Library for Multi-Armed Bandit Algorithms
☆57Apr 2, 2017Updated 9 years ago
Alternatives and similar repositories for libbandit
Users that are interested in libbandit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-armed bandit simulation library☆140Nov 9, 2023Updated 2 years ago
- More about the exploration-exploitation tradeoff with harder bandits☆24May 12, 2019Updated 6 years ago
- Epsilon-greedy, softmax and LinUCB contextual bandit implementations [recommender systems]☆50Mar 15, 2019Updated 7 years ago
- ☆12May 22, 2016Updated 9 years ago
- Simulations for Dueling Bandit Algorithms, including our Double Thompson Sampling (D-TS) algorithms☆25Sep 27, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Public repository for the work on bandit problems☆24Apr 4, 2024Updated 2 years ago
- Implementation of the X-armed Bandits algorithm, as detailed in the paper, "X-armed Bandits", Bubeck et al., 2011.☆11Jul 12, 2018Updated 7 years ago
- Bandits Environments for the OpenAI Gym☆89Jan 15, 2020Updated 6 years ago
- Empirical tests of various bandit algorithms.☆16Dec 6, 2014Updated 11 years ago
- ☆17Oct 25, 2016Updated 9 years ago
- 🔬 Research Framework for Single and Multi-Players 🎰 Multi-Arms Bandits (MAB) Algorithms, implementing all the state-of-the-art algorith…☆421Apr 30, 2024Updated 2 years ago
- Code for a generative controller for the AI Gym cartpole task☆15Feb 22, 2017Updated 9 years ago
- Implementation of multi-armed bandits in Julia☆12Jan 12, 2020Updated 6 years ago
- Python application to setup and run streaming (contextual) bandit experiments.☆85Sep 4, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Recurrent Neural Network language modeling toolkit☆38Jan 23, 2014Updated 12 years ago
- Online material and code base for the article Coordinates and Intervals in Graph Based Reference Genomes☆11May 2, 2017Updated 9 years ago
- Non-stationary Off-policy Evaluation☆13Nov 8, 2018Updated 7 years ago
- Python library for Multi-Armed Bandits☆769Feb 11, 2020Updated 6 years ago
- Create graphs of cumulative cases over cumulative deaths for COVID-19☆12May 3, 2020Updated 5 years ago
- SUPBUB is a tool that, in linear time, finds out superbubbles(special graph-structures) in a directed graph.☆12Sep 19, 2019Updated 6 years ago
- EXPERIMENTAL implementation of side graph☆10Apr 16, 2015Updated 11 years ago
- ☆27May 17, 2019Updated 6 years ago
- Genevieve client: using GenNotes, report ClinVar for individual genomes & add consensus notes☆10Aug 2, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Library of contextual bandits algorithms☆341Mar 14, 2024Updated 2 years ago
- extensions for the LaTeX fancyvrb package, including a better \Verb, automatic line breaking, and improved math mode☆28Feb 25, 2026Updated 2 months ago
- BlastGraph is a new tool for computing intensive approximate pattern matching in a sequence graph or a de-Bruijn graph. Given an oriented…☆12May 9, 2013Updated 12 years ago
- Run-length compressed BWT with LZ77 sampled suffix array☆10Apr 25, 2022Updated 4 years ago
- Repo for code for the NIPS paper entitled "An Architecture for Deep, Hierarchical Generative Models"☆14Oct 27, 2016Updated 9 years ago
- This is the libMF source files with comments in Chinses.☆29May 25, 2014Updated 11 years ago
- Model-Free Episodic Control☆14Jan 12, 2017Updated 9 years ago
- A chain of LLMs to build more complex systems.☆18Apr 4, 2023Updated 3 years ago
- ☆10Apr 4, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The handbook for leading Applied AI teams☆15Mar 12, 2026Updated last month
- lightning☆11Oct 20, 2015Updated 10 years ago
- Torch implementation for Robust convolutional neural networks under adversarial noise☆13Mar 8, 2016Updated 10 years ago
- Theano implementation of the Neural GPU☆15Jan 5, 2016Updated 10 years ago
- Finding all the circuits of a directed graph with self-arcs and multiple-arcs by K.A. Hawick and H.A. James☆19Apr 11, 2013Updated 13 years ago
- GenNotes – public consensus annotation of genetic variants☆11Mar 27, 2016Updated 10 years ago
- Contextual Bandits in R - simulation and evaluation of Multi-Armed Bandit Policies☆81Jul 25, 2020Updated 5 years ago