James231 / Wordsearch-Solver-PythonView external linksLinks
Simple Wordsearch Solving Python Script
☆12Jul 8, 2018Updated 7 years ago
Alternatives and similar repositories for Wordsearch-Solver-Python
Users that are interested in Wordsearch-Solver-Python are comparing it to the libraries listed below
Sorting:
- template for https://cnli.me☆10Feb 27, 2025Updated 11 months ago
- Simulate Qiskit circuits using quimb.☆17Jan 31, 2026Updated last week
- Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion☆11Apr 1, 2024Updated last year
- FamilyTool benchmark☆12Sep 10, 2025Updated 5 months ago
- codes for ICML2021 paper iDARTS: Differentiable Architecture Search with Stochastic Implicit Gradients☆10May 27, 2021Updated 4 years ago
- Analog TV simulation for Apple 2 emulators☆10Mar 9, 2015Updated 10 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- This is a subset of the ImageNet validation dataset. This dataset has 5 images per class.☆10Mar 5, 2021Updated 4 years ago
- Teaching a Convolutional Neural Network to recognize painting genre. Handcrafted dataset. Cool visualizations.☆10Dec 19, 2018Updated 7 years ago
- ☆13Aug 3, 2023Updated 2 years ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 4 months ago
- My master's thesis, on the algebra of topological quantum computing☆20Feb 13, 2014Updated 12 years ago
- Explore the frontier of quantum computing with our Quantum K-Nearest Neighbors (q-KNN) implementation, using IBM's Qiskit framework. This…☆14Nov 10, 2023Updated 2 years ago
- ☆13Jul 6, 2023Updated 2 years ago
- Official Repository for 'Promptable Behaviors: Personalizing Multi-Objective Rewards from Human Preferences' (CVPR 2024)☆16Mar 29, 2024Updated last year
- USB Joystick adapter for CCTV Camera Pelco-D Pan-Tilt-Zoom Over RS485☆15Feb 27, 2017Updated 8 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- The evaluation code for the paper "MoreHopQA: More Than Multi-hop Reasoning"☆14Jun 21, 2024Updated last year
- Pruning methods for pytorch with an optimizer-like interface☆15Apr 14, 2020Updated 5 years ago
- ☆21Oct 25, 2024Updated last year
- Python version gridsynth program computes approximations of Z-rotations over the Clifford+T gate set☆22Jan 9, 2026Updated last month
- ☆18Aug 19, 2024Updated last year
- Write Overwatch Scripts using node based scripting☆16Aug 11, 2024Updated last year
- Quantum Computing for Finance☆18Feb 15, 2025Updated 11 months ago
- Official Implementation for "Editing Massive Concepts in Text-to-Image Diffusion Models"☆19Mar 21, 2024Updated last year
- Comparison of method "Pruning at initialization prior to training" (Synflow/SNIP/GraSP) in PyTorch☆17May 12, 2024Updated last year
- Tutorial Lambda Básico do Canal do Um Inventor Qualquer☆20Jan 9, 2022Updated 4 years ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- algorithmic wing design library☆47Jan 8, 2026Updated last month
- MSU Themed LaTeX Templates for presentations, posters, cover letters, etc.☆22Oct 26, 2020Updated 5 years ago
- ☆23Jan 2, 2026Updated last month
- Official repo for NeurIPS'24 paper "WAGLE: Strategic Weight Attribution for Effective and Modular Unlearning in Large Language Models"☆18Dec 16, 2024Updated last year
- SEETF 2023 Public Challenge Files, Sources, and Solutions☆18Jun 18, 2023Updated 2 years ago
- Repositório com vagas de React Native☆18Mar 28, 2023Updated 2 years ago
- ☆19Jun 27, 2021Updated 4 years ago
- Code for the paper "Learning to Demodulate from Few Pilots via Offline and Online Meta-Learning"☆20Apr 10, 2023Updated 2 years ago
- Face Generation Work (Preprint)☆21Dec 28, 2024Updated last year
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆23Jul 26, 2024Updated last year