☆20Mar 15, 2017Updated 9 years ago
Alternatives and similar repositories for contextual-bandit
Users that are interested in contextual-bandit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bandit algorithms☆30Oct 12, 2017Updated 8 years ago
- Semi-synthetic experiments to test several approaches for off-policy evaluation and optimization of slate recommenders.☆43Nov 2, 2017Updated 8 years ago
- 机器学习相关论文☆12Nov 1, 2021Updated 4 years ago
- ☆19Sep 9, 2020Updated 5 years ago
- A curated list on papers about combinatorial multi-armed bandit problems.☆18May 10, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- (RecSys2020) "Doubly Robust Estimator for Ranking Metrics with Post-Click Conversions"☆23Mar 25, 2023Updated 3 years ago
- Counterfactual Evaluation and Learning for Interactive Systems: Foundations, Implementations, and Recent Advances☆12Aug 14, 2022Updated 3 years ago
- Implementation of multi-armed bandits in Julia☆12Jan 12, 2020Updated 6 years ago
- ☆14Feb 12, 2016Updated 10 years ago
- Estimators to perform off-policy evaluation☆13Sep 3, 2024Updated last year
- Plotting data on the interactive maps, IPython Notebook friendly.☆10Jun 5, 2020Updated 5 years ago
- Datasets for Online Controlled Experiments☆12Apr 4, 2025Updated last year
- Deep learning models for contextual multi-armed bandit setting☆13May 16, 2021Updated 4 years ago
- A cookiecutter template for Apache Spark applications written in Scala☆10Jan 11, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Training (hopefully) safe agents in gridworlds☆25May 12, 2019Updated 6 years ago
- Adds Free SRG-SSR Weather API to ioBroker☆14Jan 22, 2026Updated 3 months ago
- Implementation of importance sampling, direct, and hybrid methods for off-policy evaluation.☆16Mar 28, 2020Updated 6 years ago
- scripts for evaluation of contextual bandit algorithms☆46Apr 27, 2020Updated 6 years ago
- Protobuf and gRPC service definition of treehole.space☆10Mar 27, 2022Updated 4 years ago
- Python implementations of contextual bandits algorithms☆832Feb 22, 2026Updated 2 months ago
- ☆14Dec 10, 2017Updated 8 years ago
- Implementation of provably Rawlsian fair ML algorithms for contextual bandits.☆14May 10, 2017Updated 8 years ago
- Scala発火村の資料ですお☆30Oct 18, 2010Updated 15 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A robust SEO Linter / Checker for Local HTML Files☆32Aug 25, 2021Updated 4 years ago
- ☆88Jul 30, 2024Updated last year
- Scala implementations of standard algorithms for Multi-Armed Bandits Problem.☆12May 7, 2016Updated 9 years ago
- ☆12Apr 12, 2023Updated 3 years ago
- Utility functions that I reuse across different projects☆15Jun 4, 2021Updated 4 years ago
- Vowpal Wabbit examples and tutorials☆21Jan 20, 2022Updated 4 years ago
- ☆15Jan 20, 2020Updated 6 years ago
- Code from http://www.ark.cs.cmu.edu/mheilman/questions/☆12Apr 23, 2013Updated 13 years ago
- A Python implementation of the Refinement Types Tutorial.☆10Feb 4, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Neural Haircut: Prior-Guided Strand-Based Hair Reconstruction. ICCV 2023☆15Mar 8, 2024Updated 2 years ago
- This is a simple autoencoder to reconstruct pointcloud☆10May 31, 2018Updated 7 years ago
- Example of an Oozie workflow with a PySpark action using Python eggs☆14Nov 13, 2016Updated 9 years ago
- A JavaScript demo of some multi-armed bandits algorithms☆39Aug 23, 2020Updated 5 years ago
- https://sites.google.com/cornell.edu/recsys2021tutorial☆58Mar 21, 2022Updated 4 years ago
- Code for the paper "Learning Step-Size Adaptation in CMA-ES"☆12Mar 24, 2023Updated 3 years ago
- A Haskell implementation of distributed hash tables with two-phase commit.☆10Dec 9, 2016Updated 9 years ago