Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
607,898
result(s) for
"internet software"
Sort by:
Game hacking : developing autonomous bots for online games
\"A hands-on guide to hacking computer games. Shows programmers how to dissect computer games and create bots to alter their gaming environment. Covers the basics of game hacking, including reverse engineering, assembly code analysis, programmatic memory manipulation, persistent hacks, responsive hacks, and code injection\"-- Provided by publisher.
Appropriability Mechanisms and the Platform Partnership Decision: Evidence from Enterprise Software
2013
We examine whether ownership of intellectual property rights (IPR) or downstream capabilities is effective in encouraging entry into markets complementary to a proprietary platform by preventing the platform owner from expropriating rents from start-ups. We study this question in the context of the software industry, an environment where evidence of the efficacy of IPR as a mechanism to appropriate the returns from innovation has been mixed. Entry, in our context, is measured by an independent software vendor's (ISV's) decision to become certified by a platform owner and produce applications compatible with the platform. We find that ISVs with a greater stock of formal IPR (such as patents and copyrights), and those with stronger downstream capabilities (as measured by trademarks and consulting services) are more likely to join the platform, suggesting that these mechanisms are effective in protecting ISVs from the threat of expropriation. We also find that the effects of IPR on the likelihood of partnership are greater when an ISV has weak downstream capabilities or when the threat of imitation is greater, such as when the markets served by the ISV are growing quickly.
This paper was accepted by Gérard P. Cachon, information systems.
Journal Article
Coding all-in-one
by
Minnick, Chris, author
,
Abraham, Nikhil, author
,
Burd, Barry, author
in
Computer programming.
,
Internet programming.
,
Technology.
2022
\"Adding some coding know-how to your skills can help launch a new career or bolster an old one. Coding All-in-One For Dummies offers an ideal starting place for learning the languages that make technology go. This edition gets you started with a helpful explanation of how coding works and how it's applied in the real-world before setting you on a path toward writing code for web building, mobile application development, and data analysis. Add coding to your skillset for your existing career, or begin the exciting transition into life as a professional developer--Dummies makes it easy.\" -- Description provided by publisher.
Qiita: rapid, web-enabled microbiome meta-analysis
by
DeReus, Jeff
,
Swafford, Austin D
,
Robbins-Pianka, Adam
in
Computer science
,
Crohn's disease
,
Feces
2018
Multi-omic insights into microbiome function and composition typically advance one study at a time. However, in order for relationships across studies to be fully understood, data must be aggregated into meta-analyses. This makes it possible to generate new hypotheses by finding features that are reproducible across biospecimens and data layers. Qiita dramatically accelerates such integration tasks in a web-based microbiome-comparison platform, which we demonstrate with Human Microbiome Project and Integrative Human Microbiome Project (iHMP) data.
Journal Article
Web applications with Elm : functional programming for the Web
Learn the basics of the Elm platform for web applications. This book covers the language as of version 0.18 and the most important libraries. After reading this book you will have an understanding what Elm can do for you. Also, you will be able to build on the example in the book to develop advanced web applications with Elm. What You'll Learn: Work with Elm and its development environment Learn the language and libraries in examples Use the Elm architecture to create applications with the Elm platform Put it all together with a sample application and explanation that covers the implementation details Who This Book Is For: Web developers new to Elm, with some experience in JavaScript recommended. This book is also for others curious about Elm and its potential beyond web development.
MIENTURNET: an interactive web tool for microRNA-target enrichment and network-based analysis
by
Paci, Paola
,
Licursi, Valerio
,
Fiscon, Giulia
in
Algorithms
,
Bioinformatics
,
Bioinformatics tool
2019
Background
miRNAs regulate the expression of several genes with one miRNA able to target multiple genes and with one gene able to be simultaneously targeted by more than one miRNA. Therefore, it has become indispensable to shorten the long list of miRNA-target interactions to put in the spotlight in order to gain insight into understanding the regulatory mechanism orchestrated by miRNAs in various cellular processes. A reasonable solution is certainly to prioritize miRNA-target interactions to maximize the effectiveness of the downstream analysis.
