摘要:
Disclosed herein are an apparatus and method for page allocation in a many-to-one virtualization environment. The method may include determining whether a page fault interrupt is caused by page initialization for page allocation, sending an ownership change message to a node having ownership of the corresponding page when the page fault interrupt is determined to be caused by page initialization, and initializing the corresponding page upon receiving an ownership-change-processing-complete message.
摘要:
Disclosed herein are a synchronization method for improving the concurrent read performance of a critical section in distributed shared memory and an apparatus for the same. The synchronization method, performed by a distributed-shared-memory management apparatus in a physical node of a multi-node system, includes checking whether a lock is held on each node based on a read-write lock having lock variables for respective nodes in a distributed shared memory environment, acquiring a lock for a read operation or a write operation in consideration of whether a lock is held on each node, and releasing the lock based on the lock variables for the respective nodes when the read operation or the write operation is terminated.
摘要:
Disclosed herein are a distributed system and a method for operating the distributed system. The method for operating a distributed system including a server and multiple clients includes acquiring, by a first client of the multiple clients, a lock on a shared resource using a first table of the server and a second table of the client, and releasing, by the first client, a lock on the shared resource using the first table and the second table, wherein the first table is a lock (DSLock) table for storing information about a distributed shared resource, and the second table is a data structure (DSLock node) table for a lock request.
摘要:
Disclosed herein are a method and system for supporting user-level DMA I/O in a distributed file system environment. The system includes a DMA I/O library located in a user space and configured to process data-processing requests of an application using a control channel or a data channel, a distributed file system client process located in the user space and configured to process data while communicating with a remote distributed storage cluster, a VFS located in a kernel space, and a FUSE kernel module located in the kernel space, wherein the control channel is a path along which the DMA I/O library and the distributed file system client process are connected to each other through the VFS and the FUSE kernel module, and wherein the data channel is a path along which the DMA I/O library and the distributed file system client process are directly connected to each other.
摘要:
A communication system for supporting a cloud service comprising: a communication node connected to a network; an IDC connected to the network; a converged communication apparatus connected to the network and configured to interact with the IDC to integrally manage a resource stored in the IDC, and, upon a receipt of a request for the cloud service, to interact with the communication node to transfer the resource to a user who makes the cloud service request or a service provider which makes the cloud service request.
摘要:
Disclosed are a method and apparatus for reading data in a distributed file system in which a client and a server are separated. In the method and apparatus, a prefetching operation is performed to provide a continuous read function with high performance even in the distributed file system so that an optimum continuous read function of a local file system within the client may be effectively supported when an application program of the client requests continuous reading on a file (or chunk).
摘要:
There are provided a system and method for providing a virtual desktop service using a cache server. A system for providing a virtual desktop service according to the invention includes a host server configured to provide a virtual desktop service to a client terminal using a virtual machine, a distributed file system configured to store data for the virtual machine, and a cache server that is provided for each host server group having at least one host server, and performs a read process or a write process of data using physically separate caches when the read process or write process of the data is requested from the virtual machine in the host server.
摘要:
Disclosed herein are an apparatus and method for performing a fault-tolerant logical Hadamard gate operation. The apparatus is configured to perform a transversal logical Hadamard (H) operation of defining a logical quantum state and logical operators of a Hadamard-transformed logical qubit on a logical qubit of a prepared encoding flavor having an arbitrary quantum state, deform a boundary of the logical qubit while maintaining the logical quantum state using a boundary deformation technology, and perform an automatic flip of transforming a flavor of the logical qubit by flipping a rotated surface code while maintaining the logical quantum state and the definition of logical operators.
摘要:
Disclosed herein are an apparatus and method for detecting a malicious script. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program is configured to extract token-type features, each of which corresponds to a lexical unit, and tree-node-type features of an abstract syntax tree from an input script, to train two learning models to respectively learn two pieces of learning data that are generated in consideration of features extracted respectively from the token-type features and the node-type features as having the highest frequency, and to detect whether the script is a malicious script based on the result of ensemble-based malicious script detection performed for the script, which is acquired using an ensemble detection model generated from the two learning models.
摘要:
A method and a computation apparatus detecting cyber threats using a neural network through steps of: generating a learning model by performing machine learning on training data based on baseline data, converting a security event collected in real time into input data for the neural network, and determining, as an output corresponding to the input data based on the learning model, whether the security event is normal or threat are provided.