-
For moving towards an inverse method of PROTEUS sometime down the road, we need to consider a computationally feasible approach to run many models to fit a given set of observations.
To give an examp…
-
**Exploratory Data Analysis**
- Loading the datasets
- Cleaning the data
- Check for Duplicates
- Checking for NaN/null values
- Checking for data imbalance
- Analysis of the activi…
-
# MVP Deliverables
- One finetuning file JSONL with at least 500 samples of CoT reasoning
- Preferably completed by Oct 1, 2024
# Milestones
- Synthesize data (various approaches)
- Validat…
-
Add support for TensorFlow models in our XAI package. Currently, we only support scikit-learn models.
Approach
- Create a wrapper class for TensorFlow models
- Implement prediction interface to…
-
Firstly, Bayesian – yes or no? It might be a good learning opportunity for people with limited experience of Bayesian inference, including me. But I don’t have a strong feeling about this either way a…
-
- [ ] Refine modeling approach using sdm library
- [ ] Include calibration step #86
- [ ] Refine model approach
-
Dear @gr-g excuse me for opening an issue. But as the lighting-dev mailinglist moved to delving bitcoin and in the spirit of public communication / reply to [your mail](https://lists.linuxfoundation.o…
-
### Need
Support GA4 tracking for `exportMethod` buttons, including the "Analyze in Terra" button
### Approaches
I wasn't entirely sure of the desired metadata, please see the two below
#### A…
-
- Divide security analysis into multiple segments
- List models that can be used for analysis or approach
- Brief about vulnerabilities
-
- Divide security analysis into multiple segments
- List models that can be used for analysis or approach
- Brief about vulnerabilities