Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Read (system call)

Known as: Read, Read() 
In modern POSIX compliant operating systems, a program that needs to access data from a file stored in a file system uses the read system call. The… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
As information security and privacy are primary concerns for most enterprises and individuals, a threat called Cross-VM (Virtual… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
This chapter discusses the relationship between the programming constructs and the underlying protocol implementations. Knowing… Expand
Highly Cited
2005
Highly Cited
2005
A main challenge for Network-on-Chip (NoC) design isto select a network architecture that suits a particular application.NNSE… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Highly Cited
2005
Highly Cited
2005
To counter zero-day worms that exploit software flaws such as buffer overflows, this end-point architecture uses source code… Expand
  • figure 1
  • figure 2
2004
2004
This paper describes a programming framework for clean construction of disk maintenance applications. They can use it to expose… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2000
2000
Clusters of SMP machines are frequently used toperform heavy parallel computations, and the concepts of multithreading have… Expand
  • table 1
  • figure 1
  • table 2
1998
1998
Giiord and others proposed an eeect typing discipline to delimit the scope of computational eeects within a program, while Moggi… Expand
1998
1998
  • T. Tsai
  • Digest of Papers. Twenty-Eighth Annual…
  • 1998
  • Corpus ID: 206666958
Presents a novel method of "indirect" software instrumentation to achieve fault tolerance at the application level. Error… Expand
  • figure 1
  • table 1
1992
1992
In a previous paper, we introduced a new method of le replica management designed to address the problems faced by mobile clients… Expand
1988
1988
A pseudo-device is a mechanism in the Sprite network file system that lets a user-level server process emulate a file or I/O… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2