BibTeX records: Bill G. Horne

download as .bib file

@article{DBLP:journals/ieeesp/Horne16,
  author       = {Bill G. Horne},
  title        = {Trust Me. Trust Me Not},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {3--5},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.56},
  doi          = {10.1109/MSP.2016.56},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/AwadMHSH16,
  author       = {Amro Awad and
                  Pratyusa K. Manadhata and
                  Stuart Haber and
                  Yan Solihin and
                  William G. Horne},
  editor       = {Tom Conte and
                  Yuanyuan Zhou},
  title        = {Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main
                  Memory Controllers},
  booktitle    = {Proceedings of the Twenty-First International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2016, Atlanta, GA, USA, April 2-6, 2016},
  pages        = {263--276},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872362.2872377},
  doi          = {10.1145/2872362.2872377},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/AwadMHSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaberHZ16,
  author       = {Stuart Haber and
                  William G. Horne and
                  Miaomiao Zhang},
  title        = {Efficient Transparent Redactable Signatures with a Single Signature
                  Invocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1165},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaberHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horne15,
  author       = {Bill G. Horne},
  title        = {Umbrellas and Octopuses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {1},
  pages        = {3--5},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.18},
  doi          = {10.1109/MSP.2015.18},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Horne15,
  author       = {William G. Horne},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Collecting, Analyzing and Responding to Enterprise Scale {DNS} Events},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {73},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699027},
  doi          = {10.1145/2699026.2699027},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Horne15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horne14,
  author       = {Bill G. Horne},
  title        = {Humans in the Loop},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {3--4},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.5},
  doi          = {10.1109/MSP.2014.5},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Horne14a,
  author       = {Bill G. Horne},
  title        = {On Computer Security Incident Response Teams},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {13--15},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.96},
  doi          = {10.1109/MSP.2014.96},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Horne14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManadhataYRH14,
  author       = {Pratyusa K. Manadhata and
                  Sandeep Yadav and
                  Prasad Rao and
                  William G. Horne},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Detecting Malicious Domains via Graph Inference},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {59--60},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666659},
  doi          = {10.1145/2666652.2666659},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ManadhataYRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SquicciariniPHN14,
  author       = {Anna Cinzia Squicciarini and
                  Giuseppe Petracca and
                  William G. Horne and
                  Aurnob Nath},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Situational awareness through reasoning on network incidents},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557562},
  doi          = {10.1145/2557547.2557562},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/SquicciariniPHN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ManadhataYRH14,
  author       = {Pratyusa K. Manadhata and
                  Sandeep Yadav and
                  Prasad Rao and
                  William G. Horne},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Detecting Malicious Domains via Graph Inference},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_1},
  doi          = {10.1007/978-3-319-11203-9\_1},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ManadhataYRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CheungSAHHH13,
  author       = {Sen{-}ching Samson Cheung and
                  Yan Sun and
                  Karl Aberer and
                  Jayant R. Haritsa and
                  Bill G. Horne and
                  Kai Hwang},
  title        = {Guest Editorial: Special issue on privacy and trust management in
                  cloud and distributed systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {6},
  pages        = {835--837},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2259431},
  doi          = {10.1109/TIFS.2013.2259431},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CheungSAHHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lata/HaberHMMR13,
  author       = {Stuart Haber and
                  William G. Horne and
                  Pratyusa K. Manadhata and
                  Miranda Mowbray and
                  Prasad Rao},
  editor       = {Adrian{-}Horia Dediu and
                  Carlos Mart{\'{\i}}n{-}Vide and
                  Bianca Truthe},
  title        = {Efficient Submatch Extraction for Practical Regular Expressions},
  booktitle    = {Language and Automata Theory and Applications - 7th International
                  Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7810},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37064-9\_29},
