default search action
A. W. Roscoe 0001
Person information
- affiliation: University of Oxford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe, Filipe Arruda:
A refinement-based approach to safe smart contract deployment and evolution. Softw. Syst. Model. 23(3): 657-693 (2024) - [c88]Gabriel Leite, Filipe Arruda, Pedro Antonino, Augusto Sampaio, A. W. Roscoe:
Extracting Formal Smart-Contract Specifications from Natural Language with LLMs. FACS 2024: 109-126 - [c87]Juliandson Ferreira, Pedro Antonino, Augusto Sampaio, A. W. Roscoe, Filipe Arruda:
Trusted Deployer: A Tool for Safe Creation and Upgrade of Ethereum Smart Contracts. SBMF 2024: 194-204 - 2023
- [c86]A. W. Roscoe, Pedro Antonino, Jonathan Lawrence:
The Consensus Machine: Formalising Consensus in the Presence of Malign Agents. Theories of Programming and Formal Methods 2023: 136-162 - [c85]Ivo Maffei, A. W. Roscoe:
Optimally-Fair Multi-party Exchange Without Trusted Parties. ESORICS (1) 2023: 313-333 - [c84]Ivo Maffei, Andrew William Roscoe:
Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding. FC (1) 2023: 94-111 - 2022
- [j40]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Approximate verification of concurrent systems using token structures and invariants. Int. J. Softw. Tools Technol. Transf. 24(4): 613-633 (2022) - [c83]Han Liu, Huafeng Zhang, Bangdao Chen, A. W. Roscoe:
Committable: A Decentralised and Trustless Open-Source Protocol. ICBC 2022: 1-2 - [c82]Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe:
Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts. SEFM 2022: 227-243 - [i16]Ivo Maffei, A. W. Roscoe:
Delay Encryption by Cubing. CoRR abs/2205.05594 (2022) - [i15]Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe:
Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts. CoRR abs/2205.07529 (2022) - 2021
- [c81]Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - [c80]Pedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe:
Guardian: Symbolic Validation of Orderliness in SGX Enclaves. CCSW 2021: 111-123 - [c79]Pedro Antonino, A. W. Roscoe:
Solidifier: bounded model checking solidity using lazy contract deployment and precise memory modelling. SAC 2021: 1788-1797 - [p5]Stephen D. Brookes, A. W. Roscoe:
CSP: A Practical Process Algebra. Theories of Programming 2021: 187-222 - [i14]Pedro Antonino, Wojciech Aleksander Woloszyn, A. W. Roscoe:
Guardian: symbolic validation of orderliness in SGX enclaves. CoRR abs/2105.05962 (2021) - [i13]Han Liu, Pedro Antonino, Zhiqiang Yang, Chao Liu, A. W. Roscoe:
Trusted And Confidential Program Analysis. CoRR abs/2112.00346 (2021) - 2020
- [j39]David Mestel, A. W. Roscoe:
Translating between models of concurrency. Acta Informatica 57(3-5): 403-438 (2020) - [c78]Linda Guiga, A. W. Roscoe:
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM. ICISSP 2020: 611-618 - [i12]Pedro Antonino, A. W. Roscoe:
Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity. CoRR abs/2002.02710 (2020)
2010 – 2019
- 2019
- [j38]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Efficient verification of concurrent systems using local-analysis-based approximations and SAT solving. Formal Aspects Comput. 31(3): 375-409 (2019) - [j37]Márcio Cornélio, A. W. Roscoe:
Guest editorial for the special issue from the 18th Brazilian Symposium on Formal Methods (SBMF 2015). Sci. Comput. Program. 181: 82-83 (2019) - [j36]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Efficient Verification of Concurrent Systems Using Synchronisation Analysis and SAT/SMT Solving. ACM Trans. Softw. Eng. Methodol. 28(3): 18:1-18:43 (2019) - [c77]Andrew William Roscoe, Lei Wang:
Key Agreement via Protocols. Foundations of Security, Protocols, and Equational Reasoning 2019: 156-166 - [i11]David Mestel, A. W. Roscoe:
Translating between models of concurrency. CoRR abs/1904.09875 (2019) - [i10]Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. IACR Cryptol. ePrint Arch. 2019: 1281 (2019) - 2018
- [c76]Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. ICSE (Companion Volume) 2018: 65-68 - [p4]Rance Cleaveland, A. W. Roscoe, Scott A. Smolka:
Process Algebra and Model Checking. Handbook of Model Checking 2018: 1149-1195 - [e5]Klaus Havelund, Jan Peleska, Bill Roscoe, Erik P. de Vink:
Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 15-17, 2018, Proceedings. Lecture Notes in Computer Science 10951, Springer 2018, ISBN 978-3-319-95581-0 [contents] - [i9]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i8]Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. CoRR abs/1807.11609 (2018) - 2017
- [c75]Jantje A. M. Silomon, A. W. Roscoe:
Software and Malware Capabilities: Opinions on (Inter)national Security. CW 2017: 96-102 - [c74]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Checking Static Properties Using Conservative SAT Approximations for Reachability. SBMF 2017: 233-250 - [c73]A. W. Roscoe, Peter Y. A. Ryan:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. Security Protocols Workshop 2017: 278-297 - [c72]Pedro R. G. Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
The Automatic Detection of Token Structures and Invariants Using SAT Checking. TACAS (2) 2017: 249-265 - 2016
- [j35]Alexandre Boulgakov, Thomas Gibson-Robinson, A. W. Roscoe:
Computing maximal weak and other bisimulations. Formal Aspects Comput. 28(3): 381-407 (2016) - [j34]Marcel Vinícius Medeiros Oliveira, Pedro Antonino, Rodrigo Ramos, Augusto Sampaio, Alexandre Cabral Mota, A. W. Roscoe:
Rigorous development of component-based systems using component metadata and patterns. Formal Aspects Comput. 28(6): 937-1004 (2016) - [j33]Thomas Gibson-Robinson, Philip J. Armstrong, Alexandre Boulgakov, A. W. Roscoe:
FDR3: a parallel refinement checker for CSP. Int. J. Softw. Tools Technol. Transf. 18(2): 149-167 (2016) - [c71]Pedro R. G. Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Tighter Reachability Criteria for Deadlock-Freedom Analysis. FM 2016: 43-59 - [c70]Pedro Antonino, Thomas Gibson-Robinson, A. W. Roscoe:
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving. IFM 2016: 345-360 - [c69]A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols. Security Protocols Workshop 2016: 181-197 - [c68]A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). Security Protocols Workshop 2016: 198-205 - [c67]David Mestel, A. W. Roscoe:
Reducing Complex CSP Models to Traces via Priority. MFPS 2016: 237-252 - [e4]Márcio Cornélio, Bill Roscoe:
Formal Methods: Foundations and Applications - 18th Brazilian Symposium, SBMF 2015, Belo Horizonte, Brazil, September 21-22, 2015, Proceedings. Lecture Notes in Computer Science 9526, Springer 2016, ISBN 978-3-319-29472-8 [contents] - [i7]A. W. Roscoe:
Card games as pointer structures: case studies in mobile CSP modelling. CoRR abs/1611.08418 (2016) - 2015
- [c66]Thomas Gibson-Robinson, Henri Hansen, A. W. Roscoe, Xu Wang:
Practical Partial Order Reduction for CSP. NFM 2015: 188-203 - [c65]Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan:
Information Leakage Due to Revealing Randomly Selected Bits. Security Protocols Workshop 2015: 325-341 - [c64]A. W. Roscoe:
The Expressiveness of CSP With Priority. MFPS 2015: 387-401 - 2014
- [c63]Alexandre Boulgakov, Thomas Gibson-Robinson, A. W. Roscoe:
