Abstract:
Provided herein is a distributed file system including a meta data server configured to store and manage meta data of a file; and a data server configured to store and manage data and attribute information of the file, wherein, in response to a writing request from a client, the meta data server stores data requested to be changed in a delta chunk of a read-only snapshot file, and connects the original file and the read-only snapshot file in an inode structure.
Abstract:
The present invention relates to operating a parity chunk, and a parity chunk operating method, in an environment dividing data of a file by a chunk unit, constituting a stripe by calculating a parity for a failure recovery, dispersely storing a data chunk and a parity chunk included in the stripe in multiple data servers, comprising the steps of: storing a data chunk and a parity chunk of a stripe structure in data servers; generating a partial parity using a previous data chunk in the storing step of a update data chunk by the data server storing the data chunk; and transmitting a partial parity to the data server storing the parity chunk, and a data server apparatus for supporting the same are disclosed.
Abstract:
A method of moving a magic qubit in logical qubit arrangement architecture based on a checkerboard may include generating a plurality of distilled magic qubits necessary for a predetermined logic operation through a magic state distiller, storing the plurality of distilled magic qubits in a magic qubit repository, primarily moving the stored magic qubit to an area adjacent to a logical qubit block corresponding to a destination through an external bus and an internal bus, and secondarily moving the magic qubit from the area adjacent to the logical qubit block to the destination within the logical qubit block through a temporary bus.
Abstract:
Disclosed herein a method and apparatus for detecting a malicious code based on an assembly language model. According to an embodiment of the present disclosure, there is provided a method for detecting a malicious code. The method comprising: generating an instruction code sequence by converting an input file, for which a malicious code is to be detected, into an assembly code; embedding the instruction code sequence by using a prelearned assembly language model for instruction code embedding and outputting an embedding result of the instruction code sequence; and detecting whether or not the input file is a malicious code, by using a prelearned malicious code classification model with the embedding result as an input.
Abstract:
Provided herein is a filing system creating and deleting apparatus, comprising an available inode pool in which inodes are to be stored, a file system object creating processor creating an inode allocating request signal in response to a file system creating request from an external resource, an inode allocating processor allocating at least one of inodes stored in the available inode pool in response to the inode allocating request signal, a file system object deleting processor creating an inode deallocating request signal in response to a file system deleting request from the external resource, an inode deleting thread collecting inodes requested to be deleted corresponding to the file system deleting request, and an inode deallocating processor deallocating the inode requested to be deleted from the inode deleting thread, wherein a number of inodes stored in the available inode pool is limited to no more than a maximum inode number in the available inode pool, and the inode requested to be deleted creates and deletes a file system stored in the available inode pool when the number of inodes stored in the available inode pool is smaller than the maximum inode number in the available inode pool.
Abstract:
Provided is a device and a method for providing network virtualization, in which a method of dynamically mapping a processor includes extracting tenant information on a tenant and information on a virtual machine (VM) generated by a Cloud OS or controller; classifying virtual machine queues (VMQs) and processors to process the VMQs by tenant, and dynamically mapping the VMQs onto the processors by tenant.
Abstract:
A quantum computing system according to an embodiment of the present disclosure includes a logical qubit quantum compiler configured to receive a specific quantum code and to output a quantum kernel based on a quantum basic operation command, a logical qubit quantum kernel executor configured to generate a plurality of physical qubit quantum commands based on the quantum kernel, and a physical qubit quantum system configured to receive the physical qubit quantum command and to perform a physical quantum operation.
Abstract:
A file system for supporting a time-series analysis on data of a previous point in time and an operating method thereof. The file system includes a storage server configured to store input data, and provide data suitable for a data request among the stored data, and an analysis server configured to receive the data from the storage server according to an analysis request, and perform an analysis on the received data, and the storage server assigns a time-series attribute to data together with the data, and stores the time-series attribute together with the data.
Abstract:
An apparatus and a method for mapping of a tenant based dynamic processor, which classify virtual machine multi queues and processors processing the corresponding multi queues for each tenant that one or more virtual machines are belonged to, dynamically map the virtual machine multi queues that belong to the corresponding tenant to multi processors that belong to the corresponding tenant based on total usages of a network and a processor for each tenant to provide network virtualization to assure network traffic processing of virtual machines, that belong to the same tenant not to be influenced by congestion of network traffic that belongs to another tenant.
Abstract:
Provided is an interoperation method of a network device performed by a computing device including a cloud operating system (OS) in a cloud environment. An interoperation method of a network device based on a plug-in and performed by a computing device including a cloud OS includes acquiring control information of a different type of network device not supporting an instruction of the plug-in among network devices connected to the computing device, receiving an instruction from the cloud OS, converting the received instruction into an instruction for the network device based on the acquired control information, and providing the converted instruction to the network device. Therefore, the cloud OS can cause the computing device to simultaneously interoperate with several network devices through the plug-in.