Countries citing papers authored by Duncan A. Buell
Since
Specialization
Citations
This map shows the geographic impact of Duncan A. Buell's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Duncan A. Buell with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Duncan A. Buell more than expected).
This network shows the impact of papers produced by Duncan A. Buell. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Duncan A. Buell. The network helps show where Duncan A. Buell may publish in the future.
Co-authorship network of co-authors of Duncan A. Buell
This figure shows the co-authorship network connecting the top 25 collaborators of Duncan A. Buell.
A scholar is included among the top collaborators of Duncan A. Buell based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Duncan A. Buell. Duncan A. Buell is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Buell, Duncan A.. (2013). An Analysis of Long Lines in Richland County, South Carolina.3 indexed citations
4.
Buell, Duncan A., et al.. (2011). Auditing a DRE-based election in South Carolina. 11–11.2 indexed citations
5.
Gaj, Kris, et al.. (2005). High-Throughput Reconfigurable Computing: A Design Study of an IDEA Encryption Cryptosystem on the SRC-6e Reconfigurable Computer.. 681–686.3 indexed citations
6.
Buell, Duncan A., et al.. (2004). Experiences with a Reconfigurable Computer.. 100–108.4 indexed citations
7.
Buell, Duncan A., et al.. (2003). The Advanced Encryption Standard on the HC-36m Reconfigurable Computer.2 indexed citations
8.
Buell, Duncan A. & Ravi Sandhu. (2003). Identity management. IEEE Internet Computing.13 indexed citations
9.
Buell, Duncan A. & Joan Davis. (2002). Recon gurable Computing Applied to Problems in Communications Security.1 indexed citations
10.
Buell, Duncan A., Jeffrey M. Arnold, & W. Kleinfelder. (1996). Splash 2 : FPGAs in a custom computing machine. IEEE Computer Society Press eBooks.127 indexed citations
11.
Arnold, Jeffrey M. & Duncan A. Buell. (1994). VHDL programming on splash 2. 182–191.8 indexed citations
12.
Buell, Duncan A., et al.. (1994). Proceedings : IEEE Workshop on FPGAs for Custom Computing Machines, April 10-13, 1994, Napa Valley, California. IEEE Computer Society Press eBooks.5 indexed citations
Buell, Duncan A., Richard H. Hudson, & Kenneth S. Williams. (1984). Extension of a theorem of Cauchy and Jacobi. Journal of Number Theory. 19(3). 309–340.2 indexed citations
Buell, Duncan A. & Kenneth S. Williams. (1979). An Octic Reciprocity Law of Scholz Type. Proceedings of the American Mathematical Society. 77(3). 315–315.1 indexed citations
18.
Buell, Duncan A. & Kenneth S. Williams. (1979). An octic reciprocity law of Scholz type. Proceedings of the American Mathematical Society. 77(3). 315–318.4 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.