424},
journal = {Proceedings of the National Academy of Sciences of the United States of America},
month = {oct},
number = 42,
pages = {16432--7},
pmid = 17911269,
title = {Spontaneous knotting of an agitated string.},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2034230{\&}tool=pmcentrez{\&}rendertype=abstract},
volume = 104,
year = 2007,
urldate = {2011-01-12},
collections = {Easily explained}
}
@article{Glenis2008,
author = {Glenis, Spyros and Kapovich, M. and Brodskiy, N. and Dydak, J. and Lang, U. and Ballinger, B. and Blekherman, G. and Cohn, H. and Giansiracusa, N. and Kelly, E. and Others},
isbn = 7774553983,
issn = {1551-3440},
journal = {the montana mathematics enthusiast},
keywords = {euclidean geometry,isometries,klein,relations},
number = {2{\&}3},
pages = {199--214},
publisher = {Iap},
title = {Comparison of geometric figures},
url = {http://books.google.com/books?hl=en{\&}lr={\&}id=QJTkBBHbIuQC{\&}oi=fnd{\&}pg=PA28{\&}dq=Comparison+of+Geometric+Figures{\&}ots=tS475dg6Jo{\&}sig=PF-HjmGK1QPJ66aCXPq4p1zxgz0},
volume = 5,
year = 2008,
urldate = {2011-02-03}
}
@article{Ord2002,
author = {Ord, Toby},
journal = {Arxiv preprint math/0209332},
title = {Hypercomputation: computing more than the Turing machine},
url = {http://arxiv.org/abs/math/0209332 http://arxiv.org/pdf/math/0209332v1},
year = 2002,
archivePrefix = {arXiv},
eprint = {math/0209332},
primaryClass = {math.LO},
abstract = {Due to common misconceptions about the Church-Turing thesis, it has been
widely assumed that the Turing machine provides an upper bound on what is
computable. This is not so. The new field of hypercomputation studies models of
computation that can compute more than the Turing machine and addresses their
implications. In this report, I survey much of the work that has been done on
hypercomputation, explaining how such non-classical models fit into the
classical theory of computation and comparing their relative powers. I also
examine the physical requirements for such machines to be constructible and the
kinds of hypercomputation that may be possible within the universe. Finally, I
show how the possibility of hypercomputation weakens the impact of Godel's
Incompleteness Theorem and Chaitin's discovery of 'randomness' within
arithmetic.},
urldate = {2011-02-09},
collections = {Basically computer science}
}
@article{Duarte2005,
author = {Duarte, J},
doi = {10.1016/j.autcon.2004.07.013},
issn = 09265805,
journal = {Automation in Construction},
keywords = {design automation,grammars,housing,mass customization,siza},
month = {mar},
number = 2,
pages = {265--275},
title = {A discursive grammar for customizing mass housing: the case of Siza's houses at Malagueira},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0926580504000810},
volume = 14,
year = 2005,
urldate = {2011-02-15},
collections = {Basically computer science,Art}
}
@article{Blasjo,
author = {Blasjo, Viktor},
isbn = 0821835874,
issn = {1534-6455},
journal = {The Mathematical Association of America Montly},
number = 112,
pages = {526--566},
publisher = {Amer Mathematical Society},
title = {The isoperimetric problem},
url = {http://books.google.com/books?hl=en{\&}lr={\&}id=HRr3jdBDXIgC{\&}oi=fnd{\&}pg=PA175{\&}dq=The+Isoperimetric+Problem{\&}ots=sh66HDGNF7{\&}sig=98xmkIZ71{\_}NHrpnKYs0WSQ0UFqc},
urldate = {2011-03-14},
collections = {Puzzles},
year = 2001
}
@article{Warrington2009,
author = {Warrington, Gregory S.},
language = {EN},
month = {jan},
publisher = {Mathematical Association of America},
title = {Juggling Probabilities},
url = {http://www.jstor.org/pss/30037409},
year = 2009,
urldate = {2011-03-20},
collections = {Easily explained}
}
@article{Comon1997,
author = {Comon, Hubert and Dauchet, M and Gilleron, R},
title = {Tree automata techniques and applications},
url = {http://en.scientificcommons.org/42494218},
year = 1997,
urldate = {2011-03-25},
collections = {Basically computer science}
}
@article{Nollenburg2010,
abstract = {Metro maps are schematic diagrams of public transport networks that serve as visual aids for route planning and navigation tasks. It is a challenging problem in network visualization to automatically draw appealing metro maps. There are two aspects to this problem that depend on each other: the layout problem of finding station and link coordinates and the labeling problem of placing non-overlapping station labels. In this paper we present a new integral approach that solves the combined layout and labeling problem (each of which, independently, is known to be NP-hard) using mixed-integer programming (MIP). We identify seven design rules used in most real-world metro maps. We split these rules into hard and soft constraints and translate them into a MIP model. Our MIP formulation finds a metro map that satisfies all hard constraints (if such a drawing exists) and minimizes a weighted sum of costs that correspond to the soft constraints. We have implemented the MIP model and present a case study and the results of an expert assessment to evaluate the performance of our approach in comparison to both manually designed official maps and results of previous layout methods.},
author = {N{\"{o}}llenburg, Martin and Wolff, Alexander},
doi = {10.1109/TVCG.2010.81},
issn = {1077-2626},
journal = {IEEE transactions on visualization and computer graphics},
month = {may},
pages = {1--25},
pmid = 20498505,
title = {Drawing and Labeling High-Quality Metro Maps by Mixed-Integer Programming.},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20498505},
year = 2010,
urldate = {2011-04-07},
collections = {Basically computer science}
}
@article{Khosla2002,
author = {Khosla, D},
journal = {Intelligent Vehicle Symposium, 2002. IEEE},
title = {Accurate estimation of forward path geometry using two-clothoid road model},
url = {http://ieeexplore.ieee.org/xpls/abs{\_}all.jsp?arnumber=1187944},
year = 2002,
urldate = {2011-04-12},
collections = {Basically computer science}
}
@article{VanHarreveld1939,
author = {van Harreveld, A.},
issn = {0021-9967},
journal = {The Journal of Comparative Neurology},
month = {apr},
number = 2,
pages = {285--296},
title = {Doubly-, triply-, quadruply- and quintuply-innervated crustacean muscles},
url = {http://doi.wiley.com/10.1002/cne.900700208},
volume = 70,
year = 1939,
urldate = {2011-08-09}
}
@article{Boolos1994,
author = {Boolos, George},
doi = {10.1093/mind/103.409.1},
issn = {0026-4423},
journal = {Mind},
number = 409,
pages = {1--3},
title = {G{\"{o}}del's Second Incompleteness Theorem Explained in Words of One Syllable},
url = {http://mind.oxfordjournals.org/cgi/doi/10.1093/mind/103.409.1},
volume = 103,
year = 1994,
urldate = {2011-09-24},
collections = {Easily explained}
}
@article{Hardy1971,
author = {Hardy, C. and Baronet, C. N. and Tordion, G. V.},
issn = {0029-5981},
journal = {International Journal for Numerical Methods in Engineering},
month = {oct},
number = 4,
pages = {451--462},
title = {The elasto-plastic indentation of a half-space by a rigid sphere},
url = {http://doi.wiley.com/10.1002/nme.1620030402},
volume = 3,
year = 1971,
urldate = {2011-10-02}
}
@article{Calogero2003,
author = {Calogero, Francesco},
issn = {0343-6993},
journal = {The Mathematical Intelligencer},
keywords = {Mathematics},
month = {dec},
number = 4,
pages = {72--76},
publisher = {Springer New York},
title = {Cool irrational numbers and their rather cool rational approximations},
url = {http://www.springerlink.com/content/n413421605156535/},
volume = 25,
year = 2003,
urldate = {2011-10-13},
collections = {Attention-grabbing titles}
}
@article{Ball2009,
abstract = {The titles of scientific articles have a special significance. We examined nearly 20 million scientific articles and recorded the development of articles with a question mark at the end of their titles over the last 40 years. Our study was confined to the disciplines of physics, life sciences and medicine, where we found a significant increase from 50{\%} to more than 200{\%} in the number of articles with question-mark titles. We looked at the principle functions and structure of the titles of scientific papers, and we assume that marketing aspects are one of the decisive factors behind the growing usage of question-mark titles in scientific articles.},
author = {Ball, Rafael},
issn = {0138-9130},
journal = {Scientometrics},
keywords = {Computer Science},
month = {jan},
number = 3,
pages = {667--679},
publisher = {Akad{\'{e}}miai Kiad{\'{o}}, co-published with Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V.},
title = {Scholarly communication in transition: The use of question marks in the titles of scientific articles in medicine, life sciences and physics 1966–2005},
url = {http://www.springerlink.com/content/uh466q5p3722n37l/},
volume = 79,
year = 2009,
urldate = {2011-10-14},
collections = {History,The act of doing maths}
}
@article{Hilhorst2005,
archivePrefix = {arXiv},
arxivId = {arXiv:cond-mat/0507567v1},
author = {Hilhorst, H.J.},
eprint = {0507567v1},
journal = {Journal of Statistical Mechanics: Theory and Experiment},
keywords = {exact results,random graphs},
pages = {P09005},
primaryClass = {arXiv:cond-mat},
publisher = {IOP Publishing},
title = {Asymptotic statistics of the n-sided planar Poisson–Voronoi cell: I. Exact results},
url = {http://iopscience.iop.org/1742-5468/2005/09/P09005},
volume = 2005,
year = 2005,
urldate = {2011-12-08},
collections = {Probability and statistics}
}
@article{Fink2000,
author = {Fink, T and Mao, Y},
doi = {10.1016/S0378-4371(99)00226-5},
issn = 03784371,
journal = {Physica A: Statistical Mechanics and its Applications},
keywords = {knot theory,random walks,tie knots,topology},
month = {feb},
number = {1-2},
pages = {109--121},
title = {Tie knots, random walks and topology},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0378437199002265},
volume = 276,
year = 2000,
urldate = {2011-12-09},
collections = {Probability and statistics}
}
@article{Ekhad2011,
abstract = {The beautiful theory of statistical gambling, started by Dubins and Savage (for subfair games) and continued by Kelly and Breiman (for superfair games) has mostly been studied under the unrealistic assumption that we live in a continuous world, that money is indefinitely divisible, and that our life is indefinitely long. Here we study these fascinating problems from a purely discrete, finitistic, and computational, viewpoint, using Both Symbol-Crunching and Number-Crunching (and simulation just for checking purposes).},
archivePrefix = {arXiv},
arxivId = {1112.1645},
author = {Ekhad, Shalosh B and Georgiadis, Evangelos and Zeilberger, Doron},
eprint = {1112.1645},
journal = {Strategy},
keywords = {Computer Science and Game Theory,Probability},
month = {dec},
pages = 6,
title = {How to Gamble If You're In a Hurry},
url = {http://arxiv.org/abs/1112.1645 http://arxiv.org/pdf/1112.1645v2},
year = 2011,
primaryClass = {math.PR},
urldate = {2011-12-15},
collections = {Attention-grabbing titles,Games to play with friends,Probability and statistics}
}
@article{Petersen2010,
abstract = {Carrots for dessert is the title of a section of the paper `On polynomial-like mappings' by Douady and Hubbard. In that section the authors define a notion of dyadic carrot fields of the Mandelbrot set M and more generally for Mandelbrot like families. They remark that such carrots are small when the dyadic denominator is large, but they do not even try to prove a precise such statement. In this paper we formulate and prove a precise statement of asymptotic shrinking of dyadic Carrot-fields around M. The same proof carries readily over to show that the dyadic decorations of copies M' of the Mandelbrot set M inside M and inside the parabolic Mandelbrot set shrink to points when the denominator diverge to infinity.},
archivePrefix = {arXiv},
arxivId = {1003.3947},
author = {Petersen, Carsten Lunde and Roesch, Pascale},
eprint = {1003.3947},
keywords = {Dynamical Systems},
month = {mar},
pages = 21,
title = {Carrots for dessert},
url = {http://arxiv.org/abs/1003.3947 http://arxiv.org/pdf/1003.3947v1},
volume = 0,
year = 2010,
primaryClass = {math.DS},
urldate = {2012-01-02},
collections = {Attention-grabbing titles}
}
@article{Gajardo2002,
author = {Gajardo, A and Moreira, A and Goles, E},
journal = {Discrete Applied Mathematics},
keywords = {arti{\"{y}}cial life,complexity,universality,virtual ant},
number = 1,
pages = {41--50},
publisher = {Elsevier},
title = {Complexity of Langton's ant},
url = {http://www.sciencedirect.com/science/article/pii/S0166218X00003346},
volume = 117,
year = 2002,
urldate = {2012-01-04},
collections = {Basically computer science,Easily explained,Animals}
}
@article{Schmidt1966,
author = {Schmidt, WM},
journal = {Trans. Amer. Math. Soc},
number = {C},
pages = {178--199},
title = {On badly approximable numbers and certain games},
url = {http://www.ams.org/journals/tran/1966-123-01/S0002-9947-1966-0195595-4/S0002-9947-1966-0195595-4.pdf},
year = 1966,
urldate = {2012-01-04},
collections = {Games to play with friends}
}
@article{Fisher2007,
author = {Fisher, GL and Mellor, B.},
doi = {10.1080/17513470701416264},
issn = {1751-3472},
journal = {Journal of Mathematics and the Arts},
keywords = {00a06,2000 mathematics subject classifications,20h15,51f25,a needle and thread,beaded bead,frieze group,introduction,polyhedron,section 1,symmetry,three-dimensional finite point group,to make decorative objects,to sew beads together,weavers of beads use},
month = {jun},
number = 2,
pages = {85--96},
publisher = {Taylor {\&} Francis},
title = {Three-dimensional finite point groups and the symmetry of beaded beads},
url = {http://www.tandfonline.com/doi/abs/10.1080/17513470701416264 http://myweb.lmu.edu/bmellor/beadedbeads.pdf},
volume = 1,
year = 2007,
urldate = {2012-01-04},
collections = {Easily explained,Things to make and do}
}
@article{Funes1999,
author = {Funes, Pablo and Pollack, Jordan},
journal = {Evolutionary design by computers},
pages = {387--403},
publisher = {Morgan Kaufmann, San Francisco},
title = {Computer evolution of buildable objects},
url = {http://books.google.com/books?hl=en{\&}lr={\&}id=EgC6LBAH5r8C{\&}oi=fnd{\&}pg=PA387{\&}dq=Computer+Evolution+of+Buildable+Objects{\&}ots=DghBxZL9U8{\&}sig=7N-w2EI4tyT7cZdbH9-F5SrHRk4},
year = 1999,
urldate = {2012-01-09},
collections = {Basically computer science}
}
@inproceedings{Crepeau1987,
author = {Cr{\'{e}}peau, C.},
pages = {239--247},
publisher = {Springer},
title = {A zero-knowledge Poker protocol that achieves confidentiality of the players' strategy or How to achieve an electronic Poker face},
url = {http://www.springerlink.com/index/9X0K51KDU6JQ4X8W.pdf},
year = 1987,
urldate = {2012-01-10},
collections = {Attention-grabbing titles,Protocols and strategies,Games to play with friends}
}
@article{Diaconis2011,
abstract = {Many casinos routinely use mechanical card shuffling machines. We were asked to evaluate a new product, a shelf shuffler. This leads to new probability, new combinatorics, and to some practical advice which was adopted by the manufacturer. The interplay between theory, computing, and real-world application is developed.},
archivePrefix = {arXiv},
arxivId = {1107.2961},
author = {Diaconis, Persi and Fulman, Jason and Holmes, Susan},
eprint = {1107.2961},
journal = {Analysis},
keywords = {Combinatorics,Probability},
month = {jul},
pages = 23,
title = {Analysis of Casino Shelf Shuffling Machines},
url = {http://arxiv.org/abs/1107.2961 http://arxiv.org/pdf/1107.2961v2},
year = 2011,
primaryClass = {math.CO},
urldate = {2012-01-11},
collections = {Basically physics,Probability and statistics}
}
@misc{Henderson,
author = {Henderson, Xander},
title = {The Collatz Fractal},
url = {http://yozh.org/2012/01/12/the{\_}collatz{\_}fractal/},
urldate = {2012-01-15},
year = 2012
}
@inproceedings{Cormode2004,
author = {Cormode, Graham},
booktitle = {Proceedings of the 3rd International Conference on FUN with Algorithms},
pages = {65--76},
title = {The hardness of the Lemmings game, or Oh no, more NP-completeness proofs},
url = {http://scholar.google.com/scholar?hl=en{\&}btnG=Search{\&}q=intitle:The+Hardness+of+the+Lemmings+Game+,+or+Oh+no+,+more+NP-Completeness+Proofs{\#}0},
year = 2004,
urldate = {2012-01-27},
collections = {Attention-grabbing titles,Basically computer science,Games to play with friends,Animals}
}
@article{Viglietta2012,
abstract = {We establish some general schemes relating the computational complexity of a video game to the presence of certain common elements or mechanics, such as destroyable paths, collecting items, doors activated by switches or pressure plates, etc.. Then we apply such "metatheorems" to several video games published between 1980 and 1998, including Pac-Man, Tron, Lode Runner, Boulder Dash, Deflektor, Mindbender, Pipe Mania, Skweek, Prince of Persia, Lemmings, Doom, Puzzle Bobble 3, and Starcraft. We obtain both new results, and improvements or alternative proofs of previously known results.},
archivePrefix = {arXiv},
arxivId = {1201.4995},
author = {Viglietta, Giovanni},
eprint = {1201.4995},
keywords = {Computational Complexity,Computer Science and Game Theory},
month = {jan},
pages = 12,
title = {Gaming is a hard job, but someone has to do it!},
url = {http://arxiv.org/abs/1201.4995 http://arxiv.org/pdf/1201.4995v5},
year = 2012,
primaryClass = {cs.CC},
urldate = {2012-01-27},
collections = {Basically computer science,Games to play with friends}
}
@article{Moszkowski2011,
author = {Moszkowski, Ben},
doi = {10.1109/TIME.2011.25},
isbn = {978-1-4577-1242-5},
journal = {2011 Eighteenth International Symposium on Temporal Representation and Reasoning},
month = {sep},
pages = {107--114},
publisher = {Ieee},
title = {Compositional Reasoning Using Intervals and Time Reversal},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6065235},
year = 2011,
urldate = {2012-01-27}
}
@article{Wolf2010,
abstract = {We give 50 digits values of the simple continued fractions whose denominators are formed from a) prime numbers, b) twin primes, c) generalized {\$}d{\$}-twins, d) primes of the form {\$}m^2+n^4{\$}, e)primes of the form {\$}m^2+1{\$}, f) Mersenne primes and g) primorial primes. All these continued fractions belong to the set of measure zero of exceptions to the theorems of Khinchin and Levy. We claim that all these continued fractions are transcendental numbers. Next we propose the conjecture which indicates the way to deduce the transcendence of some continued fractions from transcendence of another ones.},
archivePrefix = {arXiv},
arxivId = {1003.4015},
author = {Wolf, Marek},
eprint = {1003.4015},
isbn = 9999637051,
journal = {Arxiv preprint arXiv:1003.4015},
keywords = {History and Overview,Number Theory},
month = {mar},
number = 1,
pages = 35,
title = {Continued fractions constructed from prime numbers},
url = {http://arxiv.org/abs/1003.4015 http://arxiv.org/pdf/1003.4015v2},
volume = 1,
year = 2010,
primaryClass = {math.NT},
urldate = {2012-02-01},
collections = {Easily explained}
}
@article{Izhakian2005,
abstract = {This paper introduces a new structure of commutative semiring, generalizing the tropical semiring, and having an arithmetic that modifies the standard tropical operations, i.e. summation and maximum. Although our framework is combinatorial, notions of regularity and invertibility arise naturally for matrices over this semiring; we show that a tropical matrix is invertible if and only if it is regular.},
archivePrefix = {arXiv},
arxivId = {math/0505458},
author = {Izhakian, Zur},
eprint = {math/0505458},
journal = {ReCALL},
keywords = {Algebraic Geometry,Combinatorics},
month = {may},
pages = 17,
primaryClass = {math.AG},
title = {Tropical Arithmetic and Tropical Matrix Algebra},
url = {http://arxiv.org/abs/math/0505458 http://arxiv.org/pdf/math/0505458v3},
year = 2005,
urldate = {2012-02-03},
collections = {Unusual arithmetic}
}
@article{Hodge2010,
author = {Hodge, Jonathan K. and Marshall, Emily and Patterson, Geoff},
doi = {10.4169/074683410X510317},
issn = 07468342,
journal = {The College Mathematics Journal},
month = {sep},
number = 4,
pages = {312--324},
title = {Gerrymandering and Convexity},
url = {http://www.jstor.org/stable/10.4169/074683410X510317},
volume = 41,
year = 2010,
urldate = {2012-02-03},
collections = {Easily explained}
}
@article{Ball2011,
author = {Ball, Philip},
issn = {0028-0836},
journal = {Nature},
month = {dec},
number = 7378,
pages = {455--455},
publisher = {Nature Publishing Group, a division of Macmillan Publishers Limited. All Rights Reserved.},
shorttitle = {Nature},
title = {In retrospect: On the Six-Cornered Snowflake},
url = {http://dx.doi.org/10.1038/480455a},
volume = 480,
year = 2011,
urldate = {2012-02-06}
}
@inproceedings{Gradwohl2007,
author = {Gradwohl, Ronen and Naor, M. and Pinkas, Benny and Rothblum, G.},
booktitle = {Fun with Algorithms},
number = 860,
pages = {166--182},
publisher = {Springer},
title = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles},
url = {http://www.springerlink.com/index/N15668887411R778.pdf http://www.mit.edu/{\~{}}rothblum/papers/sudoku.pdf},
year = 2007,
urldate = {2012-02-07},
collections = {Easily explained,Protocols and strategies}
}
@article{Meier1980,
author = {Meier, Paul and Zabell, Sandy},
journal = {Journal of the American Statistical Association},
keywords = {19th-century mathematical sued,charles s,distinguished,peirce,thomas blandel retained equally},
number = 371,
pages = {497--506},
publisher = {JSTOR},
title = {Benjamin Peirce and the Howland will},
url = {http://www.jstor.org/stable/10.2307/2287637 http://ben-israel.rutgers.edu/711/Meier-Zabell.pdf},
volume = 75,
year = 1980,
urldate = {2012-02-07},
collections = {History}
}
@misc{Devlin,
author = {Devlin, Keith},
title = {Good stories, pity they're not true},
url = {http://www.maa.org/devlin/devlin{\_}06{\_}04.html},
urldate = {2012-02-08},
collections = {Attention-grabbing titles,History}
}
@article{Benjamin2007,
author = {Benjamin, A.T. and Cameron, N.T. and Quinn, J.J.},
journal = {Fibonacci Quarterly},
number = 1,
pages = 39,
publisher = {THE FIBONACCI ASSOCIATION},
title = {Fibonacci determinants-a combinatorial approach},
url = {http://www.math.hmc.edu/{\~{}}benjamin/papers/FiboDet.pdf},
volume = 45,
year = 2007,
urldate = {2012-02-08}
}
@article{Moler2003,
author = {Moler, Cleve and Van Loan, C.},
journal = {SIAM review},
keywords = {1,15a15,65f15,65f30,65l99,ams subject classifications,and eco-,biological,condition,exponential,introduction,mathematical models of many,matrix,physical,pii,roundoff error,s0036144502418010,truncation error},
number = 1,
pages = {3--49},
publisher = {JSTOR},
title = {Nineteen dubious ways to compute the exponential of a matrix, twenty-five years later},
url = {http://www.jstor.org/stable/10.2307/25054364 http://www.cs.cornell.edu/cv/researchpdf/19ways+.pdf},
volume = 45,
year = 2003,
urldate = {2012-02-09},
collections = {Basically computer science}
}
@article{Speyer2004,
abstract = {These are the notes for the Clay Mathematics Institute Senior Scholar Lecture which was delivered by Bernd Sturmfels in Park City, Utah, on July 22, 2004. The topic of this lecture is the ``tropical approach'' in mathematics, which has gotten a lot of attention recently in combinatorics, algebraic geometry and related fields. It offers an an elementary introduction to this subject, touching upon Arithmetic, Polynomials, Curves, Phylogenetics and Linear Spaces. Each section ends with a suggestion for further research. The bibliography contains numerousreferences for further reading in this field.},
archivePrefix = {arXiv},
arxivId = {math/0408099},
author = {Speyer, David and Sturmfels, Bernd},
eprint = {math/0408099},
keywords = {Algebraic Geometry,Combinatorics},
month = {aug},
number = {July},
pages = 15,
primaryClass = {math.CO},
title = {Tropical Mathematics},
url = {http://arxiv.org/abs/math/0408099 http://arxiv.org/pdf/math/0408099v1},
year = 2004,
urldate = {2012-02-12},
collections = {Unusual arithmetic,Easily explained}
}
@article{Erlichson2003,
author = {Erlichson, Herman},
doi = {10.1016/S0315-0860(02)00008-3},
issn = 03150860,
journal = {Historia Mathematica},
month = {nov},
number = 4,
pages = {432--440},
title = {Passage to the limit in Proposition I, Book I of Newton's Principia},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0315086002000083},
volume = 30,
year = 2003,
urldate = {2012-02-15},
collections = {History}
}
@article{Bartholdi2012,
abstract = {There are two standard ways of peeling an orange: either cut the skin along meridians, or cut it along a spiral. We consider here the second method, and study the shape of the spiral strip, when unfolded on a table. We derive a formula that describes the corresponding flattened-out spiral. Cutting the peel with progressively thinner strip widths, we obtain a sequence of increasingly long spirals. We show that, after rescaling, these spirals tends to a definite shape, known as the Euler spiral. The Euler spiral has applications in many fields of science. In optics, the illumination intensity at a point behind a slit is computed from the distance between two points on the Euler spiral. The Euler spiral also provides optimal curvature for train tracks between a straight run and an upcoming bend. It is striking that it can be also obtained with an orange and a kitchen knife.},
archivePrefix = {arXiv},
arxivId = {1202.3033},
author = {Bartholdi, Laurent and Henriques, Andr{\'{e}} G.},
eprint = {1202.3033},
journal = {Time},
month = {feb},
pages = {1--3},
title = {Orange Peels and Fresnel Integrals},
url = {http://arxiv.org/abs/1202.3033 http://arxiv.org/pdf/1202.3033v1},
year = 2012,
primaryClass = {math.HO},
urldate = {2012-02-15},
collections = {Attention-grabbing titles,Easily explained,Things to make and do}
}
@article{Pepperberg2012,
abstract = {A Grey parrot ( Psittacus erithacus ), able to quantify sets of eight or fewer items (including heterogeneous subsets), to sum two sequentially presented sets of 0–6 items (up to 6), and to identify and serially order Arabic numerals (1–8), all by using English labels (Pepperberg in J Comp Psychol 108:36–44, 1994 ; J Comp Psychol 120:1–11, 2006a ; J Comp Psychol 120:205–216, 2006b ; Pepperberg and Carey submitted), was tested on addition of two Arabic numerals or three sequentially presented collections (e.g., of variously sized jelly beans or nuts). He was, without explicit training and in the absence of the previously viewed addends, asked, “How many total?” and required to answer with a vocal English number label. In a few trials on the Arabic numeral addition, he was also shown variously colored Arabic numerals while the addends were hidden and asked “What color number (is the) total?” Although his death precluded testing on all possible arrays, his accuracy was statistically significant and suggested addition abilities comparable with those of nonhuman primates.},
author = {Pepperberg, Irene M.},
issn = {1435-9448},
journal = {Animal Cognition},
keywords = {Biomedical and Life Sciences},
month = {feb},
pages = {1--7},
publisher = {Springer Berlin / Heidelberg},
title = {Further evidence for addition and numerical competence by a Grey parrot (Psittacus erithacus)},
url = {http://www.springerlink.com/content/q08n44457x236ln6/},
year = 2012,
urldate = {2012-02-21},
collections = {Animals}
}
@article{Ghrist2008,
author = {Ghrist, Robert},
journal = {Bulletin-American Mathematical Society},
number = 3,
pages = {1--15},
title = {Barcodes: the persistent topology of data},
url = {http://www.ams.org/bull/2008-45-01/S0273-0979-07-01191-3/S0273-0979-07-01191-3.pdf},
year = 2008,
urldate = {2012-02-23},
collections = {Probability and statistics}
}
@article{Washington1986,
author = {Washington, Lawrence and Zagier, Don},
title = {Quotients Homophones des Groupes Libres Homophonic Quotients of Free Groups},
url = {http://people.mpim-bonn.mpg.de/zagier/files/exp-math-2/fulltext.pdf},
year = 1986,
urldate = {2012-02-27},
collections = {Easily explained}
}
@article{VanLeeuwaarden2011,
abstract = {For a homogeneous random walk in the quarter plane with nearest-neighbor transitions, starting from some state {\$}(i{\_}0,j{\_}0){\$}, we study the event that the walk reaches the vertical axis, before reaching the horizontal axis. We derive an exact expression for the probability of this event, and derive an asymptotic expression for the case when {\$}i{\_}0{\$} becomes large, a situation in which the event becomes highly unlikely. The exact expression follows from the solution of a boundary value problem and is in terms of an integral that involves a conformal gluing function. The asymptotic expression follows from the asymptotic evaluation of this integral. Our results find applications in a model for nucleosome shifting, the voter model and the asymmetric exclusion process.},
archivePrefix = {arXiv},
arxivId = {1104.3034},
author = {van Leeuwaarden, Johan S. H. and Raschel, Kilian},
eprint = {1104.3034},
journal = {Plays},
month = {apr},
pages = 17,
title = {Random walks reaching against all odds the other side of the quarter plane},
url = {http://arxiv.org/abs/1104.3034 http://arxiv.org/pdf/1104.3034v2},
year = 2011,
primaryClass = {math.PR},
urldate = {2012-03-01},
collections = {Probability and statistics}
}
@misc{Ferguson,
author = {Ferguson, D. F. and Wrench, John W},
title = {A New Approximation to {\$}\pi{\$} (Conclusion)},
url = {http://www.jstor.org/discover/10.2307/2002657?uid=3738032{\&}uid=2{\&}uid=4{\&}sid=47698756219137},
urldate = {2012-03-14},
collections = {Easily explained},
year = 1948
}
@article{Becker2003,
author = {Becker, J{\"{o}}rg},
journal = {of the 6th international conference on},
title = {Topic-based vector space model},
url = {http://udoo.uni-muenster.de/downloads/publications/1433.pdf},
year = 2003,
urldate = {2012-03-24},
collections = {Basically computer science}
}
@article{Giblin1990,
author = {Giblin, PJ},
journal = {American Mathematical Monthly},
title = {The bitangent sphere problem},
url = {http://www.jstor.org/stable/10.2307/2323998 http://dl.acm.org/citation.cfm?id=87129},
year = 1990,
urldate = {2012-03-24}
}
@article{Petersen2011,
abstract = {We analyze the dynamic properties of 10^7 words recorded in English, Spanish and Hebrew over the period 1800--2008 in order to gain insight into the coevolution of language and culture. We report language independent patterns useful as benchmarks for theoretical models of language evolution. A significantly decreasing (increasing) trend in the birth (death) rate of words indicates a recent shift in the selection laws governing word use. For new words, we observe a peak in the growth-rate fluctuations around 40 years after introduction, consistent with the typical entry time into standard dictionaries and the human generational timescale. Pronounced changes in the dynamics of language during periods of war shows that word correlations, occurring across time and between words, are largely influenced by coevolutionary social, technological, and political factors. We quantify cultural memory by analyzing the long-term correlations in the use of individual words using detrended fluctuation analysis.},
archivePrefix = {arXiv},
arxivId = {1107.3707},
author = {Petersen, Alexander M and Tenenbaum, Joel and Havlin, Shlomo and Stanley, H Eugene},
eprint = {1107.3707},
journal = {Methods},
month = {jul},
pages = 31,
title = {Statistical Laws Governing Fluctuations in Word Use from Word Birth to Word Death},
url = {http://arxiv.org/abs/1107.3707 http://arxiv.org/pdf/1107.3707v2},
year = 2011,
primaryClass = {physics.soc-ph},
urldate = {2012-03-27},
collections = {Probability and statistics}
}
@article{Ianovski2012,
abstract = {We examine the history of cake cutting mechanisms and discuss the efficiency of their allocations. In the case of piecewise uniform preferences, we define a game that in the presence of strategic agents has equilibria that are not dominated by the allocations of any mechanism. We identify that the equilibria of this game coincide with the allocations of an existing cake cutting mechanism.},
archivePrefix = {arXiv},
arxivId = {1203.0100},
author = {Ianovski, Egor},
eprint = {1203.0100},
journal = {October},
month = {mar},
number = {March},
title = {Cake Cutting Mechanisms},
url = {http://arxiv.org/abs/1203.0100 http://arxiv.org/pdf/1203.0100v2},
year = 2012,
primaryClass = {cs.GT},
urldate = {2012-04-07},
collections = {Puzzles,Easily explained,Protocols and strategies}
}
@article{Chelghoum2004,
author = {Chelghoum, Kamel and Margenstern, Maurice and Martin, Beno\^it},
journal = {Cellular Automata},
pages = {1--11},
title = {Cellular automata in the hyperbolic plane: proposal for a new environment},
url = {http://www.springerlink.com/index/J44Q88AFRMG6GP26.pdf},
year = 2004,
urldate = {2012-04-08},
collections = {Basically computer science}
}
@article{Gunji2011,
abstract = {Based on the field observation of soldier crabs, we previously proposed a model for a swarm of soldier crabs. Here, we describe the interaction of coherent swarms in the simulation model, which is implemented in a logical gate. Because a swarm is generated by inherent perturbation, a swarm can be generated and maintained under highly perturbed conditions. Thus, the model reveals a robust logical gate rather than stable one. In addition, we show that the logical gate of swarms is also implemented by real soldier crabs (Mictyris guinotae).},
author = {Gunji, YP and Nishiyama, Y},
journal = {AIP Conference Proceedings},
title = {Robust Soldier Crab Ball Gate},
url = {http://link.aip.org/link/?APCPCS/1389/995/1},
year = 2011,
urldate = {2012-04-15},
