ALAN, CHARLIE and AMITA. Amita has her keys and purse,
looking a little stressed for some reason.
                  AMITA
          What do you think? This time of
          night, I can probably just take the
          110 to the 105, right?  Shouldn't
          be too much traffic...
                  CHARLIE
          If you want, we can run a quick
          aggregated speed density function,
          or we could do a mesoscopic traffic
          simulation...
                  ALAN
          Give the abacus a break, for once.
          The Dodgers are in Houston. Rush
          hour's long over.  The 110 to the
          105 should be just fine.
 
An 
abacus computes numbers by sliding beads on
rods. In this Demonstration, click a bead to move it. The upper disks add 5. Thus each row can store the 
digits between 0 and 9.
 
Hunter's iPod is hooked to Charlie's laptop, the display also
seen on one of the LCD's.  Data code spills down as it did in
Don's Suburban.  Charlie types as Don and DAVID look on --
                  CHARLIE
          The encryption code is somewhat
          elementary... There.
 
In a Hill cipher encryption, the 
plaintext
message is broken up into blocks of length 
n according to the 
m × 
n matrix chosen.  Each block of plaintext letters is
then converted into a 
vector of numbers and is 
dotted with the matrix.  The results are then
converted back to letters and the 
ciphertext
message is produced.
 
AUDIENCE VISION - starting very tight on only a few letters,
then WIDENING to include several words.
                  CHARLIE (cont'd)
          It's made up of individual letters
          and words, but comparing letters
          and words would be meaningless...
          
WIDER now to include sentences and paragraphs.
                  CHARLIE (cont'd)
          To detect plagiarism, you'd need to
          look at larger strings: sentences,
          paragraphs, entire pages...
          
Pages of the book begin to turn, more and more rapidly. A
SECOND BOOK appears alongside, pages turning in unison.
                  CHARLIE (cont'd)
          A String Metric allows you to
          compare the two systems... and
          expose the plagiarist.
          
The page-turning suddenly stops, several passages in each
book HIGHLIGHTED.  Identical.
 
Brute-force string matching compares a given pattern with all substrings of a given text. Those comparisons between
substring and pattern proceed character by character unless a mismatch is found. Whenever a mismatch is found, the
remaining character comparisons for that substring are dropped and the next substring can be selected immediately.
 
Don and Colby at Don's desk, Charlie appears with the iPod.
                  CHARLIE
          We may want to think our tastes are
          unique... but they're not.
             (then)
          There are particular rhythms, key
          changes, or chord patterns that, as
          humans, we find pleasing. Just as
          there are odors we find pleasant or
          not...
             (then)
          This program's sampled thousands of
          hit songs, analyzed what they have
          in common... From there it can
          make a fairly accurate statistical
          guess as to what will be a hit and
          what won't.
 
The aesthetic success of all music lies in the constant unfolding of novelty versus familiarity. Is the next moment
refreshingly surprising, but not too unexpected? A common compositional device that guarantees such success is to play
an existing theme backwards (retrograde) or upside down (inversion).