팔로우
Bill Horne
Bill Horne
Senior Manager, AWS Cryptography
amazon.com의 이메일 확인됨
제목
인용
인용
연도
Progress in supervised neural networks
DR Hush, BG Horne
IEEE signal processing magazine 10 (1), 8-39, 1993
21231993
Learning long-term dependencies in NARX recurrent neural networks
T Lin, BG Horne, P Tino, CL Giles
IEEE transactions on neural networks 7 (6), 1329-1338, 1996
10151996
Computational capabilities of recurrent NARX neural networks
HT Siegelmann, BG Horne, CL Giles
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27 …, 1997
6261997
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,430,670, 2008
3312008
Fast exact and heuristic methods for role minimization problems
A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3152008
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,823,135, 2010
2812010
Software self-checking systems and methods
WG Home, LR Matheson, C Sheehan, RE Tarjan
US Patent 7,581,103, 2009
261*2009
Dynamic self-checking techniques for improved tamper resistance
B Horne, L Matheson, C Sheehan, RE Tarjan
ACM Workshop on Digital Rights Management, 141-159, 2001
2592001
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
2462015
Systems and methods for conducting transactions and communications using a trusted third party
B Pinkas, T Sander, WG Horne
US Patent 7,136,840, 2006
244*2006
An analysis of noise in recurrent neural networks: convergence and generalization
KC Jim, CL Giles, BG Horne
IEEE Transactions on neural networks 7 (6), 1424-1438, 1996
2001996
An experimental comparison of recurrent neural networks
B Horne, C Giles
Advances in neural information processing systems 7, 1994
1791994
Software self-defense systems and methods
J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ...
US Patent App. 11/506,321, 2007
1742007
Policy based, delegated limited network access management
IE Band, WG Howe, PV Rao, PAP Huang
US Patent 8,453,198, 2013
1692013
A delay damage model selection algorithm for NARX neural networks
TN Lin, CL Giles, BG Horne, SY Kung
IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997
1661997
Certified email with a light on-line trusted third party: Design and implementation
M Abadi, N Glew, B Horne, B Pinkas
Proceedings of the 11th international conference on World Wide Web, 387-395, 2002
1632002
Error surfaces for multilayer perceptrons
DR Hush, B Horne, JM Salas
IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992
1451992
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
T Lin, BG Horne, CL Giles
Neural Networks 11 (5), 861-868, 1998
1431998
Detecting malicious domains via graph inference
P Manadhata, S Yadav, P Rao, W Horne
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
1422014
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
1242016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20