collections = {Attention-grabbing titles,Basically computer science,Easily explained,Animals}
}
@article{Lemoine2010,
abstract = {Sprouts is a two-player topological game, invented in 1967 in the University of Cambridge by John Conway and Michael Paterson. The game starts with p spots, and ends in at most 3p-1 moves. The first player who cannot play loses. The complexity of the p-spot game is very high, so that the best hand-checked proof only shows who the winner is for the 7-spot game, and the best previous computer analysis reached p=11. We have written a computer program, using mainly two new ideas. The nimber (also known as Sprague-Grundy number) allows us to compute separately independent subgames; and when the exploration of a part of the game tree seems to be too difficult, we can manually force the program to search elsewhere. Thanks to these improvements, we reached up to p=32. The outcome of the 33-spot game is still unknown, but the biggest computed value is the 47-spot game ! All the computed values support the Sprouts conjecture: the first player has a winning strategy if and only if p is 3, 4 or 5 modulo 6. We have also used a check algorithm to reduce the number of positions needed to prove which player is the winner. It is now possible to hand-check all the games until p=11 in a reasonable amount of time.},
archivePrefix = {arXiv},
arxivId = {1008.2320},
author = {Lemoine, Julien and Viennot, Simon},
eprint = {1008.2320},
journal = {Analysis},
month = {aug},
pages = 17,
title = {Computer analysis of Sprouts with nimbers},
url = {http://arxiv.org/abs/1008.2320 http://arxiv.org/pdf/1008.2320v1},
year = 2010,
primaryClass = {math.CO},
urldate = {2012-04-21},
collections = {Unusual arithmetic}
}
@article{Friedman1998,
abstract = {Let k be a positive integer. There is a longest finite sequence x1,...,xn in k letters in which no consecutive block xi,...,x2i is a subsequence of any other consecutive block xj,...,x2j. Let n(k) be this longest length. We prove that n(1) = 3, n(2) = 11, and n(3) is incomprehensibly large. We give a lower bound for n(3) in terms of the familiar Ackerman hierarchy. We also give asymptotic upper and lower bounds for n(k). We view n(3) as a particularly elemental description of an incomprehensibly large integer. Related problems involving binary sequences (two letters) are also addressed. We also report on some recent computer explorations of R. Dougherty which we use to raise the lower bound for n(3).},
author = {Friedman, Harvey M},
pages = {1--50},
title = {Long finite sequences},
url = {http://www.math.osu.edu/{\~{}}friedman.8/pdf/finiteseq10{\_}8{\_}98.pdf},
year = 1998,
urldate = {2012-04-24}
}
@book{Thompson1914,
abstract = {Being a very simplest introduction to those beautiful methods of reckoning which are generally called by the terrifying names of the DIFFERENTIAL CALCULUS and the INTEGRAL CALCULUS},
author = {Thompson, Silvanus P},
title = {Calculus Made Easy},
url = {http://www.gutenberg.org/ebooks/33283},
year = 1914,
urldate = {2012-04-26}
}
@article{Shelah1992,
abstract = {When modern set theory is applied to conventional mathematical problems, it has a disconcerting tendency to produce independence results rather than theorems in the usual sense. The resulting preoccupation with "consistency" rather than "truth" may be felt to give the subject an air of unreality. Even elementary questions about the basic arithmetical operations of exponentiation in the context of infinite cardinalities, like the value of {\$}2^{\{}\aleph{\_}0{\}}{\$}, cannot be settled on the basis of the usual axioms of set theory (ZFC). Although much can be said in favor of such independence results, rather than undertaking to challenge such prejudices, we have a more modest goal; we wish to point out an area of contemporary set theory in which theorems are abundant, although the conventional wisdom views the subject as dominated by independence results, namely, cardinal arithmetic.},
author = {Shelah, Saharon},
doi = {10.1090/S0273-0979-1992-00261-6},
issn = {0273-0979},
journal = {Bulletin of the American Mathematical Society},
month = {apr},
number = 2,
pages = {197--211},
title = {Cardinal arithmetic for skeptics},
url = {http://www.ams.org/journals/bull/1992-26-02/S0273-0979-1992-00261-6/S0273-0979-1992-00261-6.pdf http://arxiv.org/pdf/math/9201251v1.pdf},
volume = 26,
year = 1992,
urldate = {2012-05-02}
}
@article{Vecer2009,
abstract = {We study the effect of the red card in a soccer game. A red card is given by a referee to signify that a player has been sent off following a serious misconduct. The player who has been sent off must leave the game immediately and cannot be replaced during the game. His team must continue the game with one player fewer. We estimate the effect of the red card from betting data on the FIFA World Cup 2006 and Euro 2008, showing that the scoring intensity of the penalized team drops significantly, while the scoring intensity of the opposing team increases slightly. We show that a red card typically leads to a smaller number of goals scored during the game when a stronger team is penalized, but it can lead to an increased number of goals when a weaker team is punished. We also show when it is better to commit a red card offense in exchange for the prevention of a goal opportunity.},
author = {Vecer, Jan and Kopriva, Frantisek},
journal = {Journal of Quantitative Analysis in},
number = 1992,
pages = {1--13},
title = {Estimating the Effect of the Red Card in Soccer},
url = {http://www.stat.columbia.edu/{\~{}}vecer/redcard.pdf},
year = 2009,
urldate = {2012-05-09},
collections = {Easily explained}
}
@article{Baez2012,
abstract = {Understanding the exceptional Lie groups as the symmetry groups of simpler objects is a long-standing program in mathematics. Here, we explore one famous realization of the smallest exceptional Lie group, G2. Its Lie algebra acts locally as the symmetries of a ball rolling on a larger ball, but only when the ratio of radii is 1:3. Using the split octonions, we devise a similar, but more global, picture of G2: it acts as the symmetries of a 'spinorial ball rolling on a projective plane', again when the ratio of radii is 1:3. We explain this ratio in simple terms using the incidence geometry of G2, and show how a form of geometric quantization applied to this system gives the imaginary split octonions.},
archivePrefix = {arXiv},
arxivId = {1205.2447},
author = {Baez, John C and Huerta, John},
eprint = {1205.2447},
month = {may},
pages = 28,
title = {G2 and the Rolling Ball},
url = {http://arxiv.org/abs/1205.2447 http://arxiv.org/pdf/1205.2447v4},
year = 2012,
primaryClass = {math.DG},
urldate = {2012-05-14},
collections = {Basically physics}
}
@article{Geiges2011,
abstract = {We apply the method of filling with holomorphic discs to a 4-dimensional symplectic cobordism with the standard contact 3-sphere as a convex boundary component. We establish the following dichotomy: either the cobordism is diffeomorphic to a ball, or there is a periodic Reeb orbit of quantifiably short period in the concave boundary of the cobordism. This allows us to give a unified treatment of various results concerning Reeb dynamics on contact 3-manifolds, symplectic fillability, the topology of symplectic cobordisms, symplectic non-squeezing, and the non-existence of exact Lagrangian surfaces in standard symplectic 4-space.},
author = {Geiges, Hansj{\"{o}}rg and Zehmisch, Kai},
month = {apr},
pages = 26,
title = {How to recognise a 4-ball when you see one},
url = {http://arxiv.org/abs/1104.1543 http://arxiv.org/pdf/1104.1543v3},
year = 2011,
archivePrefix = {arXiv},
eprint = {1104.1543},
primaryClass = {math.SG},
urldate = {2012-05-19},
collections = {Attention-grabbing titles}
}
@article{Ravsky2012,
abstract = {We found a solution of the star puzzle (a path on a chessboard from c5 to d4 in 14 straight strokes) in 14 queen moves, which has been claimed by the author as impossible.},
archivePrefix = {arXiv},
arxivId = {1205.0747},
author = {Ravsky, Alex},
eprint = {1205.0747},
journal = {Star},
month = {may},
pages = 2,
title = {On an error in the star puzzle by Henry E. Dudeney},
url = {http://arxiv.org/abs/1205.0747 http://arxiv.org/pdf/1205.0747v2},
year = 2012,
primaryClass = {math.HO},
urldate = {2012-05-22},
collections = {Puzzles}
}
@article{Feist2012,
abstract = {We use braids and linking number to explain why automobile shades fold into an odd number of loops.},
archivePrefix = {arXiv},
arxivId = {1205.4797},
author = {Feist, Curtis and Naimi, Ramin},
eprint = {1205.4797},
month = {may},
pages = 8,
title = {Topology Explains Why Automobile Sunshades Fold Oddly},
url = {http://arxiv.org/abs/1205.4797 http://arxiv.org/pdf/1205.4797v1},
year = 2012,
primaryClass = {math.GT},
urldate = {2012-05-23},
collections = {Easily explained,Basically physics}
}
@article{Kindler2004,
author = {Kindler, G},
journal = {of the fifteenth annual ACM-SIAM symposium on},
title = {On distributions computable by random walks on graphs},
url = {http://dl.acm.org/citation.cfm?id=982809},
year = 2004,
urldate = {2012-06-07}
}
@article{Isaksen2002,
author = {Isaksen, DC},
journal = {The American mathematical monthly},
number = 9,
pages = {796--805},
title = {A cohomological viewpoint on elementary school arithmetic},
url = {http://www.jstor.org/stable/10.2307/3072368},
volume = 109,
year = 2002,
urldate = {2012-06-14},
collections = {Unusual arithmetic}
}
@article{Kraft2001,
author = {Kraft, Hanspeter},
journal = {J. Biol. Phys. Chem},
number = {December},
pages = {95--96},
title = {The wobbly garden table},
url = {http://www.amsi.ge/jbpc/020101/full/9{\_}18KR01F.pdf},
volume = 1,
year = 2001,
urldate = {2012-06-17},
collections = {Easily explained,Basically physics}
}
@article{Baek2010,
abstract = {We address the equilibrium concept of a reverse auction game so that no one can enhance the individual payoff by a unilateral change when all the others follow a certain strategy. In this approach the combinatorial possibilities to consider become very much involved even for a small number of players, which has hindered a precise analysis in previous works. We here present a systematic way to reach the solution for a general number of players, and show that this game is an example of conflict between the group and the individual interests.},
archivePrefix = {arXiv},
arxivId = {1001.1065},
author = {Baek, Seung Ki and Bernhardsson, Sebastian},
doi = {10.1142/S0219477510000071},
eprint = {1001.1065},
keywords = {game,lowest unique positive integer,nash equilibrium,projection operator},
month = {jan},
number = 0,
pages = 8,
title = {Equilibrium solution to the lowest unique positive integer game},
url = {http://arxiv.org/abs/1001.1065 http://arxiv.org/pdf/1001.1065v1},
volume = 0,
year = 2010,
primaryClass = {math.CO},
urldate = {2012-06-22},
collections = {Protocols and strategies}
}
@misc{Chalcraft,
author = {Chalcraft, Adam and Greene, Michael},
title = {Train Sets},
url = {http://www.monochrom.at/turingtrainterminal/Chalcraft.pdf},
urldate = {2012-06-25},
collections = {Easily explained,Things to make and do},
year = 1994
}
@article{Dubner2001,
author = {Dubner, H},
title = {The top ten prime numbers},
url = {http://primes.utm.edu/lists/top{\_}ten/topten.pdf},
year = 2001,
urldate = {2012-06-28},
collections = {Easily explained,Lists and catalogues}
}
@article{Sloane2006,
abstract = {When the Handbook of Integer Sequences came out in 1973, Philip Morrison gave it an enthusiastic review in the Scientific American and Martin Gardner was kind enough to say in his Mathematical Games column for July 1974 that "every recreational mathematician should buy a copy forthwith." That book contained 2372 sequences. Today the On-Line Encyclopedia of Integer Sequences (or OEIS) contains 117000 sequences. The following are seven that I find especially interesting. Many of them quite literally stagger. The sequences will be labeled with their numbers (such as A064413) in the OEIS. Much more information about them can be found there and in the references cited.},
author = {Sloane, N J A},
pages = {1--12},
title = {Seven Staggering Sequences},
url = {http://neilsloane.com/doc/g4g7.pdf},
year = 2006,
urldate = {2012-07-14},
collections = {Easily explained}
}
@article{Flexner1952,
author = {Flexner, Abraham},
journal = {Harper's Magazine},
keywords = {Research,Science},
month = {oct},
number = 117,
pages = {544--552},
pmid = 13024481,
title = {The usefulness of useless knowledge},
url = {http://library.ias.edu/files/UsefulnessHarpers.pdf},
volume = 17,
year = 1952,
urldate = {2012-07-16},
collections = {History}
}
@article{Mamakani2012,
abstract = {A symmetric Venn diagram is one that is invariant under rotation, up to a relabeling of curves. A simple Venn diagram is one in which at most two curves intersect at any point. In this paper we introduce a new property of Venn diagrams called crosscut symmetry, which is related to dihedral symmetry. Utilizing a computer search restricted to crosscut symmetry we found many simple symmetric Venn diagrams with 11 curves. This answers an existence question that has been open since the 1960's. The first such diagram that was discovered is shown here.},
archivePrefix = {arXiv},
arxivId = {1207.6452},
author = {Mamakani, Khalegh and Ruskey, Frank},
eprint = {1207.6452},
keywords = {crosscut symmetry,hypercube,symmetric graphs,venn diagram},
month = {jul},
title = {A New Rose : The First Simple Symmetric 11-Venn Diagram},
url = {http://arxiv.org/abs/1207.6452 http://arxiv.org/pdf/1207.6452v1},
year = 2012,
primaryClass = {cs.CG},
urldate = {2012-08-09},
collections = {Art,Easily explained}
}
@article{Cui2012,
abstract = {The modified quantized enveloping algebra has a remarkable basis, called the canonical basis, which was introduced by Lusztig. In this paper, all these monomial elements of the canonical basis for type {\$}A{\_}{\{}2{\}}{\$} are determined and we also give a conjecture about all polynomial elements of the canonical basis.},
archivePrefix = {arXiv},
arxivId = {1208.5531},
author = {Cui, Weideng},
eprint = {1208.5531},
keywords = {algebra,canonical basis,the modified quantized enveloping,the quasi-},
month = {aug},
title = {The Canonical Basis of {\$}\dot{\{}\mathbf{\{}U{\}}{\}}{\$} for Type {\$}A{\_}{\{}2{\}}{\$}},
url = {http://arxiv.org/abs/1208.5531 http://arxiv.org/pdf/1208.5531v3},
year = 2012,
primaryClass = {math.RT},
urldate = {2012-08-29}
}
@article{Stuckman2005,
abstract = {In this paper we show that the Mastermind Satisfiability Problem (MSP) is NP-complete. The Mastermind is a popular game which can be turned into a logical puzzle called Mastermind Satisfiability Problem in a similar spirit to the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its intrinsic computational property that makes it challenging and interesting. This serves as an addition to our knowledge about a host of other puzzles, such as Minesweeper, Mah-Jongg, and the 15-puzzle.},
archivePrefix = {arXiv},
arxivId = {cs/0512049},
author = {Stuckman, Jeff and Zhang, Guo-Qiang},
eprint = {cs/0512049},
journal = {Arxiv preprint cs/0512049},
keywords = {computational complexity,mastermind,theory of computation},
month = {dec},
pages = {1--7},
primaryClass = {cs.CC},
title = {Mastermind is NP-Complete},
url = {http://arxiv.org/abs/cs/0512049 http://arxiv.org/pdf/cs/0512049v1},
year = 2005,
urldate = {2012-09-02},
collections = {Puzzles,Basically computer science,Games to play with friends}
}
@article{Masuda2005,
abstract = {Hubs, or vertices with large degrees, play massive roles in, for example, epidemic dynamics, innovation diffusion, and synchronization on networks. However, costs of owning edges can motivate agents to decrease their degrees and avoid becoming hubs, whereas they would somehow like to keep access to a major part of the network. By analyzing a model and tennis players' partnership networks, we show that combination of vertex fitness and homophily yields a VIP club made of elite vertices that are influential but not easily accessed from the majority. Intentionally formed VIP members can even serve as masterminds, which manipulate hubs to control the entire network without exposing themselves to a large mass. From conventional viewpoints based on network topology and edge direction, elites are not distinguished from many other vertices. Understanding network data is far from sufficient; individualistic factors greatly affect network structure and functions per se.},
archivePrefix = {arXiv},
arxivId = {cond-mat/0501129},
author = {Masuda, Naoki and Konno, Norio},
doi = {10.1016/j.socnet.2005.07.005},
eprint = 0501129,
journal = {Social networks},
month = {jan},
pages = 15,
primaryClass = {cond-mat},
title = {VIP-club phenomenon: emergence of elites and masterminds in social networks},
url = {http://www.sciencedirect.com/science/article/pii/S0378873305000535 http://arxiv.org/abs/cond-mat/0501129},
year = 2005,
urldate = {2012-09-02}
}
@article{Shima2012,
abstract = {The tree-based rope swing is a popular recreation facility, often installed in outdoor areas, giving pleasure to thrill-seekers. In the setting, one drops down from a high platform, hanging from a rope, then swings at a great speed like "Tarzan", and finally jumps ahead to land on the ground. The question now arises: How far can Tarzan jump by the swing? In this article, I present an introductory analysis of the Tarzan swing mechanics, a big pendulum-like swing with Tarzan himself attached as weight. The analysis enables determination of how farther forward Tarzan can jump using a given swing apparatus. The discussion is based on elementary mechanics and, therefore, expected to provide rich opportunities for investigations using analytic and numerical methods.},
archivePrefix = {arXiv},
arxivId = {1208.4355},
author = {Shima, Hiroyuki},
eprint = {1208.4355},
month = {aug},
pages = 8,
title = {How far can Tarzan jump?},
url = {http://arxiv.org/abs/1208.4355 http://arxiv.org/pdf/1208.4355v1},
year = 2012,
primaryClass = {physics.pop-ph},
urldate = {2012-09-02}
}
@article{Kahan1998,
author = {Kahan, W and Darcy, JD},
journal = {\ldots 1998 Workshop on Java \ldots},
pages = {1--81},
title = {How Java's floating-point hurts everyone everywhere},
url = {http://port70.net/{\~{}}nsz/articles/float/kahan{\_}java{\_}hurts{\_}1998.pdf http://www.cs.berkeley.edu/{\~{}}wkahan/JAVAhurt.pdf},
year = 1998,
urldate = {2012-09-05},
collections = {Basically computer science}
}
@article{Sunic2011,
abstract = {In the Twin Towers of Hanoi version of the well known Towers of Hanoi Problem there are two coupled sets of pegs. In each move, one chooses a pair of pegs in one of the sets and performs the only possible legal transfer of a disk between the chosen pegs (the smallest disk from one of the pegs is moved to the other peg), but also, simultaneously, between the corresponding pair of pegs in the coupled set (thus the same sequence of moves is always used in both sets). We provide upper and lower bounds on the length of the optimal solutions to problems of the following type. Given an initial and a final position of N disks in each of the coupled sets, what is the smallest number of moves needed to simultaneously obtain the final position from the initial one in each set? Our analysis is based on the use of a group, called Hanoi Towers group, of rooted ternary tree automorphisms, which models the original problem in such a way that the configurations on N disks are the vertices at level N of the tree and the action of the generators of the group represents the three possible moves between the three pegs. The twin version of the problem is analyzed by considering the action of Hanoi Towers group on pairs of vertices.},
archivePrefix = {arXiv},
arxivId = {1108.4494},
author = {Sunic, Zoran},
eprint = {1108.4494},
month = {aug},
pages = {1--19},
title = {Twin Towers of Hanoi},
url = {http://arxiv.org/abs/1108.4494 http://arxiv.org/pdf/1108.4494v1},
year = 2011,
primaryClass = {math.CO},
urldate = {2012-09-28},
collections = {Puzzles,Easily explained}
}
@article{Coulbois2012,
abstract = {In this article we determine, for an infinite family of maps on the plane, the topology of the surface on which the minimal regular covering occurs. This infinite family includes all Archimedean maps.},
archivePrefix = {arXiv},
arxivId = {1210.1518},
author = {Coulbois, Thierry and Pellicer, Daniel and Raggi, Miguel and Ram{\'{i}}rez, Camilo and Valdez, Ferr{\'{a}}n},
eprint = {1210.1518},
month = {oct},
pages = 21,
title = {The topology of the minimal regular cover of the Archimedean tessellations},
url = {http://arxiv.org/abs/1210.1518 http://arxiv.org/pdf/1210.1518v1},
year = 2012,
primaryClass = {math.GT},
urldate = {2012-10-05}
}
@article{Bruijn1981,
author = {Bruijn, NG De},
journal = {Kon. Nederl. Akad. Wetensch. Proc. Ser. A},
title = {Algebraic theory of Penrose's non-periodic tilings of the plane},
url = {http://alexandria.tue.nl/repository/freearticles/597566.pdf},
year = 1981,
urldate = {2012-10-13}
}
@article{Gerlach2010,
abstract = {What is the longest rope on the unit sphere? Intuition tells us that the answer to this packing problem depends on the rope's thickness. For a countably infinite number of prescribed thickness values we construct and classify all solution curves. The simplest ones are similar to the seamlines of a tennis ball, others exhibit a striking resemblance to Turing patterns in chemistry, or to ordered phases of long elastic rods stuffed into spherical shells.},
archivePrefix = {arXiv},
arxivId = {1005.4609},
author = {Gerlach, Henryk and von der Mosel, Heiko},
eprint = {1005.4609},
journal = {Nature},
month = {may},
pages = 15,
title = {On sphere-filling ropes},
url = {http://arxiv.org/abs/1005.4609 http://arxiv.org/pdf/1005.4609v1},
year = 2010,
primaryClass = {math.GT},
urldate = {2012-10-29},
collections = {Easily explained}
}
@article{Pasles2001,
author = {Pasles, PC},
journal = {The American Mathematical Monthly},
number = 6,
pages = {489--511},
title = {The lost squares of Dr. Franklin: Ben Franklin's missing squares and the secret of the magic circle},
url = {http://www.jstor.org/stable/10.2307/2695704},
volume = 108,
year = 2001,
urldate = {2012-10-30},
collections = {Puzzles,History}
}
@article{Papy1970,
author = {Papy, F},
journal = {Math Teaching},
title = {Papy's Minicomputer},
url = {http://www.rkennes.be/Papy-Minicomputer/minicomp-anglais.pdf},
year = 1970,
urldate = {2012-10-31},
collections = {Easily explained,Things to make and do}
}
@article{Khovanova2012,
abstract = {I present and discuss a puzzle about wizards invented by John H. Conway.},
archivePrefix = {arXiv},
arxivId = {1210.5460},
author = {Khovanova, Tanya},
eprint = {1210.5460},
month = {oct},
pages = 5,
title = {Conway's Wizards},
url = {http://arxiv.org/abs/1210.5460 http://arxiv.org/pdf/1210.5460v1},
year = 2012,
primaryClass = {math.HO},
urldate = {2012-11-03},
collections = {Puzzles,Easily explained}
}
@article{Demaine2012,
abstract = {We show how to hang a picture by wrapping rope around n nails, making a polynomial number of twists, such that the picture falls whenever any k out of the n nails get removed, and the picture remains hanging when fewer than k nails get removed. This construction makes for some fun mathematical magic performances. More generally, we characterize the possible Boolean functions characterizing when the picture falls in terms of which nails get removed as all monotone Boolean functions. This construction requires an exponential number of twists in the worst case, but exponential complexity is almost always necessary for general functions.},
archivePrefix = {arXiv},
arxivId = {1203.3602},
author = {Demaine, Erik D. and Demaine, Martin L. and Minsky, Yair N. and Mitchell, Joseph S. B. and Rivest, Ronald L. and Patrascu, Mihai},
eprint = {1203.3602},
isbn = 9783642303470,
month = {mar},
pages = 17,
title = {Picture-Hanging Puzzles},
url = {http://arxiv.org/abs/1203.3602 http://arxiv.org/pdf/1203.3602v2},
year = 2012,
primaryClass = {cs.DS},
urldate = {2012-11-03},
collections = {Puzzles,Easily explained}
}
@article{Alexander2012,
abstract = {A biologically unavoidable sequence is an infinite gender sequence which occurs in every gendered, infinite genealogical network satisfying certain tame conditions. We show that every eventually periodic sequence is biologically unavoidable (this generalizes Koenig's Lemma), and we exhibit some biologically avoidable sequences. Finally we give an application of unavoidable sequences to cellular automata.},
archivePrefix = {arXiv},
arxivId = {1212.0186},
author = {Alexander, Samuel},
eprint = {1212.0186},
month = {dec},
pages = 9,
title = {Biologically Unavoidable Sequences},
url = {http://arxiv.org/abs/1212.0186 http://arxiv.org/pdf/1212.0186v2},
volume = 63,
year = 2012,
primaryClass = {math.CO},
urldate = {2012-12-16}
}
@article{Wilcox2006,
abstract = {The strong association of birth weight with infant mortality is complicated by a paradoxical finding: Small babies in high-risk populations usually have lower risk than small babies in low-risk populations. In this issue of the Journal, Hern{\'{a}}ndez-D{\'{i}}az et al. (Am J Epidemiol 2006;164:1115-20) address this "birth weight paradox" using directed acyclic graphs (DAGs). They conclude that the paradox is the result of bias created by adjustment for a factor (birth weight) that is affected by the exposure of interest and at the same time shares causes with the outcome (mortality). While this bias has been discussed before, the DAGs presented by Hern{\'{a}}ndez-D{\'{i}}az et al. provide more firmly grounded criticism. The DAGs demonstrate (as do many other examples) that seemingly reasonable adjustments can distort epidemiologic results. In this commentary, the birth weight paradox is shown to be an illustration of Simpson's Paradox. It is possible for a factor to be protective within every stratum of a variable and yet be damaging overall. Questions remain as to the causal role of birth weight.},
author = {Wilcox, Allen J},
doi = {10.1093/aje/kwj276},
issn = {0002-9262},
journal = {American journal of epidemiology},
keywords = {Causality,Confounding Factors (Epidemiology),Female,Humans,Infant,Infant Mortality,Low Birth Weight,Newborn,Prevalence,Risk Assessment,Risk Factors,Smoking,Smoking: adverse effects,Smoking: epidemiology,United States,United States: epidemiology},
month = {dec},
number = 11,
pages = {1121--3; discussion 1124--5},
pmid = 16931545,
title = {Invited commentary: the perils of birth weight--a lesson from directed acyclic graphs.},
url = {http://www.ncbi.nlm.nih.gov/pubmed/16931545 http://aje.oxfordjournals.org/content/164/11/1121.long},
volume = 164,
year = 2006,
urldate = {2013-01-02},
collections = {Easily explained,Probability and statistics}
}
@article{Rothemund2004,
abstract = {Algorithms and information, fundamental to technological and biological organization, are also an essential aspect of many elementary physical phenomena, such as molecular self-assembly. Here we report the molecular realization, using two-dimensional self-assembly of DNA tiles, of a cellular automaton whose update rule computes the binary function XOR and thus fabricates a fractal pattern--a Sierpinski triangle--as it grows. To achieve this, abstract tiles were translated into DNA tiles based on double-crossover motifs. Serving as input for the computation, long single-stranded DNA molecules were used to nucleate growth of tiles into algorithmic crystals. For both of two independent molecular realizations, atomic force microscopy revealed recognizable Sierpinski triangles containing 100-200 correct tiles. Error rates during assembly appear to range from 1{\%} to 10{\%}. Although imperfect, the growth of Sierpinski triangles demonstrates all the necessary mechanisms for the molecular implementation of arbitrary cellular automata. This shows that engineered DNA self-assembly can be treated as a Turing-universal biomolecular system, capable of implementing any desired algorithm for computation or construction tasks.},
author = {Rothemund, Paul W K and Papadakis, Nick and Winfree, Erik},
issn = {1545-7885},
journal = {PLoS biology},
keywords = {Algorithms,Base Sequence,Biophysics,Biophysics: methods,Computational Biology,Computational Biology: methods,Computer Simulation,Computers, Molecular,DNA,DNA: chemistry,Genetic Engineering,Microscopy, Atomic Force,Models, Genetic,Reproducibility of Results,Sequence Analysis, DNA,Ultraviolet Rays},
month = {dec},
number = 12,
pages = {e424},
publisher = {Public Library of Science},
title = {Algorithmic self-assembly of DNA Sierpinski triangles.},
url = {http://dx.plos.org/10.1371/journal.pbio.0020424},
volume = 2,
year = 2004,
urldate = {2013-01-18}
}
@article{Bielczyk2012,
abstract = {We discuss two models of interpersonal interactions with delay. The first model is linear, and allows the presentation of a rigorous mathematical analysis of stability, while the second is nonlinear and a typical local stability analysis is thus performed. The linear model is a direct extension of the classic Strogatz model. On the other hand, as interpersonal relations are nonlinear dynamical processes, the nonlinear model should better reflect real interactions. Both models involve immediate reaction on partner's state and a correction of the reaction after some time. The models we discuss belong to the class of two-variable systems with one delay for which appropriate delay stabilizes an unstable steady state. We formulate a theorem and prove that stabilization takes place in our case. We conclude that considerable (meaning large enough, but not too large) values of time delay involved in the model can stabilize love affairs dynamics.},
author = {Bielczyk, Natalia and Bodnar, Marek and Fory{\'{s}}, Urszula},
issn = 00963003,
journal = {Applied Mathematics and Computation},
keywords = {dyadic interactions,stability switches,stabilization of steady state,the hopf bifurcation,time delay},
month = {dec},
number = 8,
pages = {3923--3937},
title = {Delay can stabilize: Love affairs dynamics},
url = {http://dx.doi.org/10.1016/j.amc.2012.10.028},
volume = 219,
year = 2012,
urldate = {2013-01-19},
collections = {Easily explained}
}
@article{Fiore2013,
abstract = {A familiar problem in neo-Riemannian theory is that the P, L, and R operations defined as contextual inversions on pitch-class segments do not produce parsimonious voice leading. We incorporate permutations into T/I-PLR-duality to resolve this issue and simultaneously broaden the applicability of this duality. More precisely, we construct the dual group to the permutation group acting on n-tuples with distinct entries, and prove that the dual group to permutations adjoined with a group G of invertible affine maps Z12 -\textgreater Z12 is the internal direct product of the dual to permutations and the dual to G. Musical examples include Liszt, R. W. Venezia, S. 201 and Schoenberg, String Quartet Number 1, Opus 7. We also prove that the Fiore--Noll construction of the dual group in the finite case works, and clarify the relationship of permutations with the RICH transformation.},
author = {Fiore, Thomas M. and Noll, Thomas and Satyendra, Ramon},
month = {jan},
pages = 15,
title = {Incorporating Voice Permutations into the Theory of Neo-Riemannian Groups and Lewinian Duality},
url = {http://arxiv.org/abs/1301.4136 http://arxiv.org/pdf/1301.4136v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1301.4136},
primaryClass = {math.GR},
urldate = {2013-01-21},
collections = {Music}
}
@article{Davis2012,
author = {Davis, Tom},
pages = {1--21},
title = {Conway's Rational Tangles},
url = {http://www.geometer.org/mathcircles/tangle.pdf},
year = 2012,
urldate = {2013-02-06},
collections = {Easily explained,Things to make and do}
}
@article{Maymin2011,
author = {Maymin, PZ},
journal = {Algorithmic Finance},
title = {Markets are efficient if and only if P = NP},
url = {http://iospress.metapress.com/index/0WH736N18J682433.pdf},
volume = 2010,
year = 2011,
urldate = {2013-02-11}
}
@article{Galvin1993,
author = {Galvin, Fred},
journal = {American Mathematical Monthly},
number = 6,
pages = {578--580},
title = {Embedding countable groups in 2-generator groups},
url = {http://www.jstor.org/stable/10.2307/2324618},
volume = 100,
year = 1993,
urldate = {2013-02-19}
}
@article{Hughes2007,
author = {Hughes, Jesse},
title = {The Muddy Children : A logic for public announcement},
url = {http://phiwumbda.org/{\~{}}jesse/slides/MuddyChildren.handouts.pdf},
year = 2007,
urldate = {2013-02-19}
}
@article{Richeson2013,
abstract = {We answer the question: who first proved that {\$}C/d{\$} is a constant? We argue that Archimedes proved that the ratio of the circumference of a circle to its diameter is a constant independent of the circle and that the circumference constant equals the area constant ({\$}C/d=A/r^{\{}2{\}}{\$}). He stated neither result explicitly, but both are implied by his work. His proof required the addition of two axioms beyond those in Euclid's {\$}\{\$}emph{\{}Elements{\}}; this was the first step toward a rigorous theory of arc length. We also discuss how Archimedes's work coexisted with the 2000-year belief -- championed by scholars from Aristotle to Descartes -- that it is impossible to find the ratio of a curved line to a straight line.},
archivePrefix = {arXiv},
arxivId = {1303.0904},
author = {Richeson, David},
eprint = {1303.0904},
keywords = {and phrases,arc,archimedes,aristotle,circle,descartes,history,pi},
month = {mar},
pages = 17,
title = {Circular reasoning: who first proved that {\$}C/d{\$} is a constant?},
