Skip to main content

Add your description here

Project description

off-key

Conformal Anomaly Detection in Temporal Applications.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

breach-0.1.0.tar.gz (1.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

breach-0.1.0-py3-none-any.whl (1.9 kB view details)

Uploaded Python 3

File details

Details for the file breach-0.1.0.tar.gz.

File metadata

  • Download URL: breach-0.1.0.tar.gz
  • Upload date:
  • Size: 1.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.7.5

File hashes

Hashes for breach-0.1.0.tar.gz
Algorithm Hash digest
SHA256 17ebe4181f4cda7b7a6c452b711125957287d6ef5a7f2531accb6526a54ef9d7
MD5 a6d220a3499f483ed50151839a0a06c7
BLAKE2b-256 987cc735f84ffae1ba0b2367c13e7c8a965ee0dd5c2945189933a53cabc86335

See more details on using hashes here.

File details

Details for the file breach-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: breach-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 1.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.7.5

File hashes

Hashes for breach-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b4db6e8a6db0b2743e4be0ecc0e3b25657884da4d7ddf581486bf95e62f16bc3
MD5 0d5de4b801c898a278f5b564babb55c8
BLAKE2b-256 8fb1792298203c2b5c744d9776c2fe716bb923e7e76532eaf95cfd09e54759d7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page