Art, Graphics, and Procedural Generation
Designing Non-repeating Patterns with Prime Numbers
Low-Complexity Art
Random Psychedelic Art
Seam-carving for Content-Aware Image Scaling
The Cellular Automaton Method for Procedural Cave Generation
Bezier Curves and Picasso
Making Hybrid Images
Signal Processing
The Fast Fourier Transform Algorithm, and Denoising a Sound Clip
The Two-Dimensional Fourier Transform and Digital Watermarking
Making Hybrid Images
The Welch-Berlekamp Algorithm for Correcting Errors in Data
Machine Learning and Data Mining
Introduction
K-Nearest-Neighbors and Handwritten Digit Classification
The Perceptron, and All the Things it Can’t Perceive
Decision Trees and Political Party Classification
Neural Networks and the Backpropagation Algorithm
K-Means Clustering and Birth Rates
Linear Regression
Regression and Linear Combinations
Eigenfaces, for Facial Recognition (via Principal Component Analysis)
Bandit Learning: the UCB1 Algorithm
Bandit Learning: the EXP3 Algorithm
Bandits and Stocks
Weak Learning, Boosting, and the AdaBoost Algorithm
Fairness in machine learning (introduction, statistical parity)
The Johnson-Lindenstrauss Transform
Singular Value Decomposition (motivation, algorithms)
Support Vector Machines (inner products, primal problem, dual problem)
Graphs and Network Science
Binary Search on Graphs
Trees and Tree Traversal
Breadth-First and Depth-First Search
The Erdős-Rényi Random Graph
The Giant Component and Explosive Percolation
Zero-One Laws for Random Graphs
Community Detection in Graphs, a Casual Tour
Google’s PageRank Algorithm:
Introduction,
A First Attempt,
The Final Product,
Why It Doesn’t Work Anymore
Combinatorial Optimization
When Greedy is Good Enough: Submodularity and the 1 – 1/e Approximation
When Greedy Algorithms are Perfect: the Matroid
Linear Programming and Healthy Diets Part 1
Linear Programming and the Simplex Algorithm
Linear Programming and Healthy Diets Part 2
The Many Faces of Set Cover
Optimization Models for Subset Cover
Algorithmic Game Theory
Stable Marriages and Designing Markets
Serial Dictatorships and Housing Allocation
Silent Duels and an Old Paper of Restrepo
Silent Duels—Parsing the Construction
Silent Duels—Constructing the Solution part 1
Silent Duels—Constructing the Solution part 2
Software Engineering
Searching for RH Counterexamples
- Setting up Pytest
- Adding a Database
- Search Strategies
- Unbounded Integers
- Deploying with Docker
- Performance Profiling
- Productionizing
- Exploring data
Quantum Computing
A Motivation for Quantum Computing
The Quantum Bit
Multiple Qubits and the Quantum Circuit
Concrete Examples of Quantum Gates
Cryptography
RSA
Elliptic Curves Introduction
Elliptic Curves as Elementary Equations
Elliptic Curves as Algebraic Structures
Elliptic Curves as Python Objects (over the rational numbers)
Programming with Finite Fields
Connecting Elliptic Curves with Finite Fields
Elliptic Curve Diffie-Hellman
Sending and Authenticating Messages with Elliptic Curves (Shamir-Massey-Omura and ElGamal)
The Mathematics of Secret Sharing
Zero Knowledge Proofs (primer, zero knowledge proofs for NP, definitions and theory)
Fully homomorphic encryption:
- The Gadget Decomposition in FHE
- Modulus Switching in LWE
- Key Switching in LWE
- Sample Extraction from RLWE to LWE
- Negacyclic Polynomial Multiplication
- Estimating the Security of Ring Learning With Errors
- Google’s Fully Homomorphic Encryption Compiler (Tutorial)
- Encoding schemes in FHE
Streaming and Sublinear Algorithms
Load Balancing and the Power of Hashing
Program Gallery entries
Natural Language
Metrics on Words
Word Segmentation, or Makingsenseofthis
Cryptanalysis with N-Grams
Computational Category Theory
A Sample of Standard ML (and a Preview of Monoids)
Categories, What’s the Point?
Introducing Categories
Categories as Types
Properties of Morphisms
Universal Properties
Functoriality
The Universal Properties of Map, Fold, and Filter
Computational Topology
Computing Homology
Fixing Bugs in Computing Homology
The Čech complex and the Vietoris-Rips complex
Games
The Wild World of Cellular Automata
Turing Machines and Conway’s Dreams
Conway’s Game of Life in Conway’s Game of Life
Optimally Stacking the Deck: Kicsi Poker
Optimally Stacking the Deck: Texas Hold ‘Em
Want to make a great puzzle game? Get inspired by theoretical computer science.
Miscellaneous
Two’s Complement and Group Theory
Group Actions and Hashing Unordered Multisets
A Working Mathematician’s Guide to Parsing
The Reasonable Effectiveness of the Multiplicative Weights Update Algorithm
Taylor Series and Accelerometers
Hunting Serial Killers
Learning to Love Complex Numbers
Holidays and Homicide
Numerical Integration
Busy Beavers, and the Quest for Big Numbers
Row Reduction over a Field
Complete Sequences and Magic Tricks
Well Orderings and Search
Education
Teaching Mathematics – Graph Theory
Learning Programming – Finger-Painting and Killing Zombies
How to Take a Calculus Test
Why There’s no Hitchhiker’s Guide to Mathematics
Deconstructing the Common Core Mathematical Standard
Guest Posts
Math and Baking: Torus-Knotted Baklava
With High Probability: What’s up with Graph Laplacians?
Pingback: Cryptanalysis with N-Grams | Math ∩ Programming
Pingback: Matemática e Álgebra Computacional - Márcio Francisco Dutra e Campos
Pingback: The Universal Properties of Map, Fold, and Filter | Math ∩ Programming
Pingback: Introducing Categories | Math ∩ Programming
Pingback: Introducing Elliptic Curves | Math ∩ Programming
Pingback: A Sample of Standard ML, the TreeSort Algorithm, and Monoids | Math ∩ Programming