Computing Maximal Bisimulations. ICFEM 2014: 11-26 - [c62]Thomas Gibson-Robinson, Philip J. Armstrong, Alexandre Boulgakov, A. W. Roscoe:
FDR3 - A Modern Refinement Checker for CSP. TACAS 2014: 187-201 - [p3]Philip J. Armstrong, Gavin Lowe, Joël Ouaknine, Bill Roscoe:
Model checking Timed CSP. HOWARD-60 2014: 13-33 - 2013
- [j32]Joël Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell:
A Static Analysis Framework for Livelock Freedom in CSP. Log. Methods Comput. Sci. 9(3) (2013) - [j31]A. W. Roscoe, Jian Huang:
Checking noninterference in Timed CSP. Formal Aspects Comput. 25(1): 3-35 (2013) - [j30]Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1): 30-38 (2013) - [j29]Bangdao Chen, Long Hoang Nguyen, A. W. Roscoe:
Reverse Authentication in Financial Transactions and Identity Management. Mob. Networks Appl. 18(5): 712-727 (2013) - [c61]A. W. Roscoe, Philippa J. Hopcroft:
Slow Abstraction via Priority. Theories of Programming and Formal Methods 2013: 326-345 - 2012
- [j28]Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham, Qinghua Wang, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. J. Networks 7(9): 1400-1406 (2012) - [j27]Hristina Palikareva, Joël Ouaknine, A. W. Roscoe:
SAT-solving in CSP trace refinement. Sci. Comput. Program. 77(10-11): 1178-1197 (2012) - [c60]Philip J. Armstrong, Michael Goldsmith, Gavin Lowe, Joël Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell:
Recent Developments in FDR. CAV 2012: 699-704 - [c59]Long Hoang Nguyen, A. W. Roscoe:
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication. FSE 2012: 326-345 - [c58]Xin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe:
Bootstrapping body sensor networks using human controlled LED-camera channels. ICITST 2012: 433-438 - [c57]Xin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe:
User interactive Internet of things privacy preserved access control. ICITST 2012: 597-602 - [c56]Bangdao Chen, A. W. Roscoe:
Social Networks for Importing and Exporting Security. Monterey Workshop 2012: 132-147 - [i6]Long Hoang Nguyen, Andrew William Roscoe:
Simple construction of epsilon-biased distribution. IACR Cryptol. ePrint Arch. 2012: 429 (2012) - 2011
- [j26]Long Hoang Nguyen, A. W. Roscoe:
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. J. Comput. Secur. 19(1): 139-201 (2011) - [c55]Joël Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell:
Static Livelock Analysis in CSP. CONCUR 2011: 389-403 - [c54]Xin Huang, Qinghua Wang, Chen Bangdao, Andrew Markham, Riku Jäntti, A. W. Roscoe:
Body sensor network key distribution using human interactive channels. ISABEL 2011: 143:1-143:5 - [c53]Bangdao Chen, Long Hoang Nguyen, Andrew William Roscoe:
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. Security Protocols Workshop 2011: 115-125 - [c52]Chen Bangdao, A. W. Roscoe:
Mobile Electronic Identity: Securing Payment on Mobile Phones. WISTP 2011: 22-37 - [r1]A. W. Roscoe, Jim Davies:
CSP (Communicating Sequential Processes). Encyclopedia of Parallel Computing 2011: 478-482 - [i5]Long Hoang Nguyen, Andrew William Roscoe:
On the construction of digest functions for manual authentication protocols. IACR Cryptol. ePrint Arch. 2011: 116 (2011) - 2010
- [b2]A. W. Roscoe:
Understanding Concurrent Systems. Texts in Computer Science, Springer 2010, ISBN 978-1-84882-257-3, pp. I-XVIII, 1-527 - [c51]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Security and Usability: Analysis and Evaluation. ARES 2010: 275-282 - [c50]Chen Bangdao, A. W. Roscoe, Ronald Kainda, Long Hoang Nguyen:
