looking for volunteers! the idea is to start a collaborative, open source, open/network-science-based attack on the boundaries and frontiers of mathematics and computer science. esp seeking students and researchers/academics in mathematics and computer science.

just leave a reply if interested. tell a little about yourself and any more detail about what you’re interested in. (see also chat.)

model resources/ results for projects along these lines:

- Polymath project(s) by “DHJ Polymath”
- Reinventing discovery—the new era of networked science, by Nielsen

more recently the crack international Polymath cyberteam succeeded in dramatically improving the breakthrough/ historic Zhang twin prime result!

- Together and Alone, Closing the Prime Gap Klarreich/ Simons institute
- New equidistribution estimates of Zhang type, and bounded gaps between primes / DHJ Polymath, arxiv
- THE “BOUNDED GAPS BETWEEN PRIMES” POLYMATH PROJECT – A RETROSPECTIVE / DHJ Polymath, arxiv

these are five short dramatic accounts of two singularly notable, historic, basically successful collaborative projects launched within the last few years and which received widespread/major media and scientific attention, the Gowers DHJ theorem project and the Deolalikar proof cyberspatial group evaluation/refereeing.

- Mathematics by collaboration — The Polymath project harnesses the power of the Internet to use massive collaboration to solve a major problem in record time / by Julie Rehmeyer, ScienceNews (2009)
- Massively Collaborative Mathematics / Rehmeyer, SIAM (2010)
- A tale of a serious attempt at P≠NP by Lipton, CACM (2010)
- Crowdsourcing peer review — A claimed proof that P≠NP spurs a massive collaborative research effort Julie Rehmeyer (2010)
- Step 1: Post Elusive Proof. Step 2: Watch Fireworks / Markoff, NYT (2010)

these are two detailed scientific papers analyzing the DHJ theorem attack dynamics.

Daniel M.Very interesting. Sure makes we dream of harnessing that power into one of our favorite curious mathematical or conceptual topics with potential for exploration.

Pingback: the NIPS peer review experiment and more cyber zeitgeist | Turing Machine