url = {http://arxiv.org/abs/1303.0904 http://arxiv.org/pdf/1303.0904v2},
year = 2013,
primaryClass = {math.HO},
urldate = {2013-03-06}
}
@article{Ghang2013,
abstract = {We use recurrence equations (alias difference equations) to enumerate the number of formula-representations of positive integers using only addition and multiplication, and using addition, multiplication, and exponentiation, where all the inputs are ones. We also describe efficient algorithms for the random generation of such representations, and use Dynamical Programming to find a shortest possible formula representing any given positive integer.},
archivePrefix = {arXiv},
arxivId = {1303.0885},
author = {Ghang, EK and Zeilberger, Doron},
eprint = {1303.0885},
isbn = 1111111111,
journal = {arXiv preprint arXiv:1303.0885},
month = {mar},
pages = {1--7},
title = {Zeroless Arithmetic: Representing Integers ONLY using ONE},
url = {http://arxiv.org/abs/1303.0885 http://arxiv.org/pdf/1303.0885v2},
year = 2013,
primaryClass = {math.CO},
urldate = {2013-03-07},
collections = {Unusual arithmetic,Easily explained}
}
@article{Pierce2009,
author = {Pierce, Pamela and Ramsay, John},
journal = {Math \ldots},
number = {November},
pages = {19--22},
title = {The Circle-Squaring Problem Decomposed},
url = {http://mathdl.maa.org/images/upload{\_}library/22/Evans/Pierce.pdf},
year = 2009,
urldate = {2013-03-17}
}
@article{Moller2009,
author = {M{\"{o}}ller, H},
journal = {math.uni-muenster.de},
pages = {1--32},
title = {Das 2: 3-Ei-ein praktikables Eimodell},
url = {http://www.math.uni-muenster.de/u/mollerh/data/ZweiDreiEi.pdf},
year = 2009,
urldate = {2013-03-19},
collections = {Art,Easily explained,Lists and catalogues,Animals}
}
@article{Cherowitzo2006,
author = {Cherowitzo, WE},
journal = {To appear},
title = {Constructing the Tits ovoid from an elliptic quadric},
url = {http://www-math.ucdenver.edu/{\~{}}wcherowi/research/htmltalks/ovoids/ovoids.pdf},
year = 2006,
urldate = {2013-03-19}
}
@article{Linusson1998,
author = {Linusson, Svante and ASTLUND, JW},
keywords = {blanket,sleeping bag,snake,worm},
pages = {1--5},
title = {A Smaller Sleeping Bag For A Baby Snake},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.7066},
year = 1998,
urldate = {2013-03-20},
collections = {Attention-grabbing titles,Puzzles,Easily explained,Animals}
}
@article{Kranakis2010,
author = {Kranakis, Evangelos and Krizanc, Danny},
journal = {Fun with Algorithms},
number = 1,
title = {The urinal problem},
url = {http://link.springer.com/chapter/10.1007/978-3-642-13122-6{\_}28 http://people.scs.carleton.ca/{\~{}}kranakis/Papers/urinal.pdf},
year = 2010,
urldate = {2013-03-28},
collections = {Puzzles,Easily explained}
}
@misc{Goucher,
author = {Goucher, Adam},
title = {Circuitry in 3D chess},
url = {http://cp4space.wordpress.com/2013/04/03/circuitry-in-3d-chess/},
urldate = {2013-04-03},
year = 2013
}
@article{Sauerland2013,
abstract = {We report data from an internet questionnaire of sixty number trivia. Participants were asked for the number of cups in their house, the number of cities they know and 58 other quantities. We compare the answers of familial sinistrals - individuals who are left-handed themselves or have a left-handed close blood-relative - with those of pure familial dextrals - right-handed individuals who reported only having right-handed close blood-relatives. We show that familial sinistrals use rounder numbers than pure familial dextrals in the survey responses. Round numbers in the decimal system are those that are multiples of powers of 10 or of half or a quarter of a power of 10. Roundness is a gradient concept, e.g. 100 is rounder than 50 or 200. We show that very round number like 100 and 1000 are used with 25{\%} greater likelihood by familial sinistrals than by pure familial dextrals, while pure familial dextrals are more likely to use less round numbers such as 25, 60, and 200. We then use Sigurd's (1988, Language in Society) index of the roundness of a number and report that familial sinistrals' responses are significantly rounder on average than those of pure familial dextrals. To explain the difference, we propose that the cognitive effort of using exact numbers is greater for the familial sinistral group because their language and number systems tend to be more distributed over both hemispheres of the brain. Our data support the view that exact and approximate quantities are processed by two separate cognitive systems. Specifically, our behavioral data corroborates the view that the evolutionarily older, approximate number system is present in both hemispheres of the brain, while the exact number system tends to be localized in only one hemisphere.},
author = {Sauerland, Uli and Gotzner, Nicole},
editor = {Stamatakis, Emmanuel Andreas},
issn = {1932-6203},
journal = {PloS one},
keywords = {Anthropology,Behavior,Biology,Cognition,Cognitive neurology,Cognitive neuroscience,Cognitive psychology,Human families,Linguistic anthropology,Linguistics,Mathematics,Medicine,Mental Health,Neuroethology,Neurolinguistics,Neurological Disorders,Neurology,Neuropsychology,Neuroscience,Number concepts,Number theory,Psycholinguistics,Psychology,Research Article,Social and behavioral sciences,Sociology,Verbal behavior},
month = {jan},
number = 3,
pages = {e59103},
publisher = {Public Library of Science},
title = {Familial sinistrals avoid exact numbers.},
url = {http://dx.plos.org/10.1371/journal.pone.0059103},
volume = 8,
year = 2013,
urldate = {2013-04-15},
collections = {Easily explained,Probability and statistics}
}
@article{Vierling-Claassen2013,
author = {Vierling-Claassen, a.},
doi = {10.1177/1043463112473795},
issn = {1043-4631},
journal = {Rationality and Society},
month = {may},
number = 2,
pages = {198--228},
title = {Division of labor in child care: A game-theoretic approach},
url = {http://rss.sagepub.com/cgi/doi/10.1177/1043463112473795},
volume = 25,
year = 2013,
urldate = {2013-05-07},
collections = {Easily explained,Protocols and strategies}
}
@article{Coecke2005,
abstract = {These lecture notes survey some joint work with Samson Abramsky as it was presented by me at several conferences in the summer of 2005. It concerns `doing quantum mechanics using only pictures of lines, squares, triangles and diamonds'. This picture calculus can be seen as a very substantial extension of Dirac's notation, and has a purely algebraic counterpart in terms of so-called Strongly Compact Closed Categories (introduced by Abramsky and I in quant-ph/0402130 and [4]) which subsumes my Logic of Entanglement quant-ph/0402014. For a survey on the `what', the `why' and the `hows' I refer to a previous set of lecture notes quant-ph/0506132. In a last section we provide some pointers to the body of technical literature on the subject.},
archivePrefix = {arXiv},
arxivId = {quant-ph/0510032},
author = {Coecke, Bob},
eprint = 0510032,
keywords = {-a quantum information,-w quantum mechanics,03,65,67,category theory,dirac notation,graphical calculus,logic,pacs,quantum formalism},
month = {oct},
pages = 18,
primaryClass = {quant-ph},
title = {Kindergarten Quantum Mechanics},
url = {http://arxiv.org/abs/quant-ph/0510032},
year = 2005,
urldate = {2013-05-28}
}
@article{Popoff2013,
abstract = {Transformational musical theory has so far mainly focused on the study of groups acting on musical chords, one of the most famous example being the action of the dihedral group D24 on the set of major and minor chords. Comparatively less work has been devoted to the study of transformations of time-spans and rhythms. D. Lewin was the first to study group actions on time-spans by using a subgroup of the affine group in one dimension. In our previous work, the work of Lewin has been included in the more general framework of group extensions, and generalizations to time-spans on multiple timelines have been proposed. The goal of this paper is to show that such generalizations have a categorical background in free monodical categories generated by a group-as-category. In particular, symmetric monodical categories allow to deal with the possible interexchanges between timelines. We also show that more general time-spans can be considered, in which single time-spans are encapsulated in a "bracket" of time-spans, which allow for the description of complex rhythms.},
archivePrefix = {arXiv},
arxivId = {1305.7192},
author = {Popoff, Alexandre},
eprint = {1305.7192},
month = {may},
pages = 17,
title = {Using Monoidal Categories in the Transformational Study of Musical Time-Spans and Rhythms},
url = {http://arxiv.org/abs/1305.7192 http://arxiv.org/pdf/1305.7192v3},
year = 2013,
primaryClass = {math.GR},
urldate = {2013-06-02}
}
@article{Khovanova2013,
author = {Khovanova, Tanya},
pages = {1--4},
title = {A Line of Sages},
url = {http://tanyakhovanova.com/publications/ALineOfWizards.pdf},
year = 2013,
urldate = {2013-06-20},
collections = {Puzzles}
}
@article{Conrey2012,
abstract = {We give a new algorithm that quickly finds smooth neighbors.},
archivePrefix = {arXiv},
arxivId = {1212.5161},
author = {Conrey, Brian and Holmstrom, Mark and McLaughlin, Tara},
eprint = {1212.5161},
month = {dec},
pages = {1--14},
title = {Smooth neighbors},
url = {http://arxiv.org/abs/1212.5161 http://arxiv.org/pdf/1212.5161v1},
year = 2012,
primaryClass = {math.NT},
urldate = {2013-07-11}
}
@article{Lehmer1964,
author = {Lehmer, DH},
journal = {Illinois Journal of Mathematics},
title = {On a problem of St{\"{o}}rmer},
url = {http://projecteuclid.org/euclid.ijm/1256067456},
year = 1964,
urldate = {2013-07-11},
collections = {Easily explained}
}
@article{Szekely2005,
author = {Sz{\'{e}}kely, GJ},
journal = {Wilmott Magazine},
pages = {66--68},
title = {Half of a coin: negative probabilities},
url = {http://www.wilmott.com/pdfs/100609{\_}gjs.pdf},
year = 2005,
urldate = {2013-07-17},
collections = {Probability and statistics}
}
@article{Haralambous1999,
author = {Haralambous, Yannis},
journal = {\ldots 14th International Unicode Conference, available from \ldots},
pages = {1--36},
title = {From Unicode to Typography, a Case Study the Greek Script},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.4076 http://web.archive.org/web/20120229131933/http://omega.enstb.org/yannis/pdf/boston99.pdf},
year = 1999,
urldate = {2013-07-22},
collections = {Basically computer science,Notation and conventions,History}
}
@article{Fouhey2013,
author = {Fouhey, David F and Maturana, Daniel},
title = {On n-Dimensional Polytope Schemes},
url = {http://www.oneweirdkerneltrick.com/polytope.pdf},
year = 2013,
urldate = {2013-08-02}
}
@article{Braswell2013a,
abstract = {In 2002, Cookie Monster appeared in The Inquisitive Problem Solver. The hungry monster wants to empty a set of jars filled with various numbers of cookies. On each of his moves, he may choose any subset of jars and take the same number of cookies from each of those jars. The Cookie Monster number is the minimum number of moves Cookie Monster must use to empty all of the jars. This number depends on the initial distribution of cookies in the jars. We discuss bounds of the Cookie Monster number and explicitly find the Cookie Monster number for Fibonacci, Tribonacci and other nacci sequences.},
author = {Braswell, Leigh Marie and Khovanova, Tanya},
month = {may},
pages = 8,
title = {Cookie Monster Devours Naccis},
url = {http://arxiv.org/abs/1305.4305 http://arxiv.org/pdf/1305.4305v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1305.4305},
primaryClass = {math.HO},
urldate = {2013-10-09},
collections = {Attention-grabbing titles,Puzzles,Animals}
}
@article{Speyer2004a,
abstract = {We study a recurrence defined on a three dimensional lattice and prove that its values are Laurent polynomials in the initial conditions with all coefficients equal to one. This recurrence was studied by Propp and by Fomin and Zelivinsky. Fomin and Zelivinsky were able to prove Laurentness and conjectured that the coefficients were 1. Our proof establishes a bijection between the terms of the Laurent polynomial and the perfect matchings of certain graphs, generalizing the theory of Aztec diamonds. In particular, this shows that the coefficients of this polynomial, and polynomials obtained by specializing its variables, are positive, a conjecture of Fomin and Zelevinsky.},
author = {Speyer, David E},
month = {feb},
title = {Perfect Matchings and the Octahedron Recurrence},
url = {http://arxiv.org/abs/math/0402452 http://arxiv.org/pdf/math/0402452v2},
year = 2004,
archivePrefix = {arXiv},
eprint = {math/0402452},
primaryClass = {math.CO},
urldate = {2013-10-09}
}
@article{Buchholz2013,
author = {Buchholz, Ralph H and Rathbun, Randall L},
number = 2,
pages = {107--115},
title = {An Infinite Set of Heron Triangles with Two Rational Medians},
url = {http://www.jstor.org/stable/2974977},
volume = 104,
year = 2013,
urldate = {2013-10-09}
}
@article{Fomin2001,
abstract = {A composition of birational maps given by Laurent polynomials need not be given by Laurent polynomials; however, sometimes---quite unexpectedly---it does. We suggest a unified treatment of this phenomenon, which covers a large class of applications. In particular, we settle in the affirmative a conjecture of D.Gale and R.Robinson on integrality of generalized Somos sequences, and prove the Laurent property for several multidimensional recurrences, confirming conjectures by J.Propp, N.Elkies, and M.Kleber.},
author = {Fomin, Sergey and Zelevinsky, Andrei},
month = {apr},
pages = 21,
title = {The Laurent phenomenon},
url = {http://arxiv.org/abs/math.CO/0104241},
year = 2001,
urldate = {2013-10-09}
}
@article{CONRAD,
author = {CONRAD, K},
journal = {math.uconn.edu},
pages = {1--18},
title = {Proofs by Descent},
url = {http://www.math.uconn.edu/{\~{}}kconrad/blurbs/ugradnumthy/descent.pdf},
urldate = {2013-11-04}
}
@article{Feinstein2010,
author = {Feinstein, JF and Heath, MJ},
journal = {Studia Math},
keywords = {and phrases,rational approximation,swiss cheeses,uniform algebras},
title = {Swiss cheeses, rational approximation and universal plane curves},
url = {http://www.maths.nottingham.ac.uk/personal/jff/Papers/pdf/Swisscheeses2.pdf},
year = 2010,
urldate = {2013-11-14},
collections = {Attention-grabbing titles}
}
@article{Bulteau2011,
author = {Bulteau, Laurent and Fertin, Guillaume and Rusu, Irena},
month = {nov},
title = {Pancake Flipping is Hard},
url = {http://arxiv.org/abs/1111.0434 http://arxiv.org/pdf/1111.0434v2},
year = 2011,
archivePrefix = {arXiv},
eprint = {1111.0434},
primaryClass = {cs.CC},
abstract = {Pancake Flipping is the problem of sorting a stack of pancakes of different
sizes (that is, a permutation), when the only allowed operation is to insert a
spatula anywhere in the stack and to flip the pancakes above it (that is, to
perform a prefix reversal). In the burnt variant, one side of each pancake is
marked as burnt, and it is required to finish with all pancakes having the
burnt side down. Computing the optimal scenario for any stack of pancakes and
determining the worst-case stack for any stack size have been challenges over
more than three decades. Beyond being an intriguing combinatorial problem in
itself, it also yields applications, e.g. in parallel computing and
computational biology. In this paper, we show that the Pancake Flipping
problem, in its original (unburnt) variant, is NP-hard, thus answering the
long-standing question of its computational complexity.},
urldate = {2013-11-15},
collections = {Attention-grabbing titles,Puzzles,Basically computer science,Easily explained}
}
@article{Grau2011,
author = {Grau, Jos{\'{e}} Mar{\'{i}}a and Oller-Marc{\'{e}}n, Antonio M.},
month = {mar},
title = {Giuga Numbers and the arithmetic derivative},
url = {http://arxiv.org/abs/1103.2298 http://arxiv.org/pdf/1103.2298v1},
year = 2011,
archivePrefix = {arXiv},
eprint = {1103.2298},
primaryClass = {math.NT},
abstract = {We characterize Giuga Numbers as solutions to the equation {\$}n'=an+1{\$}, with {\$}a
\in \mathbb{\{}N{\}}{\$} and {\$}n'{\$} being the arithmetic derivative. Although this fact
does not refute Lava's conjecture, it brings doubts about its veracity.},
urldate = {2013-11-15},
collections = {Unusual arithmetic}
}
@article{Sloane2013,
author = {Sloane, NJA},
journal = {arXiv preprint arXiv:1307.0453},
title = {2178 And All That},
url = {http://arxiv.org/abs/1307.0453 http://arxiv.org/pdf/1307.0453v4},
year = 2013,
archivePrefix = {arXiv},
eprint = {1307.0453},
primaryClass = {math.NT},
abstract = {For integers g >= 3, k >= 2, call a number N a (g,k)-reverse multiple if the
reversal of N in base g is equal to k times N. The numbers 1089 and 2178 are
the two smallest (10,k)-reverse multiples, their reversals being 9801 = 9x1089
and 8712 = 4x2178. In 1992, A. L. Young introduced certain trees in order to
study the problem of finding all (g,k)-reverse multiples. By using modified
versions of her trees, which we call Young graphs, we determine the possible
values of k for bases g = 2 through 100, and then show how to apply the
transfer-matrix method to enumerate the (g,k)-reverse multiples with a given
number of base-g digits. These Young graphs are interesting finite directed
graphs, whose structure is not at all well understood.},
urldate = {2013-11-20},
collections = {Easily explained}
}
@article{Mestrovic2011,
author = {Mestrovic, Romeo},
month = {nov},
title = {Wolstenholme's theorem: Its Generalizations and Extensions in the last hundred and fifty years (1862--2012)},
url = {http://arxiv.org/abs/1111.3057 http://arxiv.org/pdf/1111.3057v2},
year = 2011,
archivePrefix = {arXiv},
eprint = {1111.3057},
primaryClass = {math.NT},
abstract = {In 1862 Wolstenholme proved that for any prime {\$}p\ge 5{\$} the numerator of the
fraction {\$}{\$} 1+\frac 12 +\frac 13+...+\frac{\{}1{\}}{\{}p-1{\}}
{\$}{\$} written in reduced form is divisible by {\$}p^2{\$}, {\$}(2){\$} and the numerator of
the fraction
{\$}{\$} 1+\frac{\{}1{\}}{\{}2^2{\}} +\frac{\{}1{\}}{\{}3^2{\}}+...+\frac{\{}1{\}}{\{}(p-1)^2{\}}
{\$}{\$} written in reduced form is divisible by {\$}p{\$}. The first of the above
congruences, the so called {\{}\it Wolstenholme's theorem{\}}, is a fundamental
congruence in combinatorial number theory. In this article, consisting of 11
sections, we provide a historical survey of Wolstenholme's type congruences and
related problems. Namely, we present and compare several generalizations and
extensions of Wolstenholme's theorem obtained in the last hundred and fifty
years. In particular, we present more than 70 variations and generalizations of
this theorem including congruences for Wolstenholme primes. These congruences
are discussed here by 33 remarks.
The Bibliography of this article contains 106 references consisting of 13
textbooks and monographs, 89 papers, 3 problems and Sloane's On-Line Enc. of
Integer Sequences. In this article, some results of these references are cited
as generalizations of certain Wolstenholme's type congruences, but without the
expositions of related congruences. The total number of citations given here is
189.},
urldate = {2013-11-21},
collections = {History}
}
@article{Mosher2013,
author = {Mosher, Lee and Pfaff, Catherine},
month = {nov},
title = {Lone Axes in Outer Space},
url = {http://arxiv.org/abs/1311.6855 http://arxiv.org/pdf/1311.6855v3},
year = 2013,
archivePrefix = {arXiv},
eprint = {1311.6855},
primaryClass = {math.GR},
abstract = {Handel and Mosher define the axis bundle for a fully irreducible outer
automorphism in "Axes in Outer Space." In this paper we give a necessary and
sufficient condition for the axis bundle to consist of a unique periodic fold
line. As a consequence, we give a setting, and means for identifying in this
setting, when two elements of an outer automorphism group {\$}Out(F{\_}r){\$} have
conjugate powers.},
urldate = {2013-11-29}
}
@article{Bell2008,
abstract = {Septoku is a Sudoku variant invented by Bruce Oberg, played on a hexagonal grid of 37 cells. We show that up to rotations, reflections, and symbol permutations, there are only six valid Septoku boards. In order to have a unique solution, we show that the minimum number of given values is six. We generalize the puzzle to other board shapes, and devise a puzzle on a star-shaped board with 73 cells with six givens which has a unique solution. We show how this puzzle relates to the unsolved Hadwiger-Nelson problem in combinatorial geometry.},
author = {Bell, George I.},
month = {jan},
pages = 11,
title = {The mathematics of Septoku},
url = {http://arxiv.org/abs/0801.3697 http://arxiv.org/pdf/0801.3697v4},
year = 2008,
archivePrefix = {arXiv},
eprint = {0801.3697},
primaryClass = {math.CO},
urldate = {2013-12-22},
collections = {Puzzles,Easily explained}
}
@article{Middleton2013,
abstract = {We present a theoretical and experimental analysis of circular-like orbits made by a marble rolling on a warped spandex fabric. We show that the mass of the fabric interior to the orbital path influences the motion of the marble in a nontrivial way, and can even dominate the orbital characteristics. We also compare a Kepler-like expression for such orbits to similar expressions for orbits about a spherically-symmetric massive object in the presence of a constant vacuum energy, as described by general relativity.},
author = {Middleton, Chad A. and Langston, Michael},
month = {dec},
pages = 13,
title = {Circular orbits on a warped spandex fabric},
url = {http://arxiv.org/abs/1312.3893 http://arxiv.org/pdf/1312.3893v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1312.3893},
primaryClass = {physics.class-ph},
urldate = {2014-01-07},
collections = {Basically physics,Things to make and do}
}
@article{Benjamin2003,
author = {Benjamin, AT and Hanusa, CRH and Su, FE},
journal = {Utilitas Mathematica},
pages = {3--17},
title = {Linear recurrences through tilings and Markov chains},
url = {http://math.hmc.edu/{\~{}}benjamin/papers/hanusa.pdf},
volume = 64,
year = 2003,
urldate = {2014-01-21}
}
@article{Hirsch2014,
abstract = {We extend the existing enumeration of neck tie knots to include tie knots with a textured front, tied with the narrow end of a tie. These tie knots have gained popularity in recent years, based on reconstructions of a costume detail from The Matrix Reloaded, and are explicitly ruled out in the enumeration by Fink and Mao (2000). We show that the relaxed tie knot description language that comprehensively describes these extended tie knot classes is either context sensitive or context free. It has a sub-language that covers all the knots that inspired the work, and that is regular. From this regular sub-language we enumerate 177 147 distinct tie knots that seem tieable with a normal necktie. These are found through an enumeration of 2 046 winding patterns that can be varied by tucking the tie under itself at various points along the winding.},
author = {Hirsch, Dan and Patterson, Meredith L and Sandberg, Anders and Vejdemo-Johansson, Mikael},
month = {jan},
title = {More ties than we thought},
url = {http://arxiv.org/abs/1401.8242 http://arxiv.org/pdf/1401.8242v2},
year = 2014,
archivePrefix = {arXiv},
eprint = {1401.8242},
primaryClass = {cs.FL},
urldate = {2014-02-06},
collections = {Attention-grabbing titles,Easily explained}
}
@article{Henwood1980,
author = {Henwood, Mervyn R. and Rival, Ivan},
doi = {10.1007/BF03028604},
issn = {0343-6993},
journal = {The Mathematical Intelligencer},
month = {dec},
number = 4,
pages = {204--205},
title = {Eponymy in Mathematical Nomenclature: What's in a Name, and What Should Be?},
url = {http://scholar.google.com/scholar?hl=en{\&}btnG=Search{\&}q=intitle:Eponymy+in+Mathematical+Nomenclature:+What's+in+a+Name,+and+What+Should+Be?{\#}0 http://link.springer.com/10.1007/BF03028604},
volume = 2,
year = 1980,
urldate = {2014-02-11},
collections = {The act of doing maths}
}
@article{Reifegerste2003,
author = {Reifegerste, Astrid},
doi = {10.1016/S0195-6698(03)00065-9},
issn = 01956698,
journal = {European Journal of Combinatorics},
month = {aug},
number = 6,
pages = {759--776},
title = {On the diagram of 132-avoiding permutations},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0195669803000659},
volume = 24,
year = 2003,
urldate = {2014-03-31}
}
@article{Demontigny2013,
author = {Demontigny, Philippe and Do, Thao and Kulkarni, Archit and Miller, Steven J. and Moon, David and Varma, Umang},
month = {sep},
title = {Generalizing Zeckendorf's Theorem to f-decompositions},
url = {http://arxiv.org/abs/1309.5599 http://arxiv.org/pdf/1309.5599v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1309.5599},
primaryClass = {math.NT},
abstract = {A beautiful theorem of Zeckendorf states that every positive integer can be
uniquely decomposed as a sum of non-consecutive Fibonacci numbers {\$}\{\{}F{\_}n\{\}}{\$},
where {\$}F{\_}1 = 1{\$}, {\$}F{\_}2 = 2{\$} and {\$}F{\_}{\{}n+1{\}} = F{\_}n + F{\_}{\{}n-1{\}}{\$}. For general
recurrences {\$}\{\{}G{\_}n\{\}}{\$} with non-negative coefficients, there is a notion of a
legal decomposition which again leads to a unique representation, and the
number of summands in the representations of uniformly randomly chosen {\$}m \in
[G{\_}n, G{\_}{\{}n+1{\}}){\$} converges to a normal distribution as {\$}n \to \infty{\$}.
We consider the converse question: given a notion of legal decomposition, is
it possible to construct a sequence {\$}\{\{}a{\_}n\{\}}{\$} such that every positive integer
can be decomposed as a sum of terms from the sequence? We encode a notion of
legal decomposition as a function {\$}f:\N{\_}0\to\N{\_}0{\$} and say that if {\$}a{\_}n{\$} is in
an "{\$}f{\$}-decomposition", then the decomposition cannot contain the {\$}f(n){\$} terms
immediately before {\$}a{\_}n{\$} in the sequence; special choices of {\$}f{\$} yield many
well known decompositions (including base-{\$}b{\$}, Zeckendorf and factorial). We
prove that for any {\$}f:\N{\_}0\to\N{\_}0{\$}, there exists a sequence
{\$}\{\{}a{\_}n\{\}}{\_}{\{}n=0{\}}^\infty{\$} such that every positive integer has a unique
{\$}f{\$}-decomposition using {\$}\{\{}a{\_}n\{\}}{\$}. Further, if {\$}f{\$} is periodic, then the unique
increasing sequence {\$}\{\{}a{\_}n\{\}}{\$} that corresponds to {\$}f{\$} satisfies a linear
recurrence relation. Previous research only handled recurrence relations with
no negative coefficients. We find a function {\$}f{\$} that yields a sequence that
cannot be described by such a recurrence relation. Finally, for a class of
functions {\$}f{\$}, we prove that the number of summands in the {\$}f{\$}-decomposition of
integers between two consecutive terms of the sequence converges to a normal
distribution.},
urldate = {2014-04-28},
collections = {Unusual arithmetic}
}
@article{Khovanova2014,
abstract = {We enumerate P-positions in the game of Nim in two different ways. In one series of sequences we enumerate them by the maximum number of counters in a pile. In another series of sequences we enumerate them by the total number of counters. We show that the game of Nim can be viewed as a cellular automaton, where the total number of counters divided by 2 can be considered as a generation in which P-positions are born. We prove that the three-pile Nim sequence enumerated by the total number of counters is a famous toothpick sequence based on the Ulam-Warburton cellular automaton. We introduce 10 new sequences.},
author = {Khovanova, Tanya and Xiong, Joshua},
month = {may},
pages = 19,
title = {Nim Fractals},
url = {http://arxiv.org/abs/1405.5942 http://arxiv.org/pdf/1405.5942v1},
year = 2014,
archivePrefix = {arXiv},
eprint = {1405.5942},
primaryClass = {math.CO},
urldate = {2014-06-05},
collections = {Games to play with friends}
}
@article{Clifford2008,
abstract = {Ulam has defined a history-dependent random sequence by the recursion Xn+1=Xn+XU(n), where (U(n); n[{\&}ge;]1) is a sequence of independent random variables with U(n) uniformly distributed on {\{}1, ..., n{\}} and X1=1. We introduce a new class of continuous-time history-dependent random processes regulated by Poisson processes. The simplest of these, a univariate process regulated by a homogeneous Poisson process, replicates in continuous time the essential properties of Ulam's sequence, and greatly facilitates its analysis. We consider several generalizations and extensions of this, including bivariate and multivariate coupled history-dependent processes, and cases when the dependence on the past is not uniform. The analysis of the discrete-time formulations of these models would be at the very least an extremely formidable project, but we determine the asymptotic growth rates of their means and higher moments with relative ease.},
author = {Clifford, P. and Stirzaker, D.},
issn = {1364-5021},
journal = {Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences},
month = {may},
number = 2093,
pages = {1105--1124},
title = {History-dependent random processes},
url = {http://rspa.royalsocietypublishing.org/content/464/2093/1105},
volume = 464,
year = 2008,
urldate = {2014-06-30}
}
@article{Petersen2004,
abstract = {In earlier work, Jockusch, Propp, and Shor proved a theorem describing the limiting shape of the boundary between the uniformly tiled corners of a random tiling of an Aztec diamond and the more unpredictable `temperate zone' in the interior of the region. The so-called arctic circle theorem made precise a phenomenon observed in random tilings of large Aztec diamonds. Here we examine a related combinatorial model called groves. Created by Carroll and Speyer as combinatorial interpretations for Laurent polynomials given by the cube recurrence, groves have observable frozen regions which we describe precisely via asymptotic analysis of a generating function. Our approach also provides another way to prove the arctic circle theorem for Aztec diamonds.},
author = {Petersen, T. K. and Speyer, D.},
month = {jul},
pages = 25,
title = {An arctic circle theorem for groves},
url = {http://arxiv.org/abs/math/0407171 http://arxiv.org/pdf/math/0407171v1},
year = 2004,
archivePrefix = {arXiv},
eprint = {math/0407171},
primaryClass = {math.CO},
urldate = {2014-07-01}
}
@article{Papadopoulos2014,
abstract = {The purpose of this paper is to show through particular examples how group theory is used in music. The examples are chosen from the theoretical work and from the compositions of Olivier Messiaen (1908-1992), one of the most influential twentieth century composers and pedagogues. Messiaen consciously used mathematical concepts derived from symmetry and groups, in his teaching and in his compositions. Before dwelling on this, I will give a quick overview of the relation between mathematics and music. This will put the discussion on symmetry and group theory in music in a broader context and it will provide the reader of this handbook some background and some motivation for the subject. The relation between mathematics and music, during more than two millennia, was lively, widespread, and extremely enriching for both domains. This paper will appear in the Handbook of Group actions, vol. II (ed. L. Ji, A. Papadopoulos and S.-T. Yau), Higher Eucation Press and International Press.},
author = {Papadopoulos, Athanase},
month = {jul},
title = {Mathematics and group theory in music},
url = {http://arxiv.org/abs/1407.5757 http://arxiv.org/pdf/1407.5757v1},
year = 2014,
archivePrefix = {arXiv},
eprint = {1407.5757},
primaryClass = {math.HO},
urldate = {2014-07-24},
collections = {Music}
}
@article{Legendre2013,
abstract = {We review the stamp folding problem, the number of ways to fold a strip of {\$}n{\$} stamps, and the related problem of enumerating meander configurations. The study of equivalence classes of foldings and meanders under symmetries allows to characterize and enumerate folding and meander shapes. Symmetric foldings and meanders are described, and relations between folding and meandric sequences are given. Extended tables for these sequences are provided.},
author = {Legendre, St{\'{e}}phane},
month = {feb},
pages = 18,
title = {Foldings and Meanders},
url = {http://arxiv.org/abs/1302.2025 http://arxiv.org/pdf/1302.2025v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1302.2025},
primaryClass = {math.CO},
urldate = {2014-08-19},
collections = {Easily explained}
}
@article{Mahadevan1993,
author = {Mahadevan, L and Keller, JB},
journal = {Proceedings: Mathematical and Physical Sciences},
number = 1908,
pages = {149--162},
title = {The shape of a Mobius band},
url = {http://rspa.royalsocietypublishing.org/content/440/1908/149.short http://www.seas.harvard.edu/softmat/downloads/pre2000-20.pdf},
volume = 440,
year = 1993,
urldate = {2014-08-20}
}
@article{Martin2013,
abstract = {We introduce and study a combinatorial optimization problem motivated by the question in the title. In the simple case where you use all objects in your room equally often, we investigate asymptotics of the optimal time to clean up in terms of the number of objects in your room. In particular, we prove a logarithmic upper bound, solve an approximate version of this problem, and conjecture a precise logarithmic asymptotic.},
author = {Martin, Kimball and Shankar, Krishnan},
month = {may},
pages = 28,
title = {How often should you clean your room?},
url = {http://arxiv.org/abs/1305.1984 http://arxiv.org/pdf/1305.1984v2},
year = 2013,
archivePrefix = {arXiv},
eprint = {1305.1984},
primaryClass = {math.CO},
urldate = {2014-09-02},
collections = {Easily explained}
}
@article{Bailey2008,
author = {Bailey, RA},
journal = {American Mathematical \ldots},
pages = {1--31},
title = {Sudoku, gerechte designs, resolutions, affine space, spreads, reguli, and Hamming codes},
url = {http://www.ingentaconnect.com/content/maa/amm/2008/00000115/00000005/art00001 http://www.maths.qmul.ac.uk/{\~{}}pjc/preprints/sudoku.pdf},
year = 2008,
urldate = {2014-10-02},
collections = {Puzzles}
}
@article{Hughes2006,
author = {Hughes, DJD},
journal = {Annals of Mathematics},
number = 3,
pages = {1065--1076},
title = {Proofs without syntax},
url = {http://www.jstor.org/stable/20160016},
volume = 164,
year = 2006,
urldate = {2014-10-09},
collections = {Notation and conventions}
}
@article{Richardson2014,
author = {Richardson, Thomas M.},
month = {oct},
title = {The Super Patalan Numbers},
url = {http://arxiv.org/abs/1410.5880 http://arxiv.org/pdf/1410.5880v1},
year = 2014,
archivePrefix = {arXiv},
eprint = {1410.5880},
primaryClass = {math.CO},
abstract = {We introduce the super Patalan numbers, a generalization of the super Catalan
numbers in the sense of Gessel, and prove a number of properties analagous to
those of the super Catalan numbers. The super Patalan numbers generalize the
super Catalan numbers similarly to how the Patalan numbers generalize the
Catalan numbers.},
urldate = {2014-10-23},
collections = {Attention-grabbing titles,Easily explained}
}
@article{Bell2007,
author = {Bell, George I.},
month = {mar},
title = {Solving Triangular Peg Solitaire},
url = {http://arxiv.org/abs/math/0703865v6 http://arxiv.org/pdf/math/0703865v6},
year = 2007,
archivePrefix = {arXiv},
eprint = {math/0703865},
primaryClass = {math.CO},
abstract = {We consider the one-person game of peg solitaire on a triangular board of
arbitrary size. The basic game begins from a full board with one peg missing
and finishes with one peg at a specified board location. We develop necessary
and sufficient conditions for this game to be solvable. For all solvable
problems, we give an explicit solution algorithm. On the 15-hole board, we
compare three simple solution strategies. We then consider the problem of
finding solutions that minimize the number of moves (where a move is one or
more consecutive jumps by the same peg), and find the shortest solution to the
basic game on all triangular boards with up to 55 holes (10 holes on a side).},
urldate = {2014-11-10},
collections = {Puzzles}
}
@article{Miller2009a,
author = {Miller, Steven J. and Montague, David},
month = {sep},
title = {Irrationality From The Book},
url = {http://arxiv.org/abs/0909.4913 http://arxiv.org/pdf/0909.4913v2},
year = 2009,
archivePrefix = {arXiv},
eprint = {0909.4913},
primaryClass = {math.HO},
abstract = {We generalize Tennenbaum's geometric proof of the irrationality of sqrt(2) to
sqrt(n) for n = 3, 5, 6 and 10.},
urldate = {2014-12-01}
}
@article{McGuire2012,
abstract = {This article is about the mathematics of ringing the changes. We describe the mathematics which arises from a real-world activity, that of ringing the changes on bells. We present Rankin's solution of one of the famous old problems in the subject. This article was written in 2003.},
author = {McGuire, Gary},
month = {mar},
title = {Bells, Motels and Permutation Groups},
url = {http://arxiv.org/abs/1203.1835 http://arxiv.org/pdf/1203.1835v1},
year = 2012,
archivePrefix = {arXiv},
eprint = {1203.1835},
primaryClass = {math.GR},
urldate = {2014-12-17},
collections = {Easily explained,Music}
}
@article{Arthan2004,
abstract = {This note describes a representation of the real numbers due to Schanuel. The representation lets us construct the real numbers from first principles. Like the well-known construction of the real numbers using Dedekind cuts, the idea is inspired by the ancient Greek theory of proportion, due to Eudoxus. However, unlike the Dedekind construction, the construction proceeds directly from the integers to the real numbers bypassing the intermediate construction of the rational numbers. The construction of the additive group of the reals depends on rather simple algebraic properties of the integers. This part of the construction can be generalised in several natural ways, e.g., with an arbitrary abelian group playing the role of the integers. This raises the question: what does the construction construct? In an appendix we sketch some generalisations and answer this question in some simple cases. The treatment of the main construction is intended to be self-contained and assumes familiarity only with elementary algebra in the ring of integers and with the definitions of the abstract algebraic notions of group, ring and field.},
author = {Arthan, R. D.},
month = {may},
pages = 15,
title = {The Eudoxus Real Numbers},
url = {http://arxiv.org/abs/math/0405454 http://arxiv.org/pdf/math/0405454v1},
year = 2004,
archivePrefix = {arXiv},
eprint = {math/0405454},
primaryClass = {math.HO},
urldate = {2015-01-07},
collections = {Unusual arithmetic}
}
@article{Loregian2015,
abstract = {The present note is a recollection of the most striking and useful applications of co/end calculus. We put a considerable effort in making arguments and constructions rather explicit: after having given a series of preliminary definitions, we characterize co/ends as particular co/limits; then we derive a number of results directly from this characterization. The last sections discuss the most interesting examples where co/end calculus serves as a powerful abstract way to do explicit computations in diverse fields like Algebra, Algebraic Topology and Category Theory. The appendices serve to sketch a number of results in theories heavily relying on co/end calculus; the reader who dares to arrive at this point, being completely introduced to the mysteries of co/end fu, can regard basically every statement as a guided exercise.},
author = {Loregian, Fosco},
month = {jan},
pages = 39,
title = {This is the (co)end, my only (co)friend},
url = {http://arxiv.org/abs/1501.02503 http://arxiv.org/pdf/1501.02503v2},
year = 2015,
archivePrefix = {arXiv},
eprint = {1501.02503},
primaryClass = {math.CT},
urldate = {2015-01-13},
collections = {Attention-grabbing titles}
}
@article{Feldman1993,
author = {Feldman, D and Impagliazzo, R and Naor, M},
journal = {Information and \ldots},
title = {On dice and coins: Models of computation for random generation},
url = {http://www.sciencedirect.com/science/article/pii/S089054018371028X},
year = 1993,
urldate = {2015-01-26},
collections = {Easily explained,Things to make and do}
}
@article{Gouyou-Beauchamps2005,
abstract = {We enumerate the symmetry classes of convex polyominoes on the hexagonal (honeycomb) lattice. Here convexity is to be understood as convexity along the three main column directions. We deduce the generating series of free (i.e. up to reflection and rotation) and of asymmetric convex hexagonal polyominoes, according to area and half-perimeter. We give explicit formulas or implicit functional equations for the generating series, which are convenient for computer algebra. Thus, computations can be carried out up to area 70.},
author = {Gouyou-Beauchamps, Dominique and Leroux, Pierre},
issn = 03043975,
journal = {Theoretical Computer Science},
month = {nov},
number = {2-3},
pages = {307--334},
title = {Enumeration of symmetry classes of convex polyominoes on the honeycomb lattice},
url = {http://www.sciencedirect.com/science/article/pii/S0304397505004950},
volume = 346,
year = 2005,
urldate = {2015-02-02}
}
@misc{Calude2006,
author = {Calude, C.S and Dinneen, Michael},
issn = {1178-3540},
keywords = {Computing and Communication Sciences,Fields of Research::280000 Information},
month = {dec},
publisher = {Department of Computer Science, The University of Auckland, New Zealand},
title = {Exact Approximations of Omega Numbers},
url = {https://researchspace.auckland.ac.nz/handle/2292/3800},
year = 2006,
urldate = {2015-02-03}
}
@article{Ahlbach2012,
abstract = {We study the problem of addition and subtraction using the Zeckendorf representation of integers. We show that both operations can be performed in linear time; in fact they can be performed by combinational logic networks with linear size and logarithmic depth. The implications of these results for multiplication, division and square-root extraction are also discussed.},
author = {Ahlbach, Connor and Usatine, Jeremy and Pippenger, Nicholas},
month = {jul},
title = {Efficient Algorithms for Zeckendorf Arithmetic},
url = {http://arxiv.org/abs/1207.4497 http://arxiv.org/pdf/1207.4497v1},
year = 2012,
archivePrefix = {arXiv},
eprint = {1207.4497},
primaryClass = {cs.DS},
urldate = {2015-02-16},
collections = {Easily explained}
}
@article{Oller2007,
abstract = {In this paper we study a generalization of the Fibonacci sequence in which rabbits are mortal and take more that two months to become mature. In particular we give a general recurrence relation for these sequences (improving the work in the paper Hoggatt, V. E., Jr.; Lind, D. A. "The dying rabbit problem". Fibonacci Quart. 7 1969 no. 5, 482--487) and we calculate explicitly their general term (extending the work in the paper Miles, E. P., Jr. Generalized Fibonacci numbers and associated matrices. Amer. Math. Monthly 67 1960 745--752). In passing, and as a technical requirement, we also study the behavior of the positive real roots of the characteristic polynomial of the considered sequences.},
author = {Oller, Antonio M.},
month = {oct},
pages = 8,
title = {The dying rabbit problem revisited},
url = {http://arxiv.org/abs/0710.2216 http://arxiv.org/pdf/0710.2216v1},
year = 2007,
archivePrefix = {arXiv},
eprint = {0710.2216},
primaryClass = {math.NT},
urldate = {2015-02-18},
collections = {Easily explained,Animals}
}
@article{Chvatal1975,
author = {Chv{\'{a}}tal, V},
issn = 00958956,
journal = {Journal of Combinatorial Theory, Series B},
month = {feb},
number = 1,
pages = {39--41},
title = {A combinatorial theorem in plane geometry},
url = {http://www.sciencedirect.com/science/article/pii/0095895675900611},
volume = 18,
year = 1975,
urldate = {2015-02-23},
collections = {Easily explained}
}
@article{Golumbic1998,
author = {Golumbic, Martin Charles and Wassermann, Amir},
issn = {0911-0119},
journal = {Graphs and Combinatorics},
month = {aug},
number = 3,
pages = {223--239},
title = {Complexity and Algorithms for Graph and Hypergraph Sandwich Problems},
url = {http://link.springer.com/10.1007/s003730050028},
volume = 14,
year = 1998,
urldate = {2015-02-24}
}
@article{Cotogno2009,
author = {Cotogno, Paolo},
issn = {0924-6495},
journal = {Minds and Machines},
month = {oct},
number = 3,
pages = {391--405},
title = {A Brief Critique of Pure Hypercomputation},
url = {http://link.springer.com/10.1007/s11023-009-9161-7},
volume = 19,
year = 2009,
urldate = {2015-03-05},
collections = {Basically computer science}
}
@article{Anderson2015,
abstract = {SignificanceThere are currently more than 100,000 patients on the waiting list in the United States for a kidney transplant from a deceased donor. To address this shortage, kidney exchange programs allow patients with living incompatible donors to exchange donors through cycles and chains initiated by altruistic nondirected donors. To determine which exchanges will take place, kidney exchange programs use algorithms for maximizing the number of transplants under constraints about the size of feasible exchanges. This problem is NP-hard, and algorithms previously used were unable to optimize when chains could be long. We developed two algorithms that use integer programming to solve this problem, one of which is inspired by the traveling salesman, that together can find optimal solutions in practice. As of May 2014 there were more than 100,000 patients on the waiting list for a kidney transplant from a deceased donor. Although the preferred treatment is a kidney transplant, every year there are fewer donors than new patients, so the wait for a transplant continues to grow. To address this shortage, kidney paired donation (KPD) programs allow patients with living but biologically incompatible donors to exchange donors through cycles or chains initiated by altruistic (nondirected) donors, thereby increasing the supply of kidneys in the system. In many KPD programs a centralized algorithm determines which exchanges will take place to maximize the total number of transplants performed. This optimization problem has proven challenging both in theory, because it is NP-hard, and in practice, because the algorithms previously used were unable to optimally search over all long chains. We give two new algorithms that use integer programming to optimally solve this problem, one of which is inspired by the techniques used to solve the traveling salesman problem. These algorithms provide the tools needed to find optimal solutions in practice.},
author = {Anderson, Ross and Ashlagi, Itai and Gamarnik, David and Roth, Alvin E.},
issn = {0027-8424},
journal = {Proceedings of the National Academy of Sciences},
month = {jan},
number = 3,
pages = 201421853,
title = {Finding long chains in kidney exchange using the traveling salesman problem},
url = {http://www.pnas.org/content/112/3/663},
volume = 112,
year = 2015,
urldate = {2015-03-07},
collections = {Basically computer science,Protocols and strategies}
}
@article{Mugford2001,
abstract = {Colonies of the ant Leptothorax albipennis naturally inhabit flat rock crevices. Scouts can determine, before initiating an emigration, if a nest has sufficient area to house their colony. They do so with a rule of thumb: the Buffon's needle algorithm. Based on a derivation from the classical statistical geometry of Comte George de Buffon in the 18th century, it can be shown that it is possible to estimate the area of a plane from the frequency of intersections between two sets of randomly scattered lines of known lengths. Our earlier work has shown that individual ants use this Buffon's needle algorithm by laying individual-specific trail pheromones on a first visit to a potential nest site and by assessing the frequency at which they intersect that path on a second visit. Nest area would be inversely proportional to the intersection frequency. The simplest procedure would be for individual ants to keep their first-visit path-length constant regardless of the size of the nest they are visiting. Here we show, for the first time, that this is the case. We also determine the potential quality of information that individual ants might have at their disposal from their own path-laying and path-crossing activities. Hence, we can determine the potential accuracy of nest area estimation by individual ants. Our findings suggest that ants using the Buffon's needle rule of thumb might obtain remarkably accurate assessments of nest area.},
author = {Mugford, S. T.},
issn = 14657279,
journal = {Behavioral Ecology},
month = {nov},
number = 6,
pages = {655--658},
title = {The accuracy of Buffon's needle: a rule of thumb used by ants to estimate area},
url = {http://beheco.oxfordjournals.org/content/12/6/655.full},
volume = 12,
year = 2001,
urldate = {2015-03-09},
collections = {Animals,Probability and statistics}
}
@article{Ferrie2015,
abstract = {We give bounds on the average fidelity achievable by any quantum state estimator, which is arguably the most prominently used figure of merit in quantum state tomography. Moreover, these bounds can be computed online---that is, while the experiment is running. We show numerically that these bounds are quite tight for relevant distributions of density matrices. We also show that the Bayesian mean estimator is ideal in the sense of performing close to the bound without requiring optimization. Our results hold for all finite dimensional quantum systems.},
author = {Ferrie, Christopher and Kueng, Richard},
month = {mar},
title = {Have you been using the wrong estimator? These guys bound average fidelity using this one weird trick von Neumann didn't want you to know},
url = {http://arxiv.org/abs/1503.00677 http://arxiv.org/pdf/1503.00677v2},
year = 2015,
archivePrefix = {arXiv},
eprint = {1503.00677},
primaryClass = {quant-ph},
urldate = {2015-03-26},
collections = {Attention-grabbing titles,Probability and statistics}
}
@article{Schumacher2004,
abstract = {We define quantum cellular automata as infinite quantum lattice systems with discrete time dynamics, such that the time step commutes with lattice translations and has strictly finite propagation speed. In contrast to earlier definitions this allows us to give an explicit characterization of all local rules generating such automata. The same local rules also generate the global time step for automata with periodic boundary conditions. Our main structure theorem asserts that any quantum cellular automaton is structurally reversible, i.e., that it can be obtained by applying two blockwise unitary operations in a generalized Margolus partitioning scheme. This implies that, in contrast to the classical case, the inverse of a nearest neighbor quantum cellular automaton is again a nearest neighbor automaton. We present several construction methods for quantum cellular automata, based on unitaries commuting with their translates, on the quantization of (arbitrary) reversible classical cellular automata, on quantum circuits, and on Clifford transformations with respect to a description of the single cells by finite Weyl systems. Moreover, we indicate how quantum random walks can be considered as special cases of cellular automata, namely by restricting a quantum lattice gas automaton with local particle number conservation to the single particle sector.},
author = {Schumacher, B. and Werner, R. F.},
month = {may},
pages = 20,
title = {Reversible quantum cellular automata},
url = {http://arxiv.org/abs/quant-ph/0405174},
year = 2004,
urldate = {2015-06-28},
collections = {Basically computer science}
}
@article{Gerogiorgakis2015,
abstract = {This article discusses rationality gaps triggered by self-referential/cyclic choice, the latter being understood as choosing according to a norm that refers to the choosing itself. The Crocodile Paradox is reformulated and analyzed as a game—named CP—whose Nash equilibrium is shown to trigger a cyclic choice and to invite a rationality gap. It is shown that choosing the Nash equilibrium of CP conforms to the principles Wolfgang Spohn and Haim Gaifman introduced to, allegedly, guarantee acyclicity but, in fact, does not prevent self-referential/cyclic choice and rationality gaps. It is shown that CP is a counter-example to Gaifman's solution of the rationality gaps problem.},
author = {Gerogiorgakis, Stamatios},
issn = {0144-5340},
journal = {History and Philosophy of Logic},
language = {en},
month = {jun},
pages = {1--13},
publisher = {Taylor {\&} Francis},
title = {Mind the Croc! Rationality Gaps vis-{\`{a}}-vis the Crocodile Paradox},
url = {http://www.tandfonline.com/doi/full/10.1080/01445340.2015.1046211{\#}.VegVv{\_}lViHg},
year = 2015,
urldate = {2015-09-03},
collections = {Attention-grabbing titles,Animals}
}
@article{Diaconis1989a,
author = {Diaconis, Persi and Keller, Joseph B},
journal = {The American Mathematical Monthly},
number = 4,
pages = {337--339},
title = {Fair Dice},
url = {http://links.jstor.org/sici?sici=0002-9890{\%}28198904{\%}2996{\%}3A4{\%}3C337{\%}3AFD{\%}3E2.0.CO{\%}3B2-Z},
volume = 96,
year = 1989,
urldate = {2015-09-15},
collections = {Games to play with friends,Probability and statistics}
}
@article{Muller2013,
abstract = {In 1955 B. Segre showed that any oval in a projective plane over a finite field of odd order is a conic. His proof constructs a conic which matches the oval in some points, and then shows that it actually coincides with the oval. Here we give another proof. We describe the oval by a possibly high degree polynomial, and then show that the degree is actually 2.},
author = {M{\"{u}}ller, Peter},
month = {nov},
pages = 2,
title = {Another Proof of Segre's Theorem about Ovals},
url = {http://arxiv.org/abs/1311.3082 http://arxiv.org/pdf/1311.3082v1},
year = 2013,
archivePrefix = {arXiv},
eprint = {1311.3082},
primaryClass = {math.NT},
urldate = {2015-09-29}
}
@article{Rechnitzer2003,
abstract = {Guttmann and Enting [Phys. Rev. Lett. 76 (1996) 344–347] proposed the examination of anisotropic generating functions as a test of the solvability of models of bond animals. In this article we describe a technique for examining some properties of anisotropic generating functions. For a wide range of solved and unsolved families of bond animals, we show that the coefficients of yn is rational, the degree of its numerator is at most that of its denominator, and the denominator is a product of cyclotomic polynomials. Further, we are able to find a multiplicative upper bound for these denominators which, by comparison with numerical studies [Jensen, personal communication; Jensen and Guttmann, personal communication], appears to be very tight. These facts can be used to greatly reduce the amount of computation required in generating series expansions. They also have strong and negative implications for the solvability of these problems.},
author = {Rechnitzer, Andrew},
issn = 01968858,
journal = {Advances in Applied Mathematics},
month = {feb},
number = {1-2},
pages = {228--257},
title = {Haruspicy and anisotropic generating functions},
url = {http://www.sciencedirect.com/science/article/pii/S0196885802005341},
volume = 30,
year = 2003,
urldate = {2015-11-08}
}
@article{Blote1984,
author = {Blote, H W J and Hilhorst, H J},
issn = {0305-4470},
journal = {Journal of Physics A: Mathematical and General},
language = {en},
month = {feb},
number = 3,
pages = {L111--L115},
publisher = {IOP Publishing},
title = {Spiralling self-avoiding walks: an exact solution},
url = {http://iopscience.iop.org/article/10.1088/0305-4470/17/3/004},
volume = 17,
year = 1984,
urldate = {2015-11-08}
}
@article{Katz2010,
abstract = {We examine alternative interpretations of the symbol described as nought, point, nine recurring. Is "an infinite number of 9s" merely a figure of speech? How are such alternative interpretations related to infinite cardinalities? How are they expressed in Lightstone's "semicolon" notation? Is it possible to choose a canonical alternative interpretation? Should unital evaluation of the symbol .999 . . . be inculcated in a pre-limit teaching environment? The problem of the unital evaluation is hereby examined from the pre-R, pre-lim viewpoint of the student.},
author = {Katz, Karin Usadi and Katz, Mikhail G.},
month = {jul},
pages = 28,
title = {When is .999... less than 1?},
url = {http://arxiv.org/abs/1007.3018 http://arxiv.org/pdf/1007.3018v1},
year = 2010,
archivePrefix = {arXiv},
eprint = {1007.3018},
primaryClass = {math.HO},
urldate = {2015-11-19},
collections = {Unusual arithmetic}
}
@article{Sanders2015,
abstract = {The aim of this paper is to highlight a hitherto unknown computational aspect of Nonstandard Analysis pertaining to Reverse Mathematics (RM). In particular, we shall establish RM-equivalences between theorems from Nonstandard Analysis in a fragment of Nelson's internal set theory. We then extract primitive recursive terms from Goedel's system T (not involving Nonstandard Analysis) from the proofs of the aforementioned nonstandard equivalences. The resulting terms turn out to be witnesses for effective1 equivalences in Kohlenbach's higher-order RM. In other words, from an RM-equivalence in Nonstandard Analysis, we can extract the associated effective higher-order RM-equivalence which does not involve Nonstandard Analysis anymore. Finally, we show that certain effective equivalences in turn give rise to the original nonstandard theorems from which they were derived.},
author = {Sanders, Sam},
month = {nov},
title = {The effective content of Reverse Nonstandard Mathematics and the nonstandard content of effective Reverse Mathematics},
url = {http://arxiv.org/abs/1511.04679 http://arxiv.org/pdf/1511.04679v1},
year = 2015,
archivePrefix = {arXiv},
eprint = {1511.04679},
primaryClass = {math.LO},
urldate = {2015-11-19},
collections = {Attention-grabbing titles}
}
@article{Gordinowicz2015,
abstract = {Let {\$}G{\$} be any connected graph on {\$}n{\$} vertices, {\$}n \ge 2.{\$} Let {\$}k{\$} be any positive integer. Suppose that a fire breaks out on some vertex of {\$}G.{\$} Then in each turn {\$}k{\$} firefighters can protect vertices of {\$}G{\$} --- each can protect one vertex not yet on fire; Next a fire spreads to all unprotected neighbours. The {\$}\{\$}emph{\{}{\$}k{\$}-surviving{\}} rate of G, denoted by {\$}\rho{\_}k(G),{\$} is the expected fraction of vertices that can be saved from the fire by {\$}k{\$} firefighters, provided that the starting vertex is chosen uniformly at random. In this paper, it is shown that for any planar graph {\$}G{\$} we have {\$}\rho{\_}3(G) \ge \frac{\{}2{\}}{\{}21{\}}.{\$} Moreover, 3 firefighters are needed for the first step only; after that it is enough to have 2 firefighters per each round. This result significantly improves known solutions to a problem of Cai and Wang (there was no positive bound known for surviving rate of general planar graph with only 3 firefighters). The proof is done using the separator theorem for planar graphs.},
author = {Gordinowicz, Przemys{\l}aw},
issn = 03043975,
journal = {Theoretical Computer Science},
month = {aug},
pages = {160--164},
title = {Planar graph is on fire},
url = {http://arxiv.org/abs/1311.1158 http://arxiv.org/pdf/1311.1158v2},
volume = 593,
year = 2015,
archivePrefix = {arXiv},
eprint = {1311.1158},
primaryClass = {math.CO},
urldate = {2015-12-02},
collections = {Attention-grabbing titles,Puzzles}
}
@article{Diaz2003,
abstract = {We examine the kinetics of a snowball that is gaining mass while is rolling downhill. This dynamical system combines rotational effects with effects involving the variation of mass. In order to understand the consequences of both effects we compare its behavior with the one of some objects in which such effects are absent. Environmental conditions are also included. We conclude that the comparative velocity of the snowball is very sensitive to the hill profile and the retardation factors. We emphasize that the increase of mass (inertia), could surprisingly diminish the retardation effect due to the drag force. Additionally, when an exponential trajectory is assumed, the maximum velocity of the snowball can be reached at an intermediate step of the trip.},
author = {Diaz, Rodolfo A. and Gonzalez, Diego L. and Marin, Francisco and Martinez, R.},
month = {oct},
pages = 16,
title = {Comparative kinetics of the snowball respect to other dynamical objects},
url = {http://arxiv.org/abs/physics/0310010 http://arxiv.org/pdf/physics/0310010v2},
year = 2003,
archivePrefix = {arXiv},
eprint = {physics/0310010},
primaryClass = {physics.class-ph},
urldate = {2016-01-18},
collections = {Basically physics}
}
@misc{BlancoAbellan2015,
abstract = {Postprint (author's final draft)},
author = {Blanco Abell{\'{a}}n, M{\'{o}}nica},
booktitle = {Bulletin of the Scientific Instrument Society},
issn = {0956-8271},
keywords = {Mathematical instruments,{\`{A}}rees tem{\`{a}}tiques de la UPC::Matem{\`{a}}tiques i estad{\'{i}}s},
language = {eng},
pages = {22--28},
title = {On gardeners, dukes and mathematical instruments},
url = {http://upcommons.upc.edu/handle/2117/78617},
volume = 125,
year = 2015,
urldate = {2016-01-18},
collections = {History}
}
@article{Hung,
abstract = {This is a translation of the handwritten classroom notes taken by Nienhuys of a course in combinatorics given by N.G. de Bruijn at Eindhoven University of Technology, during the 1970s and 1980s.},
author = {Hung, J.W.Nienhuys (Ling-Ju and Eds.), Ton Kloks},
pages = 192,
title = {De Bruijn's Combinatorics},
url = {http://vixra.org/abs/1208.0223},
urldate = {2016-02-05},
year = 2012
}
@article{Uspensky1994,
title = {G{\"{o}}del's incompleteness theorem},
author = {Uspensky, V},
url = {http://linkinghub.elsevier.com/retrieve/pii/0304397594902224},
doi = {10.1016/0304-3975(94)90222-4},
issn = 03043975,
journal = {Theoretical Computer Science},
month = {aug},
number = 2,
pages = {239--319},
volume = 130,
year = 1994,
urldate = {2011-06-01}
}
@article{FIBONACCIJIGSAWPUZZLE,
title = {Fibonacci Jigsaw Puzzle},
url = {http://starcage.org/fibonacci{\_}puzzle/fibonacci{\_}puzzle.html},
author = {Akio Hizume},
comment = {},
urldate = {2016-05-19},
collections = {Puzzles,Easily explained},
year = 2016
}
@article{Bernhardsson2011,
title = {A Paradoxical Property of the Monkey Book},
author = {Bernhardsson, Sebastian and Baek, Seung Ki and Minnhagen, Petter},
url = {http://arxiv.org/abs/1103.2681 http://arxiv.org/pdf/1103.2681v1.pdf},
abstract = {A "monkey book" is a book consisting of a random distribution of letters and blanks, where a group of letters surrounded by two blanks is defined as a word. We compare the statistics of the word distribution for a monkey book with the corresponding distribution for the general class of random books, where the latter are books for which the words are randomly distributed. It is shown that the word distribution statistics for the monkey book is different and quite distinct from a typical sampled book or real book. In particular the monkey book obeys Heaps' power law to an extraordinary good approximation, in contrast to the word distributions for sampled and real books, which deviate from Heaps' law in a characteristics way. The somewhat counter-intuitive conclusion is that a "monkey book" obeys Heaps' power law precisely because its word-frequency distribution is not a smooth power law, contrary to the expectation based on simple mathematical arguments that if one is a power law, so is the other.},
archivePrefix = {arXiv},
arxivId = {1103.2681},
doi = {10.1088/1742-5468/2011/07/P07013},
eprint = {1103.2681},
journal = {Contemporary Physics},
month = {mar},
pages = 5,
year = 2011,
urldate = {2011-04-03},
collections = {Animals}
}
@article{Culbertson2012,
title = {A categorical foundation for Bayesian probability},
author = {Culbertson, Jared and Sturtz, Kirk},
url = {http://arxiv.org/abs/1205.1488 http://arxiv.org/pdf/1205.1488v3},
abstract = {Given two measurable spaces {\$}H{\$} and {\$}D{\$} with countably generated {\$}\sigma{\$}-algebras, a prior probability measure {\$}P{\_}H{\$} on {\$}H{\$} and a sampling distribution {\$}\mcS:H \rightarrow D{\$}, there is a corresponding inference map {\$}\mcI:D \rightarrow H{\$} which is unique up to a set of measure zero. Thus, given a data measurement {\$}\mu:1 \rightarrow D{\$}, a posterior probability {\$}\hat{\{}P{\_}H{\}}=\mcI \circ \mu{\$} can be computed. This procedure is iterative: with each updated probability {\$}P{\_}H{\$}, we obtain a new joint distribution which in turn yields a new inference map {\$}\mcI{\$} and the process repeats with each additional measurement. The main result shows that the assumption of Polish spaces to obtain regular conditional probabilities is not necessary---countably generated spaces suffice. This less stringent condition then allows for non-trivial decision rules (Eilenberg--Moore algebras) on finite (as well as non finite) spaces, and also provides for a common framework for decision theory and Bayesian probability.},
archivePrefix = {arXiv},
arxivId = {1205.1488},
eprint = {1205.1488},
keywords = {bayesian probability,categorical foundation for probability,giry,monad,msc 2000 subject,primary 60a05,probabilistic logic,regular conditional probability,secondary 62c10},
month = {may},
pages = 18,
year = 2012,
urldate = {2012-05-08},
collections = {Probability and statistics}
}
@article{DismalArithmetic,
title = {Dismal Arithmetic},
abstract = {Dismal arithmetic is just like the arithmetic you learned in school, only
simpler: there are no carries, when you add digits you just take the largest,
and when you multiply digits you take the smallest. This paper studies basic
number theory in this world, including analogues of the primes, number of
divisors, sum of divisors, and the partition function.},
url = {http://arxiv.org/abs/1107.1130v2 http://arxiv.org/pdf/1107.1130v2},
author = {David Applegate and Marc LeBrun and N. J. A. Sloane},
comment = {},
urldate = {2016-05-19},
archivePrefix = {arXiv},
eprint = {1107.1130},
primaryClass = {math.NT},
collections = {Unusual arithmetic,Easily explained},
year = 2011
}
@article{Allis1988,
title = {A knowledge-based approach of connect-four},
author = {Allis, Victor},
url = {http://www.informatik.uni-trier.de/{\~{}}fernau/DSL0607/Masterthesis-Viergewinnt.pdf},
year = 1988,
abstract = {A Shannon C-type strategy program, VICTOR, is written for Connect-Four, based on nine strategic rules. Each of these rules is proven to be correct, implying that conclusions made by VICTOR are correct. Using VICTOR, strategic rules where found which can be used by Black to at least draw the game, on each 7 (2n) board, provided that White does not start at the middle column, as well as on any 6 (2n) board. In combination with conspiracy-number search, search tables and depth-first search, VICTOR was able to show that White can win on the standard 7 6 board. Using a database of approximately half a million positions, VICTOR can play real time against opponents on the 7 6 board, always winning with White.},
urldate = {2013-12-03},
collections = {Games to play with friends}
}
@article{TwoNotesOnNotation,
title = {Two notes on notation},
abstract = {The author advocates two specific mathematical notations from his popular
course and joint textbook, "Concrete Mathematics". The first of these,
extending an idea of Iverson, is the notation "[P]" for the function which is 1
when the Boolean condition P is true and 0 otherwise. This notation can
encourage and clarify the use of characteristic functions and Kronecker deltas
in sums and integrals.
