Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bill G. Horne
@article{DBLP:journals/ieeesp/Horne16, author = {Bill G. Horne}, title = {Trust Me. Trust Me Not}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {3}, pages = {3--5}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.56}, doi = {10.1109/MSP.2016.56}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/AwadMHSH16, author = {Amro Awad and Pratyusa K. Manadhata and Stuart Haber and Yan Solihin and William G. Horne}, editor = {Tom Conte and Yuanyuan Zhou}, title = {Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers}, booktitle = {Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2016, Atlanta, GA, USA, April 2-6, 2016}, pages = {263--276}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872362.2872377}, doi = {10.1145/2872362.2872377}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/AwadMHSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaberHZ16, author = {Stuart Haber and William G. Horne and Miaomiao Zhang}, title = {Efficient Transparent Redactable Signatures with a Single Signature Invocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2016}, url = {http://eprint.iacr.org/2016/1165}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaberHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horne15, author = {Bill G. Horne}, title = {Umbrellas and Octopuses}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {1}, pages = {3--5}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.18}, doi = {10.1109/MSP.2015.18}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Horne15, author = {William G. Horne}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Collecting, Analyzing and Responding to Enterprise Scale {DNS} Events}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {73}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699027}, doi = {10.1145/2699026.2699027}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Horne15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horne14, author = {Bill G. Horne}, title = {Humans in the Loop}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {3--4}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.5}, doi = {10.1109/MSP.2014.5}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Horne14a, author = {Bill G. Horne}, title = {On Computer Security Incident Response Teams}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {13--15}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.96}, doi = {10.1109/MSP.2014.96}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Horne14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManadhataYRH14, author = {Pratyusa K. Manadhata and Sandeep Yadav and Prasad Rao and William G. Horne}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Detecting Malicious Domains via Graph Inference}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {59--60}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666659}, doi = {10.1145/2666652.2666659}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ManadhataYRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SquicciariniPHN14, author = {Anna Cinzia Squicciarini and Giuseppe Petracca and William G. Horne and Aurnob Nath}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Situational awareness through reasoning on network incidents}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {111--122}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557562}, doi = {10.1145/2557547.2557562}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/SquicciariniPHN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ManadhataYRH14, author = {Pratyusa K. Manadhata and Sandeep Yadav and Prasad Rao and William G. Horne}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Detecting Malicious Domains via Graph Inference}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_1}, doi = {10.1007/978-3-319-11203-9\_1}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ManadhataYRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CheungSAHHH13, author = {Sen{-}ching Samson Cheung and Yan Sun and Karl Aberer and Jayant R. Haritsa and Bill G. Horne and Kai Hwang}, title = {Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {6}, pages = {835--837}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2259431}, doi = {10.1109/TIFS.2013.2259431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CheungSAHHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lata/HaberHMMR13, author = {Stuart Haber and William G. Horne and Pratyusa K. Manadhata and Miranda Mowbray and Prasad Rao}, editor = {Adrian{-}Horia Dediu and Carlos Mart{\'{\i}}n{-}Vide and Bianca Truthe}, title = {Efficient Submatch Extraction for