Bill Horne
Bill Horne
Principal Product Manager, AWS Cryptography
Verified email at amazon.com
Title
Cited by
Cited by
Year
Progress in supervised neural networks
DR Hush, BG Horne
IEEE signal processing magazine 10 (1), 8-39, 1993
19581993
Learning long-term dependencies in NARX recurrent neural networks
T Lin, BG Horne, P Tino, CL Giles
IEEE Transactions on Neural Networks 7 (6), 1329-1338, 1996
7301996
Computational capabilities of recurrent NARX neural networks
HT Siegelmann, BG Horne, CL Giles
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27 …, 1997
4911997
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,430,670, 2008
3122008
Fast exact and heuristic methods for role minimization problems
A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2612008
Software self-checking systems and methods
WG Home, LR Matheson, C Sheehan, RE Tarjan
US Patent 7,581,103, 2009
250*2009
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,823,135, 2010
2442010
Dynamic self-checking techniques for improved tamper resistance
B Horne, L Matheson, C Sheehan, RE Tarjan
ACM Workshop on Digital Rights Management, 141-159, 2001
2442001
Systems and methods for conducting transactions and communications using a trusted third party
B Pinkas, T Sander, WG Horne
US Patent 7,136,840, 2006
2172006
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
1742015
An experimental comparison of recurrent neural networks
BG Horne, CL Giles
Advances in neural information processing systems, 697-704, 1995
1661995
An analysis of noise in recurrent neural networks: convergence and generalization
KC Jim, CL Giles, BG Horne
IEEE Transactions on neural networks 7 (6), 1424-1438, 1996
1591996
Policy based, delegated limited network access management
IE Band, WG Howe, PV Rao, PAP Huang
US Patent 8,453,198, 2013
1542013
Certified email with a light on-line trusted third party: Design and implementation
M Abadi, N Glew
Proceedings of the 11th international conference on World Wide Web, 387-395, 2002
1542002
Software self-defense systems and methods
J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ...
US Patent App. 11/506,321, 2007
1422007
Software self-defense systems and methods
JJ Homing, WO Sibert, RE Tarjan, U Maheshwari, WG Home, AK Wright, ...
US Patent 7,779,394, 2010
1372010
Error surfaces for multilayer perceptrons
DR Hush, B Horne, JM Salas
IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992
1371992
A delay damage model selection algorithm for NARX neural networks
TN Lin, CL Giles, BG Horne, SY Kung
IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997
1341997
Bounds on the complexity of recurrent neural network implementations of finite state machines
BG Horne, DR Hush
Neural networks 9 (2), 243-252, 1996
1101996
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
T Lin, BG Horne, CL Giles
Neural Networks 11 (5), 861-868, 1998
1091998
The system can't perform the operation now. Try again later.
Articles 1–20