☆17Oct 25, 2016Updated 9 years ago
Alternatives and similar repositories for causal_bandits
Users that are interested in causal_bandits are comparing it to the libraries listed below
Sorting:
- Simulation code for reference with MABUC article: Bareinboim, Forney, & Pearl (2015)☆18Nov 11, 2015Updated 10 years ago
- Structural Causal Bandit☆26Sep 12, 2021Updated 4 years ago
- Empirical tests of various bandit algorithms.☆16Dec 6, 2014Updated 11 years ago
- ☆17May 18, 2021Updated 4 years ago
- R Code for Causal Inference by Hernán and Robins☆22Oct 5, 2021Updated 4 years ago
- An Interface to Specify Causal Graphs and Compute Balke Bounds☆22Feb 26, 2025Updated last year
- ☆48Mar 28, 2022Updated 3 years ago
- ☆33Jul 8, 2018Updated 7 years ago
- Code for the Causal Bayesian Optimization algorithm (http://proceedings.mlr.press/v108/aglietti20a/aglietti20a.pdf)☆32Sep 21, 2020Updated 5 years ago
- ☆12Mar 13, 2025Updated 11 months ago
- Contextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies☆80Jul 25, 2020Updated 5 years ago
- A collection of handy tools such as adding Key & BPM to your music library☆15Mar 8, 2023Updated 3 years ago
- Feel the Vibes☆13Feb 26, 2025Updated last year
- Machine learning for molecules workshop 2022☆13Nov 30, 2022Updated 3 years ago
- This is a read-only mirror of the CRAN R package repository. speedglm — Fitting Linear and Generalized Linear Models to Large Data Sets…☆10May 6, 2023Updated 2 years ago
- Implementation of safe offline bandit algorithms.☆10Oct 27, 2019Updated 6 years ago
- Implementation of the X-armed Bandits algorithm, as detailed in the paper, "X-armed Bandits", Bubeck et al., 2011.☆11Jul 12, 2018Updated 7 years ago
- ☆10Nov 11, 2016Updated 9 years ago
- Implementation of "POPCORN: Partially Observed Prediction Constrained Reinforcement Learning" (Futoma, Hughes, Doshi-Velez, AISTATS 2020)☆11May 19, 2021Updated 4 years ago
- Avoiding catastrophic failures in reinforcement learning by learning to shape rewards.☆10Nov 13, 2017Updated 8 years ago
- Experiments from "The Description Length of Deep Learning Models"☆10Aug 1, 2018Updated 7 years ago
- Exploring the relationships in the historical data of weather, wind generated electricity and electricity demand. Base on the analysis, u…☆13Oct 12, 2021Updated 4 years ago
- Experiments for recognising textual entailment☆14Oct 12, 2012Updated 13 years ago
- Various optimized implementations of YUV to RGB conversion routines☆12May 8, 2016Updated 9 years ago
- Code for the EMNLP paper "Improving Detection and Categorization of Task-relevant Utterances through Integration of Discourse Structure a…☆12Nov 23, 2022Updated 3 years ago
- ☆11Oct 1, 2021Updated 4 years ago
- Repository for paper Decrypting Cryptic Crosswords☆10Jan 15, 2022Updated 4 years ago
- ☆13Aug 7, 2023Updated 2 years ago
- ☆14Jul 8, 2024Updated last year
- Towards Automated Causal Discovery☆11Aug 20, 2024Updated last year
- Safe SLAC, an algorithm for safe cost-constrained reinforcement learning in high-dimensional POMDPs.☆11Mar 1, 2023Updated 3 years ago
- Examples of different methods to compose FaaS functions together☆10Jul 18, 2018Updated 7 years ago
- ☆11Jun 12, 2024Updated last year
- A helper package to get information of scholarly articles from DBLP using its public API☆15May 13, 2025Updated 9 months ago
- A project to translate the Voynich Manuscript into English☆11Jun 30, 2023Updated 2 years ago
- [COLM 2025: 1st Workshop on the Application of LLM Explainability to Reasoning and Planning] Latent Chain-of-Thought? Decoding the Depth-…☆17Oct 4, 2025Updated 5 months ago
- A tool that can segment and recognize hand written letters☆10Dec 31, 2018Updated 7 years ago
- Tunnel is a clean wrapper around native Go channel to allow cleanly closing the channel without throwing a panic.☆13Aug 1, 2019Updated 6 years ago
- Exposes the haproxy command socket over TCP using socat☆13May 28, 2020Updated 5 years ago