Bill Horne
Bill Horne
Principal Product Manager, AWS Cryptography
E-mailová adresa ověřena na:
Progress in supervised neural networks
DR Hush, BG Horne
IEEE signal processing magazine 10 (1), 8-39, 1993
Learning long-term dependencies in NARX recurrent neural networks
T Lin, BG Horne, P Tino, CL Giles
IEEE transactions on neural networks 7 (6), 1329-1338, 1996
Computational capabilities of recurrent NARX neural networks
HT Siegelmann, BG Horne, CL Giles
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 27 …, 1997
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,430,670, 2008
Fast exact and heuristic methods for role minimization problems
A Ene, W Horne, N Milosavljevic, P Rao, R Schreiber, RE Tarjan
Proceedings of the 13th ACM symposium on Access control models and …, 2008
Software self-defense systems and methods
JJ Horning, WO Sibert, RE Tarjan, U Maheshwari, WG Horne, AK Wright, ...
US Patent 7,823,135, 2010
Software self-checking systems and methods
WG Home, LR Matheson, C Sheehan, RE Tarjan
US Patent 7,581,103, 2009
Dynamic self-checking techniques for improved tamper resistance
B Horne, L Matheson, C Sheehan, RE Tarjan
ACM Workshop on Digital Rights Management, 141-159, 2001
Systems and methods for conducting transactions and communications using a trusted third party
B Pinkas, T Sander, WG Horne
US Patent 7,136,840, 2006
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
An analysis of noise in recurrent neural networks: convergence and generalization
KC Jim, CL Giles, BG Horne
IEEE Transactions on neural networks 7 (6), 1424-1438, 1996
An experimental comparison of recurrent neural networks
B Horne, C Giles
Advances in neural information processing systems 7, 1994
Policy based, delegated limited network access management
IE Band, WG Howe, PV Rao, PAP Huang
US Patent 8,453,198, 2013
Software self-defense systems and methods
J Horning, W Sibert, R Tarjan, U Maheshwari, W Horne, A Wright, ...
US Patent App. 11/506,321, 2007
Certified email with a light on-line trusted third party: Design and implementation
M Abadi, N Glew, B Horne, B Pinkas
Proceedings of the 11th international conference on World Wide Web, 387-395, 2002
A delay damage model selection algorithm for NARX neural networks
TN Lin, CL Giles, BG Horne, SY Kung
IEEE Transactions on Signal Processing 45 (11), 2719-2730, 1997
Software self-defense systems and methods
JJ Homing, WO Sibert, RE Tarjan, U Maheshwari, WG Home, AK Wright, ...
US Patent 7,779,394, 2010
Error surfaces for multilayer perceptrons
DR Hush, B Horne, JM Salas
IEEE Transactions on systems, man, and cybernetics 22 (5), 1152-1161, 1992
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
T Lin, BG Horne, CL Giles
Neural Networks 11 (5), 861-868, 1998
Detecting malicious domains via graph inference
P Manadhata, S Yadav, P Rao, W Horne
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20