Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Application Level Network (ALN)

Handbook of Research on Developments in E-Health and Telemedicine: Technological and Social Perspectives
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. Most cases this ALN software entities use the P2P model, not the client/server one for the communication.
Published in Chapter:
A Proposed Scalable Environment for Medical Data Processing and Evaluation
Csaba Horváth (Budapest University of Technology and Economics, Hungary), Gábor Fodor (Budapest University of Technology and Economics, Hungary), Ferenc Kovács (Budapest University of Technology and Economics, Hungary), and Gábor Hosszú (Budapest University of Technology and Economics, Budapest, Hungary)
DOI: 10.4018/978-1-61520-670-4.ch028
Abstract
Cardiotocography (CTG) is widely used for antenatal monitoring and assessment of fetal well-being. CTG measurement methods based on the phonocardiographic principle and a home-monitoring system utilizing low-cost devices for data acquisition have been proposed and implemented by our research group. Assessment and storage of the recordings are carried out in medical centers, and their calculation capacity is no longer enough to evaluate the ever-increasing amount of incoming data on the constantly growing number of different assessment methods. The present work proposes a new method to create an easily scalable environment based on a P2P principle to share the workload and data between medical centers, while also representing a framework for discovering new correlations between evaluation method results and symptoms of fetal diseases.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Content-Sensitive Approach to Search in Shared File Storages
The applications, which are running in the hosts, can create a virtual network from their logical connections. This virtual network is also called overlay ( see later in the section ). The operations of such software entities are not able to understand without knowing their logical relations. The most cases this ALN software entities use the P2P model (see later in the section) , not the client/server (see later in the section)) one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Pattern-Based Identification in P2P Systems
The applications, which are running in the hosts, can create a virtual network from their logical connections. This virtual network is also called overlay. The operations of such software entities are not able to understand without knowing their logical relations. In most cases, these ALN software entities use the P2P model, not the client/server model for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
E-Collaboration Enhanced Host Security
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. Most cases of these ALN software entities use the P2P model, not the client/server model for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Network-Based Intrusion Detection
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. Most cases this ALN software entities use the P2P model, not the client/server one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Peer-to-Peer Methods for Operating System Security
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called an overlay network. The operations of such software entities are not understandable without knowing their logical relations. In most cases this ALN software entities use the P2P model (see below), not the client/server (see below) one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
A Novel Application of the P2P Technology for Intrusion Detection
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. ALN software entities usually use the P2P model, not the client/server model, for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Light-Weight Content-Based Search for File Sharing Systems
The applications, which are running in the hosts, can create a virtual network from their logical connections. This virtual network is also called overlay (see below). The operations of such software entities cannot be understood by one another without knowing their logical relations. In most cases, these ALN software entities use the P2P model (see below), not the client/server one (see below) for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Content-Based Searching in Group Communication Systems
Applications running in the hosts can create a virtual network from their logical connections. The virtual network is called overlay (see below). Such software entities are not able to communicate with each other without knowing their logical relations. The most cases this ALN software entities use the P2P model (see below), not the client/server (see below) one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Detection Based on P2P Software
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network ( see below ). The operations of such software entities are not able to understand without knowing their logical relations. The most cases this ALN software entities use the P2P model (see below) , not the client/server ( see below ) one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
On the Stability of Peer-to-Peer Networks in Real-World Environments
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called an overlay network. The operations of such software entities are not able to understand without knowing their logical relations. ALN software entities usually use the P2P model, not the client/server model for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. In most cases the ALN software entities use the P2P model, not the client/server one for the communication.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR