• Stars
    star
    20
  • Rank 1,121,974 (Top 23 %)
  • Language
    Scala
  • License
    Other
  • Created over 8 years ago
  • Updated over 6 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Akka based id generation service with the same algorithm with Twitter Snowflake

More Repositories

1

akka-cluster-custom-downing

akka-cluster-custom-downing provides configurable auto-downing strategy you can choose based on your distributed application design.
Scala
163
star
2

node-openjtalk

Japanese text-to-speech engine binding for NodeJS
C++
26
star
3

papers-i-read

Jupyter Notebook
23
star
4

learning-deep-learning-from-scratch

coding work of deep-learning-from-scratch from Oreilly https://github.com/oreilly-japan/deep-learning-from-scratch
Python
15
star
5

deepvoice3-tensorflow

A tensorflow based implementation of DeepVoice3 https://arxiv.org/abs/1710.07654
Python
13
star
6

reactive-zookeeper

Let-it-crash style ZooKeeper client based on Akka actor
Scala
12
star
7

akka-persistence-s3

Amazon S3 Snapshot Store Plugin for Akka Persistence
Scala
8
star
8

wavenet

An implementation of WaveNet: A Generative Model for Raw Audio https://arxiv.org/abs/1609.03499
Python
8
star
9

pdf2speech

convert PDF to mp3 audio with text-to-speech engine
JavaScript
8
star
10

blog

ブログの下書き
7
star
11

aws-aware-akka-cluster-custom-downing

AWS cloud aware Akka cluster downing strategy customization
Scala
3
star
12

vqvae

Python
2
star
13

kafka-book-scala

Learning Kafka The Definitive Guide from O'Reilly
Scala
2
star
14

Oreilly-Learning-TensorFlow

Jupyter Notebook
1
star
15

js_pitch_sample_code

2014/9/5にLIG社で行われた勉強会の資料中のサンプルコード
JavaScript
1
star
16

akka-cluster-aws-ec2-metadata-replication

Amazon AWS EC2 instance metadata extension for Akka cluster membership
Scala
1
star
17

distributed-database-study

分散データベース勉強会資料
HTML
1
star
18

Probabilistic-Programming-and-Bayesian-Methods-for-Hackers

my playground for "Probabilistic Programming and Bayesian Methods for Hackers" book
Jupyter Notebook
1
star
19

backpressured-processmanager-example

Example applying backpressure to ProcessManager that execute long running process to prevent process overflow with Akka actor & stream
Scala
1
star