  doi          = {10.1007/978-3-642-37064-9\_29},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lata/HaberHMMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/YangMHRG12,
  author       = {Liu Yang and
                  Pratyusa K. Manadhata and
                  William G. Horne and
                  Prasad Rao and
                  Vinod Ganapathy},
  editor       = {Tilman Wolf and
                  Andrew W. Moore and
                  Viktor K. Prasanna},
  title        = {Fast submatch extraction using OBDDs},
  booktitle    = {Symposium on Architecture for Networking and Communications Systems,
                  {ANCS} '12, Austin, TX, {USA} - October 29 - 30, 2012},
  pages        = {163--174},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2396556.2396594},
  doi          = {10.1145/2396556.2396594},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ancs/YangMHRG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetraccaSHM12,
  author       = {Giuseppe Petracca and
                  Anna Cinzia Squicciarini and
                  William G. Horne and
                  Marco Casassa Mont},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {ReasONets: a fuzzy-based approach for reasoning on network incidents},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1010--1012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382308},
  doi          = {10.1145/2382196.2382308},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PetraccaSHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BhattHR11,
  author       = {Sandeep N. Bhatt and
                  William G. Horne and
                  Prasad Rao},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {On Computing Enterprise {IT} Risk Metrics},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {271--280},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_22},
  doi          = {10.1007/978-3-642-21424-0\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BhattHR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ThompsonHHSY09,
  author       = {Brian Thompson and
                  Stuart Haber and
                  William G. Horne and
                  Tomas Sander and
                  Danfeng Yao},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Computation and Verification of Aggregate Queries
                  on Outsourced Databases},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_11},
  doi          = {10.1007/978-3-642-03168-7\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ThompsonHHSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaberHHHMSTY08,
  author       = {Stuart Haber and
                  Yasuo Hatano and
                  Yoshinori Honda and
                  William G. Horne and
                  Kunihiko Miyazaki and
                  Tomas Sander and
                  Satoru Tezoku and
                  Danfeng Yao},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Efficient signature schemes supporting redaction, pseudonymization,
                  and data deidentification},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {353--362},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368362},
  doi          = {10.1145/1368310.1368362},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaberHHHMSTY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/EneHMRST08,
  author       = {Alina Ene and
                  William G. Horne and
                  Nikola Milosavljevic and
                  Prasad Rao and
                  Robert Schreiber and
                  Robert Endre Tarjan},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Fast exact and heuristic methods for role minimization problems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377838},
  doi          = {10.1145/1377836.1377838},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/EneHMRST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/drm/HaberHPST03,
  author       = {Stuart Haber and
                  Bill G. Horne and
                  Joe Pato and
                  Tomas Sander and
                  Robert Endre Tarjan},
  editor       = {Eberhard Becker and
                  Willms Buhse and
                  Dirk G{\"{u}}nnewig and
                  Niels Rump},
  title        = {If Piracy Is the Problem, Is {DRM} the Answer?},
  booktitle    = {Digital Rights Management - Technological, Economic, Legal and Political
                  Aspects},
  series       = {Lecture Notes in Computer Science},
  volume       = {2770},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10941270\_15},
  doi          = {10.1007/10941270\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/HaberHPST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neco/TinoHG01,
  author       = {Peter Ti{\~{n}}o and
                  Bill G. Horne and
                  C. Lee Giles},
  title        = {Attractive Periodic Sets in Discrete-Time Recurrent Networks (with
                  Emphasis on Fixed-Point Stability and Bifurcations in Two-Neuron Networks)},
  journal      = {Neural Comput.},
  volume       = {13},
  number       = {6},
  pages        = {1379--1414},
  year         = {2001},
  url          = {https://doi.org/10.1162/08997660152002898},
  doi          = {10.1162/08997660152002898},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/neco/TinoHG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HorneMST01,
  author       = {Bill G. Horne and
                  Lesley R. Matheson and
                  Casey Sheehan and
                  Robert Endre Tarjan},
  editor       = {Tomas Sander},
  title        = {Dynamic Self-Checking Techniques for Improved Tamper Resistance},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_9},
