Latest version: v2.9.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Library for nonlinear optimization, wrapping many algorithms for global and local, constrained or unconstrained, optimization
No known vulnerabilities found
Has known vulnerabilities