The second notation puts Stirling numbers on the same footing as binomial
coefficients. Since binomial coefficients are written on two lines in
parentheses and read "n choose k", Stirling numbers of the first kind should be
written on two lines in brackets and read "n cycle k", while Stirling numbers
of the second kind should be written in braces and read "n subset k". (I might
say "n partition k".) The written form was first suggested by Imanuel Marx. The
virtues of this notation are that Stirling partition numbers frequently appear
in combinatorics, and that it more clearly presents functional relations
similar to those satisfied by binomial coefficients.},
url = {http://arxiv.org/abs/math/9205211v1 http://arxiv.org/pdf/math/9205211v1},
author = {Donald E. Knuth},
comment = {},
urldate = {2016-05-19},
archivePrefix = {arXiv},
eprint = {math/9205211},
primaryClass = {math.HO},
collections = {Notation and conventions},
year = 1992
}
@article{OntheCookieMonsterProblem,
title = {On the Cookie Monster Problem},
abstract = {The Cookie Monster Problem supposes that the Cookie Monster wants to empty a
set of jars filled with various numbers of cookies. On each of his moves, he
may choose any subset of jars and take the same number of cookies from each of
those jars. The Cookie Monster number of a set is the minimum number of moves
the Cookie Monster must use to empty all of the jars. This number depends on
the initial distribution of cookies in the jars. We discuss bounds of the
Cookie Monster number and explicitly find the Cookie Monster number for jars
containing cookies in the Fibonacci, Tribonacci, n-nacci, and Super-n-nacci
sequences. We also construct sequences of k jars such that their Cookie Monster
numbers are asymptotically rk, where r is any real number between 0 and 1
inclusive.},
url = {http://arxiv.org/abs/1309.5985v1 http://arxiv.org/pdf/1309.5985v1},
author = {Leigh Marie Braswell and Tanya Khovanova},
comment = {},
urldate = {2016-05-19},
archivePrefix = {arXiv},
eprint = {1309.5985},
primaryClass = {math.HO},
collections = {Puzzles,Animals},
year = 2013
}
@article{Brumleve2012,
title = {The mate-in-n problem of infinite chess is decidable},
author = {Brumleve, Dan and Hamkins, Joel David and Schlicht, Philipp},
url = {http://arxiv.org/abs/1201.5597 http://arxiv.org/pdf/1201.5597v4},
abstract = {Infinite chess is chess played on an infinite edgeless chessboard. The familiar chess pieces move about according to their usual chess rules, and each player strives to place the opposing king into checkmate. The mate-in-n problem of infinite chess is the problem of determining whether a designated player can force a win from a given finite position in at most n moves. A naive formulation of this problem leads to assertions of high arithmetic complexity with 2n alternating quantifiers---there is a move for white, such that for every black reply, there is a counter-move for white, and so on. In such a formulation, the problem does not appear to be decidable; and one cannot expect to search an infinitely branching game tree even to finite depth. Nevertheless, the main theorem of this article, confirming a conjecture of the first author and C. D. A. Evans, establishes that the mate-in-n problem of infinite chess is computably decidable, uniformly in the position and in n. Furthermore, there is a computable strategy for optimal play from such mate-in-n positions. The proof proceeds by showing that the mate-in-n problem is expressible in what we call the first-order structure of chess, which we prove (in the relevant fragment) is an automatic structure, whose theory is therefore decidable. Indeed, it is definable in Presburger arithmetic. Unfortunately, this resolution of the mate-in-n problem does not appear to settle the decidability of the more general winning-position problem, the problem of determining whether a designated player has a winning strategy from a given position, since a position may admit a winning strategy without any bound on the number of moves required. This issue is connected with transfinite game values in infinite chess, and the exact value of the omega one of chess is not known.},
archivePrefix = {arXiv},
arxivId = {1201.5597},
eprint = {1201.5597},
journal = {New York},
month = {jan},
pages = 10,
year = 2012,
urldate = {2012-03-28},
collections = {Puzzles,Games to play with friends}
}
@article{Xu2012,
title = {Survey on fusible numbers},
author = {Xu, Junyan},
url = {http://arxiv.org/abs/1202.5614 http://arxiv.org/pdf/1202.5614v1},
abstract = {We point out that the recursive formula that appears in Erickson's presentation "Fusible Numbers" is incorrect, and pose an alternate conjecture about the structure of fusible numbers. Although we are unable to solve the conjecture, we succeed in establishing some basic properties of fusible numbers. We suggest some possible approaches to the conjecture, and list further problems in the final chapter.},
archivePrefix = {arXiv},
arxivId = {1202.5614},
eprint = {1202.5614},
month = {feb},
pages = 10,
year = 2012,
urldate = {2012-05-02},
collections = {Easily explained}
}
@article{Jerabek2016,
title = {Division by zero},
author = {Je\vr{\'{a}}bek, Emil},
url = {http://arxiv.org/abs/1604.07309 http://arxiv.org/pdf/1604.07309v1},
abstract = {As a consequence of the MRDP theorem, the set of Diophantine equations provably unsolvable in any sufficiently strong theory of arithmetic is algorithmically undecidable. In contrast, we show the decidability of Diophantine equations provably unsolvable in Robinson's arithmetic Q. The argument hinges on an analysis of a particular class of equations, hitherto unexplored in Diophantine literature. We also axiomatize the universal fragment of Q in the process.},
month = {apr},
pages = 12,
year = 2016,
archivePrefix = {arXiv},
eprint = {1604.07309},
primaryClass = {math.LO},
urldate = {2016-04-26}
}
@article{Balbiani2008,
title = {‘Knowable' As ‘Known After an Announcement'},
author = {Balbiani, Philippe and Baltag, Alexandru and Ditmarsch, Hans Van and Herzig, Andreas and Hoshi, Tomohiro and De Lima, Tiago},
url = {http://www.journals.cambridge.org/abstract{\_}S1755020308080210},
journal = {The Review of Symbolic Logic},
month = {dec},
number = 03,
pages = 305,
volume = 1,
year = 2008,
urldate = {2010-06-26}
}
@article{Galperin2003,
title = {Playing pool with {\$}\pi{\$} (the number {\$}\pi{\$} from a billiard point of view)},
author = {Galperin, G},
url = {http://www.turpion.org/php/reference.phtml?journal{\_}id=rd{\&}paper{\_}id=252 http://ics.org.ru/doc?pdf=440},
doi = {10.1070/RD2003v008n04ABEH000252},
journal = {Regular and Chaotic Dynamics},
pages = {375--394},
year = 2003,
urldate = {2013-11-14},
collections = {Easily explained}
}
@article{Hata1993,
title = {Rational approximations to {\$}\pi{\$} and some other numbers},
author = {Hata, Masayoshi and Mignotte, M and Chudnovsky, G V and Beukers, F},
url = {http://matwbn.icm.edu.pl/ksiazki/aa/aa63/aa6344.pdf},
journal = {Acta Arithmetica},
number = 4,
volume = 63,
year = 1993,
urldate = {2015-02-16},
collections = {Easily explained}
}
@article{Chen2010,
title = {A Closed-Form Algorithm for Converting Hilbert Space-Filling Curve Indices},
author = {Chen, Chih-sheng and Lin, Shen-yi and Fan, Min-hsuan and Huang, Chua-huang},
url = {http://www.iaeng.org/IJCS/issues{\_}v37/issue{\_}1/IJCS{\_}37{\_}1{\_}02.pdf},
journal = {IAENG International Journal of Computer Science},
keywords = {closed-form,hilbert space-filling curve,program generation,tensor product},
number = {February},
year = 2010,
urldate = {2010-09-01},
collections = {Basically computer science}
}
@article{Marasco2011,
title = {Doc, What Are My Chances?},
author = {Marasco, Joe and Doerfler, Ron and Roschier, Leif},
url = {http://www.myreckonings.com/modernnomogramsTMP/Doc{\_}What{\_}Are{\_}My{\_}Chances{\_}UMAP{\_}32-4-2011.pdf},
number = 4,
pages = {279--298},
volume = 32,
year = 2011,
urldate = {2012-03-11},
collections = {Attention-grabbing titles,Probability and statistics}
}
@article{Romano,
title = {Deriving Uniform Polyhedra with Wythoff's Construction},
author = {Romano, Don},
url = {http://math.ucdenver.edu/{\~{}}mferrara/seminar/F2010/Don{\_}Romano{\_}Seminar.pdf},
urldate = {2011-05-10},
year = 2010
}
@article{Barany2011,
title = {Chalk : Materials and Concepts in Mathematics Chalk in Hand},
author = {Barany, Michael J and Mackenzie, Donald},
url = {http://www.sps.ed.ac.uk/{\_}{\_}data/assets/file/0020/60518/Chalk.pdf},
pages = {1--30},
year = 2011,
urldate = {2011-11-01},
collections = {Notation and conventions,The act of doing maths}
}
@article{Renteln,
title = {Foolproof : A Sampling of Mathematical Folk Humor},
author = {Renteln, Paul and Dundes, Alan},
url = {http://www.ams.org/notices/200501/fea-dundes.pdf},
journal = {Physics},
urldate = {2010-06-18},
collections = {Lists and catalogues},
year = 2005
}
@misc{Scarle2008,
title = {Implications of the Turing Completeness of Reaction-Diffusion Models, informed by GPGPU simulations on an XBox 360: Cardiac Arrythmias, Re-entry and the Halting Problem},
author = {Scarle, S},
url = {http://www.ncbi.nlm.nih.gov/pubmed/19577519 http://research.microsoft.com/pubs/79271/turing.pdf},
year = 2008,
urldate = {2010-09-30},
collections = {Basically computer science,Basically physics}
}
@article{Flajolet2011,
title = {On Buffon Machines and Numbers},
author = {Flajolet, Philippe},
url = {http://arxiv.org/abs/0906.5560 http://arxiv.org/pdf/0906.5560v2},
journal = {Bernoulli},
pages = {1--12},
year = 2011,
urldate = {2011-01-12},
abstract = {The well-know needle experiment of Buffon can be regarded as an analog (i.e., continuous) device that stochastically "computes" the number 2/pi {\~{}} 0.63661, which is the experiment's probability of success. Generalizing the experiment and simplifying the computational framework, we consider probability distributions, which can be produced perfectly, from a discrete source of unbiased coin flips. We describe and analyse a few simple Buffon machines that generate geometric, Poisson, and logarithmic-series distributions. We provide human-accessible Buffon machines, which require a dozen coin flips or less, on average, and produce experiments whose probabilities of success are expressible in terms of numbers such as, exp(-1), log 2, sqrt(3), cos(1/4), aeta(5). Generally, we develop a collection of constructions based on simple probabilistic mechanisms that enable one to design Buffon experiments involving compositions of exponentials and logarithms, polylogarithms, direct and inverse trigonometric functions, algebraic and hypergeometric functions, as well as functions defined by integrals, such as the Gaussian error function.},
archivePrefix = {arXiv},
eprint = {0906.5560},
collections = {Easily explained,Probability and statistics}
}
@article{West2002,
title = {Better approximations to cumulative normal functions},
author = {West, Graeme},
url = {http://www.codeplanet.eu/files/download/accuratecumnorm.pdf},
journal = {Wilmott},
pages = {70--76},
year = 2002,
urldate = {2011-01-22},
collections = {Probability and statistics}
}
@article{Tondering2005,
title = {Surreal Numbers – An Introduction},
author = {T{\o}ndering, Claus},
url = {http://www.tondering.dk/download/sur16.pdf},
number = {January},
year = 2005,
urldate = {2011-02-16},
collections = {Unusual arithmetic}
}
@article{Ellermeyer2008,
title = {James Garfield's Proof of the Pythagorean Theorem},
author = {Ellermeyer, S F},
url = {http://math.kennesaw.edu/{\~{}}sellerme/sfehtml/classes/math1112/garfieldpro.pdf},
pages = {1--4},
year = 2008,
urldate = {2011-02-18},
collections = {History}
}
@article{Gerh2010,
title = {Automatic calculation of plane loci using Grobner bases and integration into a Dynamic Geometry System},
author = {Gerh, Michael},
url = {http://link.springer.com/chapter/10.1007{\%}2F978-3-642-25070-5{\_}4 http://jsxgraph.uni-bayreuth.de/talks/adg10/presentation.pdf},
booktitle = {Opera},
year = 2010,
urldate = {2011-03-24},
collections = {Basically computer science}
}
@article{Figueira2002,
title = {An example of a computable absolutely normal number},
author = {Figueira, Santiago},
url = {http://www.glyc.dc.uba.ar/santiago/papers/absnor.pdf},
journal = {Theoretical Computer Science},
pages = {947--958},
volume = 270,
year = 2002,
urldate = {2011-03-28}
}
@article{Aludaat2008,
title = {A Note on Approximating the Normal Distribution Function},
author = {Aludaat, K M and Alodat, M T},
url = {http://www.m-hikari.com/ams/ams-password-2008/ams-password9-12-2008/alodatAMS9-12-2008-2},
keywords = {cumulative distribution function,normal distribution},
number = 9,
pages = {425 -- 429},
volume = 2,
year = 2008,
urldate = {2011-03-28}
}
@article{Chandler,
title = {Testing Petri Nets for Mobile Robots Using Gr{\"{o}}bner Bases},
author = {Chandler, Angie and Heyworth, Anne and Blair, Lynne and Seward, Derek},
url = {http://arxiv.org/abs/math/0002119v1 http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=5C9463550D7C2241928C47ED1498EACB?doi=10.1.1.109.7667{\&}rep=rep1{\&}type=pdf http://arxiv.org/pdf/math/0002119.pdf},
journal = {Transition},
urldate = {2011-05-09},
collections = {Basically computer science},
year = 2000
}
@article{Owens,
title = {Investigations of Game of Life cellular automata rules on Penrose Tilings : lifetime and ash statistics},
author = {Owens, Nick and Stepney, Susan},
url = {https://www-users.cs.york.ac.uk/susan/bib/ss/nonstd/auto08b.pdf},
pages = {1--34},
urldate = {2011-08-14},
collections = {Probability and statistics},
year = 2010
}
@article{Bacchus1995,
title = {Against Conditionalization},
author = {Bacchus, Fahiem},
url = {http://www.cs.toronto.edu/{\~{}}fbacchus/Papers/BKTSYN90.pdf},
year = 1995,
urldate = {2011-08-28},
collections = {Probability and statistics}
}
@article{Miller2009,
title = {Irrationality from the book},
author = {Miller, Steven J and Montague, David},
url = {http://arxiv.org/abs/0909.4913 http://arxiv.org/pdf/0909.4913v2},
archivePrefix = {arXiv},
arxivId = {arXiv:0909.4913v2},
eprint = {arXiv:0909.4913v2},
pages = {2--8},
year = 2009,
urldate = {2011-08-29},
collections = {Easily explained}
}
@article{Shamos2011,
title = {Shamos's Catalog of the Real Numbers},
author = {Shamos, Michael Ian},
url = {http://euro.ecom.cmu.edu/people/faculty/mshamos/cat.pdf},
booktitle = {Science},
isbn = 0671750615,
year = 2011,
urldate = {2011-09-08},
collections = {Lists and catalogues}
}
@article{Mccarthy2006,
title = {Mad Abel : A card game for 2 + players},
author = {Mccarthy, Sm{\'{a}}ri},
url = {https://www.pagat.com/docs/madabel.pdf},
pages = {3--7},
year = 2006,
urldate = {2011-09-13},
collections = {Unusual arithmetic,Easily explained,Games to play with friends}
}
@article{Erickson,
title = {Fusible Numbers},
author = {Erickson, Jeff},
url = {http://www.mathpuzzle.com/fusible.pdf},
urldate = {2011-09-21},
collections = {Unusual arithmetic,Easily explained},
year = 2010
}
@article{Khovanova2010,
title = {Baron Munchhausen Redeems Himself : Bounds for a Coin-Weighing Puzzle Background},
author = {Khovanova, Tanya and Lewis, Joel Brewster},
url = {http://arxiv.org/abs/1006.4135v1 http://arxiv.org/pdf/1006.4135v1},
archivePrefix = {arXiv},
arxivId = {arXiv:1006.4135v1},
eprint = {arXiv:1006.4135v1},
pages = {1--19},
year = 2010,
urldate = {2011-10-14},
abstract = {We investigate a coin-weighing puzzle that appeared in the Moscow Math Olympiad in 1991. We generalize the puzzle by varying the number of participating coins, and deduce an upper bound on the number of weighings needed to solve the puzzle that is noticeably better than the trivial upper bound. In particular, we show that logarithmically-many weighings on a balance suffice.},
collections = {Attention-grabbing titles,Puzzles}
}
@article{Brenton2008,
title = {Remainder Wheels and Group Theory},
author = {Brenton, Lawrence},
url = {http://www.maa.org/sites/default/files/pdf/upload{\_}library/22/Polya/Brenton.pdf http://www.maa.org/programs/maa-awards/writing-awards/remainder-wheels-and-group-theory},
number = 2,
pages = {129--135},
volume = 39,
year = 2008,
urldate = {2011-11-02},
collections = {Unusual arithmetic,Easily explained}
}
@article{Demaine2008,
title = {Tetris is Hard, Even to Approximate},
author = {Demaine, Erik D and Hohenberger, Susan and Liben-Nowell, David},
url = {http://arxiv.org/abs/cs/0210020 http://arxiv.org/pdf/cs/0210020v1},
archivePrefix = {arXiv},
arxivId = {arXiv:cs/0210020v1},
eprint = {0210020v1},
journal = {Technology},
pages = {1--56},
primaryClass = {arXiv:cs},
year = 2008,
urldate = {2011-11-23},
abstract = {In the popular computer game of Tetris, the player is given a sequence of tetromino pieces and must pack them into a rectangular gameboard initially occupied by a given configuration of filled squares; any completely filled row of the gameboard is cleared and all pieces above it drop by one row. We prove that in the offline version of Tetris, it is NP-complete to maximize the number of cleared rows, maximize the number of tetrises (quadruples of rows simultaneously filled and cleared), minimize the maximum height of an occupied square, or maximize the number of pieces placed before the game ends. We furthermore show the extreme inapproximability of the first and last of these objectives to within a factor of p^(1-epsilon), when given a sequence of p pieces, and the inapproximability of the third objective to within a factor of (2 - epsilon), for any epsilon>0. Our results hold under several variations on the rules of Tetris, including different models of rotation, limitations on player agility, and restricted piece sets.},
collections = {Attention-grabbing titles}
}
@article{Lane,
title = {What Are the Odds?},
author = {Lane, F.C.},
url = {http://library.la84.org/SportsLibrary/BBM/1919/bbm226k.pdf},
abstract = {Gambling Has No Place in Baseball But Every Move on the Diamond Is Governed by the Laws of Chance--- The Successful Manager Is Successful Just So Far As He Knows and Accepts the Odds},
keywords = {1919,Iss. 6,Vol. 22,pgs.337-339},
pages = {337--339},
urldate = {2011-12-09},
collections = {Games to play with friends,Probability and statistics},
year = 1919
}
@article{Appel2002,
title = {Deobfuscation is in NP},
author = {Appel, Andrew W},
url = {https://www.cs.princeton.edu/{\~{}}appel/papers/deobfus.pdf},
journal = {Symposium A Quarterly Journal In Modern Foreign Literatures},
pages = {1--2},
year = 2002,
urldate = {2011-12-12},
collections = {Basically computer science}
}
@article{Gerdes2000,
title = {Ethnomathematics as a new research field , illustrated by studies of mathematical ideas in African history},
author = {Gerdes, Paulus},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.551.2369{\&}rep=rep1{\&}type=pdf},
journal = {African Philosophy},
year = 2000,
urldate = {2012-01-19},
collections = {History,Art}
}
@article{Deuber2004,
title = {A note on paradoxical metric spaces},
author = {Deuber, W A and Simonovits, M and Os, V T S},
url = {http://renyi.hu/{\~{}}miki/walter07.pdf},
number = 1995,
pages = {17--23},
volume = 30,
year = 2004,
urldate = {2013-01-26}
}
@article{Dijkstra1981,
title = {Fibonacci numbers and Leonardo numbers},
author = {Dijkstra, E.W.},
url = {https://www.cs.utexas.edu/users/EWD/transcriptions/EWD07xx/EWD797.html},
pages = {1--8},
year = 1981,
urldate = {2013-11-19},
collections = {Easily explained}
}
@article{Hampton2009,
title = {A Mathematical Coloring Book},
author = {Hampton, Marshall},
url = {http://www.d.umn.edu/{\~{}}mhampton/mathcolor17b.pdf},
year = 2009,
urldate = {2014-04-24},
collections = {Art,Easily explained,Things to make and do}
}
@article{Bialostocki1998,
title = {An Application of Elementary Group Theory to Central Solitaire},
author = {Bialostocki, Arie},
url = {http://www.oswego.edu/Documents/wac/deans{\_}awards{\_}2015/MAT{\%}20{\%}20Hannahan{\%}20{\%}203-31-15.pdf},
journal = {The College Mathematics Journal},
number = 3,
pages = {208--212},
volume = 29,
year = 1998,
urldate = {2014-11-10}
}
@article{Casazza,
title = {A mathematician's survival guide},
author = {Casazza, Peter G},
url = {https://faculty.missouri.edu/{\~{}}casazzap/pdf/140-MAA.pdf},
pages = {1--18},
urldate = {2012-04-29},
collections = {The act of doing maths},
year = 2012
}
@article{Demaine2010,
title = {Circle Packing for Origami Design Is Hard},
author = {Demaine, E.D. and Fekete, S.P. and Lang, R.J.},
url = {http://arxiv.org/abs/1008.1224 http://arxiv.org/pdf/1008.1224v2},
abstract = {We show that deciding whether a given set of circles can be packed into a rectangle, an equilateral triangle, or a unit square are NP-hard problems, settling the complexity of these natural packing problems. On the positive side, we show that any set of circles of total area 1 can be packed into a square of size 8/pi=2.546... These results are motivated by problems arising in the context of origami design.},
journal = {Arxiv preprint arXiv:1008.1224},
pages = {1--17},
publisher = {arxiv.org},
year = 2010,
urldate = {2010-08-13},
archivePrefix = {arXiv},
eprint = {1008.1224}
}
@article{Smarandache1991,
title = {Only problems, not solutions!},
author = {Smarandache, Florentin},
url = {http://fs.gallup.unm.edu/opns.pdf},
isbn = 1879585006,
volume = 1993,
year = 1991,
urldate = {2013-07-29},
collections = {Attention-grabbing titles,Puzzles}
}
@article{CountingGroups,
title = {Counting groups: gnus, moas and other exotica},
abstract = {The number of groups of a given order is a fascinating function. We report on
its known values, discuss some of its properties, and study some related functions.},
url = {https://www.math.auckland.ac.nz/{\~{}}obrien/research/gnu.pdf},
author = {John H. Conway and Heiko Dietrich and E.A. O’Brien},
comment = {},
urldate = {2016-05-20},
collections = {Attention-grabbing titles,Animals},
year = 2008
}
@article{LostMathematics,
title = {Lectures on lost mathematics},
author = {Branko Gr{\"{u}}nbaum},
url = {http://scholar.google.com/scholar?hl=en{\&}btnG=Search{\&}q=intitle:Lectures+on+lost+mathematics{\#}0 https://digital.lib.washington.edu/researchworks/bitstream/handle/1773/15700/Lost{\%}2520Mathematics.pdf?sequence=1},
number = {April},
year = 2010,
urldate = {2012-05-10},
collections = {History,The act of doing maths}
}
@article{Poloblanco2007,
title = {Theory and History of Geometric Models},
author = {Polo-blanco, Irene},
url = {http://dissertations.ub.rug.nl/FILES/faculties/science/2007/i.polo.blanco/thesis.pdf},
isbn = 9789078927013,
number = {april 1977},
year = 2007,
urldate = {2012-04-15},
collections = {History}
}
@article{OnPellegrinos20CapsinS43,
title = {On Pellegrino's 20-Caps in {\$}S{\_}{\{}4,3{\}}{\$}},
author = {R. Hill},
url = {http://www.sciencedirect.com/science/article/pii/S030402080873322X http://www.sciencedirect.com/science/article/pii/S030402080873322X/pdf?md5=d1b75feaabe33b62c6beb656d86a2a7d{\&}pid=1-s2.0-S030402080873322X-main.pdf},
abstract = {Although Pellegrino demonstrated that every 20-cap in {\$}S{\_}{\{}4,3{\}}{\$} is one of two geometric types, but it is by no means clear how many inequivalent 20-caps are there in each type. This chapter demonstrates that there are in all exactly nine inequivalent 20-caps in {\$}S{\_}{\{}4,3{\}}{\$}. It also shows that just two of these occur as the intersection of a 56-cap in {\$}S{\_}{\{}5,3{\}}{\$} with a hyperplane. Because any 10-cap in {\$}S{\_}{\{}3,3{\}}{\$} is an elliptic quadric and is unique up to equivalence, it follows that any choice of E and V is equivalent to any other. However, for a given choice of E and V, there are 310 different r-caps. The seemingly difficult task of finding how many of these are inequivalent is made relatively simple by using the triple transitivity of the group Aut E on the points of E, together with the uniqueness of the ternary Golay code. The chapter identifies those 20-caps that occur as the intersection of a 56-cap in {\$}S{\_}{\{}5,3{\}}{\$} with a hyperplane and shows that caps of both these types do occur as sections of a 56-cap in {\$}S{\_}{\{}5,3{\}}{\$}.},
comment = {},
urldate = {2016-06-01},
year = 1983
}
@article{ChallengingProblems,
title = {Challenging mathematical problems with elementary solutions},
abstract = {},
url = {https://drive.google.com/file/d/0B45juCGJ7U7PNmJhY2M0ZTMtNzU1MC00NGU3LTg3NGItMzE3OTViOThiYmU3/view},
author = {A.M. Yaglom and I.M. Yaglom},
comment = {},
urldate = {2016-06-08},
collections = {Puzzles},
year = 1964
}
@article{DrMitchillandtheMathematicalTetrodonThePublicDomainReview,
title = {Dr Mitchill and the Mathematical Tetrodon},
abstract = {},
url = {http://publicdomainreview.org/2015/09/16/dr-mitchill-and-the-mathematical-tetrodon/},
author = {Kevin Dann},
comment = {},
urldate = {2016-06-13},
collections = {Attention-grabbing titles,Art,Animals},
year = 2015
}
@article{Dudley,
title = {What to do when the trisector comes},
author = {Dudley, Underwood},
url = {http://web.mst.edu/{\~{}}lmhall/WhatToDoWhenTrisectorComes.pdf},
urldate = {2015-11-30},
collections = {Attention-grabbing titles,The act of doing maths},
year = 1983
}
@article{Thesnaillemma,
title = {The snail lemma},
abstract = {The classical snake lemma produces a six terms exact sequence starting from
a commutative square with one of the edge being a regular epimorphism. We establish
a new diagram lemma, that we call snail lemma, removing such a condition. We also
show that the snail lemma subsumes the snake lemma and we give an interpretation of
the snail lemma in terms of strong homotopy kernels. Our results hold in any pointed
regular protomodular category.},
url = {http://www.tac.mta.ca/tac/volumes/31/19/31-19abs.html http://www.tac.mta.ca/tac/volumes/31/19/31-19.pdf},
author = {Enrico M. Vitale},
comment = {},
urldate = {2016-06-13},
collections = {Attention-grabbing titles,Animals},
year = 2016
}
@article{ContinuedLogarithms,
title = {Continued Logarithms And Associated Continued Fractions},
abstract = {We investigate some of the connections between continued fractions and continued logarithms. We study the binary continued logarithms as introduced by Bill Gosper and explore two generalizations of the continued logarithm to base {\$}b{\$}. We show convergence for them using equivalent forms of their corresponding continued fractions. Through numerical experimentation we discover that, for one such formulation, the exponent terms have finite arithmetic means for almost all real numbers. This set of means, which we call the logarithmic Khintchine numbers, has a pleasing relationship with the geometric means of the corresponding continued fraction terms. While the classical Khintchine’s constant is believed not to be related to any naturally occurring number, we find surprisingly that the logarithmic Khintchine numbers are elementary.},
url = {https://www.carma.newcastle.edu.au/jon/clogs.pdf},
author = {Jonathan M. Borwein and Neil J. Calkin and Scott B. Lindstrom and Andrew Mattingly},
comment = {},
urldate = {2016-06-15},
year = 2016
}
@article{FuzzyGeometry,
title = {Fuzzy plane geometry I: Points and lines },
abstract = {We introduce a comprehensive study of fuzzy geometry in this paper by first defining a fuzzy point and a fuzzy line
in fuzzy plane geometry. We consider the fuzzy distance between fuzzy points and show it is a (weak) fuzzy metric.
We study various definitions of a fuzzy line, develop their basic properties, and investigate parallel fuzzy lines. },
url = {http://www.caam.rice.edu/{\~{}}yad1/miscellaneous/References/Math/Topology/Fuzzy/Fuzzy{\%}20plane{\%}20geometry{\%}20I{\%}20Points{\%}20and{\%}20lines.pdf?platform=hootsuite},
author = {J.J. Buckley and E. Aslami},
comment = {},
urldate = {2016-06-17},
collections = {Probability and statistics},
year = 1997
}
@article{Yato2003,
title = {Complexity and Completeness of Finding Another solution and its Application to Puzzles},
abstract = {The Another Solution Problem (ASP) of a problem {\$}\Pi{\$} is the following problem: for a given instance {\$}x{\$} of {\$}\Pi{\$} and a solution {\$}s{\$} to it, find a solution to {\$}x{\$} other than {\$}s{\$}. The notion of ASP as a new class of problems was first introduced by Ueda and Nagao. They also pointed out that polynomial-time parsimonious reductions which allow polynomial-time transformation of solutions can derive the NP-completeness of ASP of a certain problem from that of ASP of another. They used this property to show the NP-completeness of ASP of Nonogram, a sort of puzzle. Following it, Seta considered the problem to find another solution when {\$}n{\$}
solutions are given. (We call the problem {\$}n{\$}-ASP.) He proved the NP-completeness of {\$}n{\$}-ASP of some problems, including Cross Sum, for any {\$}n{\$}.
In this thesis we establish a rigid formalization of {\$}n{\$}-ASPs to investigate their characteristics more clearly. In particular we introduce ASP-completeness, the completeness with respect to the reductions satisfying the properties mentioned above, and show that ASP-completeness of a problem implies NP-completeness of {\$}n{\$}-ASP of the problem for all {\$}n{\$}. Moreover we research the relation between ASPs and other versions of problems, such as counting problems and enumeration problems, and show the equivalence of the class of problems which allow enumerations of solutions in polynomial time and the class of problems of which {\$}n{\$}-ASP is
solvable in polynomial time.
As Ueda and Nagao pointed out, the complexity of ASPs has a relation with the difficulty of designing puzzles. We prove the ASP-completeness of three popular puzzles: Slither Link, Number Place and Fillomino. The ASP-completeness of Slither Link is shown via a reduction from the Hamiltonian circuit problem for restricted graphs, that of Number Place is from the problem of Latin square completion, and that of Fillomino is from planar 3SAT. Since ASP=completeness implies NP-completeness as is mentioned above, these results can be regarded as new results of NP-completeness proof of puzzles.},
url = {http://www-imai.is.s.u-tokyo.ac.jp/{\~{}}yato/data2/MasterThesis.pdf},
author = {Takayushi Yato},
comment = {},
urldate = {2016-06-18},
collections = {Puzzles,Basically computer science},
year = 2003
}
@article{Whatisthesmallestprime,
title = {What is the smallest prime?},
abstract = {What is the first prime? It seems that the number two should be the obvious
answer, and today it is, but it was not always so. There were times when and
mathematicians for whom the numbers one and three were acceptable answers. To
find the first prime, we must also know what the first positive integer is.
Surprisingly, with the definitions used at various times throughout history,
one was often not the first positive integer (some started with two, and a few
with three). In this article, we survey the history of the primality of one,
from the ancient Greeks to modern times. We will discuss some of the reasons
definitions changed, and provide several examples. We will also discuss the
last significant mathematicians to list the number one as prime.},
url = {http://arxiv.org/abs/1209.2007v2 http://arxiv.org/pdf/1209.2007v2},
author = {Chris K. Caldwell and Yeng Xiong},
comment = {},
urldate = {2016-07-05},
archivePrefix = {arXiv},
eprint = {1209.2007},
primaryClass = {math.HO},
collections = {History,Easily explained},
year = 2012
}
@article{LadderedParenthesis,
title = {The nesting and roosting habits of the laddered parenthesis},
abstract = {},
url = {http://oeis.org/A003018/a003018.pdf},
author = {R.K. Guy and J. L. Selfridge},
comment = {},
urldate = {2016-07-08},
collections = {Attention-grabbing titles,Easily explained},
year = 1973
}
@article{AnIrrationalityMeasureforRegularPaperfoldingNumbers,
title = {An Irrationality Measure for Regular Paperfolding Numbers},
abstract = {Let {\$}F(z) = \sum{\_}{\{}n \geq 1{\}} f{\_}n z^n{\$} be the generating series of the regular paperfolding sequence. For a real number {\$}\alpha{\$} the irrationality exponent {\$}\mu(\alpha){\$}, of {\$}\alpha{\$}, is defined as the supremum of the set of real numbers {\$}\mu{\$} such that the inequality {\$}\lvert \alpha - p/q \rvert \lt q-\mu{\$} has infinitely many solutions {\$}(p,q) \in Z \times N{\$}. In this paper, using a method introduced by Bugeaud, we prove that
\[ \mu(F(1/b)) \leq 275331112987/137522851840 = 2.002075359 \ldots \]
for all integers {\$}b \geq 2{\$}. This improves upon the previous bound of {\$}\mu(F(1/b)) \leq 5{\$} given by Adamczewski and Rivoal.},
url = {https://cs.uwaterloo.ca/journals/JIS/VOL15/Coons/coons3.html https://cs.uwaterloo.ca/journals/JIS/VOL15/Coons/coons3.pdf},
author = {Michael Coons and Paul Vrbik},
comment = {},
urldate = {2016-07-11},
collections = {Things to make and do},
year = 2012
}
@article{RationalPolynomialsThatTakeIntegerValuesattheFibonacciNumbers,
title = {Rational Polynomials That Take Integer Values at the Fibonacci Numbers},
author = {Keith Johnson and Kira Scheibelhut},
url = {http://www.jstor.org/stable/10.4169/amer.math.monthly.123.4.338},
abstract = {An integer-valued polynomial on a subset {\$}S{\$} of {\$}\mathbb{\{}Z{\}}{\$} is a polynomial {\$}f(x) \in \mathbb{\{}Q{\}}[x]{\$} with the property {\$}f(S) \subseteq \mathbb{\{}Z{\}}{\$}. This article describes the ring of such polynomials in the special case that {\$}S{\$} is the Fibonacci numbers. An algorithm is described for finding a regular basis, i.e., an ordered sequence of polynomials, the {\$}n{\$}th one of degree {\$}n{\$}, with which any such polynomial can be expressed as a unique integer linear combination.},
comment = {},
urldate = {2016-08-02},
year = 2016
}
@article{TenLessonsRota,
title = {Ten Lessons I Wish I Had Learned Before I Started Teaching Differential Equations},
abstract = {},
url = {https://web.williams.edu/Mathematics/lg5/Rota.pdf},
author = {Giancarlo Rota},
comment = {An entertainingly indignant rant about the way DEs are taught.},
urldate = {2016-08-03},
collections = {Attention-grabbing titles,The act of doing maths},
year = 1997
}
@book{MattersComputational,
title = {Matters Computational - Ideas, Algorithms, Source Code},
author = {J{\"{o}}rg Arndt},
url = {http://www.jjj.de/fxt/fxtbook.pdf http://www.jjj.de/fxt/{\#}fxtbook},
abstract = {This is the book "Matters Computational" (formerly titled "Algorithms for Programmers"), published with Springer.},
comment = {Lots and lots of algorithms!},
urldate = {2016-08-03},
collections = {Basically computer science},
year = 2010
}
@article{Thedenominatorsofconvergentsforcontinuedfractions,
title = {The denominators of convergents for continued fractions},
abstract = {For any real number {\$}x \in [0,1){\$}, we denote by {\$}q{\_}n(x){\$} the denominator of
the {\$}n{\$}-th convergent of the continued fraction expansion of {\$}x{\$} {\$}(n \in
\mathbb{\{}N{\}}){\$}. It is well-known that the Lebesgue measure of the set of points
{\$}x \in [0,1){\$} for which {\$}\log q{\_}n(x)/n{\$} deviates away from {\$}\pi^2/(12\log2){\$}
decays to zero as {\$}n{\$} tends to infinity. In this paper, we study the rate of
this decay by giving an upper bound and a lower bound. What is interesting is
that the upper bound is closely related to the Hausdorff dimensions of the
level sets for {\$}\log q{\_}n(x)/n{\$}. As a consequence, we obtain a large deviation
type result for {\$}\log q{\_}n(x)/n{\$}, which indicates that the rate of this decay is
exponential.},
url = {http://arxiv.org/abs/1608.01246v1 http://arxiv.org/pdf/1608.01246v1},
author = {Lulu Fang and Min Wu and Bing Li},
comment = {},
urldate = {2016-08-06},
archivePrefix = {arXiv},
eprint = {1608.01246},
primaryClass = {math.NT},
year = 2016
}
@article{BeckettGrayCodes,
title = {Beckett-Gray Codes},
abstract = {In this paper we discuss a natural mathematical structure that is derived
from Samuel Beckett's play "Quad". This structure is called a binary
Beckett-Gray code. Our goal is to formalize the definition of a binary
Beckett-Gray code and to present the work done to date. In addition, we
describe the methodology used to obtain enumeration results for binary
Beckett-Gray codes of order {\$}n = 6{\$} and existence results for binary
Beckett-Gray codes of orders {\$}n = 7,8{\$}. We include an estimate, using Knuth's
method, for the size of the exhaustive search tree for {\$}n=7{\$}. Beckett-Gray
codes can be realized as successive states of a queue data structure. We show
that the binary reflected Gray code can be realized as successive states of two
stack data structures.},
url = {http://arxiv.org/abs/1608.06001v1 http://arxiv.org/pdf/1608.06001v1},
author = {Mark Cooke and Chris North and Megan Dewar and Brett Stevens},
comment = {},
urldate = {2016-08-24},
archivePrefix = {arXiv},
eprint = {1608.06001},
primaryClass = {math.CO},
year = 2016
}
@article{TopologicallyDistinctSetsofNonintersectingCirclesinthePlane,
title = {Topologically Distinct Sets of Non-intersecting Circles in the Plane},
abstract = {Nested parentheses are forms in an algebra which define orders of
evaluations. A class of well-formed sets of associated opening and closing
parentheses is well studied in conjunction with Dyck paths and Catalan numbers.
Nested parentheses also represent cuts through circles on a line. These become
topologies of non-intersecting circles in the plane if the underlying algebra
is commutative.
This paper generalizes the concept and answers quantitatively - as
recurrences and generating functions of matching rooted forests - the
questions: how many different topologies of nested circles exist in the plane
if (i) pairs of circles may intersect, or (ii) even triples of circles may
intersect. That analysis is driven by examining the symmetry properties of the
inner regions of the fundamental type(s) of the intersecting pairs and triples.},
url = {http://arxiv.org/abs/1603.00077v1 http://arxiv.org/pdf/1603.00077v1},
author = {Richard J. Mathar},
comment = {},
urldate = {2016-08-25},
archivePrefix = {arXiv},
eprint = {1603.00077},
primaryClass = {math.CO},
collections = {Easily explained},
year = 2016
}
@article{WinklerSevenPuzzles,
title = {Seven Puzzles You Think You Must Not Have Heard Correctly},
abstract = {A typical mathematical puzzle sounds tricky but solvable — if not by you, then perhaps by the
genius down the hall. But sometimes the task at hand is so obviously impossible that you are moved
to ask whether you understood the problem correctly, and other times, the task seems so trivial
that you are sure you must have missed something.
Here, I have compiled seven puzzles which have often been greeted by words similar to “Wait
a minute — I must not have heard that correctly.” Some seem too hard, some too easy; after you've
worked on them for a while, you may find that the hard ones now seem easy and vice versa.},
url = {https://math.dartmouth.edu/{\~{}}pw/solutions.pdf},
author = {Peter Winkler},
comment = {},
urldate = {2016-08-30},
collections = {Attention-grabbing titles,Puzzles},
year = 2006
}
@article{PonytailMotion,
title = {Ponytail Motion},
abstract = {A jogger's ponytail sways from side to side as the jogger runs, although her head does not move from side to side. The jogger's head just moves up and down, forcing the ponytail to do so also. We show in two ways that this vertical motion is unstable to lateral perturbations. First we treat the ponytail as a rigid pendulum, and then we treat it as a flexible string; in each case, it is hanging from a support which is moving up and down periodically, and we solve the linear equation for small lateral oscillation. The angular displacement of the pendulum and the amplitude of each mode of the string satisfy Hill's equation. This equation has solutions which grow exponentially in time when the natural frequency of the pendulum, or that of a mode of the string, is close to an integer multiple of half the frequency of oscillation of the support. Then the vertical motion is unstable, and the ponytail sways.},
url = {http://epubs.siam.org/doi/abs/10.1137/090760477 http://epubs.siam.org/doi/pdf/10.1137/090760477},
author = {Joseph B. Keller},
comment = {},
urldate = {2016-09-19},
collections = {Easily explained,Basically physics},
year = 2010
}
@article{HistoricalMethodsForMultiplication,
title = {Historical methods for multiplication},
abstract = {This paper summarizes the contents of our workshop. In this workshop, we presented and discussed the "Greek" multiplication, given by Eutokios of Ascalon in his commentary on The Measurement of a Circle. We discussed part of the text from the treatise of Eutokios. Our basic thesis is that we think that this historical method for multiplication is part of the algorithms friendly to the user (based on the ideas that the children use in their informal mental strategies). The important idea is that the place value of numbers is maintained and the students act with quantities and not with isolated symbols as it happens with the classic algorithm. This helps students to control their thought at every stage of calculation. We also discussed the Russian method and the method by the cross (basically the same as "Casting out nines") to control the execution of the operations.},
url = {https://www.researchgate.net/publication/263733700{\_}Historical{\_}methods{\_}for{\_}multiplication},
author = {Bj{\o}rn Smestad and Konstantinos Nikolantonakis},
comment = {},
urldate = {2016-09-22},
collections = {Notation and conventions,History,Easily explained},
year = 2010
}
@article{Programmingquantumcomputersusing3Dpuzzlescoffeecupsanddoughnuts,
title = {Programming quantum computers using 3-D puzzles, coffee cups, and doughnuts},
abstract = {The task of programming a quantum computer is just as strange as quantum
mechanics itself. But it now looks like a simple 3D puzzle may be the future
tool of quantum software engineers.},
url = {http://arxiv.org/abs/1609.06628v1 http://arxiv.org/pdf/1609.06628v1},
author = {Simon J. Devitt},
comment = {},
urldate = {2016-09-23},
archivePrefix = {arXiv},
eprint = {1609.06628},
primaryClass = {quant-ph},
year = 2016
}
@article{Fractalgeometryofacomplexplumagetraitrevealsbirdsquality,
title = {Fractal geometry of a complex plumage trait reveals bird's quality},
abstract = {Animal coloration is key in natural and sexual selection, playing significant roles in intra- and interspecific communication because of its linkage to individual behaviour, genetics and physiology. Simple animal traits such as the area or the colour intensity of homogeneous patches have been profusely studied. More complex patterns are widespread in nature, but they escape our understanding because their variation is difficult to capture effectively by standard, simple measures. Here, we used fractal geometry to quantify inter-individual variation in the expression of a complex plumage trait, the heterogeneous black bib of the red-legged partridge (Alectoris rufa). We show that a higher bib fractal dimension (FD) predicted better individual body condition, as well as immune responsiveness, which is condition-dependent in our study species. Moreover, when food intake was experimentally reduced during moult as a means to reduce body condition, the bib's FD significantly decreased. Fractal geometry therefore provides new opportunities for the study of complex animal colour patterns and their roles in animal communication.},
url = {http://rspb.royalsocietypublishing.org/content/280/1755/20122783},
author = {Lorenzo P{\'{e}}rez-Rodr{\'{i}}guez and Roger Jovani and Fran\ccois Mougeot},
comment = {},
urldate = {2016-09-27},
collections = {Animals},
year = 2013
}
@article{AvoidingSquaresandOverlapsOvertheNaturalNumbers,
title = {Avoiding Squares and Overlaps Over the Natural Numbers},
abstract = {We consider avoiding squares and overlaps over the natural numbers, using a
greedy algorithm that chooses the least possible integer at each step; the word
generated is lexicographically least among all such infinite words. In the case
of avoiding squares, the word is 01020103..., the familiar ruler function, and
is generated by iterating a uniform morphism. The case of overlaps is more
challenging. We give an explicitly-defined morphism phi : N* -> N* that
generates the lexicographically least infinite overlap-free word by iteration.