Results
We propose a new and easy-to-use web tool MIENTURNET (MicroRNA ENrichment TURned NETwork) that receives in input a list of miRNAs or mRNAs and tackles the problem of prioritizing miRNA-target interactions by performing a statistical analysis followed by a fully featured network-based visualization and analysis. The statistics is used to assess the significance of an over-representation of miRNA-target interactions and then MIENTURNET filters based on the statistical significance associated with each miRNA-target interaction. In addition, the holistic approach of the network theory is used to infer possible evidences of miRNA regulation by capturing emergent properties of the miRNA-target regulatory network that would be not evident through a pairwise analysis of the individual components.
Conclusion
MIENTURNET offers the possibility to consistently perform both statistical and network-based analyses by using only a single tool leading to a more effective prioritization of the miRNA-target interactions. This has the potential to avoid researchers without computational and informatics skills to navigate multiple websites and thus to independently investigate miRNA activity in every cellular process of interest in an easy and at the same time exhaustive way thanks to the intuitive web interface. The web application along with a well-documented and comprehensive user guide are freely available at
http://userver.bio.uniroma1.it/apps/mienturnet/
without any login requirement.
Journal Article
Cognitive internet of things : collaboration to optimize action
This book explores cognitive behavior among Internet of Things. Using a series of current and futuristic examples - appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more - the book covers use cases, technology and communication aspects of how machines will support individuals and organizations. This book examines the Cognitive Things covering a number of important questions: \" What are Cognitive Things? \" What applications can be driven from Cognitive Things - today and tomorrow? \" How will these Cognitive Things collaborate with each and other, with individuals and with organizations? \" What is the cognitive era? How is it different from the automation era? \" How will the Cognitive Things support or accelerate human problem solving? \" Which technical components make up cognitive behavior? \" How does it redistribute the work-load between humans and machines? \" What types of data can be collected from them and shared with external organizations? \" How do they recognize and authenticate authorized users? How is the data safeguarded from potential theft? Who owns the data and how are the data ownership rights enforced? Overall, Sathi explores ways in which Cognitive Things bring value to individuals as well as organizations and how to integrate the use of the devices into changing organizational structures. Case studies are used throughout to illustrate how innovators are already benefiting from the initial explosion of devices and data. Business executives, operational managers, and IT professionals will understand the fundamental changes required to fully benefit from cognitive technologies and how to utilize them for their own success.
PlotsOfData—A web app for visualizing data together with their summaries
by
Goedhart, Joachim
,
Postma, Marten
in
Applications programs
,
Cellular biology
,
Computational Biology - methods
2019
Reporting of the actual data in graphs and plots increases transparency and enables independent evaluation. On the other hand, data summaries are often used in graphs because they aid interpretation. To democratize state-of-the-art data visualization of raw data with a selection of statistical summaries, a freely available, open-source web app was written using R/shiny that uses the ggplot2 package for generating plots. Users can to choose how to display the data and which of the data summaries to add. In addition, the 95% confidence intervals (95CIs) can be added for visual inferences. By adjusting the visibility of the layers, the visualization of the raw data and their summaries can be tuned for optimal presentation and interpretation. The app is dubbed PlotsOfData and is available at https://huygens.science.uva.nl/PlotsOfData/.
Journal Article
A smart kid's guide to Internet privacy
by
Jakubiak, David J
in
Internet Safety measures Juvenile literature.
,
Internet and children Juvenile literature.
,
Spyware (Computer software) Juvenile literature.
2010
Offers kids suggestions on how to protect their identities online and how to avoid those who wish them harm.
Google, Facebook, Amazon, eBay: Is the Internet driving competition or market monopolization?
2014
This paper discusses the general characteristics of online markets from a competition theory perspective and the implications for competition policy. Three important Internet markets are analyzed in more detail: search engines, online auction platforms, and social networks. Given the high level of market concentration and the development of competition over time, we use our theoretical insights to examine whether (a) leading Internet platforms have non-temporary market power and, based on this analysis, (b) whether any specific market regulation beyond general competition law rules is warranted in these three online markets.
Journal Article