This map shows the geographic impact of Bill Roscoe's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Bill Roscoe with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Bill Roscoe more than expected).
This network shows the impact of papers produced by Bill Roscoe. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Bill Roscoe. The network helps show where Bill Roscoe may publish in the future.
Co-authorship network of co-authors of Bill Roscoe
This figure shows the co-authorship network connecting the top 25 collaborators of Bill Roscoe.
A scholar is included among the top collaborators of Bill Roscoe based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Bill Roscoe. Bill Roscoe is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Roscoe, Bill. (2011). Authentication protocols based on low−bandwidth unspoofable channels: a comparative survey. Journal of Computer Security. 19.1 indexed citations
2.
Roscoe, Bill. (2007). Responsiveness and stable revivals. Formal Aspects of Computing. 19(3).3 indexed citations
3.
Roscoe, Bill. (2006). Verifying Statemate Statecharts Using CSP and FDR.2 indexed citations
4.
Roscoe, Bill. (2005). Confluence thanks to extensional determinism.1 indexed citations
5.
Roscoe, Bill. (2004). Responsiveness of Interoperating Components. Formal Aspects of Computing. 16.1 indexed citations
6.
Roscoe, Bill. (2003). On the expressive power of CSP refinement. Formal Aspects of Computing. 17.8 indexed citations
7.
Roscoe, Bill. (2003). Compiling Statemate Statecharts into CSP and verifying them using FDR.4 indexed citations
8.
Creese, Sadie, Michael Goldsmith, & Bill Roscoe. (2003). The attacker in ubiquitous computing environments: formalising the threat model.20 indexed citations
9.
Ryan, Peter Y. A., Steve Schneider, Michael Goldsmith, Gavin Lowe, & Bill Roscoe. (2001). Modelling and analysis of security protocols. View.153 indexed citations
10.
Lazić, Ranko & Bill Roscoe. (1999). Data Independence with Generalised Predicate Symbols.. Parallel and Distributed Processing Techniques and Applications. 319–326.8 indexed citations
11.
Roscoe, Bill. (1997). The perfect spy for model−checking crypto−protocols.21 indexed citations
12.
Roscoe, Bill. (1996). Intensional specifications of security protocols.3 indexed citations
13.
Roscoe, Bill. (1994). Non−interference through determinism. Journal of Computer Security. 4.2 indexed citations
Roscoe, Bill. (1988). The laws of occam programming. Theoretical Computer Science. 60.11 indexed citations
16.
Roscoe, Bill. (1988). A timed model for communicating sequential processes. Theoretical Computer Science. 58.5 indexed citations
17.
Roscoe, Bill, et al.. (1986). Human factors in annunciator/alarm systems: annunciator experiment plan I. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information).3 indexed citations
18.
Roscoe, Bill. (1985). Deadlock analysis in networks of communicating processes. Distributed Computing. 13(4).1 indexed citations
19.
Roscoe, Bill. (1985). Characterisations of simply−connected finite polyhedra in 3−space. Bulletin of the London Mathematical Society.2 indexed citations
20.
Roscoe, Bill. (1981). A theory of communicating sequential processes. Journal of the ACM.16 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.