  doi          = {10.1007/3-540-47870-1\_9},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HorneMST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/HornePS01,
  author       = {Bill G. Horne and
                  Benny Pinkas and
                  Tomas Sander},
  editor       = {Michael P. Wellman and
                  Yoav Shoham},
  title        = {Escrow services and incentives in peer-to-peer networks},
  booktitle    = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
                  Tampa, Florida, USA, October 14-17, 2001},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501158.501168},
  doi          = {10.1145/501158.501168},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/HornePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LewisHA00,
  author       = {Frank L. Lewis and
                  Bill G. Horne and
                  Chaouki T. Abdallah},
  title        = {Computational complexity of determining resource loops in re-entrant
                  flow lines},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {30},
  number       = {2},
  pages        = {222--229},
  year         = {2000},
  url          = {https://doi.org/10.1109/3468.833105},
  doi          = {10.1109/3468.833105},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/LewisHA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/BackHTG99,
  author       = {Andrew D. Back and
                  Bill G. Horne and
                  Ah Chung Tsoi and
                  C. Lee Giles},
  title        = {Alternative discrete-time operators: an algorithm for optimal selection
                  of parameters},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {47},
  number       = {9},
  pages        = {2612--2615},
  year         = {1999},
  url          = {https://doi.org/10.1109/78.782226},
  doi          = {10.1109/78.782226},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/BackHTG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/LinHG98,
  author       = {Tsungnan Lin and
                  Bill G. Horne and
                  C. Lee Giles},
  title        = {How embedded memory in recurrent neural network architectures helps
                  learning long-term temporal dependencies},
  journal      = {Neural Networks},
  volume       = {11},
  number       = {5},
  pages        = {861--868},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0893-6080(98)00018-5},
  doi          = {10.1016/S0893-6080(98)00018-5},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nn/LinHG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/HushH98,
  author       = {Don R. Hush and
                  Bill G. Horne},
  title        = {Efficient algorithms for function approximation with piecewise linear
                  sigmoidal networks},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {9},
  number       = {6},
  pages        = {1129--1141},
  year         = {1998},
  url          = {https://doi.org/10.1109/72.728357},
  doi          = {10.1109/72.728357},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/HushH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ClouseGHC97,
  author       = {Daniel S. Clouse and
                  C. Lee Giles and
                  Bill G. Horne and
                  Garrison W. Cottrell},
  title        = {Time-delay neural networks: representation and induction of finite-state
                  machines},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {8},
  number       = {5},
  pages        = {1065--1070},
  year         = {1997},
  url          = {https://doi.org/10.1109/72.623208},
  doi          = {10.1109/72.623208},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ClouseGHC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/SiegelmannHG97,
  author       = {Hava T. Siegelmann and
                  Bill G. Horne and
                  C. Lee Giles},
  title        = {Computational capabilities of recurrent {NARX} neural networks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {27},
  number       = {2},
  pages        = {208--215},
  year         = {1997},
  url          = {https://doi.org/10.1109/3477.558801},
  doi          = {10.1109/3477.558801},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/SiegelmannHG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/LinGHK97,
  author       = {Tsung{-}Nan Lin and
                  C. Lee Giles and
                  Bill G. Horne and
                  Sun{-}Yuan Kung},
  title        = {A delay damage model selection algorithm for {NARX} neural networks},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {45},
  number       = {11},
  pages        = {2719--2730},
  year         = {1997},
  url          = {https://doi.org/10.1109/78.650098},
  doi          = {10.1109/78.650098},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/LinGHK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/SakrLCHG97,
  author       = {Majd F. Sakr and
                  Steven P. Levitan and
                  Donald M. Chiarulli and
                  Bill G. Horne and
                  C. Lee Giles},
  editor       = {Douglas H. Fisher},
  title        = {Predicting Multiprocessor Memory Access Patterns with Learning Models},
  booktitle    = {Proceedings of the Fourteenth International Conference on Machine
                  Learning {(ICML} 1997), Nashville, Tennessee, USA, July 8-12, 1997},
  pages        = {305--312},
  publisher    = {Morgan Kaufmann},
  year         = {1997},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/SakrLCHG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HushLH97,
  author       = {Don R. Hush and
                  Fernando Lozano and
                  Bill G. Horne},
  editor       = {Michael I. Jordan and
                  Michael J. Kearns and
                  Sara A. Solla},
  title        = {Function Approximation with the Sweeping Hinge Algorithm},