The Missing Link: Human Interactive Security Protocols in Mobile Payment. IWSEC (Short Papers) 2010: 94-109 - [c49]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Two heads are better than one: security and usability of device associations in group scenarios. SOUPS 2010 - [c48]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. WISTP 2010: 308-315 - [p2]Clifford B. Jones, A. W. Roscoe:
Insight, Inspiration and Collaboration. Reflections on the Work of C. A. R. Hoare 2010: 1-32 - [p1]A. W. Roscoe:
CSP is Expressive Enough for π. Reflections on the Work of C. A. R. Hoare 2010: 371-404 - [e3]A. W. Roscoe, Clifford B. Jones, Kenneth R. Wood:
Reflections on the Work of C. A. R. Hoare. Springer 2010, ISBN 978-1-84882-911-4 [contents] - [i4]Long Hoang Nguyen, A. W. Roscoe:
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. IACR Cryptol. ePrint Arch. 2010: 206 (2010)
2000 – 2009
- 2009
- [j25]Hristina Palikareva, Joël Ouaknine, Bill Roscoe:
Faster FDR Counterexample Generation Using SAT-Solving. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - [j24]A. W. Roscoe:
Revivals, stuckness and the hierarchy of CSP models. J. Log. Algebraic Methods Program. 78(3): 163-190 (2009) - [c47]A. W. Roscoe, Philip J. Armstrong, Pragyesh:
Local Search in Model Checking. ATVA 2009: 22-38 - [c46]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Usability and security of out-of-band channels in secure device pairing protocols. SOUPS 2009 - [e2]Michael Goldsmith, Bill Roscoe:
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007. Electronic Notes in Theoretical Computer Science 250(1), Elsevier 2009 [contents] - [i3]Long Hoang Nguyen, A. W. Roscoe:
Separating two roles of hashing in one-way message authentication. IACR Cryptol. ePrint Arch. 2009: 3 (2009) - [i2]Long Hoang Nguyen, A. W. Roscoe:
Efficient group authentication protocols based on human interaction. IACR Cryptol. ePrint Arch. 2009: 150 (2009) - [i1]Long Hoang Nguyen, A. W. Roscoe:
New combinatorial bounds for universal hash functions. IACR Cryptol. ePrint Arch. 2009: 153 (2009) - 2008
- [j23]Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, James Worrell:
Nets with Tokens which Carry Data. Fundam. Informaticae 88(3): 251-274 (2008) - [j22]Long Hoang Nguyen, A. W. Roscoe:
Authenticating ad hoc networks by comparison of short digests. Inf. Comput. 206(2-4): 250-271 (2008) - [c45]Nick Moffat, Michael Goldsmith, Bill Roscoe:
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking. ICFEM 2008: 258-277 - [c44]A. W. Roscoe:
The Three Platonic Models of Divergence-Strict CSP. ICTAC 2008: 23-49 - 2007
- [j21]Joy N. Reed, A. W. Roscoe, Jane E. Sinclair:
Responsiveness and stable revivals. Formal Aspects Comput. 19(3): 303-319 (2007) - [c43]Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, James Worrell:
Nets with Tokens Which Carry Data. ICATPN 2007: 301-320 - [c42]Michael Goldsmith, Bill Roscoe:
Preface. AVoCS 2007: 1-2 - 2006
- [c41]A. W. Roscoe, Zhenzhong Wu:
Verifying Statemate Statecharts Using CSP and FDR. ICFEM 2006: 324-341 - [c40]Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao:
Bootstrapping multi-party ad-hoc security. SAC 2006: 369-375 - [c39]Jian Huang, A. W. Roscoe:
Extending noninterference properties to the timed world. SAC 2006: 376-383 - 2005
- [j20]A. W. Roscoe:
On the expressive power of CSP refinement. Formal Aspects Comput. 17(2): 93-112 (2005) - [c38]Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. SPC 2005: 119-133 - [c37]Lee Momtahan, Andrew P. Martin, A. W. Roscoe:
A Taxonomy of Web Services Using CSP. WLFM@FM 2005: 71-87 - [c36]Joy N. Reed, A. W. Roscoe, Jane E. Sinclair:
Machine-Verifiable Responsiveness. AVoCS 2005: 185-200 - [c35]A. W. Roscoe:
Confluence Thanks to Extensional Determinism. APC 25 2005: 305-309 - [c34]E. Kleiner, A. W. Roscoe:
On the Relationship Between Web Services Security and Traditional Protocols. MFPS 2005: 583-603 - 2004
- [j19]Joy N. Reed, Jane E. Sinclair, A. W. Roscoe:
Responsiveness of interoperating components. Formal Aspects Comput. 16(4): 394-411 (2004) - [j18]Philippa J. Broadfoot, A. W. Roscoe:
Embedding agents within the intruder to detect parallel attacks. J. Comput. Secur. 12(3-4): 379-408 (2004) - [j17]Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe:
On model checking data-independent systems with arrays without reset. Theory Pract. Log. Program. 4(5-6): 659-693 (2004) - [c33]A. W. Roscoe:
Seeing Beyond Divergence. 25 Years Communicating Sequential Processes 2004: 15-35 - [c32]Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe:
On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations. 25 Years Communicating Sequential Processes 2004: 275-291 - [c31]Xu Wang, A. W. Roscoe, Ranko Lazic:
Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption. IFM 2004: 247-266 - [c30]Ranko Lazic, Thomas Christopher Newcomb, Bill Roscoe:
Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting. INFINITY 2004: 61-86 - 2003
- [c29]Michael Goldsmith, Nick Moffat, Bill Roscoe, Tim Whitworth, Irfan Zakiuddin:
Watchdog Transformations for Property-Oriented Model-Checking. FME 2003: 600-616 - [c28]Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. SPC 2003: 116-129 - 2002
- [c27]Philippa J. Broadfoot, A. W. Roscoe:
Capturing Parallel Attacks within the Data Independence Framework. CSFW 2002: 147-159 - 2000
- [c26]Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe:
Automating Data Independence. ESORICS 2000: 175-190 - [c25]S. J. Creese, A. W. Roscoe:
Data Independent Induction over Structured Networks. PDPTA 2000 - [c24]Philippa J. Broadfoot, A. W. Roscoe:
Tutorial on FDR and Its Applications. SPIN 2000: 322 - [c23]A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe:
Data independent verification of crypto-protocols. MFCSIT 2000: 359
1990 – 1999
- 1999
- [j16]A. W. Roscoe, Philippa J. Broadfoot:
Proving Security Protocols with Model Checkers by Data Independence Techniques. J. Comput. Secur. 7(1): 147-190 (1999) - [j15]George M. Reed, A. W. Roscoe:
The Timed Failures-Stability Model for CSP. Theor. Comput. Sci. 211(1-2): 85-127 (1999) - [c22]A. W. Roscoe, M. H. Goldsmith:
What Is Intransitive Noninterference? CSFW 1999: 228-238 - [c21]S. J. Creese, A. W. Roscoe:
Verifying an infinite family of inductions simultaneously using data independence and FDR. FORTE 1999: 437-452 - [c20]Ranko Lazic, Bill Roscoe:
Data Independence with Generalised Predicate Symbols. PDPTA 1999: 319-326 - [c19]S. J. Creese, A. W. Roscoe:
Formal Verification of Arbitrary Network Topologies. PDPTA 1999: 1033-1039 - 1998
- [c18]A. W. Roscoe:
Proving Security Protocols with Model Checkers by Data Independence Techniques. CSFW 1998: 84-95 - 1997
- [j14]Gavin Lowe, A. W. Roscoe:
Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. Software Eng. 23(10): 659-669 (1997) - 1996
- [j13]A. W. Roscoe, Jim Woodcock, Lars Wulf:
Non-interference through Determinism. J. Comput. Secur. 4(1): 27-54 (1996) - [c17]A. W. Roscoe:
Intensional specifications of security protocols. CSFW 1996: 28-38 - 1995
- [j12]Michael W. Mislove, A. W. Roscoe, Steve A. Schneider:
Fixed Points Without Completeness. Theor. Comput. Sci. 138(2): 273-314 (1995) - [c16]A. W. Roscoe, Lars Wulf:
Composing and decomposing systems under security properties. CSFW 1995: 9-15 - [c15]A. W. Roscoe:
Modelling and verifying key-exchange protocols using CSP and FDR. CSFW 1995: 98-107 - [c14]A. W. Roscoe:
CSP and determinism in security modelling. S&P 1995: 114-127 - [c13]A. W. Roscoe, Paul H. B. Gardiner, Michael Goldsmith, J. R. Hulance, D. M. Jackson, J. Bryan Scattergood:
Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock. TACAS 1995: 133-152 - 1994
- [c12]A. W. Roscoe, Jim Woodcock, Lars Wulf:
Non-Interference Through Determinism. ESORICS 1994: 33-53 - 1993
- [j11]A. W. Roscoe:
Unbounded Non-Determinism in CSP. J. Log. Comput. 3(2): 131-172 (1993) - 1992
- [j10]A. W. Roscoe:
An Alternative Order for the Failures Model. J. Log. Comput. 2(5): 557-577 (1992) - 1991
- [j9]Stephen D. Brookes, A. W. Roscoe:
Deadlock Analysis in Networks of Communicating Processes. Distributed Comput. 4: 209-230 (1991) - [c11]Steve A. Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe:
Timed CSP: Theory and Practice. REX Workshop 1991: 640-675
1980 – 1989
- 1989
- [c10]George M. Reed, A. W. Roscoe:
Analysing TMFS: a Study of Nondeterminism in Real-Time Concurrency. Concurrency: Theory, Language, And Architecture 1989: 36-63 - [c9]A. W. Roscoe, Geoff Barrett:
Unbounded Nondeterminism in CSP. Mathematical Foundations of Programming Semantics 1989: 160-193 - 1988
- [j8]T. Yung Kong, David M. Mount, A. W. Roscoe:
The Decomposition of a Rectangle into Rectangles of Minimal Perimeter. SIAM J. Comput. 17(6): 1215-1231 (1988) - [j7]George M. Reed, A. W. Roscoe:
A Timed Model for Communicating Sequential Processes. Theor. Comput. Sci. 58: 249-261 (1988) - [j6]A. W. Roscoe, C. A. R. Hoare:
The Laws of Occam Programming. Theor. Comput. Sci. 60: 177-229 (1988) - 1987
- [j5]C. A. R. Hoare, Ian J. Hayes, Jifeng He, Carroll Morgan, A. W. Roscoe, Jeff W. Sanders, Ib Holm Sørensen, J. Michael Spivey, Bernard Sufrin:
Laws of Programming. Commun. ACM 30(8): 672-686 (1987) - [j4]A. W. Roscoe, Naiem Dathi:
The Pursuit of Deadlock freedom. Inf. Comput. 75(3): 289-327 (1987) - [c8]George M. Reed, A. W. Roscoe:
Metric Spaces as Models for Real-Time Concurrency. MFPS 1987: 331-343 - 1986
- [c7]George M. Reed, A. W. Roscoe:
A Timed Model for Communicating Sequential Processes. ICALP 1986: 314-323 - 1985
- [j3]T. Yung Kong, A. W. Roscoe:
Continuous analogs of axiomatized digital surfaces. Comput. Vis. Graph. Image Process. 29(1): 60-86 (1985) - [j2]T. Yung Kong, A. W. Roscoe:
A theory of binary digital pictures. Comput. Vis. Graph. Image Process. 32(2): 221-243 (1985) - [e1]Stephen D. Brookes, A. W. Roscoe, Glynn Winskel:
Seminar on Concurrency, Carnegie-Mellon University, Pittsburg, PA, USA, July 9-11, 1984. Lecture Notes in Computer Science 197, Springer 1985, ISBN 3-540-15670-4 [contents] - 1984
- [j1]Stephen D. Brookes, C. A. R. Hoare, A. W. Roscoe:
A Theory of Communicating Sequential Processes. J. ACM 31(3): 560-599 (1984) - [c6]Stephen D. Brookes, A. W. Roscoe:
An Improved Failures Model for Communicating Processes. Seminar on Concurrency 1984: 281-305 - [c5]A. W. Roscoe:
Denotational Semantics for occam. Seminar on Concurrency 1984: 306-329 - [c4]C. A. R. Hoare, A. W. Roscoe:
Programs as Executable Predicates. FGCS 1984: 220-228 - [c3]Stephen D. Brookes, A. W. Roscoe:
Deadlock Analysis in Networks of Communicating Processes. Logics and Models of Concurrent Systems 1984: 305-323 - 1983
- [c2]A. W. Roscoe:
Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification. The Analysis of Concurrent Systems 1983: 103-109 - [c1]A. W. Roscoe:
A CSP solution to the "trains" problem. The Analysis of Concurrent Systems 1983: 384-388 - 1982
- [b1]Andrew William Roscoe:
A mathematical theory of communicating processes. University of Oxford, UK, 1982
Coauthor Index
aka: Pedro Antonino
aka: Chen Bangdao
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint