Project CLAI: Instrumenting the Command Line as a New Environment for AI Agents
January 31, 2020 ยท Entered Twilight ยท ๐ arXiv.org
"No code URL or promise found in abstract"
"Code repo scraped from project page (backfill)"
Evidence collected by the PWNC Scanner
Repo contents: .gitattributes, .github, .gitignore, .pylintrc, .travis.yml, AUTHORS.md, BuildDockerImage.sh, CODE_OF_CONDUCT.md, CONTRIBUTING.md, Dockerfile.CLAI, Dockerfile.CLAIServer, Dockerfile.Dev, Jenkinsfile, LICENSE.txt, Makefile, Makefile.gnu, Makefile.uss, README.md, RunDockerImage.sh, StopDockerImage.sh, anonymize.json, bin, clai, configPlugins.json, develop.py, develop.sh, docker-compose.yaml, docs, emulator.sh, install.py, install.sh, known-issues.md, my_agent, requirements.txt, requirements_dev.txt, requirements_emulator.txt, requirements_test.txt, requirements_utilities.txt, runLocalTests.sh, scripts, test, test_integration, uninstall.py, uninstall.sh, usersInstalled.json, utils
Found the code? Know the venue? Think something is wrong? Let us know!
๐ Similar Papers
In the same crypt โ Human-Computer Interaction