A Falcon+peewee microsite to explore identifying game-theory strategies
Project description
This provides an the implementation of the Identification of Trust microsite using the Falcon framework
The implementation is by separately requiring the Falcon-dependent code and the Peewee-dependent code.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file finitelycomputable_idtrust_falcon_peewee-24.5.tar.gz
.
File metadata
- Download URL: finitelycomputable_idtrust_falcon_peewee-24.5.tar.gz
- Upload date:
- Size: 2.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dab7f9dde7142d26991d300f2cf9a08b3a6ae29635290ab716b81076f4650cfd |
|
MD5 | 62517d940c48b993664014778b0d36eb |
|
BLAKE2b-256 | a5312890ea26315a043f10f5fec9d93cb4e563304d069cfbc430465a61c5eaa6 |
File details
Details for the file finitelycomputable_idtrust_falcon_peewee-24.5-py3-none-any.whl
.
File metadata
- Download URL: finitelycomputable_idtrust_falcon_peewee-24.5-py3-none-any.whl
- Upload date:
- Size: 3.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9a1c9c6d23b089a250ded8da038083e26c87e06636ee85736b0fb9c85ff4d8f7 |
|
MD5 | 20b89c8c5f1e21ea5fdbe239a89efe62 |
|
BLAKE2b-256 | 5232efcd82cbed5da3da1cb4a39acb2ee87f956b2248b248fe8e6b2266ac6903 |