A collection of game theory notebooks
☆25Sep 23, 2025Updated 6 months ago
Alternatives and similar repositories for game-theory-notebooks
Users that are interested in game-theory-notebooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Algorithms and data structures for game theory in Julia☆143Mar 14, 2026Updated 2 weeks ago
- Show climate risk on a map of the US, with the MIT Joint Program data☆16Mar 11, 2026Updated 2 weeks ago
- ☆18Nov 24, 2019Updated 6 years ago
- PSCI 8357: Statistics for Political Research II☆11Apr 21, 2016Updated 9 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Repository for Micro Risks and (Robust) Pareto Improving Policies☆13Sep 14, 2024Updated last year
- Scripts for https://www.zeit.de/wissen/umwelt/2019-12/klimawandel-globale-erwaermung-warming-stripes-wohnort☆14Dec 11, 2019Updated 6 years ago
- Quarto template for Harvard GSAS dissertations with a Typst backend☆16Mar 9, 2026Updated 2 weeks ago
- ☆15May 30, 2025Updated 9 months ago
- Import Data on All Members of the Bundestag since 1949☆13Dec 5, 2025Updated 3 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Topic Modeling with Non-Negative Matrix Factorization (NMF)☆12Apr 5, 2019Updated 6 years ago
- NCSU CSC-326 Course Page☆12Dec 5, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code for paper: "3D Reconstruction of Incomplete Archaeological Objects Using a Generative Adversarial Network"☆16Dec 29, 2021Updated 4 years ago
- ☆14Dec 1, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Repo for the multimodal deep learning class at the DS3 data science summer school☆13Aug 24, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- julia version of eaton and kortum (2002)☆18May 7, 2025Updated 10 months ago
- 🏪 Daily updated prices of all items from the German supermarket chain REWE as CSV (including EAN, grammage, product image etc.)☆18Dec 12, 2024Updated last year
- Course materials for Spring 2021 ETH Course, "Sequencing Legal DNA: NLP for Law and Political Economy"☆13Aug 18, 2021Updated 4 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 6 years ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- ☆17Apr 1, 2017Updated 8 years ago
- Retrieving and Generating data using LLMs☆30Oct 26, 2025Updated 5 months ago
- Master Kali Linux, Excel in Offensive Security☆32Jun 15, 2025Updated 9 months ago
- A Guide to Germany's Regional Data☆29Jun 16, 2025Updated 9 months ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts that I find useful for managing MongoDB☆19Dec 19, 2017Updated 8 years ago
- r package for bayesian VARs☆23Dec 12, 2017Updated 8 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆12Jun 9, 2020Updated 5 years ago
- Materials for my Workshop on LLMs☆38Sep 26, 2025Updated 6 months ago
- 🚗 A curated list of resources for learning about vehicle security and safety.☆19Jul 10, 2019Updated 6 years ago
- Replication code for " Computational analysis of 140 years of US political speeches reveals more positive but increasingly polarized fram…☆30Feb 22, 2026Updated last month