Furthermore, we show that for all h,k in N with h <= k, the word phi^{\{}k-h{\}}(h)
is the lexicographically least overlap-free word starting with the letter h and
ending with the letter k, and give some of its symmetry properties.},
url = {http://arxiv.org/abs/0901.1397v1 http://arxiv.org/pdf/0901.1397v1},
author = {Mathieu Guay-Paquet and Jeffrey Shallit},
comment = {},
urldate = {2016-10-03},
archivePrefix = {arXiv},
eprint = {0901.1397},
primaryClass = {math.CO},
year = 2009
}
@article{ADiscreteandBoundedEnvyFreeCakeCuttingProtocolforAnyNumberofAgents,
title = {A Discrete and Bounded Envy-Free Cake Cutting Protocol for Any Number of Agents},
abstract = {We consider the well-studied cake cutting problem in which the goal is to
find an envy-free allocation based on queries from {\$}n{\$} agents. The problem has
received attention in computer science, mathematics, and economics. It has been
a major open problem whether there exists a discrete and bounded envy-free
protocol. We resolve the problem by proposing a discrete and bounded envy-free
protocol for any number of agents. The maximum number of queries required by
the protocol is {\$}n^{\{}n^{\{}n^{\{}n^{\{}n^n{\}}{\}}{\}}{\}}{\$}. We additionally show that even if we do
not run our protocol to completion, it can find in at most {\$}n^{\{}n+1{\}}{\$} queries a
partial allocation of the cake that achieves proportionality (each agent gets
at least {\$}1/n{\$} of the value of the whole cake) and envy-freeness. Finally we
show that an envy-free partial allocation can be computed in {\$}n^{\{}n+1{\}}{\$} queries
such that each agent gets a connected piece that gives the agent at least
{\$}1/(3n){\$} of the value of the whole cake.},
url = {http://arxiv.org/abs/1604.03655v10 http://arxiv.org/pdf/1604.03655v10},
author = {Haris Aziz and Simon Mackenzie},
comment = {},
urldate = {2016-10-13},
archivePrefix = {arXiv},
eprint = {1604.03655},
primaryClass = {cs.DS},
collections = {Attention-grabbing titles,Easily explained,Protocols and strategies},
year = 2016
}
@article{GeometricMechanicsofCurvedCreaseOrigami,
title = {Geometric Mechanics of Curved Crease Origami},
abstract = {Folding a sheet of paper along a curve can lead to structures seen in
decorative art and utilitarian packing boxes. Here we present a theory for the
simplest such structure: an annular circular strip that is folded along a
central circular curve to form a three-dimensional buckled structure driven by
geometrical frustration. We quantify this shape in terms of the radius of the
circle, the dihedral angle of the fold and the mechanical properties of the
sheet of paper and the fold itself. When the sheet is isometrically deformed
everywhere except along the fold itself, stiff folds result in creases with
constant curvature and oscillatory torsion. However, relatively softer folds
inherit the broken symmetry of the buckled shape with oscillatory curvature and
torsion. Our asymptotic analysis of the isometrically deformed state is
corroborated by numerical simulations which allow us to generalize our analysis
to study multiply folded structures.},
url = {http://arxiv.org/abs/1206.0461v2 http://arxiv.org/pdf/1206.0461v2},
author = {Marcelo A. Dias and Levi H. Dudte and L. Mahadevan and Christian D. Santangelo},
comment = {},
urldate = {2016-10-14},
archivePrefix = {arXiv},
eprint = {1206.0461},
primaryClass = {cond-mat.soft},
collections = {Art,Basically physics,Things to make and do},
year = 2012
}
@article{ASpaceEfficientAlgorithmfortheCalculationoftheDigitDistributionintheKolakoskiSequence,
title = {A Space Efficient Algorithm for the Calculation of the Digit Distribution in the Kolakoski Sequence},
abstract = {With standard algorithms for generating the classical Kolakoski sequence, the
numerical calculation of the digit distribution requires a linear amount of
space. Here, we present an algorithm for calculating the distribution of the
digits in the classical Kolakoski sequence, that only requires a logarithmic
amount of space and still runs in linear time. The algorithm is easily
adaptable to generalised Kolakoski sequences.},
url = {http://arxiv.org/abs/1110.4228v2 http://arxiv.org/pdf/1110.4228v2},
author = {Johan Nilsson},
comment = {},
urldate = {2016-10-14},
archivePrefix = {arXiv},
eprint = {1110.4228},
primaryClass = {math.CO},
year = 2011
}
@article{Tworemarksonevenandoddtownproblems,
title = {Two remarks on even and oddtown problems},
abstract = {A family {\$}\mathcal A{\$} of subsets of an {\$}n{\$}-element set is called an eventown
(resp. oddtown) if all its sets have even (resp. odd) size and all pairwise
intersections have even size. Using tools from linear algebra, it was shown by
Berlekamp and Graver that the maximum size of an eventown is {\$}2^{\{}\left\lfloor
n/2\right\rfloor{\}}{\$}. On the other hand (somewhat surprisingly), it was proven by
Berlekamp, that oddtowns have size at most {\$}n{\$}. Over the last four decades,
many extensions of this even/oddtown problem have been studied. In this paper
we present new results on two such extensions. First, extending a result of Vu,
we show that a {\$}k{\$}-wise eventown (i.e., intersections of {\$}k{\$} sets are even) has
for {\$}k \geq 3{\$} a unique extremal configuration and obtain a stability result
for this problem. Next we improve some known bounds for the defect version of
an {\$}\ell{\$}-oddtown problem. In this problem we consider sets of size {\$}\not\equiv
0 \pmod \ell{\$} where {\$}\ell{\$} is a prime number {\$}\ell{\$} (not necessarily {\$}2{\$}) and
allow a few pairwise intersections to also have size {\$}\not\equiv 0 \pmod \ell{\$}.},
url = {http://arxiv.org/abs/1610.07907v1 http://arxiv.org/pdf/1610.07907v1},
author = {Benny Sudakov and Pedro Vieira},
comment = {},
urldate = {2016-10-27},
archivePrefix = {arXiv},
eprint = {1610.07907},
primaryClass = {math.CO},
year = 2016
}
@article{QuasipracticalNumbers,
title = {Quasipractical Numbers},
abstract = {},
url = {http://ieeexplore.ieee.org/document/1090205/},
author = {Harvey J. Hindin},
comment = {},
urldate = {2016-11-28},
collections = {Unusual arithmetic},
year = 1980
}
@article{DevelopingaMathematicalModelforBobbinLace,
title = {Developing a Mathematical Model for Bobbin Lace},
abstract = {Bobbin lace is a fibre art form in which intricate and delicate patterns are
created by braiding together many threads. An overview of how bobbin lace is
made is presented and illustrated with a simple, traditional bookmark design.
Research on the topology of textiles and braid theory form a base for the
current work and is briefly summarized. We define a new mathematical model that
supports the enumeration and generation of bobbin lace patterns using an
intelligent combinatorial search. Results of this new approach are presented
and, by comparison to existing bobbin lace patterns, it is demonstrated that
this model reveals new patterns that have never been seen before. Finally, we
apply our new patterns to an original bookmark design and propose future areas
for exploration.},
url = {http://arxiv.org/abs/1406.1532v3 http://arxiv.org/pdf/1406.1532v3},
author = {Veronika Irvine and Frank Ruskey},
comment = {},
urldate = {2016-11-28},
archivePrefix = {arXiv},
eprint = {1406.1532},
primaryClass = {math.CO},
collections = {Art},
year = 2014
}
@article{SequencesOfConsecutiveNNivenNumbers,
title = {Sequences of consecutive \(n\)-Niven numbers},
abstract = {A Niven number is a positive integer that is divisible by the sum of its digits. In 1982, Kennedy showed that there do not exist sequences of more than 21 consecutive Niven numbers. In 1992, Cooper {\&} Kennedy improved this result by proving that there does not exist a sequence of more than 20 consecutive Niven numbers. They also proved that this bound is the best possible by producing an infinite family of sequences of 20 consecutive Niven numbers. For any positive integer \(n \gt 2\), define an \(n\)-Niven number to be a positive integer that is divisible by the sum of the digits in its base \(n\) expansion. This paper examines the maximal possible
lengths of sequences of consecutive \(n\)-Niven numbers. The main result is given in the following theorem. },
url = {http://www.fq.math.ca/Scanned/32-2/grundman.pdf},
author = {H.G. Grundman},
comment = {},
urldate = {2016-12-05},
year = 1992
}
@article{Everynaturalnumberisthesumoffortyninepalindromes,
title = {Every natural number is the sum of forty-nine palindromes},
abstract = {It is shown that the set of decimal palindromes is an additive basis for the
natural numbers. Specifically, we prove that every natural number can be
expressed as the sum of forty-nine (possibly zero) decimal palindromes.},
url = {http://arxiv.org/abs/1508.04721v1 http://arxiv.org/pdf/1508.04721v1},
author = {William D. Banks},
comment = {},
urldate = {2016-12-17},
archivePrefix = {arXiv},
eprint = {1508.04721},
primaryClass = {math.NT},
year = 2015
}
@article{TwoshortproofsofthePerfectForestTheorem,
title = {Two short proofs of the Perfect Forest Theorem},
abstract = {A perfect forest is a spanning forest of a connected graph {\$}G{\$}, all of whose
components are induced subgraphs of {\$}G{\$} and such that all vertices have odd
degree in the forest. A perfect forest generalised a perfect matching since, in
a matching, all components are trees on one edge. Scott first proved the
Perfect Forest Theorem, namely, that every connected graph of even order has a
perfect forest. Gutin then gave another proof using linear algebra.
We give here two very short proofs of the Perfect Forest Theorem which use
only elementary notions from graph theory. Both our proofs yield
polynomial-time algorithms for finding a perfect forest in a connected graph of
even order.},
url = {http://arxiv.org/abs/1612.05004v1 http://arxiv.org/pdf/1612.05004v1},
author = {Yair Caro and Josef Lauri and Christina Zarb},
comment = {},
urldate = {2016-12-18},
archivePrefix = {arXiv},
eprint = {1612.05004},
primaryClass = {math.CO},
year = 2016
}
@article{BalloonPolyhedra,
title = {Balloon Polyhedra},
abstract = {},
url = {http://erikdemaine.org/papers/Balloons{\_}ShapingSpace2/paper.pdf},
author = {Erik D. Demaine and Martin L. Demaine and Vi Hart},
comment = {},
urldate = {2016-12-21},
collections = {Art,Easily explained,Things to make and do},
year = 2013
}
@article{ASingularMathematicalPromenade,
title = {A Singular Mathematical Promenade},
abstract = {This is neither an elementary introduction to singularity theory nor a
specialized treatise containing many new theorems. The purpose of this little
book is to invite the reader on a mathematical promenade. We will pay a visit
to Hipparchus, Newton and Gauss, but also to many contemporary mathematicians.
We will play with a bit of algebra, topology, geometry, complex analysis and
computer science. Hopefully, some motivated undergraduates and some more
advanced mathematicians will enjoy some of these panoramas.},
url = {http://arxiv.org/abs/1612.06373v1 http://arxiv.org/pdf/1612.06373v1},
author = {Etienne Ghys},
comment = {A delight!},
urldate = {2016-12-22},
archivePrefix = {arXiv},
eprint = {1612.06373},
primaryClass = {math.AG},
collections = {History},
year = 2016
}
@article{HumanInferencesaboutSequencesAMinimalTransitionProbabilityModel,
title = {Human Inferences about Sequences: A Minimal Transition Probability Model},
abstract = {The brain constantly infers the causes of the inputs it receives and uses these inferences to generate statistical expectations about future observations. Experimental evidence for these expectations and their violations include explicit reports, sequential effects on reaction times, and mismatch or surprise signals recorded in electrophysiology and functional MRI. Here, we explore the hypothesis that the brain acts as a near-optimal inference device that constantly attempts to infer the time-varying matrix of transition probabilities between the stimuli it receives, even when those stimuli are in fact fully unpredictable. This parsimonious Bayesian model, with a single free parameter, accounts for a broad range of findings on surprise signals, sequential effects and the perception of randomness. Notably, it explains the pervasive asymmetry between repetitions and alternations encountered in those studies. Our analysis suggests that a neural machinery for inferring transition probabilities lies at the core of human sequence knowledge.},
url = {http://journals.plos.org/ploscompbiol/article?id=10.1371/journal.pcbi.1005260},
author = {Florent Meyniel and Maxime Maheu and Stanislas Dehaene},
comment = {},
urldate = {2017-01-09},
collections = {The act of doing maths,Probability and statistics},
year = 2016
}
@article{RulesforFoldingPolyminoesfromOneLeveltoTwoLevels,
title = {Rules for Folding Polyminoes from One Level to Two Levels},
abstract = {Polyominoes have been the focus of many recreational and research
investigations. In this article, the authors investigate whether a paper cutout
of a polyomino can be folded to produce a second polyomino in the same shape as
the original, but now with two layers of paper. For the folding, only "corner
folds" and "half edge cuts" are allowed, unless the polyomino forms a closed
loop, in which case one is allowed to completely cut two squares in the
polyomino apart. With this set of allowable moves, the authors present
algorithms for folding different types of polyominoes and prove that certain
polyominoes can successfully be folded to two layers. The authors also
establish that other polyominoes cannot be folded to two layers if only these
moves are allowed.},
url = {http://arxiv.org/abs/1701.03461v1 http://arxiv.org/pdf/1701.03461v1},
author = {Julia Martin and Elizabeth Wilcox},
comment = {},
urldate = {2017-01-16},
archivePrefix = {arXiv},
eprint = {1701.03461},
primaryClass = {math.CO},
collections = {Easily explained,Things to make and do},
year = 2017
}
@article{OntheExistenceofOrdinaryTriangles,
title = {On the Existence of Ordinary Triangles},
abstract = {Let {\$}P{\$} be a finite point set in the plane. A {\$}c{\$}-ordinary triangle in {\$}P{\$} is
a subset of {\$}P{\$} consisting of three non-collinear points such that each of the
three lines determined by the three points contains at most {\$}c{\$} points of {\$}P{\$}.
We prove that there exists a constant {\$}c>0{\$} such that {\$}P{\$} contains a
{\$}c{\$}-ordinary triangle, provided that {\$}P{\$} is not contained in the union of two
lines. Furthermore, the number of {\$}c{\$}-ordinary triangles in {\$}P{\$} is
{\$}\Omega(|P|){\$}.},
url = {http://arxiv.org/abs/1701.08183v1 http://arxiv.org/pdf/1701.08183v1},
author = {Radoslav Fulek and Hossein Nassajian Mojarrad and M{\'{a}}rton Nasz{\'{o}}di and J{\'{o}}zsef Solymosi and Sebastian U. Stich and May Szedl{\'{a}}k},
comment = {},
urldate = {2017-02-06},
archivePrefix = {arXiv},
eprint = {1701.08183},
primaryClass = {math.CO},
year = 2017
}
@article{TransfiniteVersionofWeltersGame,
title = {Transfinite Version of Welter's Game},
abstract = {We study the transfinite version of Welter's Game, a combinatorial game,
which is played on the belt divided into squares with general ordinal numbers
extended from natural numbers.
In particular, we obtain a straight-forward solution for the transfinite
version based on those of the transfinite version of Nim and the original
version of Welter's Game.},
url = {http://arxiv.org/abs/1701.08928v1 http://arxiv.org/pdf/1701.08928v1},
author = {Tomoaki Abuku},
comment = {},
urldate = {2017-02-06},
archivePrefix = {arXiv},
eprint = {1701.08928},
primaryClass = {math.CO},
collections = {Protocols and strategies,Games to play with friends},
year = 2017
}
@article{PlanepartitionsintheworkofRichardStanleyandhisschool,
title = {Plane partitions in the work of Richard Stanley and his school},
abstract = {These notes provide a survey of the theory of plane partitions, seen through
the glasses of the work of Richard Stanley and his school.},
url = {http://arxiv.org/abs/1503.05934v2 http://arxiv.org/pdf/1503.05934v2},
author = {C. Krattenthaler},
comment = {},
urldate = {2017-02-06},
archivePrefix = {arXiv},
eprint = {1503.05934},
primaryClass = {math.CO},
collections = {Art},
year = 2015
}
@article{RandomTrianglesandPolygonsinthePlane,
title = {Random Triangles and Polygons in the Plane},
abstract = {We consider the problem of finding the probability that a random triangle is
obtuse, which was first raised by Lewis Caroll. Our investigation leads us to a
natural correspondence between plane polygons and the Grassmann manifold of
2-planes in real {\$}n{\$}-space proposed by Allen Knutson and Jean-Claude Hausmann.
This correspondence defines a natural probability measure on plane polygons. In
these terms, we answer Caroll's question. We then explore the Grassmannian
geometry of planar quadrilaterals, providing an answer to Sylvester's
four-point problem, and describing explicitly the moduli space of unordered
quadrilaterals. All of this provides a concrete introduction to a family of
metrics used in shape classification and computer vision.},
url = {http://arxiv.org/abs/1702.01027v1 http://arxiv.org/pdf/1702.01027v1},
author = {Jason Cantarella and Tom Needham and Clayton Shonkwiler and Gavin Stewart},
comment = {},
urldate = {2017-02-06},
archivePrefix = {arXiv},
eprint = {1702.01027},
primaryClass = {math.MG},
collections = {Probability and statistics},
year = 2017
}
@article{ThreeThoughtsonPrimeSimplicity,
title = {Three Thoughts on “Prime Simplicity”},
abstract = {In 2009, Catherine Woodgold and I published ‘‘Prime Simplicity’’, examining the belief that Euclid’s famous proof of the infinitude of prime numbers was by contradiction. We demonstrated that that belief is widespread among mathematicians and is false: Euclid’s proof is simpler and better than the frequently seen proof by contradiction. The extra complication of the indirect proof serves no purpose and has pitfalls that can mislead the reader.},
url = {https://link.springer.com/article/10.1007/s00283-012-9322-z},
author = {Michael Hardy},
comment = {},
urldate = {2017-02-27},
year = 2012
}
@article{PrimeSimplicity,
title = {Prime Simplicity},
author = {Michael Hardy and Catherine Woodgold},
url = {https://link.springer.com/article/10.1007/s00283-009-9064-8},
abstract = {},
comment = {Euclid's proof of the infinitude of the primes wasn't a proof by contradiction!},
urldate = {2017-02-27},
year = 2009
}
@article{StatisticsDoneWrong,
title = {Statistics Done Wrong},
abstract = {If you’re a practicing scientist, you probably use statistics to analyze your data. From basic t tests and standard error calculations to Cox proportional hazards models and propensity score matching, we rely on statistics to give answers to scientific problems.
This is unfortunate, because statistical errors are rife.
Statistics Done Wrong is a guide to the most popular statistical errors and slip-ups committed by scientists every day, in the lab and in peer-reviewed journals. Many of the errors are prevalent in vast swaths of the published literature, casting doubt on the findings of thousands of papers. Statistics Done Wrong assumes no prior knowledge of statistics, so you can read it before your first statistics course or after thirty years of scientific practice.},
url = {https://www.statisticsdonewrong.com/},
author = {Alex Reinhart},
comment = {},
urldate = {2017-03-01},
collections = {Attention-grabbing titles,Lists and catalogues,Probability and statistics},
year = 2015
}
@article{Themathematicsoflecturehallpartitions,
title = {The mathematics of lecture hall partitions},
abstract = {Over the past twenty years, lecture hall partitions have emerged as
fundamental combinatorial structures, leading to new generalizations and
interpretations of classical theorems and new results. In recent years,
geometric approaches to lecture hall partitions have used polyhedral geometry
to discover further properties of these rich combinatorial objects.
In this paper we give an overview of some of the surprising connections that
have surfaced in the process of trying to understand the lecture hall
partitions.},
url = {http://arxiv.org/abs/1607.01765v1 http://arxiv.org/pdf/1607.01765v1},
author = {Carla D. Savage},
comment = {},
urldate = {2017-03-08},
archivePrefix = {arXiv},
eprint = {1607.01765},
primaryClass = {math.CO},
collections = {Easily explained},
year = 2016
}
@article{CrazySequentialRepresentationNumbersfrom0to11111intermsofIncreasingandDecreasingOrdersof1to9,
title = {Crazy Sequential Representation: Numbers from 0 to 11111 in terms of Increasing and Decreasing Orders of 1 to 9},
abstract = {Natural numbers from 0 to 11111 are written in terms of 1 to 9 in two
different ways. The first one in increasing order of 1 to 9, and the second one
in decreasing order. This is done by using the operations of addition,
multiplication, subtraction, potentiation, and division. In both the situations
there are no missing numbers, except one, i.e., 10958 in the increasing case.},
url = {http://arxiv.org/abs/1302.1479v5 http://arxiv.org/pdf/1302.1479v5},
author = {Inder J. Taneja},
comment = {},
urldate = {2017-03-12},
archivePrefix = {arXiv},
eprint = {1302.1479},
primaryClass = {math.HO},
collections = {Easily explained},
year = 2013
}
@article{BeyondFloatingPoint,
title = {Beyond Floating Point: Next-Generation Computer Arithmetic },
abstract = {},
url = {http://web.stanford.edu/class/ee380/Abstracts/170201-slides.pdf},
author = {John L. Gustafson},
comment = {About posits, which beat IEEE floats on pretty much everything. Lots of nice pictures!},
urldate = {2017-03-21},
collections = {Basically computer science,Unusual arithmetic},
year = 2017
}
@article{SENEWSPAPAC00,
title = {PAPAC-00, a Do-It-Yourself Paper Computer},
abstract = {},
url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5222588},
author = {Rollin P. Mayer},
comment = {},
urldate = {2017-03-21},
collections = {Basically computer science,Easily explained,Things to make and do},
year = 1958
}
@article{Whitt2013,
title = {The Maximum Throughput Rate for Each Hole on a Golf Course},
author = {Whitt, Ward},
url = {http://www.columbia.edu/{\~{}}ww2040/golf{\_}throughput{\_}POMS{\_}2015.pdf},
urldate = {2013-11-25},
abstract = {},
comment = {},
collections = {Games to play with friends,Basically physics,Probability and statistics},
year = 2015
}
@misc{item61,
title = {Prime numbers in certain arithmetic progressions},
author = {Ram Murty and Nithum Thain},
url = {http://projecteuclid.org/download/pdf{\_}1/euclid.facm/1229442627},
urldate = {2016-05-07},
abstract = {We discuss to what extent Euclid's elementary proof of the infinitude of primes can be modified so as to show infinitude of primes in arithmetic progressions (Dirichlet's theorem). Murty had shown earlier that such proofs can exist if and only if the residue class (mod {\$}k{\$}) has order 1 or 2. After reviewing this work, we consider generalizations of this question to algebraic number fields.},
comment = {},
year = 2001
}
@article{Plagge1978,
title = {Fractions without Quotients: Arithmetic of Repeating Decimals},
author = {Plagge, Richard},
url = {https://www.maa.org/sites/default/files/pdf/upload{\_}library/22/Polya/00494925.di020680.02p0417i.pdf http://www.jstor.org/stable/10.2307/3026549},
urldate = {2012-02-10},
abstract = {},
comment = {},
collections = {Notation and conventions,Unusual arithmetic,Easily explained},
year = 1978
}
@article{Fink1999,
title = {Designing tie knots by random walks},
author = {Thomas M. Fink and Yong Mao},
url = {http://www.nature.com/nature/journal/v398/n6722/abs/398031a0.html},
urldate = {2011-12-09},
abstract = {The simplest of conventional tie knots, the four-in-hand, has its origins in late-nineteenth-century England. The Duke of Windsor, as King Edward VIII became after abdicating in 1936, is credited with introducing what is now known as the Windsor knot, from which its smaller derivative, the half-Windsor, evolved. In 1989, the Pratt knot, the first new knot to appear in fifty years, was revealed on the front page of The New York Times.},
comment = {},
collections = {Probability and statistics},
year = 1999
}
@article{CryptographicProtocolsWithEverydayObjects,
title = {Cryptographic Protocols with Everyday Objects},
author = {James Heather and Steve Schneider and Vanessa Teague},
url = {http://www.computing.surrey.ac.uk/personal/st/S.Schneider/papers/2011/cryptoforma11a.pdf},
urldate = {2016-11-17},
abstract = {Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access
to some sort of computational device.
However, there are times when there is need for a security mechanism
to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for
solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.},
comment = {},
collections = {Protocols and strategies,Things to make and do},
year = 2011
}
@article{NaguraOntheintervalcontainingatleastoneprimenumber,
title = {On the interval containing at least one prime number},
author = {Jitsuro Nagura},
url = {https://projecteuclid.org/euclid.pja/1195570997 https://projecteuclid.org/download/pdf{\_}1/euclid.pja/1195570997},
urldate = {2016-11-14},
abstract = {},
comment = {},
year = 1952
}
@misc{item58,
title = {Area and Hausdorff Dimension of Julia Sets of Entire Functions},
author = {Curt McMullen},
url = {http://www.math.harvard.edu/{\~{}}ctm/papers/home/text/papers/entire/entire.pdf},
urldate = {2015-12-17},
abstract = {We show the Julia set of {\$}\lambda \sin(z){\$} has positive area and the action of {\$}\lambda \sin(z){\$} on its Julia set is not ergodic; the Julia set of {\$}\lambda \exp(z){\$} has Hausdorff dimension two but in the presence of an attracting periodic cycle its area is zero.},
comment = {},
year = 1987
}
@article{Kolliopoulos,
title = {The 1-Hyperbolic Projection for User Interfaces},
author = {Kolliopoulos, Alexander},
url = {http://www.dgp.toronto.edu/{\~{}}alexk/hyperproj.pdf},
urldate = {2011-04-12},
abstract = {The problem of dealing with representations of information that does not fit conveniently within allotted screen space is pervasive in graphical interfaces. While there are techniques for dealing with this problem in various ways, some properties of such existing techniques are not satisfying. For example, global structure of information may be lost in favor of local focus, or information may not be mapped into a rectangular area. The 1-hyperbolic interface is proposed to deal with some of these deficiencies, and the mathematics involved in display and interaction are derived. The calculations necessary for this interface are easy to implement, and can run reasonably even on slow devices. A fully functional prototype for displaying tree structures has been developed to compare the effects of this new interface
to those of a standard interface. The results of usability experiments conducted with this prototype are also presented and analyzed.},
comment = {},
collections = {Basically computer science},
year = 2003
}
@article{item36,
title = {Solving Differential Equations by Symmetry Groups},
author = {John Starret},
url = {https://www.jstor.org/stable/27642331},
urldate = {2013-12-06},
abstract = {},
comment = {},
year = 2007
}
@article{Knutson2012,
title = {A stratification of the space of all {\$}k{\$}-planes in {\$}\mathbb{\{}C{\}}{\_}n{\$}},
author = {Knutson, A},
url = {http://www.math.cornell.edu/{\~{}}allenk/joint.pdf},
urldate = {2012-11-19},
abstract = {To each {\$}k \times n{\$} matrix {\$}\mathrm{\{}M{\}}{\$} of rank {\$}k{\$}, we associate a juggling pattern of periodicity {\$}n{\$} with {\$}k{\$} balls. The juggling pattern actually only depends
on the {\$}k{\$}-plane spanned by the rows, so gives a decomposition of the “Grassmannian” of all {\$}k{\$}-planes in {\$}n{\$}-space.
There are many connections between the geometry and the juggling. For example, the natural topology on the space of matrices induces a partial order on the space of juggling patterns, which indicates whether one pattern is “more excited” than another. This same decomposition turns out to naturally arise from totally
positive geometry, characteristic {\$}p{\$} geometry, and noncommutative geometry. It also arises by projection from the manifold of full flags in {\$}n{\$}-space, where there is no cyclic symmetry},
comment = {},
year = 2012
}
@online{item16,
title = {Navigating Hyperbolic Space with Fibonacci Trees},
author = {moniker},
url = {http://moniker.name/worldmaking/?p=409},
urldate = {2012-04-07},
abstract = {},
comment = {},
collections = {Basically computer science},
year = 2010
}
@misc{item43,
title = {The Nesting and Roosting Habits of The Laddered Parenthesis},
author = {R. K. Guy and J. L. Selfridge},
url = {http://www.jstor.org/stable/2319392},
urldate = {2016-09-23},
abstract = {},
comment = {},
collections = {Attention-grabbing titles,Easily explained},
year = 1973
}
@article{BadgroupsinthesenseofCherlin,
title = {Bad groups in the sense of Cherlin},
author = {Olivier Fr{\'{e}}con},
url = {http://arxiv.org/abs/1607.02994v1 http://arxiv.org/pdf/1607.02994v1},
urldate = {2016-08-02},
abstract = {There exists no bad group (in the sense of Gregory Cherlin), namely any
simple group of Morley rank 3 is isomorphic to {\$}\mathrm{\{}PSL{\_}2{\}}(K){\$} for an algebraically
closed field {\$}K{\$}.},
comment = {},
year = 2016
}
@article{Mercer2009,
title = {On Furstenberg's Proof of the Infinitude of Primes},
author = {Mercer, Idris D},
url = {http://www.idmercer.com/monthly355-356-mercer.pdf},
urldate = {2010-09-09},
abstract = {},
comment = {},
year = 2009
}
@online{item17,
title = {Light reflecting off Christmas-tree balls},
author = {Joseph O'Rourke},
url = {http://mathoverflow.net/questions/50150/light-reflecting-off-christmas-tree-balls},
urldate = {2012-04-08},
abstract = {'Twas the night before Christmas and under the tree Was a heap of new balls, stacked tight as can be. The balls so gleaming, they reflect all light rays, Which bounce in the stack every which way. When, what to my wondering mind does occur: A question of interest; I hope you concur! From each point outside, I wondered if light Could reach deep inside through gaps so tight?},
comment = {},
collections = {Easily explained},
year = 2010
}
@article{CountingCasesInMarchingCubes,
title = {Counting Cases in Marching Cubes: Towards a Generic Algorithm for Producing Substitopes},
author = {David C. Banks and Stephen Linton},
url = {https://www.evl.uic.edu/cavern/rg/20040525{\_}renambot/Visualization-papers/papers/03/01250354.pdf http://ieeexplore.ieee.org/document/1250354},
urldate = {2016-09-28},
abstract = {We describe how to count the cases that arise in a family of visualization techniques, including marching cubes, sweeping simplices, contour meshing, interval volumes, and separating surfaces. Counting the cases is the first step toward developing a generic visualization algorithm to produce substitopes (geometric substitution of polytopes). We demonstrate the method using a software system ("GAP") for computational group theory. The case-counts are organized into a table that provides taxonomy of members of the family; numbers in the table are derived from actual lists of cases, which are computed by our methods. The calculation confirms previously reported case-counts for large dimensions that are too large to check by hand, and predicts the number of cases that will arise in algorithms that have not yet been invented.},
comment = {},
collections = {Basically computer science},
year = 2003
}
@online{item21,
title = {Carcassonne and multivariate calculus},
author = {Douglas Weathers},
url = {http://douglasweathers.com/permalink.php?id=5},
urldate = {2012-08-13},
abstract = {},
comment = {Link is broken and the Internet Archive gives an error :(},
collections = {Unusual arithmetic}
}
@article{Akritas1986,
title = {There is no "Uspensky's method"},
author = {Akritas, AG},
url = {http://portal.acm.org/citation.cfm?id=32457},
urldate = {2011-09-15},
abstract = {In this paper an attempt is made to correct the misconception of several authors that there exists a method by Upensky (based on Vincent's theorem) for the isolation of the real roots of a polynomial equation with rational coefficients. Despite Uspensky's claim, in the preface of his book, that he invented this method, we show that what Uspensky actually did was to take Vincent's method and double its computing time. Uspensky must not have understood Vincent's method probably because he was not aware of Budan's theorem. In view of the above, it is historically incorrect to attribute Vincent's method to Uspensky.},
comment = {},
collections = {Attention-grabbing titles},
year = 1986
}
@book{Diaconis2006,
title = {Methods for studying coincidences},
author = {Diaconis, P and Mosteller, Frederick},
url = {http://link.springer.com/chapter/10.1007/978-0-387-44956-2{\_}39},
urldate = {2014-10-07},
abstract = {This article illustrates basic statistical techniques for studying coincidences. These include data-gathering methods (informal anecdotes, case studies, observational studies, and experiments) and methods of analysis (exploratory and confirmatory data analysis, special analytic techniques, and probabilistic modeling, both general and special purpose). We develop a version of the birthday problem general enough to include dependence, inhomogeneity, and almost multiple matches. We review Fisher’s techniques for giving partial credit for close matches. We develop a model for studying coincidences involving newly learned words. Once we set aside coincidences having apparent causes, four principles account for large numbers of remaining coincidences: hidden cause; psychology, including memory and perception; multiplicity of endpoints, including the counting of “close” or nearly alike events as if they were identical; and the law of truly large numbers which says that when enormous numbers of events and people and their interactions cumulate over time, almost any outrageous event is bound to occur. These sources account for much of the force of synchronicity.},
comment = {},
collections = {Easily explained,Probability and statistics},
year = 2006
}
@article{Shuai,
title = {Does Quantum Interference exist in Twitter?},
author = {Shuai, Xin and Ding, Ying and Busemeyer, Jerome and Sun, Yuyin and Chen, Shanshan and Tang, Jie},
url = {http://arxiv.org/abs/1107.0681 http://arxiv.org/pdf/1107.0681v1},
urldate = {2011-09-08},
abstract = {It becomes more difficult to explain the social information transfer phenomena using the classic models based merely on Shannon Information Theory (SIT) and Classic Probability Theory (CPT), because the transfer process in the social world is rich of semantic and highly contextualized. This paper aims to use twitter data to explore whether the traditional models can interpret information transfer in social networks, and whether quantum-like phenomena can be spotted in social networks. Our main contributions are: (1) SIT and CPT fail to interpret the information transfer occurring in Twitter; and (2) Quantum interference exists in Twitter, and (3) a mathematical model is proposed to elucidate the spotted quantum phenomena.},
comment = {},
collections = {Basically computer science,Basically physics},
year = 2011
}
@article{Saloffcoste,
title = {Random Walks on Finite Groups},
author = {Saloff-coste, Laurent},
url = {http://statweb.stanford.edu/{\~{}}cgates/PERSI/papers/rwfg.pdf},
urldate = {2012-01-05},
abstract = {Markov chains on finite sets are used in a great variety of situations to approximate, understand and sample from their limit distribution. A familiar example is provided by card shuffling methods. From this viewpoint, one is interested in the “mixing time” of the chain, that is, the time at which the chain gives a good approximation of the limit distribution. A remarkable phenomenon known as the cut-off phenomenon asserts that this often happens abruptly so that it really makes sense to talk about “the mixing time”. Random walks on finite groups generalize card shuffling models by replacing the symmetric group by other finite groups. One then would like to understand how the structure of a particular class of groups relates to the mixing time of natural random walks on those groups. It turns out that this is an extremely rich problem which is very far to be understood. Techniques from a great variety of different fields – Probability, Algebra, Representation Theory, Functional Analysis, Geometry, Combinatorics – have been used to attack special instances of this problem. This article gives a general overview of this area of research.},
comment = {},
collections = {Probability and statistics},
year = 2004
}
@article{NonSexistMenage,
title = {Non-sexist solution of the m{\'{e}}nage problem},
author = {Kenneth P. Bogart},
url = {http://www.math.dartmouth.edu/{\~{}}doyle/docs/menage/menage/menage.html},
urldate = {2013-06-16},
abstract = {The m{\'{e}}nage problem asks for the number of ways of seating \(n\) couples at a circular table, with men and women alternating, so that no one sits next to his or her partner. We present a straight-forward solution to this problem. What distinguishes our approach is that we do not seat the ladies first.},
comment = {},
collections = {Puzzles,Easily explained},
year = 1985
}
@article{Ufnarovski2003,
title = {How to differentiate a number},
author = {Ufnarovski, Victor and {\AA}hlander, B},
url = {http://www.emis.ams.org/journals/JIS/VOL6/Ufnarovski/ufnarovski.pdf https://cs.uwaterloo.ca/journals/JIS/VOL6/Ufnarovski/ufnarovski.html},
urldate = {2013-10-31},
abstract = {},
comment = {},
collections = {Unusual arithmetic,Easily explained},
year = 2003
}
@article{Martin1998,
title = {Denser Egyptian Fractions},
author = {Martin, Greg},
url = {http://arxiv.org/abs/math/9811112 http://arxiv.org/pdf/math/9811112v1},
urldate = {2015-07-23},
abstract = {An Egyptian fraction is a sum of distinct unit fractions (reciprocals of positive integers). We show that every rational number has Egyptian fraction representations where the number of terms is of the same order of magnitude as the largest denominator, improving a result from an earlier paper to best-possible form. We also settle, in best-possible form, the related problem of how small M{\_}t(r) can be such that there is an Egyptian fraction representation of r with exactly t terms, the denominators of which are all at most M{\_}t(r). We also consider the following problems posed by Erd{\H{o}}s and Graham: the set of integers that cannot be the largest denominator of an Egyptian fraction representation of 1 is infinite - what is its order of growth? How about those integers that cannot be the second-largest (third-largest, etc.) denominator of such a representation? In the latter case, we show that only finitely many integers cannot be the second-largest (third-largest, etc.) denominator of such a representation; while in the former case, we show that the set of integers that cannot be the largest denominator of such a representation has density zero, and establish its order of growth. Both results extend to representations of any positive rational number.},
comment = {},
collections = {Easily explained},
year = 1998
}
@online{item5,
title = {Four questions about fuzzy rankings},
author = {Brian Hayes},
url = {http://bit-player.org/2010/four-questions-about-fuzzy-rankings},
urldate = {2011-01-12},
abstract = {},
comment = {},
year = 2010
}
@article{Onsubsetswithintersectionsofevencardinality,
title = {On subsets with intersections of even cardinality},
author = {E.R. Berlekamp},
url = {https://cms.math.ca/10.4153/CMB-1969-059-3 https://cms.math.ca/openaccess/cmb/v12/cmb1969v12.0471-0474.pdf},
urldate = {2016-11-01},
abstract = {This paper solves a question by Paul Erd{\H{o}}s},
comment = {},
year = 1969
}
@article{item54,
title = {How to Beat Your Wythoff Games' Opponent on Three Fronts},
author = {Aviezri S. Fraenkel},
url = {http://www.jstor.org/stable/2321643},
urldate = {2015-10-23},
abstract = {},
comment = {},
collections = {Protocols and strategies,Games to play with friends},
year = 1982
}
@article{BestLaidPlansofLionsandMen,
title = {Best Laid Plans of Lions and Men},
abstract = {We answer the following question dating back to J.E. Littlewood (1885 -
1977): Can two lions catch a man in a bounded area with rectifiable lakes? The
lions and the man are all assumed to be points moving with at most unit speed.
That the lakes are rectifiable means that their boundaries are finitely long.
This requirement is to avoid pathological examples where the man survives
forever because any path to the lions is infinitely long. We show that the
answer to the question is not always "yes" by giving an example of a region {\$}R{\$}
in the plane where the man has a strategy to survive forever. {\$}R{\$} is a
polygonal region with holes and the exterior and interior boundaries are
pairwise disjoint, simple polygons. Our construction is the first truly
two-dimensional example where the man can survive.
Next, we consider the following game played on the entire plane instead of a
bounded area: There is any finite number of unit speed lions and one fast man
who can run with speed {\$}1+\varepsilon{\$} for some value {\$}\varepsilon>0{\$}. Can the
man always survive? We answer the question in the affirmative for any constant
{\$}\varepsilon>0{\$}.},
url = {http://arxiv.org/abs/1703.03687v1 http://arxiv.org/pdf/1703.03687v1},
author = {Mikkel Abrahamsen and Jacob Holm and Eva Rotenberg and Christian Wulff-Nilsen},
comment = {},
urldate = {2017-03-22},
archivePrefix = {arXiv},
eprint = {1703.03687},
primaryClass = {cs.CG},
collections = {Attention-grabbing titles,Protocols and strategies,Animals},
year = 2017
}
@online{Ptak,
title = {A Do-It-Yourself Paper Digital Computer, 1959.},
author = {Ptak, John F.},
url = {http://longstreet.typepad.com/books/2010/11/item-mayer-rollin-p-papac-00-a-do-it-yourself-paper-computer-in-communications-of-the-association-for-computing-machin.html},
urldate = {2013-05-05},
abstract = {This wonderful cut-away and paste-up template for a digital computer comes to us from the Communications of the Association for Computing Machinery, volume 2, issue 9 for September 1959. The PAPAC-00 is a “2-register, 1-bit, fixed-instruction binary digital computer” and was submitted to the journal by Rollin P. Mayer (of the MIT Lincoln Lab).},
comment = {},
collections = {Easily explained,Things to make and do},
year = 2010
}
@article{Gale1991,
title = {The Strange and Surprising Saga of the Somos Sequences},
author = {Gale, David},
url = {http://link.springer.com/10.1007/BF03024070},
urldate = {2013-10-09},
abstract = {},
comment = {},
doi = {10.1007/BF03024070},
issn = {0343-6993},
journal = {The Mathematical Intelligencer},
month = {mar},
number = 1,
pages = {40--43},
volume = 13,
year = 1991
}
@misc{item23,
title = {Modiﬁed Pascal Triangle and Pascal Surfaces},
author = {David Alvo},
url = {http://uai.academia.edu/DavidAlvo/Papers/995009/Modi{\_}ed{\_}Pascal{\_}Triangle{\_}and{\_}Pascal{\_}Surfaces},
urldate = {2012-09-05},
abstract = {},
comment = {},
keywords = {Biology,Chemistry,Computer Science,Earth Sciences,Economics,English,Geography,History,Law,Math,Medicine,Philosophy,Physics,Political Science,Psychology,Religion,academia,academics,research,universities}
}
@article{Battisti2006,
title = {A Generalized Fibonacci LSB Data Hiding Technique},
author = {Battisti, F and Carli, M and Neri, A and Egiaziarian, K},
url = {http://www.comlab.uniroma3.it/Marco/Articoli{\%}20Battisti/A{\%}20Generalized{\%}20Fibonacci{\%}20LSB{\%}20Data{\%}20Hiding{\%}20Technique.pdf},
urldate = {2012-01-10},
abstract = {},
comment = {},
booktitle = {3rd International Conference on Computers and Devices for Communication (CODEC-06) TEA, Institute of Radio Physics and Electronics, University of Calcutta},
keywords = {data hiding,fibonacci,image,security},
pages = {2--5},
year = 2006,
collections = {Basically computer science}
}
@article{Flajolet1998,
title = {Continued fraction algorithms, functional operators, and structure constants},
author = {Flajolet, P. and Vall{\'{e}}e, B.},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0304397597001230},
urldate = {2011-01-20},
abstract = {},
comment = {},
issn = {0304-3975},
journal = {Theoretical Computer Science},
number = {1-2},
pages = {1--34},
publisher = {Elsevier},
volume = 194,
year = 1998,
collections = {}
}
@misc{item2,
title = {Digital halftoning space filling curves},
author = {Luiz C. Velho and Jonas M. Gomes},
url = {http://www.google.co.uk/patents?hl=en{\&}lr={\&}vid=USPAT5602943{\&}id=Mn0jAAAAEBAJ{\&}oi=fnd{\&}dq=hilbert+curve{\&}printsec=abstract{\#}v=onepage{\&}q=hilbert curve{\&}f=false},
urldate = {2010-08-31},
abstract = {},
comment = {},
collections = {Basically computer science},
year = 1997
}
@online{Bauer,
title = {Constructive gem: juggling exponentials},
author = {Bauer, Andrej},
url = {http://math.andrej.com/2009/09/09/constructive-gem-juggling-exponentials/},
urldate = {2010-07-15},
abstract = {},
comment = {},
collections = {Basically computer science},
year = 2009
}
@article{AnalysisofCarriesinSignedDigitExpansions,
title = {Analysis of Carries in Signed Digit Expansions},
author = {Clemens Heuberger and Sara Kropf and Helmut Prodinger},
url = {http://arxiv.org/abs/1503.08816v3 http://arxiv.org/pdf/1503.08816v3},
urldate = {2017-02-06},
abstract = {The number of positive and negative carries in the addition of two
independent random signed digit expansions of given length is analyzed
asymptotically for the {\$}(q, d){\$}-system and the symmetric signed digit
expansion. The results include expectation, variance, covariance between the
positive and negative carries and a central limit theorem.
Dependencies between the digits require determining suitable transition
probabilities to obtain equidistribution on all expansions of given length. A
general procedure is described to obtain such transition probabilities for
arbitrary regular languages.
The number of iterations in von Neumann's parallel addition method for the
symmetric signed digit expansion is also analyzed, again including expectation,
variance and convergence to a double exponential limiting distribution. This
analysis is carried out in a general framework for sequences of generating
functions.},
comment = {},
archivePrefix = {arXiv},
eprint = {1503.08816},
primaryClass = {math.CO},
collections = {Basically computer science},
year = 2015
}
@article{Hutter2002,
title = {The Fastest and Shortest Algorithm for All Well-Defined Problems},
author = {Hutter, Marcus},
url = {http://www.hutter1.net/ai/pfastprg.htm http://arxiv.org/abs/cs.CC/0206022},
urldate = {2012-08-14},
abstract = {},
comment = {},
journal = {International Journal of Foundations of Computer Science},
keywords = {Kolmogorov complexity,acceleration,algorithmic information theory,blum's speed-up theorem,computational complexity,levin search},
number = 3,
pages = {431--443},
volume = 13,
year = 2002,
collections = {Attention-grabbing titles,Basically computer science}
}
@article{Miquel2007,
title = {The experimental effectiveness of mathematical proof},
author = {Miquel, Alexandre},
url = {https://www.fing.edu.uy/{\~{}}amiquel/publis/effectiveness.pdf},
urldate = {2011-10-30},
abstract = {},
comment = {},
pages = {1--42},
year = 2007,
collections = {History,The act of doing maths}
}
@book{CajoriNotations,
title = {A history of mathematical notations},
author = {Florian Cajori},
url = {http://www.maths.ed.ac.uk/{\~{}}aar/papers/cajorinot.pdf},
urldate = {2011-01-12},
abstract = {},
comment = {},
year = 1993,
collections = {History,Notation and conventions,Lists and catalogues}
}
@misc{item51,
title = {Representations of Palindromic, Prime and Number Patterns},
author = {Inder J. Taneja},
url = {http://rgmia.org/papers/v18/v18a77.pdf},
urldate = {2015-06-12},
abstract = {},
comment = {},
collections = {Unusual arithmetic},
year = 2015
}
@article{Doyle2006,
title = {Division by three},
author = {Doyle, Peter G. and Conway, John Horton},
url = {https://arxiv.org/abs/math/0605779v1 https://arxiv.org/pdf/math/0605779v1.pdf},
urldate = {2014-11-17},
abstract = {},
comment = {},
month = {may},
year = 2006,
collections = {}
}
@misc{Kahan,
title = {Beastly Numbers},
author = {Kahan, W},
url = {http://www.cs.berkeley.edu/{\~{}}wkahan/tests/numbeast.ps},
urldate = {2012-09-05},
abstract = {It seems unlikely that two computers, designed by different people 1800 miles apart, would be upset in the same way by the same two floating-point numbers 65535... and 4294967295... , but it has happened.},
comment = {},
collections = {Basically computer science},
year = 1996
}
@article{Srinivasan1948,
title = {Practical numbers},
author = {Srinivasan, A.K.},
url = {http://www.currentscience.ac.in/Downloads/article{\_}id{\_}017{\_}06{\_}0179{\_}0180{\_}0.pdf http://www.currentscience.ac.in/php/toc.php?vol=017{\&}issue=06},
urldate = {2013-10-31},
abstract = {},
comment = {},
journal = {Current science},
year = 1948,
month = {jun},
volume = 17,
issue = 6,
collections = {Easily explained}
}
@article{Akleman2011,
title = {Cyclic twill-woven objects},
author = {Akleman, Ergun and Chen, Jianer and Chen, YenLin and Xing, Qing and Gross, Jonathan L.},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0097849311000422},
urldate = {2013-05-16},
abstract = {},
comment = {},
doi = {10.1016/j.cag.2011.03.003},
issn = 00978493,
journal = {Computers {\&} Graphics},
month = {jun},
number = 3,
pages = {623--631},
volume = 35,
year = 2011,
collections = {Basically computer science}
}
@article{TheGeneralCounterfeitCoinProblem,
title = {The general counterfeit coin problem},
author = {Lorenz Halbeisen and Norbert Hungerb{\"{u}}hler},
url = {http://user.math.uzh.ch/halbeisen/publications/pdf/coin.pdf},
urldate = {2016-08-24},
abstract = {Given {\$}c{\$} nickels among which there may be a counterfeit coin, which can only be told
apart by its weight being different from the others, and moreover {\$}b{\$} balances. What is the minimal number of weighings to decide whether there is a counterfeit nickel, if so which one it is and whether it is heavier or lighter than a genuine nickel. We give an answer to this question for sequential and nonsequential strategies and we will consider the problem of more than one counterfeit coin.},
comment = {},
collections = {Puzzles,Easily explained},
year = 1995
}
@article{MidpointOfAnInterval,
title = {How do you compute the midpoint of an interval?},
author = {Fr{\'{e}}d{\'{e}}ric Goualard},
url = {https://hal.archives-ouvertes.fr/file/index/docid/576641/filename/computing-midpoint.pdf},
urldate = {2016-07-04},
abstract = {},
comment = {},
collections = {Basically computer science},
year = 2014
}
@article{Dividingbyzerohowbadisitreally,
title = {Dividing by zero - how bad is it, really?},
author = {Takayuki Kihara and Arno Pauly},
url = {http://arxiv.org/abs/1606.04126v1 http://arxiv.org/pdf/1606.04126v1},
urldate = {2016-06-17},
abstract = {In computable analysis testing a real number for being zero is a fundamental
example of a non-computable task. This causes problems for division: We cannot
ensure that the number we want to divide by is not zero. In many cases, any
real number would be an acceptable outcome if the divisor is zero - but even
this cannot be done in a computable way.
In this note we investigate the strength of the computational problem "Robust
division": Given a pair of real numbers, the first not greater than the other,
output their quotient if well-defined and any real number else. The formal
framework is provided by Weihrauch reducibility. One particular result is that
having later calls to the problem depending on the outcomes of earlier ones is
strictly more powerful than performing all calls concurrently. However, having
a nesting depths of two already provides the full power. This solves an open
problem raised at a recent Dagstuhl meeting on Weihrauch reducibility.
As application for "Robust division", we show that it suffices to execute
Gaussian elimination.},
comment = {},
archivePrefix = {arXiv},
eprint = {1606.04126},
primaryClass = {cs.LO},
collections = {Basically computer science},
year = 2016
}
@online{item53,
title = {Dice - Numericana},
author = {G{\'{e}}rard P. Michon},
url = {http://www.numericana.com/answer/dice.htm},
urldate = {2015-10-17},
abstract = {},
comment = {},
keywords = {cast,casting,combinatorics,dice,die,enumeration,roll,rolling,toss,tossing},
collections = {Easily explained,Games to play with friends,Lists and catalogues},
year = 2000
}
@misc{item47,
title = {On Legendre's Prime Number Formula},
author = {Janos Pintz},
url = {http://www.jstor.org/stable/2321863?seq=1{\#}page{\_}scan{\_}tab{\_}contents},
urldate = {2015-03-06},
abstract = {},
comment = {},
collections = {History},
year = 1980
}
@article{Fink2013,
title = {LIM is not slim},
author = {Fink, Alex and Fraenkel, Aviezri S. and Santos, Carlos},
url = {http://link.springer.com/10.1007/s00182-013-0380-z},
urldate = {2014-06-11},
abstract = {In this paper LIM, a recently proposed impartial combinatorial ruleset, is analyzed. A formula to describe the {\$}G{\$}-values of LIM positions is given, by way of analyzing an equivalent combinatorial ruleset LIM’, closely related to the classical nim. Also, an enumeration of {\$}P{\$}-positions of LIM with {\$}n{\$} stones, and its relation to the Ulam-Warburton cellular automaton, is presented.},
comment = {},
issn = {0020-7276},
journal = {International Journal of Game Theory},
month = {may},
number = 2,
pages = {269--281},
volume = 43,
year = 2013,
collections = {Attention-grabbing titles}
}
@misc{item40,
title = {A number system with an irrational base},
author = {George Bergman},
url = {http://www.jstor.org/discover/10.2307/3029218?uid=3738032{\&}uid=2{\&}uid=4{\&}sid=21103722830183},
urldate = {2014-03-12},
abstract = {},
comment = {},
collections = {Unusual arithmetic},
year = 1957
}
@article{Silva2007,
title = {Mathematical Games},
author = {Silva, Jorge Nuno},
url = {http://www.cim.pt/files/cim{\_}games.pdf},
urldate = {2014-01-24},
abstract = {},
comment = {Some slides about mathematical games throughout history.},
year = 2007,
collections = {History,Games to play with friends}
}
@misc{item38,
title = {The Stick Problem},
author = {Augustine Bertagnolli},
url = {http://ajbertagnolli.com/wp-content/uploads/2013/10/sticks2.pdf},
urldate = {2014-01-13},
abstract = {},
comment = {},
collections = {Puzzles,Easily explained},
year = 2013
}
@article{item34,
title = {Is POPL Mathematics or Science?},
author = {Andrew W. Appel},
url = {http://www.cs.princeton.edu/{\~{}}appel/papers/science.pdf},
urldate = {2013-11-06},
abstract = {},
comment = {},
collections = {The act of doing maths,Probability and statistics},
year = 1992
}
@article{Althofer2013,
title = {Random Structures from Lego Bricks and Analog Monte Carlo Procedures},
author = {Alth{\"{o}}fer, I},
url = {http://www.althofer.de/random-lego-structures.pdf},
urldate = {2013-11-13},
abstract = {},
comment = {},
journal = {Update},
keywords = {analog monte carlo,artificial life,interactive art,procedure,random lego structures},
year = 2013,
collections = {Attention-grabbing titles,Basically computer science,Easily explained,Basically physics}
}
@misc{item33,
title = {The Ubiquitous Thue-Morse Sequence},
author = {Jeffrey Shallit},
url = {https://cs.uwaterloo.ca/{\~{}}shallit/Talks/green3.pdf},
urldate = {2013-10-21},
abstract = {},
comment = {},
collections = {Easily explained},
year = 2006
}
@article{Castellanos2013,
title = {The Ubiquitous Pi},
author = {Castellanos, Dario},
url = {http://www.jstor.org/stable/2690037},
urldate = {2013-06-11},
abstract = {},
comment = {},
number = 2,
pages = {67--98},
volume = 61,
year = 2013,
collections = {History,Easily explained}
}
@misc{Kalman,
title = {Six Ways to Sum a Series},
author = {Kalman, Dan},
url = {http://mathdl.maa.org/mathDL/22/?pa=content{\&}sa=viewDocument{\&}nodeId=2687 http://www.maa.org/sites/default/files/pdf/upload{\_}library/22/Polya/07468342.di020759.02p00026.pdf},
urldate = {2013-06-10},
abstract = {A discussion of the sum of squares of the reciprocals of the positive integers with a review of several proofs.},
comment = {},
collections = {Easily explained},
year = 1994
}
@online{DatingRecommenderSystems,
title = {Online Dating Recommender Systems: The Split-complex Number Approach},
author = {J{\'{e}}rôme Kunegis},
url = {http://www.slideshare.net/kunegis/presentation-2012rsweb},
urldate = {2012-09-13},
abstract = {},
comment = {},
collections = {Basically computer science,Unusual arithmetic,Easily explained,Probability and statistics},
year = 2012
}
@article{Arkin2006,
title = {The Snowblower Problem},
author = {Arkin, Esther M. and Bender, Michael A. and Mitchell, Joseph S. B. and Polishchuk, Valentin},
url = {http://arxiv.org/abs/cs/0603026 http://arxiv.org/pdf/cs/0603026v1 http://www.ams.sunysb.edu/{\~{}}jsbm/papers/snowblowing.pdf},
urldate = {2012-01-22},
abstract = {We introduce the snowblower problem (SBP), a new optimization problem that is closely related to milling problems and to some material-handling problems. The objective in the SBP is to compute a short tour for the snowblower to follow to remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower passes over each region along the tour, it displaces snow into a nearby region. The constraint is that if the snow is piled too high, then the snowblower cannot clear the pile. We give an algorithmic study of the SBP. We show that in general, the problem is NP-complete, and we present polynomial-time approximation algorithms for removing snow under various assumptions about the operation of the snowblower. Most commercially-available snowblowers allow the user to control the direction in which the snow is thrown. We differentiate between the cases in which the snow can be thrown in any direction, in any direction except backwards, and only to the right. For all cases, we give constant-factor approximation algorithms; the constants increase as the throw direction becomes more restricted. Our results are also applicable to robotic vacuuming (or lawnmowing) with bounded capacity dust bin and to some versions of material-handling problems, in which the goal is to rearrange cartons on the floor of a warehouse.},
comment = {},
month = {mar},
pages = 19,
year = 2006,
archivePrefix = {arXiv},
eprint = {cs/0603026},
primaryClass = {cs.DS},
collections = {Basically computer science,Puzzles,Easily explained}
}
@article{Lang2000,
title = {Origami Burrs and Woven Polyhedra},
author = {Lang, Robert J},
url = {http://www.langorigami.com/files/articles/Polypolyhedra{\_}part{\_}1.pdf},
urldate = {2011-12-14},
abstract = {},
comment = {},
pages = {1--26},
volume = 4,
year = 2000,
collections = {Things to make and do}
}
@article{Faure2008,
title = {Hierarchical Position Based Dynamics},
author = {Faure, F. and Teschner, M.},
url = {http://www.matthiasmueller.info/publications/hpbd.pdf},
urldate = {2011-03-11},
abstract = {},
comment = {},
journal = {matthiasmueller.info},
year = 2008,
collections = {Basically computer science}
}
@article{Freeman1967,
title = {Detection of transposition errors in decimal numbers},
author = {Freeman, H},
url = {http://ieeexplore.ieee.org/xpls/abs{\_}all.jsp?arnumber=1447797},
urldate = {2010-08-20},
abstract = {},
comment = {},
journal = {Proceedings of the IEEE},
number = 8,
pages = {1500--1501},
volume = 55,
year = 1967,
collections = {Basically computer science}
}
@article{Berkel2009,
title = {On a curious property of 3435},
author = {Berkel, Daan Van},
url = {http://arxiv.org/abs/0911.3038 http://arxiv.org/pdf/0911.3038v2},
urldate = {2011-02-02},
abstract = {Folklore tells us that there are no uninteresting natural numbers. But some natural numbers are more interesting then others. In this article we will explain why 3435 is one of the more interesting natural numbers around. We will show that 3435 is a Munchausen number in base 10, and we will explain what we mean by that. We will further show that for every base there are finitely many Munchausen numbers in that base.},
comment = {},
archivePrefix = {arXiv},
arxivId = {0911.3038v2},
eprint = {0911.3038v2},
journal = {Folklore},
pages = {1--5},
year = 2009,
collections = {Easily explained}
}
@article{HuntingRabbitsontheHypercube,
title = {Hunting Rabbits on the Hypercube},
author = {Jessalyn Bolkema and Corbin Groothuis},
url = {http://arxiv.org/abs/1701.08726v1 http://arxiv.org/pdf/1701.08726v1},
urldate = {2017-02-06},
abstract = {We explore the Hunters and Rabbits game on the hypercube. In the process, we
find the solution for all classes of graphs with an isoperimetric nesting
property and find the exact hunter number of {\$}Q^n{\$} to be
{\$}1+\sum\limits{\_}{\{}i=0{\}}^{\{}n-2{\}} \binom{\{}i{\}}{\{}\lfloor i/2 \rfloor{\}}{\$}. In addition, we
extend results to the situation where we allow the rabbit to not move between
shots.},
comment = {},
archivePrefix = {arXiv},
eprint = {1701.08726},
primaryClass = {math.CO},
collections = {Attention-grabbing titles,Easily explained,Protocols and strategies,Animals},
year = 2017
}
@article{item32,
title = {Missing Data: Instrument-Level Heffalumps and Item-Level Woozles},
author = {Philip L. Roth and Fred S. Switzer III},
url = {https://archive.is/8Jq0O http://division.aomonline.org/rm/1999{\_}RMD{\_}Forum{\_}Missing{\_}Data.htm},
urldate = {2013-06-26},
abstract = {The purpose of this paper is to provide a brief overview of each of two missing data situations, and try to show the importance of considering which elusive creature a researcher might be hunting. We find that much of the previous literature does not consider the distinction between missing data at the item level or instrument level. Failure to make this distinction can partially muddle one’s treatment of missing data in important situations.},
comment = {},
collections = {Attention-grabbing titles},
year = 1999
}
@article{Oliva2010,
title = {What Sequential Games , the Tychonoff Theorem and the Double-Negation Shift have in Common},
author = {Oliva, Paulo and Escardo, Martin},
url = {http://www.cs.bham.ac.uk/{\~{}}mhe/papers/msfp2010/Escardo-Oliva-MSFP2010.pdf},
urldate = {2010-08-04},
abstract = {This is a tutorial for mathematically inclined functional programmers, based on previously published, peered reviewed theoretical work. We discuss a higher-type functional, written here in the functional programming language Haskell, which (1) optimally plays sequential games, (2) implements a computational version of the Tychonoff Theorem from topology, and (3) realizes the Double Negation Shift from logic and proof theory. The functional makes sense for finite and infinite (lazy) lists, and in the binary case it amounts to an operation that is available in any (strong) monad. In fact, once we define this monad in Haskell, it turns out that this amazingly versatile functional is already available in Haskell, in the standard prelude, called sequence, which iterates this binary operation.
Therefore Haskell proves that this functional is even more versatile than anticipated, as the function sequence was introduced for other purposes by the language designers, in particular the iteration of a list of monadic effects (but effects are not what we discuss here)},
comment = {},
journal = {Topology},
keywords = {agda,axiom of choice,dependent type,exhaustible set,foundations,functional programming,game theory,haskell,infinite data,logic,monad,optimal strategy,search,topology},
year = 2010,
collections = {Basically computer science,Protocols and strategies,Games to play with friends}
}
@article{Janson2008,
title = {Plane recursive trees, Stirling permutations and an urn model},
author = {Janson, Svante},
url = {https://arxiv.org/abs/0803.1129v1 http://arxiv.org/pdf/0803.1129},
urldate = {2010-02-25},
abstract = {},
comment = {},
journal = {Preprint},
pages = {1--8},
year = 2008,
collections = {Probability and statistics}
}
@article{Ito2015,
title = {On the Existence of Generalized Parking Spaces for Complex Reflection Groups},
author = {Ito, Yosuke and Okada, Soichi},
url = {http://arxiv.org/abs/1508.06846 http://arxiv.org/pdf/1508.06846v1},
urldate = {2015-09-06},
abstract = {Let {\$}W{\$} be an irreducible finite complex reflection group acting on a complex vector space {\$}V{\$}. For a positive integer {\$}k{\$}, we consider a class function {\$}\varphi{\_}k{\$} given by {\$}\varphi{\_}k(w) = k^{\{}\dim V^w{\}}{\$} for {\$}w \in W{\$}, where {\$}V^w{\$} is the fixed-point subspace of {\$}w{\$}. If {\$}W{\$} is the symmetric group of {\$}n{\$} letters and {\$}k=n+1{\$}, then {\$}\varphi{\_}{\{}n+1{\}}{\$} is the permutation character on (classical) parking functions. In this paper, we give a complete answer to the question when {\$}\varphi{\_}k{\$} (resp. its {\$}q{\$}-analogue) is the character of a representation (resp. the graded character of a graded representation) of {\$}W{\$}. As a key to the proof in the symmetric group case, we find the greatest common divisors of specialized Schur functions. And we propose a unimodality conjecture of the coefficients of certain quotients of principally specialized Schur functions.},
comment = {},
month = {aug},
year = 2015,
archivePrefix = {arXiv},
eprint = {1508.06846},
primaryClass = {math.CO},
collections = {Attention-grabbing titles}
}
@article{Knauer2011,
title = {How to eat 4/9 of a pizza},
author = {Knauer, Kolja and Micek, Piotr and Ueckerdt, Torsten},
url = {http://arxiv.org/abs/0812.2870 http://www.sciencedirect.com/science/article/pii/S0012365X11001154 http://arxiv.org/pdf/0812.2870v4},
urldate = {2012-12-12},
abstract = {Given two players alternately picking pieces of a pizza sliced by radial cuts, in such a way that after the first piece is taken every subsequent chosen piece is adjacent to some previously taken piece, we provide a strategy for the starting player to get 4/9 of the pizza. This is best possible and settles a conjecture of Peter Winkler.},
comment = {},
archivePrefix = {arXiv},
arxivId = {0812.2870},
eprint = {0812.2870},
journal = {Discrete Mathematics},
month = {dec},
pages = {1--15},
year = 2011,
primaryClass = {cs.DM},
collections = {Easily explained,Protocols and strategies,Puzzles}
}
@article{Hadley1992,
title = {Problems to sharpen the young},
author = {Hadley, John and Singmaster, David},
url = {http://www.jstor.org/stable/10.2307/3620384},
urldate = {2013-03-18},
abstract = {An annotated translation of Propositiones ad acuendos juvenes, the oldest mathematical problem collection in Latin, attributed to Alcuin of York.},
comment = {},
journal = {The Mathematical Gazette},
number = 475,
pages = {102--126},
volume = 76,
year = 1992,
collections = {Easily explained,Puzzles}
}
@article{Flocchini2010,
title = {Mapping an unfriendly subway system},
author = {Flocchini, Paola and Kellett, Matthew and Mason, P.},
url = {http://www.springerlink.com/index/T0782U872653550H.pdf http://people.scs.carleton.ca/{\~{}}santoro/Reports/Subway.pdf},
urldate = {2012-02-07},
abstract = {We consider a class of highly dynamic networks modelled on an urban subway system. We examine the problem of creating a map of such a subway in less than ideal conditions, where the local residents are not enthusiastic about the process and there is a limited ability to communicate amongst the mappers. More precisely, we study the problem of a team of asynchronous computational entities (the mapping agents) determining the location of black holes in a highly dynamic graph, whose edges are defined by the asynchronous movements ofmobile entities (the subway carriers). We present and analyze a solution protocol. The algorithm solves the problem with the minimum number of agents possible. We also establish lower bounds on the number of carrier moves in the worst case, showing that our protocol is also move-optimal.},
comment = {},
journal = {Fun with Algorithms},
pages = {190--201},
publisher = {Springer},
year = 2010,
collections = {Protocols and strategies}
}
@article{Bazargan2007,
title = {A linear programming approach for aircraft boarding strategy},
author = {Bazargan, M},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0377221706010137},
urldate = {2011-10-04},
abstract = {},
comment = {},
doi = {10.1016/j.ejor.2006.09.071},
issn = 03772217,
journal = {European Journal of Operational Research},
keywords = {boarding strategy,integer programming,or in airlines,transportation},
month = {nov},
number = 1,
pages = {394--411},
volume = 183,
year = 2007,
collections = {Basically computer science,Protocols and strategies}
}
@article{item13,
title = {London Calling Philosophy and Engineering: WPE 2008},
author = {Glen Miller},
url = {http://www.ncbi.nlm.nih.gov/pubmed/19543813},
urldate = {2012-01-24},
abstract = {},
comment = {},
booktitle = {The Annals of occupational hygiene},
isbn = 1903496780,
issn = {0003-4878},
number = 2,
pmid = 3752842,
volume = 30,
collections = {},
year = 2009
}
@article{Ge2007,
title = {Interpolating Solid Orientations with a {\$}C^2{\$} -Continuous B-Spline Quaternion Curve},
author = {Ge, Wenbing and Huang, Zhangjin and Wang, Guoping},
url = {http://link.springer.com/chapter/10.1007{\%}2F978-3-540-73011-8{\_}58},
urldate = {2011-01-12},
abstract = {},
comment = {},
keywords = {b-spline curve,c 2 -continuous,computer,interpolation,quaternion},
pages = {606--615},
year = 2007,
collections = {Basically computer science}
}
@article{Stallings1966,
title = {How not to prove the Poincar{\'{e}} conjecture},
author = {Stallings, JR},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.3404 http://math.berkeley.edu/{\~{}}stall/notPC.ps},
urldate = {2014-11-17},
abstract = {I have committed the sin of falsely proving Poincar{\'{e}}'s Conjecture. But that was in another country; and besides, until now no one has known about it. Now, in hope of deterring others from making similar mistakes, I shall describe my mistaken proof. Who knows but that somehow a small change, a new interpretation, and this line of proof may be rectified!},
comment = {},
year = 1966,
collections = {Attention-grabbing titles}
}
@misc{item41,
title = {Useful inequalities cheat sheet},
author = {L{\'{a}}szl{\'{o}} Kozma},
url = {http://lkozma.net/inequalities{\_}cheat{\_}sheet/},
urldate = {2014-04-28},
abstract = {This is a collection of some of the most important mathematical inequalities. I tried to include non-trivial inequalities that can be useful in solving problems or proving theorems. I omitted many details, in some cases even necessary conditions (hopefully only when they were obvious). If you are not sure whether an inequality can be applied in some context, try to find a more detailed source for the exact definition. For lack of space I omitted proofs and discussions on when equality holds.},
comment = {},
collections = {Lists and catalogues},
year = 2011
}
@article{Duran2014,
title = {The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems. Can We Trust in Them?},
author = {Dur{\'{a}}n, Antonio J and P{\'{e}}rez, Mario and Varona, Juan L},
url = {http://www.ams.org/notices/201410/rnoti-p1249.pdf},
urldate = {2014-10-23},
abstract = {},
comment = {},
isbn = 1584704349,
number = {November},
pages = {1249--1252},
year = 2014,
collections = {}
}
@article{Gould2011,
title = {Table for Fundamentals of Series : Part I : Basic Properties of Series and Products},
author = {Gould, Henry W.},
url = {http://math.wvu.edu/{\~{}}gould/Vol.1.PDF},
urldate = {2014-02-11},
abstract = {},
comment = {},
year = 2011,
collections = {Lists and catalogues}
}
@article{Frieze2013,
title = {The topology of competitively constructed graphs},
author = {Frieze, Alan and Pegden, Wesley},
url = {http://arxiv.org/abs/1312.0964 http://arxiv.org/pdf/1312.0964v2},
urldate = {2013-12-30},
abstract = {We consider a simple game, the {\$}k{\$}-regular graph game, in which players take turns adding edges to an initially empty graph subject to the constraint that the degrees of vertices cannot exceed {\$}k{\$}. We show a sharp topological threshold for this game: for the case {\$}k=3{\$} a player can ensure the resulting graph is planar, while for the case {\$}k=4{\$}, a player can force the appearance of arbitrarily large clique minors.},
comment = {},
month = {dec},
pages = 9,
year = 2013,
archivePrefix = {arXiv},
eprint = {1312.0964},
primaryClass = {math.CO},
collections = {Games to play with friends,Protocols and strategies}
}
@article{Kikuchi1994,
title = {A Note on Boolos' Proof of the Incompleteness Theorem},
author = {Kikuchi, Makoto},
url = {http://doi.wiley.com/10.1002/malq.19940400409},
urldate = {2010-09-03},
abstract = {We give a proof of G{\"{o}}del's first incompleteness theorem based on Berry's paradox, and from it we also derive the second incompleteness theorem model-theoretically.},
comment = {},
journal = {Mathematical Logic Quarterly},
number = 4,
pages = {528--532},
volume = 40,
year = 1994,
collections = {}
}
@online{Searchingforgeneralizedbinarynumbersystems,
title = {Searching for generalized binary number systems},
author = {Attila Kov{\'{a}}cs},
url = {http://szdg.lpds.sztaki.hu/szdg/desc{\_}numsys{\_}es.php},
urldate = {2016-08-22},
abstract = {The aim of the project is to find all the generalized binary number systems up to dimension 11. Below we give a short description of the number system concept and mention a few possible applications.},
comment = {},
collections = {Unusual arithmetic},
year = 2017
}
@article{Rechnitzer2006,
title = {Haruspicy 3: The anisotropic generating function of directed bond-animals is not D-finite},
author = {Rechnitzer, Andrew},
url = {http://www.sciencedirect.com/science/article/pii/S0097316505001883},
urldate = {2015-11-08},
abstract = {While directed site-animals have been solved on several lattices, directed bond-animals remain unsolved on any nontrivial lattice. In this paper we demonstrate that the anisotropic generating function of directed bond-animals on the square lattice is fundamentally different from that of directed site-animals in that it is not differentiably finite. We also extend this result to directed bond-animals on hypercubic lattices. This indicates that directed bond-animals are unlikely to be solved by similar methods to those used in the solution of directed site-animals. It also implies that a solution cannot be conjectured using computer packages such as Gfun [A Maple package developed by B. Salvy, P. Zimmermann, E. Murray at INRIA, France, available from http://algo.inria.fr/libraries/ at time of submission; B. Salvy, P. Zimmermann, Gfun: A Maple package for the manipulation of generating and holonomic functions in one variable, ACM Trans. Math. Software 20 (2) (1994) 163–177] or differential approximants [A.J. Guttmann, Asymptotic analysis of coefficients, in: C. Domb, J. Lebowitz (Eds.), Phase Transit. Crit. Phenom., vol. 13, Academic Press, London, 1989, pp. 1–234, programs available from http://www.ms.unimelb.edu.au/{\~{}}tonyg].},
comment = {},
issn = 00973165,
journal = {Journal of Combinatorial Theory, Series A},
keywords = {Bond animals,Differentiably finite power series,Enumeration,Solvability},
month = {aug},
number = 6,
pages = {1031--1049},
volume = 113,
year = 2006,
collections = {Animals,Attention-grabbing titles}
}
@article{Williams2012,
title = {The paramagnetic and glass transitions in sudoku},
author = {Williams, Alex and Ackland, Graeme . J.},
url = {http://arxiv.org/abs/1212.1649 http://arxiv.org/pdf/1212.1649v1},
urldate = {2012-12-29},
abstract = {We study the statistical mechanics of a model glassy system based on a familiar and popular mathematical puzzle. Sudoku puzzles provide a very rare example of a class of frustrated systems with a unique groundstate without symmetry. Here, the puzzle is recast as thermodynamic system where the number of violated rules defines the energy. We use Monte Carlo simulation to show that the "Sudoku Hamiltonian" exhibits two transitions as a function of temperature, a paramagnetic and a glass transition. Of these, the intermediate condensed phase is the only one which visits the ground state (i.e. it solves the puzzle, though this is not the purpose of the study). Both transitions are associated with an entropy change, paramagnetism measured from the dynamics of the Monte Carlo run, showing a peak in specific heat, while the residual glass entropy is determined by finding multiple instances of the glass by repeated annealing. There are relatively few such simple models for frustrated or glassy systems which exhibit both ordering and glass transitions, sudoku puzzles are unique for the ease with which they can be obtained with the proof of the existence of a unique ground state via the satisfiability of all constraints. Simulations suggest that in the glass phase there is an increase in information entropy with lowering temperature. In fact, we have shown that sudoku have the type of rugged energy landscape with multiple minima which typifies glasses in many physical systems, and this puzzling result is a manifestation of the paradox of the residual glass entropy. These readily-available puzzles can now be used as solvable model Hamiltonian systems for studying the glass transition.},
comment = {},
archivePrefix = {arXiv},
arxivId = {1212.1649},
doi = {10.1103/PhysRevE.86.031109},
eprint = {1212.1649},
month = {dec},
year = 2012,
primaryClass = {math-ph},
collections = {Basically physics}
}
@article{Kac,
title = {Can One Hear the Shape of a Drum?},
author = {Kac, Mark},
url = {http://www.jstor.org/stable/2313748},
urldate = {2011-01-12},
abstract = {},
comment = {},
collections = {Basically physics,Easily explained,Music},
year = 1966
}
@article{MeaninginClassicalMathematicsIsitatOddswithIntuitionism,
title = {Meaning in Classical Mathematics: Is it at Odds with Intuitionism?},
author = {Karin Usadi Katz and Mikhail G. Katz},
url = {http://arxiv.org/abs/1110.5456v1 http://arxiv.org/pdf/1110.5456v1},
urldate = {2017-02-27},
abstract = {We examine the classical/intuitionist divide, and how it reflects on modern
theories of infinitesimals. When leading intuitionist Heyting announced that
"the creation of non-standard analysis is a standard model of important
mathematical research", he was fully aware that he was breaking ranks with
Brouwer. Was Errett Bishop faithful to either Kronecker or Brouwer? Through a
comparative textual analysis of three of Bishop's texts, we analyze the
ideological and/or pedagogical nature of his objections to infinitesimals a la
Robinson. Bishop's famous "debasement" comment at the 1974 Boston workshop,
published as part of his Crisis lecture, in reality was never uttered in front
of an audience. We compare the realist and the anti-realist intuitionist
narratives, and analyze the views of Dummett, Pourciau, Richman, Shapiro, and
Tennant. Variational principles are important physical applications, currently
lacking a constructive framework. We examine the case of the Hawking-Penrose
singularity theorem, already analyzed by Hellman in the context of the
Quine-Putnam indispensability thesis.},
comment = {},
archivePrefix = {arXiv},
eprint = {1110.5456},
primaryClass = {math.LO},
collections = {History,The act of doing maths},
year = 2011
}
@article{Coman,
title = {The Math Encyclopedia of Smarandache Type Notions},
author = {Coman, Marius},
url = {http://vixra.org/abs/1311.0097},
urldate = {2013-11-21},
abstract = {About the works of Florentin Smarandache have been written a lot of books (he himself wrote dozens of books and articles regarding math, physics, literature, philosophy). Being a globally recognized personality in both mathematics (there are countless functions and concepts that bear his name) and literature, it is natural that the volume of writings about his research is huge. What we try to do with this encyclopedia is to gather together as much as we can both from Smarandache's mathematical work and the works of many mathematicians around the world inspired by the Smarandache notions. We structured this book using numbered Definitions, Theorems, Conjectures, Notes and Comments, in order to facilitate an easier reading but also to facilitate references to a specific paragraph. We divided the Bibliography in two parts, Writings by Florentin Smarandache (indexed by the name of books and articles) and Writings on Smarandache notions (indexed by the name of authors). We treated, in this book, about 130 Smarandache type sequences, about 50 Smarandache type functions and many solved or open problems of number theory. We also have, at the end of this book, a proposal for a new Smarandache type notion, id est the concept of “a set of Smarandache-Coman divisors of order k of a composite positive integer n with m prime factors”, notion that seems to have promising applications, at a first glance at least in the study of absolute and relative Fermat pseudoprimes, Carmichael numbers and Poulet numbers. This encyclopedia is both for researchers that will have on hand a tool that will help them “navigate” in the universe of Smarandache type notions and for young math enthusiasts: many of them will be attached by this wonderful branch of mathematics, number theory, reading the works of Florentin Smarandache.},
comment = {},
pages = 135,
collections = {Lists and catalogues},
year = 2013
}
@article{Gauvrit2011,
title = {Sloane's Gap: Do Mathematical and Social Factors Explain the Distribution of Numbers in the OEIS?},
author = {Gauvrit, Nicolas and Delahaye, Jean-Paul and Zenil, Hector},
url = {http://arxiv.org/abs/1101.4470 http://arxiv.org/pdf/1101.4470v2},
urldate = {2013-10-17},
abstract = {The Online Encyclopedia of Integer Sequences (OEIS) is made up of thousands of numerical sequences considered particularly interesting by some mathematicians. The graphic representation of the frequency with which a number n as a function of n appears in that database shows that the underlying function decreases fast, and that the points are distributed in a cloud, seemingly split into two by a clear zone that will be referred to here as "Sloane's Gap". The decrease and general form are explained by mathematics, but an explanation of the gap requires further considerations.},
comment = {},
month = {jan},
year = 2011,
archivePrefix = {arXiv},
eprint = {1101.4470},
primaryClass = {math.PR},
collections = {Easily explained,Probability and statistics,The act of doing maths}
}
@article{Fathauer,
title = {Statistical Modeling of Gang Violence in Los Angeles},
author = {Fathauer, Chris},
url = {http://paleo.sscnet.ucla.edu/SIURO{\_}revised.pdf},
urldate = {2012-04-13},
abstract = {},
comment = {},
pages = {1--25},
collections = {Basically computer science,Probability and statistics},
year = 2010
}
@article{Poonen2012,
title = {Undecidable problems: a sampler},
author = {Poonen, Bjorn},
url = {http://arxiv.org/abs/1204.0299 http://arxiv.org/pdf/1204.0299v2},
urldate = {2012-04-04},
abstract = {After discussing two senses in which the notion of undecidability is used, we present a survey of undecidable decision problems arising in various branches of mathematics.},
comment = {},
archivePrefix = {arXiv},
arxivId = {1204.0299},
eprint = {1204.0299},
keywords = {and phrases,decision problem,undecidability},
month = {apr},
pages = 28,
year = 2012,
primaryClass = {math.LO},
collections = {Probability and statistics}
}
@article{JewishProblems,
title = {Jewish Problems},
author = {Tanya Khovanova and Alexey Radul},
url = {http://arxiv.org/abs/1110.1556v2 http://arxiv.org/pdf/1110.1556v2},
urldate = {2017-03-23},
abstract = {This is a special collection of problems that were given to select applicants
during oral entrance exams to the math department of Moscow State University.