Practical Regular Expressions}, booktitle = {Language and Automata Theory and Applications - 7th International Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7810}, pages = {323--334}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37064-9\_29}, doi = {10.1007/978-3-642-37064-9\_29}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lata/HaberHMMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/YangMHRG12, author = {Liu Yang and Pratyusa K. Manadhata and William G. Horne and Prasad Rao and Vinod Ganapathy}, editor = {Tilman Wolf and Andrew W. Moore and Viktor K. Prasanna}, title = {Fast submatch extraction using OBDDs}, booktitle = {Symposium on Architecture for Networking and Communications Systems, {ANCS} '12, Austin, TX, {USA} - October 29 - 30, 2012}, pages = {163--174}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2396556.2396594}, doi = {10.1145/2396556.2396594}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/YangMHRG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetraccaSHM12, author = {Giuseppe Petracca and Anna Cinzia Squicciarini and William G. Horne and Marco Casassa Mont}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {ReasONets: a fuzzy-based approach for reasoning on network incidents}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1010--1012}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382308}, doi = {10.1145/2382196.2382308}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PetraccaSHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BhattHR11, author = {Sandeep N. Bhatt and William G. Horne and Prasad Rao}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {On Computing Enterprise {IT} Risk Metrics}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {271--280}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_22}, doi = {10.1007/978-3-642-21424-0\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BhattHR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ThompsonHHSY09, author = {Brian Thompson and Stuart Haber and William G. Horne and Tomas Sander and Danfeng Yao}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {185--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_11}, doi = {10.1007/978-3-642-03168-7\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/ThompsonHHSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaberHHHMSTY08, author = {Stuart Haber and Yasuo Hatano and Yoshinori Honda and William G. Horne and Kunihiko Miyazaki and Tomas Sander and Satoru Tezoku and Danfeng Yao}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Efficient signature schemes supporting redaction, pseudonymization, and data deidentification}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {353--362}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368362}, doi = {10.1145/1368310.1368362}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaberHHHMSTY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/EneHMRST08, author = {Alina Ene and William G. Horne and Nikola Milosavljevic and Prasad Rao and Robert Schreiber and Robert Endre Tarjan}, editor = {Indrakshi Ray and Ninghui Li}, title = {Fast exact and heuristic methods for role minimization problems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377838}, doi = {10.1145/1377836.1377838}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/EneHMRST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/drm/HaberHPST03, author = {Stuart Haber and Bill G. Horne and Joe Pato and Tomas Sander and Robert Endre Tarjan}, editor = {Eberhard Becker and Willms Buhse and Dirk G{\"{u}}nnewig and Niels Rump}, title = {If Piracy Is the Problem, Is {DRM} the Answer?}, booktitle = {Digital Rights Management - Technological, Economic, Legal and Political Aspects}, series = {Lecture Notes in Computer Science}, volume = {2770}, pages = {224--233}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10941270\_15}, doi = {10.1007/10941270\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/drm/HaberHPST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neco/TinoHG01, author = {Peter Ti{\~{n}}o and Bill G. Horne and C. Lee Giles}, title = {Attractive Periodic Sets in Discrete-Time Recurrent Networks (with Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks)}, journal = {Neural Comput.