Follow
Bill Horne
Bill Horne
Senior Manager, AWS Cryptography
Verified email at amazon.com
Title
Cited by
Cited by
Year
Progress in supervised neural networks
DR Hush, BG Horne
IEEE signal processing magazine 10 (1), 8-39, 1993
21061993
Learning long-term dependencies in NARX recurrent neural networks
T Lin, BG Horne, P Tino, CL Giles
IEEE transactions on neural networks 7 (6), 1329-1338, 1996
9921996
Computational capabilities of recurrent NARX neural networks
HT Siegelmann, BG Horne, CL Giles
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27 …, 1997
6091997
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,430,670, 2008
3302008
Fast exact and heuristic methods for role minimization problems
A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3122008
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,823,135, 2010
2782010
Software self-checking systems and methods
WG Home, LR Matheson, C Sheehan, RE Tarjan
US Patent 7,581,103, 2009
258*2009
Dynamic self-checking techniques for improved tamper resistance
B Horne, L Matheson, C Sheehan, RE Tarjan
ACM Workshop on Digital Rights Management, 141-159, 2001
2582001
Systems and methods for conducting transactions and communications using a trusted third party
B Pinkas, T Sander, WG Horne
US Patent 7,136,840, 2006
243*2006
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
2402015
An analysis of noise in recurrent neural networks: convergence and generalization
KC Jim, CL Giles, BG Horne
IEEE Transactions on neural networks 7 (6), 1424-1438, 1996
1951996
An experimental comparison of recurrent neural networks
B Horne, C Giles
Advances in neural information processing systems 7, 1994
1781994
Software self-defense systems and methods
J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ...
US Patent App. 11/506,321, 2007
1712007
Policy based, delegated limited network access management
IE Band, WG Howe, PV Rao, PAP Huang
US Patent 8,453,198, 2013
1672013
A delay damage model selection algorithm for NARX neural networks
TN Lin, CL Giles, BG Horne, SY Kung
IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997
1631997
Certified email with a light on-line trusted third party: Design and implementation
M Abadi, N Glew, B Horne, B Pinkas
Proceedings of the 11th international conference on World Wide Web, 387-395, 2002
1622002
Error surfaces for multilayer perceptrons
DR Hush, B Horne, JM Salas
IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992
1441992
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
T Lin, BG Horne, CL Giles
Neural Networks 11 (5), 861-868, 1998
1371998
Detecting malicious domains via graph inference
P Manadhata, S Yadav, P Rao, W Horne
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
1352014
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
1212016
The system can't perform the operation now. Try again later.
Articles 1–20