The nuts and bolts of what I do when thinking about math are very similar to the nuts and bolts of thinking about a policy problem… Math Meets Congress Or, A Mathematician Goes to Washington Courtney Gibbons Hamilton College Thanks to the American Association for the Advancement of Science and
One of the fundamental forces in the universe is the weak force. The weak force is involved in holding atoms together or breaking them apart... Putting a period on mathematical physics Ursula Whitcher Mathematical Reviews (AMS) You've heard of periods at the ends of sentences and periods of sine waves.
Up until recently, all known aperiodic tilings used a minimum of two shapes, and it has long been a major problem to find a tiling that uses just one. Quite recently this problem has been solved, although only with a qualification… Hat Tricks Bill Casselman University of British Columbia “But
If one has a pattern on a band, frieze, or strip (disregarding color if as often happens more than one color appears), regardless of the artistic content of what one sees, there are exactly 7 different patterns that are possible… Remembering Donald W. Crowe Maker of Connections between Symmetry, Art
Polynomials, it turns out, are useful for more than just input-output assignments! Perspectives on Polynomials (it’s a witch!) Courtney Gibbons Hamilton College It was a dark and stormy night… Okay, it was probably more like 3:30 in the afternoon on a crisp fall day back when I was teaching Calc
I would like to discuss the Jordan curve theorem as part of an intrinsic human activity: storytelling. The Jordan Curve Theorem as a Lusona Allechar Serrano López Harvard University Introduction The Jordan curve theorem is a result in topology that states that every Jordan curve (a plane simple closed curve)
Mathematically, the most intriguing of the new proposals use lattices for message encryption… What will they do when quantum computers start working? Bill Casselman University of British Columbia Commercial transactions on the internet are invariably passed through a process that hides them from unauthorized parties, using RSA public key encryption