  booktitle    = {Advances in Neural Information Processing Systems 10, {[NIPS} Conference,
                  Denver, Colorado, USA, 1997]},
  pages        = {535--541},
  publisher    = {The {MIT} Press},
  year         = {1997},
  url          = {http://papers.nips.cc/paper/1397-function-approximation-with-the-sweeping-hinge-algorithm},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HushLH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/HorneH96,
  author       = {Bill G. Horne and
                  Don R. Hush},
  title        = {Bounds on the complexity of recurrent neural network implementations
                  of finite state machines},
  journal      = {Neural Networks},
  volume       = {9},
  number       = {2},
  pages        = {243--252},
  year         = {1996},
  url          = {https://doi.org/10.1016/0893-6080(95)00095-X},
  doi          = {10.1016/0893-6080(95)00095-X},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/HorneH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LinHTG96,
  author       = {Tsungnan Lin and
                  Bill G. Horne and
                  Peter Ti{\~{n}}o and
                  C. Lee Giles},
  title        = {Learning long-term dependencies in {NARX} recurrent neural networks},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {7},
  number       = {6},
  pages        = {1329--1338},
  year         = {1996},
  url          = {https://doi.org/10.1109/72.548162},
  doi          = {10.1109/72.548162},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/LinHTG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/JimGH96,
  author       = {Kam{-}Chuen Jim and
                  C. Lee Giles and
                  Bill G. Horne},
  title        = {An analysis of noise in recurrent neural networks: convergence and
                  generalization},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {7},
  number       = {6},
  pages        = {1424--1438},
  year         = {1996},
  url          = {https://doi.org/10.1109/72.548170},
  doi          = {10.1109/72.548170},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/JimGH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnn/SakrGLHMC96,
  author       = {Majd F. Sakr and
                  C. Lee Giles and
                  Steven P. Levitan and
                  Bill G. Horne and
                  Marco Maggini and
                  Donald M. Chiarulli},
  title        = {Online prediction of multiprocessor memory access patterns},
  booktitle    = {Proceedings of International Conference on Neural Networks (ICNN'96),
                  Washington, DC, USA, June 3-6, 1996},
  pages        = {1564--1569},
  publisher    = {{IEEE}},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICNN.1996.549133},
  doi          = {10.1109/ICNN.1996.549133},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnn/SakrGLHMC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ClouseGHC96,
  author       = {Daniel S. Clouse and
                  C. Lee Giles and
                  Bill G. Horne and
                  Garrison W. Cottrell},
  editor       = {Michael Mozer and
                  Michael I. Jordan and
                  Thomas Petsche},
  title        = {Representation and Induction of Finite State Machines using Time-Delay
                  Neural Networks},
  booktitle    = {Advances in Neural Information Processing Systems 9, NIPS, Denver,
                  CO, USA, December 2-5, 1996},
  pages        = {403--409},
  publisher    = {{MIT} Press},
  year         = {1996},
  url          = {http://papers.nips.cc/paper/1275-representation-and-induction-of-finite-state-machines-using-time-delay-neural-networks},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ClouseGHC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/GilesHL95,
  author       = {C. Lee Giles and
                  Bill G. Horne and
                  Tsungnan Lin},
  title        = {Learning a class of large finite state machines with a recurrent neural
                  network},
  journal      = {Neural Networks},
  volume       = {8},
  number       = {9},
  pages        = {1359--1365},
  year         = {1995},
  url          = {https://doi.org/10.1016/0893-6080(95)00041-0},
  doi          = {10.1016/0893-6080(95)00041-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nn/GilesHL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LinHTG95,
  author       = {Tsungnan Lin and
                  Bill G. Horne and
                  Peter Ti{\~{n}}o and
                  C. Lee Giles},
  editor       = {David S. Touretzky and
                  Michael Mozer and
                  Michael E. Hasselmo},
  title        = {Learning long-term dependencies is not as difficult with {NARX} networks},
  booktitle    = {Advances in Neural Information Processing Systems 8, NIPS, Denver,
                  CO, USA, November 27-30, 1995},
  pages        = {577--583},
  publisher    = {{MIT} Press},
  year         = {1995},
  url          = {http://papers.nips.cc/paper/1151-learning-long-term-dependencies-is-not-as-difficult-with-narx-networks},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/LinHTG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/HorneSG95,
  author       = {Bill G. Horne and
                  Hava T. Siegelmann and
                  C. Lee Giles},
  editor       = {Miroslav Bartosek and
                  Jan Staudek and
                  Jir{\'{\i}} Wiedermann},
  title        = {What {NARX} Networks Can Compute},
  booktitle    = {{SOFSEM} '95, 22nd Seminar on Current Trends in Theory and Practice
                  of Informatics, Milovy, Czech Republic, November 23 - December 1,
                  1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1012},
  pages        = {95--102},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60609-2\_5},
