MathFest

MathFest is a mathematics conference hosted annually in late summer by the Mathematical Association of America. It is known for its dual focus on teaching and research in mathematics, as well as for student participation.

MathFest Locations

YearLocation[1][2][3]
2023Tampa, FL
2022Washington, DC
2021Sacramento, CA
2020Philadelphia, PA
2019Cincinnati, OH
2018Denver, CO
2017Chicago, IL
2016Columbus, OH
2015Washington, DC
2014Portland, OR
2013Hartford, CT
2012Madison, WI
2011Lexington, KY
2010Pittsburgh, PA
2009Portland, OR
2008Madison, WI
2007San Jose, CA
2006Knoxville, TN
2005Albuquerque, NM
2004Providence, RI
2003Boulder, CO
2002Burlington, VT
2001Madison, WI

The 2015 meeting in Washington, D.C. was an extra day long in order to include events to mark the centennial anniversary of the MAA.

Events

MathFest features many annual lectures, such as the Earle Raymond Hedrick Lecture Series, which consists of up to three lectures by the same presenter, on three consecutive days, [4] and the AWM-MAA Falconer Lecture, which is given by a distinguished female mathematician or mathematics educator.[5]

Notes

  1. MathFest Abstracts. http://www.maa.org/abstracts/, retrieved 22 August 2012.
  2. National Meetings of the MAA. http://www.maa.org/meetings/mathfest, retrieved 31 March 2014.
  3. Spring 2001 MAA Student Newsletter. http://www.maa.org/maa-student-chapters-newsletters-spring-2001
  4. "Hedrick lectures". www.maa.org. Retrieved 2020-01-17.
  5. "Falconer lecture". www.maa.org. Retrieved 2020-01-17.
gollark: CarrOSt just doesn't work. What even is a carrost?
gollark: This should actually be less disruptive than I thought, I can just isolate the privileged stuff in a separate polychoron process instead of just shutting down all user code.
gollark: What is, the evil exploit someone made?
gollark: It's a very clever exploit - they load some trusted code via PotatOS Privileged Execution™, then send it fake HTTP responses containing code.
gollark: I've probably patched it now (hard to test, because one of my changes broke the exploit code but in a way which could be worked around), but at the cost of causing minor breakage in a mostly unused feature.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.