Contextual Bandit Algorithms (+Bandit Algorithms)
☆22Oct 18, 2019Updated 6 years ago
Alternatives and similar repositories for Contextual-Bandit
Users that are interested in Contextual-Bandit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contextual bandit in python☆112Jul 7, 2021Updated 4 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- ☆15Jan 9, 2023Updated 3 years ago
- Auction Theory Toolbox – Computer Verified Auctions☆14Jul 12, 2016Updated 9 years ago
- Code used to train an augmented auto-encoder (aka denoising auto-encoder with more augmentations) for the DonkeyCar simulator.☆47Jun 19, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Instance Neighbouring by using Knowledge☆18Oct 3, 2024Updated last year
- SQLAlchemy dialect for Dremio☆16Feb 8, 2023Updated 3 years ago
- An official JAX-based code for our NeuraLCB paper, "Offline Neural Contextual Bandits: Pessimism, Optimization and Generalization", ICLR…☆13Mar 13, 2022Updated 4 years ago
- Julia Implementation of the POMCP algorithm for solving POMDPs☆12Aug 6, 2021Updated 4 years ago
- Trajectory-ranked Reward EXtrapolation (T-REX) for Inverse Reinforcement Learning - A Tensorflow implementation trained on OpenAI Gym env…☆19Jul 4, 2019Updated 6 years ago
- Source code for Hierarchical Probabilistic Forecasting of Electricity Demand with Smart Meter Data by Ben Taieb, Souhaib, Taylor, James, …☆10Sep 4, 2019Updated 6 years ago
- Predict and recommend the news articles, user is most likely to click in real time.☆32Apr 3, 2018Updated 7 years ago
- Machine Learning Summer School☆14Mar 21, 2015Updated 11 years ago
- Explorer visualization widget for the Jupyter notebook☆17Nov 14, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Stream Data based News Recommendation - Contextual Bandit Approach☆47Nov 15, 2017Updated 8 years ago
- Library of contextual bandits algorithms☆341Mar 14, 2024Updated 2 years ago
- Contains Code for Contextual Bandits Decision Tree☆21Jun 11, 2019Updated 6 years ago
- Python code for the post "Adversarial Bandits and the Exp3 Algorithm"☆51Jun 9, 2020Updated 5 years ago
- Hybrid Linear UCB Multi-arm Bandit library☆14Oct 5, 2016Updated 9 years ago
- SimEc code relying on the theano library - check out the simec repo instead for keras based code!☆10Feb 28, 2018Updated 8 years ago
- Julia package that wraps the SARSOP software for solving POMDPs/MDPs☆15Jun 19, 2025Updated 9 months ago
- A Julia Package for providing Multi Armed Bandit Experiments☆21Jul 19, 2018Updated 7 years ago
- Implementing LinUCB and HybridLinUCB in Python.☆49May 15, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Nov 17, 2014Updated 11 years ago
- [Findings of ACL 2023] Communication Efficient Federated Learning for Multilingual Machine Translation with Adapter☆12Sep 4, 2023Updated 2 years ago
- Rule Learning with Embedding Support☆25Aug 18, 2022Updated 3 years ago
- Code for "Towards a learning theory of cause-effect inference" (ICML 2015).☆30Aug 31, 2020Updated 5 years ago
- A small wrapper to do Beta Boosting with XgBoost☆15Oct 26, 2021Updated 4 years ago
- Bayesian or-of-and☆37Mar 11, 2022Updated 4 years ago
- Code for a generative controller for the AI Gym cartpole task☆15Feb 22, 2017Updated 9 years ago
- Scala発火村の資料ですお☆30Oct 18, 2010Updated 15 years ago
- Localize the car in a static map with a particle filter.☆12Mar 18, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- working example of a contextual multi-armed bandit☆55Sep 3, 2019Updated 6 years ago
- Non-stationary Off-policy Evaluation☆13Nov 8, 2018Updated 7 years ago
- CFG-GAN: Composite functional gradient learning of generative adversarial models☆15Jul 9, 2020Updated 5 years ago
- This is a repo for all links and tools in the security and privacy field which I have found useful!!☆20Aug 16, 2022Updated 3 years ago
- Scala implementations of standard algorithms for Multi-Armed Bandits Problem.☆12May 7, 2016Updated 9 years ago
- Library for minimizing Pseudo-Boolean functions☆27Oct 31, 2023Updated 2 years ago
- [ICLR 2023] Eva: Practical Second-order Optimization with Kronecker-vectorized Approximation☆12Jul 31, 2023Updated 2 years ago