Please turn JavaScript on

Math ∩ Programming

We bring you the latest updates from Math ∩ Programming through a simple and fast subscription.

We can deliver your news in your inbox, on your phone or you can read them here on this website on your personal news page.

Unsubscribe at any time without hassle.

Math ∩ Programming's title: Math ∩ Programming

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.23 / day

Message History

I went hunting for references to the OEIS in open source code, and found some weird ones. There are not one, but two live-coding music frameworks that use OEIS sequences as a source for “anything that can be sequenced” in music. I’m guessing that’s used for choosing pseudorandom melodies, interesting rhythyms, or how to overlap tracks in different ways. T...

Read full story
A051070 is a sequence about OEIS sequences. a(n) is the n-th term in sequence A_n (or -1 if A_n doesn’t have enough terms). So the first term in A051070 is 1 because A000001 is the number of groups of order n, and that sequence has 1 as its entry in index 1. A000002 is the Kolakoski sequence (what? For another time) and has value 2 in entry 2. The sequence continues: 1, 2,...

Read full story
Problem: Determine if a 32-bit number is prime (deterministically) Solution: (in C++) // Bases to test. Using the first 4 prime bases makes the test deterministic // for all 32-bit integers. See https://oeis.org/A014233. int64_t bases[] = {2, 3, 5, 7}; inline int countTrailingZeros(uint64_t n) { if (n == 0) return 64; return __builtin_ctzll(n); } int64_t modularExponentiation(in...

Read full story
It’s the 5th annual April Cools! Here are my previous April Cools articles This year it’s a book review of Ben Recht’s book, The Irraional Decision: How We Gave Computers the Power to Choose For us, released Mar 10, 2026. The publishing industry has a stupid name for the subcategory of non-fiction book where a domain expert weaves factual evidence together into...

Read full story
In an earlier article, I covered the basic technique for performing matrix-vector multiplication in fully homomorphic encryption (FHE), known as the Halevi-Shoup diagonal method. This article covers a more recent method for matrix-matrix multiplication known as the bicyclic method. The code implementing this method is in the same GitHub repository as the previous article, and th...

Read full story