These problems were designed to prevent Jews and other undesirables from
getting a passing grade. Among problems that were used by the department to
blackball unwanted candidate students, these problems are distinguished by
having a simple solution that is difficult to find. Using problems with a
simple solution protected the administration from extra complaints and appeals.
This collection therefore has mathematical as well as historical value.},
comment = {},
archivePrefix = {arXiv},
eprint = {1110.1556},
primaryClass = {math.HO},
collections = {attention-grabbing-titles,history,puzzles},
year = 2011
}
@misc{item3,
title = {openttd logic gates},
author = {Heikki Kallasjoki},
url = {http://zem.fi/ttd{\_}logic/},
urldate = {2010-09-30},
abstract = {Here's a rather old (and probably outdated) look at how one could simulate digital logic circuits with OpenTTD. Includes the fastest four-bit ripple-carry adder ever: takes about two months (of in-game time) for the carry information to propagate.},
comment = {},
collections = {basically-computer-science},
year = 2005
}
@misc{item4,
title = {Push-pull LEGO logic gates},
author = {Randomwraith},
url = {https://www.randomwraith.com/logic.html},
urldate = {2010-09-30},
abstract = {},
comment = {},
collections = {basically-computer-science},
year = 1999
}
@article{item6,
title = {Zaphod Beeblebrox's Brain and the Fifty-ninth Row of Pascal's Triangle},
author = {Andrew Granville},
url = {http://www.dms.umontreal.ca/{\~{}}andrew/PDF/beeb.pdf},
urldate = {2010-10-31},
abstract = {},
comment = {},
collections = {attention-grabbing-titles},
year = 1992
}
@online{item9,
title = {Laying train tracks},
author = {Danny Calegari},
url = {http://lamington.wordpress.com/2011/12/02/laying-train-tracks/},
urldate = {2011-12-03},
abstract = {This morning I was playing trains with my son Felix. At the moment he is much more interested in laying the tracks than putting the trains on and moving them around, but he doesn’t tend to get concerned about whether the track closes up to make a loop.},
comment = {Group theory applied to BRIO train tracks},
collections = {easily-explained,things-to-make-and-do},
year = 2011
}
@online{item10,
title = {Understanding Monads With JavaScript},
author = {Ionuț G. Stan},
url = {http://igstan.ro/posts/2011-05-02-understanding-monads-with-javascript.html},
urldate = {2012-01-18},
abstract = {For the past weeks I've been working hard studying monads. I'm still learning Haskell, and to be honest I thought I knew what monads are all about, but when I wanted to write a little Haskell library, just to sharpen up my skills, I realized that while I understood the way monadic bind (>>=) and return work, I had no understanding of where that state comes from. So, most likely I had no understanding at all. As a result of this I thought I rediscover monads myself using JavaScript. The plan was basically the same as that used when I derived the Y Combinator: start from the initial problem (dealing with explicit immutable state in this case), and work my way up to the solution by applying simple code transformations.},
comment = {},
collections = {basically-computer-science},
year = 2011
}
@book{item11,
title = {Drawings from Angola: living mathematics},
author = {Paulus Gerdes},
url = {http://books.google.com/books?id=rRDbdeWoZEMC{\&}pgis=1},
urldate = {2012-01-19},
abstract = {For children from age 8 to 14."Drawings from Angola" present an introduction to an African story telling tradition. The tales are illustrated with marvelous drawings made in the sand. The book conveys the stories of the stork and the leopard, the hunter and the dog, the rooster and the fox, and others. It explains how to execute the drawings. The reader is invited to draw tortoises, antelopes, lions, and other animals. The activities proposed throughout the book invite the reader to experiment and to explore the 'rhythm' and symmetry of the illustrations. Surprising results will be playfully obtained, such as in arithmetic, a way to calculate quickly the sum of a sequence of odd numbers. Children will live the beautiful mathematics of the Angolan sanddrawings.Answers to the activities are provided.The book can be used both in classrooms and at home.},
comment = {},
pages = 71,
publisher = {Lulu.com},
year = 2007,
collections = {art,easily-explained,unusual-arithmetic}
}
@online{item14,
title = {Poe, E.: Near A Raven},
author = {Mike Keith},
url = {http://www.cadaeic.net/naraven.htm},
urldate = {2012-02-25},
abstract = {At the time of its writing in 1995, this composition in Standard Pilish, a retelling of Edgar Allan Poe's "The Raven", was one of the longest texts ever written using the π constraint, in which the number of letters in each successive word "spells out" the digits of π (740 digits in this example). For length this poem was subsequently outdone by the nearly-4000-digit Cadaeic Cadenza, whose first section is just Near A Raven with the first three words altered, but since this version is fairly well-known by itself (for example, it was reprinted in Berggren, Borwein and Borwein's "Pi: A Source Book"), we have decided to give it its own web page.},
comment = {},
collections = {animals,art},
year = 1995
}
@online{item15,
title = {Gaussian prime spirals},
author = {Joseph O'Rourke},
url = {http://mathoverflow.net/questions/91423/gaussian-prime-spirals},
urldate = {2012-03-24},
abstract = {Imagine a particle in the complex plane, starting at {\$}c{\_}0{\$}, a Gaussian integer, moving initially {\$}\pm{\$} in the horizontal or vertical directions. When it hits a Gaussian prime, it turns left {\$}90^{\{}\circ{\}}{\$}.},
comment = {},
collections = {easily-explained},
year = 2012
}
@article{item18,
title = {Nim multiplication},
author = {H. W. Lenstra, Jr.},
url = {https://openaccess.leidenuniv.nl/bitstream/handle/1887/2125/346{\_}027.pdf?sequence=1},
urldate = {2012-04-21},
abstract = {},
comment = {},
collections = {games-to-play-with-friends,unusual-arithmetic},
year = 1978
}
@online{item24,
title = {Magic: the Gathering is Turing Complete},
author = {Alex Churchill},
url = {http://www.toothycat.net/{\~{}}hologram/Turing/},
urldate = {2012-09-11},
abstract = {We always knew Magic: the Gathering was a complex game. But now it's proven: you could assemble a computer out of Magic cards.},
comment = {},
collections = {basically-computer-science,games-to-play-with-friends},
year = 2012
}
@online{item22,
title = {A Hamiltonian circuit for Rubik's Cube},
author = {cuBerBruce},
url = {http://bruce.cubing.net/ham333/rubikhamiltonexplanation.html},
urldate = {2012-09-04},
abstract = {At last, the Hamiltonian circuit problem for Rubik's Cube has a solution! To be a little more mathematically precise, a Hamiltonian circuit of the quarter-turn metric Cayley graph for the Rubik's Cube group has been found.},
comment = {},
collections = {easily-explained,puzzles},
year = 2012
}
@online{item26,
title = {Earliest Uses of Symbols of Calculus},
author = {Jeff Miller},
url = {http://jeff560.tripod.com/calculus.html},
urldate = {2012-10-09},
abstract = {},
comment = {},
collections = {easily-explained,history,lists-and-catalogues,notation-and-conventions}
}
@online{item27,
title = {Figures for "Impossible fractals"},
author = {Cameron Browne},
url = {http://www.cameronius.com/graphics/impossible-fractals-figures/},
urldate = {2012-12-18},
abstract = {},
comment = {},
collections = {art,easily-explained}
}
@online{item28,
title = {What are some of the most ridiculous proofs in mathematics?},
author = {Anonymous},
url = {http://www.quora.com/Mathematics/What-are-some-of-the-most-ridiculous-proofs-in-mathematics},
urldate = {2013-02-17},
abstract = {},
comment = {},
collections = {the-act-of-doing-maths}
}
@review{item29,
title = {Review of "Groups" by Georges Papy in New Scientist},
author = {T. H. O'Beirne},
url = {http://books.google.co.uk/books?id=zhboHCUC6LsC{\&}pg=PA582{\&}lpg=PA582{\&}dq=groups+georges+papy{\&}source=bl{\&}ots=SA1veajk7J{\&}sig=JCidC0RAq5u{\_}E4AzahyYlBoLuZU{\&}hl=en{\&}sa=X{\&}ei=F6lFUbyqJoaW0QXI3oDACg{\&}ved=0CDoQ6AEwAQ{\#}v=onepage{\&}q=groups georges papy{\&}f=false},
urldate = {2013-03-17},
abstract = {},
comment = {},
page = 582,
year = 1964,
month = {sep},
day = 3,
collections = {}
}
@online{item31,
title = {Pascal's Pyramid Or Pascal's Tetrahedron},
author = {Jim Nugent},
url = {https://web-beta.archive.org/web/20160410142410/http://buckydome.com/math/Article2.htm http://buckydome.com/math/Article2.htm},
urldate = {2013-06-25},
abstract = {A lattice of octahedra and tetrahedra (oct-tet lattice) is a useful paradigm for understanding the structure of Pascal's pyramid, the 3-D analog of Pascal's triangle. Notation for levels and coordinates of elements, a standard algorithm for generating the values of various elements, and a ratio method that is not dependent on the calculation of previous levels are discussed. Figures show a bell curve in 3 dimensions, the association of elements to primes and twin primes, and the values of elements mod(x) through patterns arranged in triangular plots. It is conjectured that the largest factor of any element is less than the level index.},
comment = {},
keywords = {3-D,Galton Board,JimNugent,Pascal,Pascal's tetrahedron,Pascal's triangle,Sierpinski,Stephen Mueller,True BASIC,bell curve,binomial,expansion,geometry,mathematics,oct-tet,octahedron,prime numbers,taxicab,taxicab geometry,tetrahedron,three dimensional,trinomial,twin prime,twin primes},
collections = {easily-explained},
year = 1990
}
@article{item35,
title = {WHAT IS Lehmer's number?},
author = {Eriko Hironaka},
url = {http://www.math.fsu.edu/{\~{}}aluffi/archive/paper355.pdf},
urldate = {2013-12-03},
abstract = {},
comment = {},
collections = {attention-grabbing-titles},
year = 2009
}
@online{item37,
title = {Fair but irregular polyhedral dice},
author = {Joseph O'Rourke},
url = {http://mathoverflow.net/questions/46684/fair-but-irregular-polyhedral-dice},
urldate = {2013-12-16},
abstract = {},
comment = {},
collections = {probability-and-statistics},
year = 2010
}
@online{item39,
title = {Rithmomachia},
author = {Daniel U. Thibault and Michel Boutin},
url = {http://www.gamecabinet.com/rules/Rithmomachia.html},
urldate = {2014-01-24},
abstract = {This complex chess-like game appeared in the western world around the year 1000. The game knew a great burst of popularity in the 15th century, because of some rules changes. When chess also saw its rules change (particularly when the Queen started to move in its modern fashion instead of its previous King-like motion), Rithmomachia started fading rapidly, at the close of the 16th century. The rules given here are those established in 1556 by Claude de Boissière, a Frenchman.},
comment = {},
keywords = {Board,GURPS,Games,Medieval,Rithmomachia},
collections = {games-to-play-with-friends,history},
year = 1984
}
@article{item42,
title = {The Number-Pad Game},
author = {Alex Fink and Richard Guy},
url = {http://www.maths.qmul.ac.uk/{\~{}}fink/numbpad2f.pdf},
urldate = {2014-06-11},
abstract = {},
comment = {},
collections = {easily-explained,games-to-play-with-friends,puzzles},
year = 2007
}
@article{item44,
title = {A Fresh Look at Peg Solitaire},
author = {George I. Bell},
url = {http://recmath.org/pegsolitaire/papers/Bell{\_}AFreshLookatPegSolitaire{\_}MathMag2007.pdf},
urldate = {2014-08-26},
abstract = {},
comment = {},
collections = {easily-explained,puzzles},
year = 2007
}
@online{item45,
title = {Pondering an Artist's Perplexing Tribute to the Pythagorean Theorem},
author = {Ivars Peterson},
url = {http://mathtourist.blogspot.co.uk/2009/02/pondering-artists-perplexing-tribute-to.html},
urldate = {2014-08-28},
abstract = {},
comment = {},
collections = {art,easily-explained},
year = 2009
}
@book{item46,
title = {Music: a Mathematical Offering},
author = {Dave Benson},
url = {http://homepages.abdn.ac.uk/mth192/pages/html/maths-music.html},
urldate = {2014-12-02},
abstract = {},
comment = {},
collections = {music},
year = 2006
}
@misc{item49,
title = {Maximum Matching and a Polyhedron With 0,1-Vertices},
author = {Jack Edmonds},
url = {http://nvlpubs.nist.gov/nistpubs/jres/69B/jresv69Bn1-2p125{\_}A1b.pdf},
urldate = {2015-03-07},
abstract = {A matching in a graph {\$}G{\$} is a subset of edges in {\$}G{\$} such that no two meet the same node in {\$}G{\$}. The convex polyhedron {\$}C{\$} is characterised, where the extreme points of {\$}C{\$} correspond to the matchings in {\$}G{\$}. Where each edge of {\$}G{\$} carries a real numerical weight, an efficient algorithm is described for finding a matching in {\$}G{\$} with maximum weight-sum.},
comment = {},
year = 1964,
collections = {}
}
@article{item50,
title = {The Lost Calculus (1637-1670): Tangency and Optimization without Limits},
author = {Jeff Suzuki},
url = {http://www.maa.org/programs/maa-awards/writing-awards/the-lost-calculus-1637-1670-tangency-and-optimization-without-limits},
urldate = {2015-03-12},
abstract = {An examination of the evolution of the lost calculus from its beginnings in the work of Descartes and its subsequent development by Hudde, and the possibility that nearly every problem of calculus could have been solved using algorithms entirely free from the limit concept.},
comment = {},
collections = {history},
year = 2005
}
@article{item52,
title = {Proposal to Encode the Ganda Currency Mark for Bengali in ISO/IEC 10646},
author = {Anshuman Pandey},
url = {http://std.dkuug.dk/JTC1/SC2/wg2/docs/n3311.pdf},
urldate = {2015-09-30},
abstract = {},
comment = {},
collections = {easily-explained,notation-and-conventions},
year = 2007
}
@article{item55,
title = {On the Number of Times an Integer Occurs as a Binomial Coefficient},
author = {H. L. Abbott and P. Erd{\H{o}}s and D. Hanson},
url = {http://www.jstor.org/stable/2319526?seq=4{\#}page{\_}scan{\_}tab{\_}contents},
urldate = {2015-11-30},
abstract = {},
comment = {},
collections = {},
year = 1974
}
@article{item57,
title = {Approaches to the Enumerative Theory of Meanders},
author = {Michael La Croix},
url = {http://www.math.uwaterloo.ca/{\~{}}malacroi/Latex/Meanders.pdf},
urldate = {2015-12-14},
abstract = {},
comment = {},
collections = {},
year = 2003
}
@article{item60,
title = {Transposable integers in arbitrary bases},
author = {Anne L. Ludington},
url = {http://www.fq.math.ca/Scanned/25-3/ludington.pdf},
urldate = {2016-04-19},
abstract = {},
comment = {},
year = 1985,
collections = {}
}
@online{Entanglement,
title = {A game for budding knot theorists},
author = {Dave Richeson},
url = {http://divisbyzero.com/2010/08/24/a-game-for-budding-knot-theorists/},
urldate = {2010-08-25},
abstract = {},
comment = {},
year = 2010,
month = {aug},
day = 24,
collections = {games-to-play-with-friends}
}
@article{CSCheatSheet,
title = {Theoretical Computer Science Cheat Sheet},
author = {Steve Seiden},
url = {http://www.tug.org/texshowcase/cheat.pdf},
urldate = {2011-03-26},
abstract = {},
comment = {},
journal = {TeX showcase},
collections = {basically-computer-science,lists-and-catalogues}
}
@misc{item56,
title = {The Theory of Heaps and the Cartier-Foata Monoid},
author = {C. Krattenthaler},
url = {http://www.mat.univie.ac.at/{\~{}}kratt/artikel/heaps.pdf},
urldate = {2015-12-03},
abstract = {We present Viennot’s theory of heaps of pieces, show that heaps are equivalent to elements in the partially commutative monoid of Cartier and Foata, and illustrate the main results of the theory by reproducing its application to the enumeration of parallelogram polyominoes due to Bousquet–M{\'{e}}lou and Viennot.},
comment = {},
collections = {},
year = 2006
}
@article{NotesontheFourthDimensionThePublicDomainReview,
title = {Notes on the Fourth Dimension},
author = {Jon Crabb },
url = {http://publicdomainreview.org/2015/10/28/notes-on-the-fourth-dimension/},
urldate = {2016-06-13},
abstract = {Hyperspace, ghosts, and colourful cubes — Jon Crabb on the work of Charles Howard Hinton and the cultural history of higher dimensions.},
comment = {},
collections = {art},
year = 2015
}
@online{item20,
title = {To Dissect a Mockingbird: A Graphical Notation for the Lambda Calculus with Animated Reduction},
author = {David C Keenan},
url = {http://dkeenan.com/Lambda/index.htm},
urldate = {2012-06-03},
abstract = {The lambda calculus, and the closely related theory of combinators, are important in the foundations of mathematics, logic and computer science. This paper provides an informal and entertaining introduction by means of an animated graphical notation.},
comment = {},
year = 1996,
collections = {animals,basically-computer-science}
}
@online{PhotoelectricNumberSieve,
title = {Photoelectric Number Sieve Machine ("Gear Machine")},
author = {D. H. Lehmer and Robert Canepa},
url = {http://www.computerhistory.org/collections/catalog/X85.82},
urldate = {2016-06-13},
abstract = {This gear number sieve was constructed to solve number theory problems such as factoring and determining if a number is prime. The machine also had a photo detector and powerful amplifier which was not included in the gift.},
comment = {},
collections = {easily-explained,things-to-make-and-do},
year = 1932
}
@article{item59,
title = {A Dozen Hat Problems},
author = {Ezra Brown and James Tanton},
url = {https://www.math.vt.edu/people/brown/doc/dozen{\_}hats.pdf},
urldate = {2016-04-12},
abstract = {},
comment = {},
collections = {games-to-play-with-friends,protocols-and-strategies,puzzles},
year = 2009
}
@misc{Feferman,
title = {Penrose's Godelian argument},
author = {Feferman, Solomon},
url = {http://math.stanford.edu/{\~{}}feferman/papers/penrose.pdf},
urldate = {2011-05-16},
abstract = {},
comment = {},
collections = {},
year = 1996
}
@article{Levien2008,
title = {The Euler spiral: a mathematical history},
author = {Levien, Raph},
url = {http://raph.levien.com/phd/euler{\_}hist.pdf},
urldate = {2012-04-07},
abstract = {The beautiful Euler spiral, deﬁned by the linear relationship between curvature and arclength, was ﬁrst proposed as a problem of elasticity by James Bernoulli, then solved accurately by Leonhard Euler. Since then, it has been independently reinvented twice, ﬁrst by Augustin Fresnel to compute diffraction of light through a slit, and again by Arthur Talbot to produce an ideal shape for a railway transition curve connecting a straight section with a section of given curvature. Though it has gathered many names throughout its history, the curve retains its aesthetic and mathematical beauty as Euler had clearly visualized. Its equation is related to the Gamma function, the Gauss error function (erf), and is a special case of the conﬂuent hypergeometric function.},
comment = {I love the Euler spiral. I don't know why. Maybe it's because I first learnt of it as the "clothoid", which is an excellent name, or maybe it's because it gives me something to think about when I'm driving.This shortish essay by Raph Levien gives a readable potted history of the spiral's multiple discoveries and applications, illustrated with some lovely sparse diagrams of the sort that maths-illiterate Etsy craftspeople love.},
journal = {Opera},
pages = {1--14},
year = 2008,
collections = {history}
}
@online{ScoopingLoopSnooper,
title = {Scooping the Loop Snooper},
author = {Geoffrey K. Pullum},
url = {http://www.lel.ed.ac.uk/{\~{}}gpullum/loopsnoop.html},
urldate = {2012-01-20},
abstract = {},
comment = {A proof that the Halting Problem is undecidable.},
collections = {attention-grabbing-titles,easily-explained},
year = 2000
}
@article{Good1819,
title = {Pantologia. A new (cabinet) cyclopædia, by J.M. Good, O. Gregory, and N. Bosworth assisted by other gentlemen of eminence},
author = {Good, John Mason and Gregory, Olinthus Gilbert},
url = {http://books.google.com/books?id=72vgv4yVQOAC{\&}pgis=1},
urldate = {2012-02-10},
abstract = {},
comment = {Contains something on the continued surd.},
year = 1819,
collections = {history,lists-and-catalogues}
}
@article{Williams2004,
title = {High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams},
author = {Williams, Hugh C. and Poorten, A. J. Van Der and Stein, Andreas},
url = {http://books.google.com/books?id=udr3tHHwBl0C{\&}pgis=1},
urldate = {2012-04-12},
abstract = {This volume consists of a selection of papers based on presentations made at the international conference on number theory held in honor of Hugh Williams' sixtieth birthday. The papers address topics in the areas of computational and explicit number theory and its applications. The material is suitable for graduate students and researchers interested in number theory.},
comment = {I think I just kept this because of the title. Tha's a good reason because it's a good title, but I can't remember how I found it. Maybe it contains something interesting.},
pages = 392,
publisher = {American Mathematical Soc.},
year = 2004,
collections = {attention-grabbing-titles}
}
@article{Guilbaud1963,
title = {Analyse alg{\'{e}}brique d'un scrutin},
author = {Guilbaud, GT and Rosenstiehl, P},
url = {http://www.numdam.org/article/MSH{\_}1963{\_}{\_}4{\_}{\_}9{\_}0.pdf http://www.ehess.fr/revue-msh/recherche.php?page=157{\&}lignes=1272{\&}action=recherchelignes=1272{\&}action=recherche http://archive.numdam.org/ARCHIVE/MSH/MSH{\_}1963{\_}{\_}4{\_}/MSH{\_}1963{\_}{\_}4{\_}{\_}9{\_}0/MSH{\_}1963{\_}{\_}4{\_}{\_}9{\_}0.pdf},
urldate = {2013-12-01},
abstract = {},
comment = {Found while looking at the permutohedron.},
journal = {Math. Sci. Hum},
pages = {9--33},
volume = 4,
year = 1963,
collections = {}
}
@online{item48,
title = {Magic squares of seventh powers},
author = {Christian Boyer},
url = {http://www.multimagie.com/English/SquaresOfSeventhPowers.htm},
urldate = {2015-03-06},
abstract = {},
comment = {Magic square whose sum is the first 52 digits of {\$}\pi{\$}.},
collections = {puzzles},
year = 2004
}
@article{PauliPascalPyramidsPauliFibonacciNumbersandPauliJacobsthalNumbers,
title = {Pauli Pascal Pyramids, Pauli Fibonacci Numbers, and Pauli Jacobsthal Numbers},
abstract = {The three anti-commutative two-dimensional Pauli Pascal triangles can be generalized into multi-dimensional Pauli Pascal hyperpyramids. Fibonacci and Jacobsthal numbers are then generalized into Pauli Fibonacci numbers, Pauli
Jacobsthal numbers, and Pauli Fibonacci numbers of higher order. And the question is: are Pauli rabbits killer rabbits?},
url = {http://arxiv.org/abs/0711.4030v1 http://arxiv.org/pdf/0711.4030v1},
author = {Martin Erik Horn},
comment = {},
urldate = {2017-03-24},
archivePrefix = {arXiv},
eprint = {0711.4030},
primaryClass = {math.GM},
year = 2007,
collections = {attention-grabbing-titles}
}
@article{ApprovalVotinginProductSocieties,
title = {Approval Voting in Product Societies},
abstract = {In approval voting, individuals vote for all platforms that they find
acceptable. In this situation it is natural to ask: When is agreement possible?
What conditions guarantee that some fraction of the voters agree on even a
single platform? Berg et. al. found such conditions when voters are asked to
make a decision on a single issue that can be represented on a linear spectrum.
In particular, they showed that if two out of every three voters agree on a
platform, there is a platform that is acceptable to a majority of the voters.
Hardin developed an analogous result when the issue can be represented on a
circular spectrum. We examine scenarios in which voters must make two decisions
simultaneously. For example, if voters must decide on the day of the week to
hold a meeting and the length of the meeting, then the space of possible
options forms a cylindrical spectrum. Previous results do not apply to these
multi-dimensional voting societies because a voter's preference on one issue
often impacts their preference on another. We present a general lower bound on
agreement in a two-dimensional voting society, and then examine specific
results for societies whose spectra are cylinders and tori.},
url = {http://arxiv.org/abs/1703.09870v1 http://arxiv.org/pdf/1703.09870v1},
author = {Kristen Mazur and Mutiara Sondjaja and Matthew Wright and Carolyn Yarnall},
comment = {},
urldate = {2017-03-30},
archivePrefix = {arXiv},
eprint = {1703.09870},
primaryClass = {math.CO},
year = 2017,
collections = {protocols-and-strategies}
}
@article{OvalsandEggCurves,
title = {Ovals and Egg Curves},
abstract = {},
url = {http://www.mathematische-basteleien.de/eggcurves.htm},
author = {J{\"{u}}rgen K{\"{o}}ller },
comment = {},
urldate = {2017-04-03},
collections = {art,things-to-make-and-do}
}
@article{Thenumberdictionary,
title = {The number dictionary},
abstract = {The purpose is to provide an opportunity to show properties of numbers.},
url = {http://numdic.com/},
author = {},
comment = {},
urldate = {2017-04-12},
year = 2008,
collections = {}
}
@misc{item8,
title = {Packing circles and spheres on surfaces},
author = {Alexander Schiftner and Mathias H{\"{o}}binger and Johannes Wallner and Helmut Pottmann},
url = {http://dl.acm.org/citation.cfm?id=1618485 http://www.geometrie.tugraz.at/wallner/packing.pdf},
urldate = {2011-09-04},
abstract = {Inspired by freeform designs in architecture which involve circles and spheres, we introduce a new kind of triangle mesh whose faces’ incircles form a packing. As it turns out, such meshes have a rich geometry and allow us to cover surfaces with circle patterns, sphere packings, approximate circle packings, hexagonal meshes which
carry a torsion-free support structure, hybrid tri-hex meshes, and others. We show how triangle meshes can be optimized so as to have the incircle packing property. We explain their relation to conformal geometry and implications on solvability of optimization. The examples we give confirm that this kind of meshes is a rich
source of geometric structures relevant to architectural geometry.},
comment = {},
year = 2009,
collections = {basically-computer-science}
}