default search action
Bill G. Horne
Person information
- affiliation: Hewlett Packard Enterprise Labs, Princeton, NJ, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j21]Bill G. Horne:
Trust Me. Trust Me Not. IEEE Secur. Priv. 14(3): 3-5 (2016) - [c25]Amro Awad, Pratyusa K. Manadhata, Stuart Haber, Yan Solihin, William G. Horne:
Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers. ASPLOS 2016: 263-276 - [i1]Stuart Haber, William G. Horne, Miaomiao Zhang:
Efficient Transparent Redactable Signatures with a Single Signature Invocation. IACR Cryptol. ePrint Arch. 2016: 1165 (2016) - 2015
- [j20]Bill G. Horne:
Umbrellas and Octopuses. IEEE Secur. Priv. 13(1): 3-5 (2015) - [c24]William G. Horne:
Collecting, Analyzing and Responding to Enterprise Scale DNS Events. CODASPY 2015: 73 - 2014
- [j19]Bill G. Horne:
Humans in the Loop. IEEE Secur. Priv. 12(1): 3-4 (2014) - [j18]Bill G. Horne:
On Computer Security Incident Response Teams. IEEE Secur. Priv. 12(5): 13-15 (2014) - [c23]Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William G. Horne:
Detecting Malicious Domains via Graph Inference. AISec@CCS 2014: 59-60 - [c22]Anna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath:
Situational awareness through reasoning on network incidents. CODASPY 2014: 111-122 - [c21]Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William G. Horne:
Detecting Malicious Domains via Graph Inference. ESORICS (1) 2014: 1-18 - 2013
- [j17]Sen-ching Samson Cheung, Yan Sun, Karl Aberer, Jayant R. Haritsa, Bill G. Horne, Kai Hwang:
Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems. IEEE Trans. Inf. Forensics Secur. 8(6): 835-837 (2013) - [c20]Stuart Haber, William G. Horne, Pratyusa K. Manadhata, Miranda Mowbray, Prasad Rao:
Efficient Submatch Extraction for Practical Regular Expressions. LATA 2013: 323-334 - 2012
- [c19]Liu Yang, Pratyusa K. Manadhata, William G. Horne, Prasad Rao, Vinod Ganapathy:
Fast submatch extraction using OBDDs. ANCS 2012: 163-174 - [c18]Giuseppe Petracca, Anna Cinzia Squicciarini, William G. Horne, Marco Casassa Mont:
ReasONets: a fuzzy-based approach for reasoning on network incidents. CCS 2012: 1010-1012 - 2011
- [c17]Sandeep N. Bhatt, William G. Horne, Prasad Rao:
On Computing Enterprise IT Risk Metrics. SEC 2011: 271-280
2000 – 2009
- 2009
- [c16]Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao:
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. Privacy Enhancing Technologies 2009: 185-201 - 2008
- [c15]Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. AsiaCCS 2008: 353-362 - [c14]Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan:
Fast exact and heuristic methods for role minimization problems. SACMAT 2008: 1-10 - 2003
- [p1]Stuart Haber, Bill G. Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan:
If Piracy Is the Problem, Is DRM the Answer? Digital Rights Management 2003: 224-233 - 2001
- [j16]Peter Tiño, Bill G. Horne, C. Lee Giles:
Attractive Periodic Sets in Discrete-Time Recurrent Networks (with Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks). Neural Comput. 13(6): 1379-1414 (2001) - [c13]Bill G. Horne, Lesley R. Matheson, Casey Sheehan, Robert Endre Tarjan:
Dynamic Self-Checking Techniques for Improved Tamper Resistance. Digital Rights Management Workshop 2001: 141-159 - [c12]Bill G. Horne, Benny Pinkas, Tomas Sander:
Escrow services and incentives in peer-to-peer networks. EC 2001: 85-94 - 2000
- [j15]Frank L. Lewis, Bill G. Horne, Chaouki T. Abdallah:
Computational complexity of determining resource loops in re-entrant flow lines. IEEE Trans. Syst. Man Cybern. Part A 30(2): 222-229 (2000)
1990 – 1999
- 1999
- [j14]Andrew D. Back, Bill G. Horne, Ah Chung Tsoi, C. Lee Giles:
Alternative discrete-time operators: an algorithm for optimal selection of parameters. IEEE Trans. Signal Process. 47(9): 2612-2615 (1999) - 1998
- [j13]Tsungnan Lin, Bill G. Horne, C. Lee Giles:
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies. Neural Networks 11(5): 861-868 (1998) - [j12]Don R. Hush, Bill G. Horne:
Efficient algorithms for function approximation with piecewise linear sigmoidal networks. IEEE Trans. Neural Networks 9(6): 1129-1141 (1998) - 1997
- [j11]Daniel S. Clouse, C. Lee Giles, Bill G. Horne, Garrison W. Cottrell:
Time-delay neural networks: representation and induction of finite-state machines. IEEE Trans. Neural Networks 8(5): 1065-1070 (1997) - [j10]Hava T. Siegelmann, Bill G. Horne, C. Lee Giles:
Computational capabilities of recurrent NARX neural networks. IEEE Trans. Syst. Man Cybern. Part B 27(2): 208-215 (1997) - [j9]Tsung-Nan Lin, C. Lee Giles, Bill G. Horne, Sun-Yuan Kung:
A delay damage model selection algorithm for NARX neural networks. IEEE Trans. Signal Process. 45(11): 2719-2730 (1997) - [c11]Majd F. Sakr, Steven P. Levitan, Donald M. Chiarulli, Bill G. Horne, C. Lee Giles:
Predicting Multiprocessor Memory Access Patterns with Learning Models. ICML 1997: 305-312 - [c10]Don R. Hush, Fernando Lozano, Bill G. Horne:
Function Approximation with the Sweeping Hinge Algorithm. NIPS 1997: 535-541 - 1996
- [j8]Bill G. Horne, Don R. Hush:
Bounds on the complexity of recurrent neural network implementations of finite state machines. Neural Networks 9(2): 243-252 (1996) - [j7]Tsungnan Lin, Bill G. Horne, Peter Tiño, C. Lee Giles:
Learning long-term dependencies in NARX recurrent neural networks. IEEE Trans. Neural Networks 7(6): 1329-1338 (1996) - [j6]Kam-Chuen Jim, C. Lee Giles, Bill G. Horne:
An analysis of noise in recurrent neural networks: convergence and generalization. IEEE Trans. Neural Networks 7(6): 1424-1438 (1996) - [c9]Majd F. Sakr, C. Lee Giles, Steven P. Levitan, Bill G. Horne, Marco Maggini, Donald M. Chiarulli:
Online prediction of multiprocessor memory access patterns. ICNN 1996: 1564-1569 - [c8]Daniel S. Clouse, C. Lee Giles, Bill G. Horne, Garrison W. Cottrell:
Representation and Induction of Finite State Machines using Time-Delay Neural Networks. NIPS 1996: 403-409 - 1995
- [j5]C. Lee Giles, Bill G. Horne, Tsungnan Lin:
Learning a class of large finite state machines with a recurrent neural network. Neural Networks 8(9): 1359-1365 (1995) - [c7]Tsungnan Lin, Bill G. Horne, Peter Tiño, C. Lee Giles:
Learning long-term dependencies is not as difficult with NARX networks. NIPS 1995: 577-583 - [c6]Bill G. Horne, Hava T. Siegelmann, C. Lee Giles:
What NARX Networks Can Compute. SOFSEM 1995: 95-102 - 1994
- [j4]Bill G. Horne, Don R. Hush:
On the node complexity of neural networks. Neural Networks 7(9): 1413-1426 (1994) - [c5]Laurens R. Leerink, C. Lee Giles, Bill G. Horne, Marwan A. Jabri:
Learning with Product Units. NIPS 1994: 537-544 - [c4]Kam-Chuen Jim, Bill G. Horne, C. Lee Giles:
Effects of Noise on Convergence and Generalization in Recurrent Networks. NIPS 1994: 649-656 - [c3]Bill G. Horne, C. Lee Giles:
An experimental comparison of recurrent neural networks. NIPS 1994: 697-704 - 1993
- [j3]Don R. Hush, Bill G. Horne:
Progress in supervised neural networks. IEEE Signal Process. Mag. 10(1): 8-39 (1993) - [c2]Bill G. Horne, Don R. Hush:
Bounds on the Complexity of Recurrent Neural Network Implementations of Finite State Machines. NIPS 1993: 359-366 - 1992
- [j2]Don R. Hush, Bill G. Horne, John M. Salas:
Error surfaces for multilayer perceptrons. IEEE Trans. Syst. Man Cybern. 22(5): 1152-1161 (1992) - 1990
- [j1]Bill G. Horne, Mohammad Jamshidi, Nader Vadiee:
Neural networks in robotics: A survey. J. Intell. Robotic Syst. 3(1): 51-66 (1990) - [c1]Bill G. Horne, Don R. Hush:
Estimating a posteriori probability with P-type nodes. IJCNN 1990: 691-696
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint