Folgen
Bill Roscoe (A.W. Roscoe)
Bill Roscoe (A.W. Roscoe)
Professor of Computer Science, Oxford University
Bestätigte E-Mail-Adresse bei cs.ox.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The Theory and Practice of Concurrency. international series in computer science
AW Roscoe
Prentice-Hall, 1997
2897*1997
A theory of communicating sequential processes
SD Brookes, CAR Hoare, AW Roscoe
Journal of the ACM (JACM) 31 (3), 560-599, 1984
18061984
Modelling and Analysis of Security Protocols: the CSP approach
P Ryan, S Schneider, M Goldsmith, G Lowe, AW Roscoe
Addison Wesley, 2001
8232001
Laws of programming
CAR Hoare, IJ Hayes, H Jifeng, CC Morgan, AW Roscoe, JW Sanders, ...
Communications of the ACM 30 (8), 672-686, 1987
5981987
Understanding concurrent systems
AW Roscoe
Springer-Verlag New York Inc, 2010
4782010
Model− checking CSP
B Roscoe
A classical Mind, Essays in honour of C.A.R. Hoare, 1994
4651994
A timed model for communicating sequential processes
A Roscoe, G Reed
Theoretical Computer Science 58, 1988
4231988
An improved failures model for communicating processes
SD Brookes, AW Roscoe
International Conference on Concurrency, 281-305, 1984
376*1984
A timed model for communicating sequential processes
GM Reed, AW Roscoe
Automata, Languages and Programming: 13th International Colloquium Rennes …, 1986
3561986
The laws of occam programming
AW Roscoe, CAR Hoare
Theoretical Computer Science 60 (2), 177-229, 1988
3371988
FDR3—A Modern Refinement Checker for CSP
T Gibson-Robinson, P Armstrong, A Boulgakov, AW Roscoe
TACAS, 2014
3152014
Using CSP to detect errors in the TMN protocol
G Lowe, AW Roscoe
Software Engineering, IEEE Transactions on 23 (10), 659-669, 1997
3061997
Modelling and verifying key-exchange protocols using CSP and FDR
AW Roscoe
Proceedings The Eighth IEEE Computer Security Foundations Workshop, 98-107, 1995
3041995
CSP and determinism in security modelling
AW Roscoe
Proceedings 1995 IEEE Symposium on Security and Privacy, 114-127, 1995
2961995
Reguard: finding reentrancy bugs in smart contracts
C Liu, H Liu, Z Cao, Z Chen, B Chen, B Roscoe
Proceedings of the 40th International Conference on Software Engineering …, 2018
256*2018
Star covering properties
EK Van Douwen, GM Reed, AW Roscoe, IJ Tree
Topology and its Applications 39 (1), 71-103, 1991
2501991
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
1992010
Concepts of digital topology
TY Kong, AW Roscoe, A Rosenfeld
Topology and its Applications 46, 1992
1871992
Hierarchical compression for model-checking CSP or how to check 10^20 dining philosophers for deadlock
AW Roscoe, PHB Gardiner, MH Goldsmith, JR Hulance, DM Jackson, ...
Tools and Algorithms for the Construction and Analysis of Systems, 133-152, 1995
1781995
Non-interference through determinism
AW Roscoe, JCP Woodcock, L Wulf
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
1731994
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20