Bill G. Horne

Affiliations:
  • Hewlett Packard Enterprise Labs, Princeton, NJ, USA


According to our database1, Bill G. Horne authored at least 46 papers between 1990 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
Trust Me. Trust Me Not.
IEEE Secur. Priv., 2016

Efficient Transparent Redactable Signatures with a Single Signature Invocation.
IACR Cryptol. ePrint Arch., 2016

Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
Umbrellas and Octopuses.
IEEE Secur. Priv., 2015

Collecting, Analyzing and Responding to Enterprise Scale DNS Events.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
On Computer Security Incident Response Teams.
IEEE Secur. Priv., 2014

Humans in the Loop.
IEEE Secur. Priv., 2014

Situational awareness through reasoning on network incidents.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Detecting Malicious Domains via Graph Inference.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems.
IEEE Trans. Inf. Forensics Secur., 2013

Efficient Submatch Extraction for Practical Regular Expressions.
Proceedings of the Language and Automata Theory and Applications, 2013

2012
ReasONets: a fuzzy-based approach for reasoning on network incidents.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Fast submatch extraction using OBDDs.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
On Computing Enterprise IT Risk Metrics.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2009
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

2008
Fast exact and heuristic methods for role minimization problems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2003
If Piracy Is the Problem, Is DRM the Answer?
Proceedings of the Digital Rights Management, 2003

2001
Attractive Periodic Sets in Discrete-Time Recurrent Networks (with Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks).
Neural Comput., 2001

Escrow services and incentives in peer-to-peer networks.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Dynamic Self-Checking Techniques for Improved Tamper Resistance.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
Computational complexity of determining resource loops in re-entrant flow lines.
IEEE Trans. Syst. Man Cybern. Part A, 2000

1999
Alternative discrete-time operators: an algorithm for optimal selection of parameters.
IEEE Trans. Signal Process., 1999

1998
Efficient algorithms for function approximation with piecewise linear sigmoidal networks.
IEEE Trans. Neural Networks, 1998

How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies.
Neural Networks, 1998

1997
A delay damage model selection algorithm for NARX neural networks.
IEEE Trans. Signal Process., 1997

Computational capabilities of recurrent NARX neural networks.
IEEE Trans. Syst. Man Cybern. Part B, 1997

Time-delay neural networks: representation and induction of finite-state machines.
IEEE Trans. Neural Networks, 1997

Function Approximation with the Sweeping Hinge Algorithm.
Proceedings of the Advances in Neural Information Processing Systems 10, 1997

Predicting Multiprocessor Memory Access Patterns with Learning Models.
Proceedings of the Fourteenth International Conference on Machine Learning (ICML 1997), 1997

1996
Learning long-term dependencies in NARX recurrent neural networks.
IEEE Trans. Neural Networks, 1996

An analysis of noise in recurrent neural networks: convergence and generalization.
IEEE Trans. Neural Networks, 1996

Bounds on the complexity of recurrent neural network implementations of finite state machines.
Neural Networks, 1996

Representation and Induction of Finite State Machines using Time-Delay Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 9, 1996

Online prediction of multiprocessor memory access patterns.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

1995
Learning a class of large finite state machines with a recurrent neural network.
Neural Networks, 1995

What NARX Networks Can Compute.
Proceedings of the SOFSEM '95, 22nd Seminar on Current Trends in Theory and Practice of Informatics, Milovy, Czech Republic, November 23, 1995

Learning long-term dependencies is not as difficult with NARX networks.
Proceedings of the Advances in Neural Information Processing Systems 8, 1995

1994
On the node complexity of neural networks.
Neural Networks, 1994

Learning with Product Units.
Proceedings of the Advances in Neural Information Processing Systems 7, 1994

Effects of Noise on Convergence and Generalization in Recurrent Networks.
Proceedings of the Advances in Neural Information Processing Systems 7, 1994

An experimental comparison of recurrent neural networks.
Proceedings of the Advances in Neural Information Processing Systems 7, 1994

1993
Progress in supervised neural networks.
IEEE Signal Process. Mag., 1993

1992
Error surfaces for multilayer perceptrons.
IEEE Trans. Syst. Man Cybern., 1992

1990
Neural networks in robotics: A survey.
J. Intell. Robotic Syst., 1990

Estimating a posteriori probability with P-type nodes.
Proceedings of the IJCNN 1990, 1990


  Loading...