  doi          = {10.1007/3-540-60609-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/HorneSG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/HorneH94,
  author       = {Bill G. Horne and
                  Don R. Hush},
  title        = {On the node complexity of neural networks},
  journal      = {Neural Networks},
  volume       = {7},
  number       = {9},
  pages        = {1413--1426},
  year         = {1994},
  url          = {https://doi.org/10.1016/0893-6080(94)90089-2},
  doi          = {10.1016/0893-6080(94)90089-2},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/HorneH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LeerinkGHJ94,
  author       = {Laurens R. Leerink and
                  C. Lee Giles and
                  Bill G. Horne and
                  Marwan A. Jabri},
  editor       = {Gerald Tesauro and
                  David S. Touretzky and
                  Todd K. Leen},
  title        = {Learning with Product Units},
  booktitle    = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference,
                  Denver, Colorado, USA, 1994]},
  pages        = {537--544},
  publisher    = {{MIT} Press},
  year         = {1994},
  url          = {http://papers.nips.cc/paper/990-learning-with-product-units},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/LeerinkGHJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/JimHG94,
  author       = {Kam{-}Chuen Jim and
                  Bill G. Horne and
                  C. Lee Giles},
  editor       = {Gerald Tesauro and
                  David S. Touretzky and
                  Todd K. Leen},
  title        = {Effects of Noise on Convergence and Generalization in Recurrent Networks},
  booktitle    = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference,
                  Denver, Colorado, USA, 1994]},
  pages        = {649--656},
  publisher    = {{MIT} Press},
  year         = {1994},
  url          = {http://papers.nips.cc/paper/882-effects-of-noise-on-convergence-and-generalization-in-recurrent-networks},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/JimHG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HorneG94,
  author       = {Bill G. Horne and
                  C. Lee Giles},
  editor       = {Gerald Tesauro and
                  David S. Touretzky and
                  Todd K. Leen},
  title        = {An experimental comparison of recurrent neural networks},
  booktitle    = {Advances in Neural Information Processing Systems 7, {[NIPS} Conference,
                  Denver, Colorado, USA, 1994]},
  pages        = {697--704},
  publisher    = {{MIT} Press},
  year         = {1994},
  url          = {http://papers.nips.cc/paper/1009-an-experimental-comparison-of-recurrent-neural-networks},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/HorneG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/HushH93,
  author       = {Don R. Hush and
                  Bill G. Horne},
  title        = {Progress in supervised neural networks},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {10},
  number       = {1},
  pages        = {8--39},
  year         = {1993},
  url          = {https://doi.org/10.1109/79.180705},
  doi          = {10.1109/79.180705},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spm/HushH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/HorneH93,
  author       = {Bill G. Horne and
                  Don R. Hush},
  editor       = {Jack D. Cowan and
                  Gerald Tesauro and
                  Joshua Alspector},
  title        = {Bounds on the Complexity of Recurrent Neural Network Implementations
                  of Finite State Machines},
  booktitle    = {Advances in Neural Information Processing Systems 6, [7th {NIPS} Conference,
                  Denver, Colorado, USA, 1993]},
  pages        = {359--366},
  publisher    = {Morgan Kaufmann},
  year         = {1993},
  url          = {http://papers.nips.cc/paper/822-bounds-on-the-complexity-of-recurrent-neural-network-implementations-of-finite-state-machines},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/HorneH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/HushHS92,
  author       = {Don R. Hush and
                  Bill G. Horne and
                  John M. Salas},
  title        = {Error surfaces for multilayer perceptrons},
  journal      = {{IEEE} Trans. Syst. Man Cybern.},
  volume       = {22},
  number       = {5},
  pages        = {1152--1161},
  year         = {1992},
  url          = {https://doi.org/10.1109/21.179853},
  doi          = {10.1109/21.179853},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/HushHS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jirs/HorneJV90,
  author       = {Bill G. Horne and
                  Mohammad Jamshidi and
                  Nader Vadiee},
  title        = {Neural networks in robotics: {A} survey},
  journal      = {J. Intell. Robotic Syst.},
  volume       = {3},
  number       = {1},
  pages        = {51--66},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF00368972},
  doi          = {10.1007/BF00368972},
  timestamp    = {Tue, 07 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jirs/HorneJV90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/HorneH90,
  author       = {Bill G. Horne and
                  Don R. Hush},
  title        = {Estimating a posteriori probability with P-type nodes},
  booktitle    = {{IJCNN} 1990, International Joint Conference on Neural Networks, San
                  Diego, CA, USA, June 17-21, 1990},
  pages        = {691--696},
  publisher    = {{IEEE}},
  year         = {1990},
  url          = {https://doi.org/10.1109/IJCNN.1990.137649},
  doi          = {10.1109/IJCNN.1990.137649},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/HorneH90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics