Подписаться
Bill Horne
Bill Horne
Senior Manager, AWS Cryptography
Подтвержден адрес электронной почты в домене amazon.com
Название
Процитировано
Процитировано
Год
Progress in supervised neural networks
DR Hush, BG Horne
IEEE signal processing magazine 10 (1), 8-39, 1993
21051993
Learning long-term dependencies in NARX recurrent neural networks
T Lin, BG Horne, P Tino, CL Giles
IEEE transactions on neural networks 7 (6), 1329-1338, 1996
9881996
Computational capabilities of recurrent NARX neural networks
HT Siegelmann, BG Horne, CL Giles
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27 …, 1997
6081997
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,430,670, 2008
3302008
Fast exact and heuristic methods for role minimization problems
A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3122008
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,823,135, 2010
2782010
Software self-checking systems and methods
WG Home, LR Matheson, C Sheehan, RE Tarjan
US Patent 7,581,103, 2009
258*2009
Dynamic self-checking techniques for improved tamper resistance
B Horne, L Matheson, C Sheehan, RE Tarjan
ACM Workshop on Digital Rights Management, 141-159, 2001
2582001
Systems and methods for conducting transactions and communications using a trusted third party
B Pinkas, T Sander, WG Horne
US Patent 7,136,840, 2006
243*2006
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
2402015
An analysis of noise in recurrent neural networks: convergence and generalization
KC Jim, CL Giles, BG Horne
IEEE Transactions on neural networks 7 (6), 1424-1438, 1996
1951996
An experimental comparison of recurrent neural networks
B Horne, C Giles
Advances in neural information processing systems 7, 1994
1781994
Software self-defense systems and methods
J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ...
US Patent App. 11/506,321, 2007
1692007
Policy based, delegated limited network access management
IE Band, WG Howe, PV Rao, PAP Huang
US Patent 8,453,198, 2013
1672013
A delay damage model selection algorithm for NARX neural networks
TN Lin, CL Giles, BG Horne, SY Kung
IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997
1631997
Certified email with a light on-line trusted third party: Design and implementation
M Abadi, N Glew, B Horne, B Pinkas
Proceedings of the 11th international conference on World Wide Web, 387-395, 2002
1622002
Error surfaces for multilayer perceptrons
DR Hush, B Horne, JM Salas
IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992
1441992
Detecting malicious domains via graph inference
P Manadhata, S Yadav, P Rao, W Horne
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
1352014
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
T Lin, BG Horne, CL Giles
Neural Networks 11 (5), 861-868, 1998
1351998
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
1212016
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20