}, volume = {13}, number = {6}, pages = {1379--1414}, year = {2001}, url = {https://doi.org/10.1162/08997660152002898}, doi = {10.1162/08997660152002898}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neco/TinoHG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HorneMST01, author = {Bill G. Horne and Lesley R. Matheson and Casey Sheehan and Robert Endre Tarjan}, editor = {Tomas Sander}, title = {Dynamic Self-Checking Techniques for Improved Tamper Resistance}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {141--159}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_9}, doi = {10.1007/3-540-47870-1\_9}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HorneMST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/HornePS01, author = {Bill G. Horne and Benny Pinkas and Tomas Sander}, editor = {Michael P. Wellman and Yoav Shoham}, title = {Escrow services and incentives in peer-to-peer networks}, booktitle = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001}, pages = {85--94}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501158.501168}, doi = {10.1145/501158.501168}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/HornePS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LewisHA00, author = {Frank L. Lewis and Bill G. Horne and Chaouki T. Abdallah}, title = {Computational complexity of determining resource loops in re-entrant flow lines}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {30}, number = {2}, pages = {222--229}, year = {2000}, url = {https://doi.org/10.1109/3468.833105}, doi = {10.1109/3468.833105}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/LewisHA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/BackHTG99, author = {Andrew D. Back and Bill G. Horne and Ah Chung Tsoi and C. Lee Giles}, title = {Alternative discrete-time operators: an algorithm for optimal selection of parameters}, journal = {{IEEE} Trans. Signal Process.}, volume = {47}, number = {9}, pages = {2612--2615}, year = {1999}, url = {https://doi.org/10.1109/78.782226}, doi = {10.1109/78.782226}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/BackHTG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/LinHG98, author = {Tsungnan Lin and Bill G. Horne and C. Lee Giles}, title = {How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies}, journal = {Neural Networks}, volume = {11}, number = {5}, pages = {861--868}, year = {1998}, url = {https://doi.org/10.1016/S0893-6080(98)00018-5}, doi = {10.1016/S0893-6080(98)00018-5}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/LinHG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/HushH98, author = {Don R. Hush and Bill G. Horne}, title = {Efficient algorithms for function approximation with piecewise linear sigmoidal networks}, journal = {{IEEE} Trans. Neural Networks}, volume = {9}, number = {6}, pages = {1129--1141}, year = {1998}, url = {https://doi.org/10.1109/72.728357}, doi = {10.1109/72.728357}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/HushH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ClouseGHC97, author = {Daniel S. Clouse and C. Lee Giles and Bill G. Horne and Garrison W. Cottrell}, title = {Time-delay neural networks: representation and induction of finite-state machines}, journal = {{IEEE} Trans. Neural Networks}, volume = {8}, number = {5}, pages = {1065--1070}, year = {1997}, url = {https://doi.org/10.1109/72.623208}, doi = {10.1109/72.623208}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ClouseGHC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/SiegelmannHG97, author = {Hava T. Siegelmann and Bill G. Horne and C. Lee Giles}, title = {Computational capabilities of recurrent {NARX} neural networks}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {27}, number = {2}, pages = {208--215}, year = {1997}, url = {https://doi.org/10.1109/3477.558801}, doi = {10.1109/3477.558801}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/SiegelmannHG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/LinGHK97, author = {Tsung{-}Nan Lin and C. Lee Giles and Bill G. Horne and Sun{-}Yuan Kung}, title = {A delay damage model selection algorithm for {NARX} neural networks}, journal = {{IEEE} Trans. Signal Process.}, volume = {45}, number = {11}, pages = {2719--2730}, year = {1997}, url = {https://doi.org/10.1109/78.650098}, doi = {10.1109/78.650098}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/LinGHK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/SakrLCHG97, author = {Majd F. Sakr and Steven P. Levitan and Donald M. Chiarulli and Bill G. Horne and C. Lee Giles}, editor = {Douglas H. Fisher}, title = {Predicting Multiprocessor Memory Access Patterns with Learning Models}, booktitle = {Proceedings of the Fourteenth International Conference on Machine Learning {(ICML} 1997), Nashville, Tennessee, USA, July 8-12, 1997}, pages = {305--312}, publisher = {Morgan Kaufmann}, year = {1997}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/SakrLCHG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HushLH97, author = {Don R. Hush and Fernando Lozano and Bill G. Horne}, editor = {Michael I. Jordan and Michael