Latest version: v1.8.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Formulate optimization problems using sympy expressions and solve them using interfaces to third-party optimization software (e.g. GLPK).
No known vulnerabilities found
Has known vulnerabilities