J. Kearns and Sara A. Solla}, title = {Function Approximation with the Sweeping Hinge Algorithm}, booktitle = {Advances in Neural Information Processing Systems 10, {[NIPS} Conference, Denver, Colorado, USA, 1997]}, pages = {535--541}, publisher = {The {MIT} Press}, year = {1997}, url = {http://papers.nips.cc/paper/1397-function-approximation-with-the-sweeping-hinge-algorithm}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/HushLH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/HorneH96, author = {Bill G. Horne and Don R. Hush}, title = {Bounds on the complexity of recurrent neural network implementations of finite state machines}, journal = {Neural Networks}, volume = {9}, number = {2}, pages = {243--252}, year = {1996}, url = {https://doi.org/10.1016/0893-6080(95)00095-X}, doi = {10.1016/0893-6080(95)00095-X}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/HorneH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/LinHTG96, author = {Tsungnan Lin and Bill G. Horne and Peter Ti{\~{n}}o and C. Lee Giles}, title = {Learning long-term dependencies in {NARX} recurrent neural networks}, journal = {{IEEE} Trans. Neural Networks}, volume = {7}, number = {6}, pages = {1329--1338}, year = {1996}, url = {https://doi.org/10.1109/72.548162}, doi = {10.1109/72.548162}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/LinHTG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/JimGH96, author = {Kam{-}Chuen Jim and C. Lee Giles and Bill G. Horne}, title = {An analysis of noise in recurrent neural networks: convergence and generalization}, journal = {{IEEE} Trans. Neural Networks}, volume = {7}, number = {6}, pages = {1424--1438}, year = {1996}, url = {https://doi.org/10.1109/72.548170}, doi = {10.1109/72.548170}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/JimGH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnn/SakrGLHMC96, author = {Majd F. Sakr and C. Lee Giles and Steven P. Levitan and Bill G. Horne and Marco Maggini and Donald M. Chiarulli}, title = {Online prediction of multiprocessor memory access patterns}, booktitle = {Proceedings of International Conference on Neural Networks (ICNN'96), Washington, DC, USA, June 3-6, 1996}, pages = {1564--1569}, publisher = {{IEEE}}, year = {1996}, url = {https://doi.org/10.1109/ICNN.1996.549133}, doi = {10.1109/ICNN.1996.549133}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnn/SakrGLHMC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ClouseGHC96, author = {Daniel S. Clouse and C. Lee Giles and Bill G. Horne and Garrison W. Cottrell}, editor = {Michael Mozer and Michael I. Jordan and Thomas Petsche}, title = {Representation and Induction of Finite State Machines using Time-Delay Neural Networks}, booktitle = {Advances in Neural Information Processing Systems 9, NIPS, Denver, CO, USA, December 2-5, 1996}, pages = {403--409}, publisher = {{MIT} Press}, year = {1996}, url = {http://papers.nips.cc/paper/1275-representation-and-induction-of-finite-state-machines-using-time-delay-neural-networks}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/ClouseGHC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/GilesHL95, author = {C. Lee Giles and Bill G. Horne and Tsungnan Lin}, title = {Learning a class of large finite state machines with a recurrent neural network}, journal = {Neural Networks}, volume = {8}, number = {9}, pages = {1359--1365}, year = {1995}, url = {https://doi.org/10.1016/0893-6080(95)00041-0}, doi = {10.1016/0893-6080(95)00041-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/GilesHL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LinHTG95, author = {Tsungnan Lin and Bill G. Horne and Peter Ti{\~{n}}o and C. Lee Giles}, editor = {David S. Touretzky and Michael Mozer and Michael E. Hasselmo}, title = {Learning long-term dependencies is not as difficult with {NARX} networks}, booktitle = {Advances in Neural Information Processing Systems 8, NIPS, Denver, CO, USA, November 27-30, 1995}, pages = {577--583}, publisher = {{MIT} Press}, year = {1995}, url = {http://papers.nips.cc/paper/1151-learning-long-term-dependencies-is-not-as-difficult-with-narx-networks}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/LinHTG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/HorneSG95, author = {Bill G. Horne and Hava T. Siegelmann and C. Lee Giles}, editor = {Miroslav Bartosek and Jan Staudek and Jir{\'{\i}} Wiedermann}, title = {What {NARX} Networks Can Compute}, booktitle = {{SOFSEM} '95, 22nd Seminar on Current Trends in Theory and Practice of Informatics, Milovy, Czech Republic, November 23 - December 1, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1012}, pages = {95--102}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60609-2\_5}, doi = {10.1007/3-540-60609-2\_5}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/HorneSG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/HorneH94, author = {Bill G. Horne and Don R. Hush}, title = {On the node complexity of neural networks}, journal = {Neural Networks}, volume = {7}, number = {9}, pages = {1413--1426}, year = {1994}, url = {https://doi.org/10.1016/0893-6080(94)90089-2}, doi = {10.1016/0893-6080(94)90089-2}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/HorneH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LeerinkGHJ94, author = {Laurens R. Leerink and C. Lee Giles and Bill G. Horne and Marwan A. Jabri}, editor = {Gerald Tesauro and David S. Touretzky and Todd K. Leen}, title = {Learning with Product Units}, booktitle = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference, Denver, Colorado, USA, 1994]}, pages = {537--544}, publisher = {{MIT} Press}, year = {1994}, url = {http://papers.nips.cc/paper/990-learning-with-product-units}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/LeerinkGHJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/JimHG94, author = {Kam{-}Chuen Jim and Bill G. Horne and C. Lee Giles}, editor = {Gerald Tesauro and David S. Touretzky and Todd K. Leen}, title = {Effects of Noise on Convergence and Generalization in Recurrent Networks}, booktitle = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference, Denver, Colorado, USA, 1994]}, pages = {649--656}, publisher = {{MIT} Press}, year = {1994}, url = {http://papers.nips.cc/paper/882-effects-of-noise-on-convergence-and-generalization-in-recurrent-networks}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/JimHG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HorneG94, author = {Bill G. Horne and C. Lee Giles}, editor = {Gerald Tesauro and David S. Touretzky and Todd K. Leen}, title = {An experimental comparison of recurrent neural networks}, booktitle = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference, Denver, Colorado, USA, 1994]}, pages = {697--704}, publisher = {{MIT} Press}, year = {1994}, url = {http://papers.nips.cc/paper/1009-an-experimental-comparison-of-recurrent-neural-networks}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/HorneG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/HushH93, author = {Don R. Hush and Bill G. Horne}, title = {Progress in supervised neural networks}, journal = {{IEEE} Signal Process. Mag.}, volume = {10}, number = {1}, pages = {8--39}, year = {1993}, url = {https://doi.org/10.1109/79.180705}, doi = {10.1109/79.180705}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spm/HushH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HorneH93, author = {Bill G. Horne and Don R. Hush}, editor = {Jack D. Cowan and Gerald Tesauro and Joshua Alspector}, title = {Bounds on the Complexity of Recurrent Neural Network Implementations of Finite State Machines}, booktitle = {Advances in Neural Information Processing Systems 6, [7th {NIPS} Conference, Denver, Colorado, USA, 1993]}, pages = {359--366}, publisher = {Morgan Kaufmann}, year = {1993}, url = {http://papers.nips.cc/paper/822-bounds-on-the-complexity-of-recurrent-neural-network-implementations-of-finite-state-machines}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/HorneH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/HushHS92, author = {Don R. Hush and Bill G. Horne and John M. Salas}, title = {Error surfaces for multilayer perceptrons}, journal = {{IEEE} Trans. Syst. Man Cybern.}, volume = {22}, number = {5}, pages = {1152--1161}, year = {1992}, url = {https://doi.org/10.1109/21.179853}, doi = {10.1109/21.179853}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/HushHS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jirs/HorneJV90, author = {Bill G. Horne and Mohammad Jamshidi and Nader Vadiee}, title = {Neural networks in robotics: {A} survey}, journal = {J. Intell. Robotic Syst.}, volume = {3}, number = {1}, pages = {51--66}, year = {1990}, url = {https://doi.org/10.1007/BF00368972}, doi = {10.1007/BF00368972}, timestamp = {Tue, 07 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jirs/HorneJV90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/HorneH90, author = {Bill G. Horne and Don R. Hush}, title = {Estimating a posteriori probability with P-type nodes}, booktitle = {{IJCNN} 1990, International Joint Conference on Neural Networks, San Diego, CA, USA, June 17-21, 1990}, pages = {691--696}, publisher = {{IEEE}}, year = {1990}, url = {https://doi.org/10.1109/IJCNN.1990.137649}, doi = {10.1109/IJCNN.1990.137649}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/HorneH90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.