Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthias Huber is active.

Publication


Featured researches published by Matthias Huber.


european conference on machine learning | 2008

Mining edge-weighted call graphs to localise software bugs

Frank Eichinger; Klemens Böhm; Matthias Huber

An important problem in software engineering is the automated discovery of noncrashing occasional bugs. In this work we address this problem and show that mining of weighted call graphs of program executions is a promising technique. We mine weighted graphs with a combination of structural and numerical techniques. More specifically, we propose a novel reduction technique for call graphs which introduces edge weights. Then we present an analysis technique for such weighted call graphs based on graph mining and on traditional feature selection schemes. The technique generalises previous graph mining approaches as it allows for an analysis of weights. Our evaluation shows that our approach finds bugs which previous approaches cannot detect so far. Our technique also doubles the precision of finding bugs which existing techniques can already localise in principle.


availability, reliability and security | 2013

Cumulus4j: A Provably Secure Database Abstraction Layer

Matthias Huber; Matthias Gabel; Marco Schulze; Alexander Bieber

Cloud Computing has huge impact on IT systems. It offers advantages like flexibility and reduced costs. Privacy and security issues, however, remain a major drawback. While data can be secured against external threats using standard techniques, service providers themselves have to be trusted to ensure privacy.


International Conference on Innovative Techniques and Applications of Artificial Intelligence | 2010

On the Usefulness of Weight-Based Constraints in Frequent Subgraph Mining ?

Frank Eichinger; Matthias Huber; Klemens Böhm

Frequent subgraph mining is an important data-mining technique. In this paper we look at weighted graphs, which are ubiquitous in the real world. The analysis of weights in combination with mining for substructures might yield more precise results. In particular, we study frequent subgraph mining in the presence of weight-based constraints and explain how to integrate them into mining algorithms. While such constraints only yield approximate mining results in most cases, we demonstrate that such results are useful nevertheless and explain this effect. To do so, we both assess the completeness of the approximate result sets, and we carry out application-oriented studies with real-world data-analysis problems: software-defect localization and explorative mining in transportation logistics. Our results are that the runtime can improve by a factor of up to 3.5 in defect localization and 7 in explorative mining. At the same time, we obtain an even slightly increased defect-localization precision and obtain good explorative mining results.


ISPE CE | 2011

MimoSecco: A Middleware for Secure Cloud Storage

Dirk Achenbach; Matthias Gabel; Matthias Huber

The biggest impediment for the adoption of cloud computing practices is the lack of trust in the confidentiality of one’s data in the cloud. The prevalent threat in the cloud computing model are so-called insider attacks. Full data encryption can only solve the problem in the trivial case of backups. Any sophisticated service provided on data requires insight into the structure of that data. One purpose of encryption is to prevent such insights. We introduce the MimoSecco project. In MimoSecco, we are investigating reasonable compromises. We employ two techniques, separation of duties and secure hardware. With separation of duties, we fragment a database and separate the fragments geographically. The goal is to make it infeasible to reconstruct the database from one fragment alone. The secure hardware tokens we employ are hard-to-copy devices which offer encryption, decryption and cryptographically signing of data. The keys used are stored in the tamper-proof hardware device and never leave it. We are in the process of developing a prototypical database adapter that behaves like a SQL database, but stores data securely.


european conference on research and advanced technology for digital libraries | 2010

Privacy-aware folksonomies

Clemens Heidinger; Erik Buchmann; Matthias Huber; Klemens Böhm; Jörn Müller-Quade

Many popular web sites use folksonomies to let people label objects like images (Flickr), music (Last.fm), or URLs (Delicous) with schema-free tags. Folksonomies may reveal personal information. For example, tags can contain sensitive information, the set of tagged objects might disclose interests, etc. While many users call for sophisticated privacy mechanisms, current folksonomy systems provide coarse mechanisms at most, and the system provider has access to all information. This paper proposes a privacy-aware folksonomy system. Our approach consists of a partitioning scheme that distributes the folksonomy data among four providers and makes use of encryption. A key sharing mechanism allows a user to control which party is able to access which data item she has generated. We prove that our approach generates folksonomy databases that are indistinguishable from databases consisting of random tuples.


international symposium on stabilization safety and security of distributed systems | 2009

Brief Announcement: Towards Secure Cloud Computing

Christian Henrich; Matthias Huber; Carmen Kempka; Jörn Müller-Quade; Mario Strefler

Security of cloud computing in the strict cryptographic sense is impossible to achieve practically. We propose a pragmatic security approach providing application-specific security under practical constraints.


computer assisted radiology and surgery | 2018

IMHOTEP: virtual reality framework for surgical applications

Micha Pfeiffer; Hannes Kenngott; Anas Preukschas; Matthias Huber; Lisa Bettscheider; Beat P. Müller-Stich; Stefanie Speidel

PurposeThe data which is available to surgeons before, during and after surgery is steadily increasing in quantity as well as diversity. When planning a patient’s treatment, this large amount of information can be difficult to interpret. To aid in processing the information, new methods need to be found to present multimodal patient data, ideally combining textual, imagery, temporal and 3D data in a holistic and context-aware system.MethodsWe present an open-source framework which allows handling of patient data in a virtual reality (VR) environment. By using VR technology, the workspace available to the surgeon is maximized and 3D patient data is rendered in stereo, which increases depth perception. The framework organizes the data into workspaces and contains tools which allow users to control, manipulate and enhance the data. Due to the framework’s modular design, it can easily be adapted and extended for various clinical applications.ResultsThe framework was evaluated by clinical personnel (77 participants). The majority of the group stated that a complex surgical situation is easier to comprehend by using the framework, and that it is very well suited for education. Furthermore, the application to various clinical scenarios—including the simulation of excitation propagation in the human atrium—demonstrated the framework’s adaptability. As a feasibility study, the framework was used during the planning phase of the surgical removal of a large central carcinoma from a patient’s liver.ConclusionThe clinical evaluation showed a large potential and high acceptance for the VR environment in a medical context. The various applications confirmed that the framework is easily extended and can be used in real-time simulation as well as for the manipulation of complex anatomical structures.


mining and learning with graphs | 2008

Improved Software Fault Detection with Graph Mining

Frank Eichinger; Klemens Böhm; Matthias Huber


Archive | 2010

Challenges and Opportunities of Cloud Computing Trade-off Decisions in Cloud Computing Architecture

Michael Hauck; Matthias Huber; Markus Klems; Samuel Kounev; Jörn Müller-Quade; Alexander Pretschner; Ralf H. Reussner; Stefan Tai


GI-Jahrestagung | 2011

Towards Secure Cloud Computing through a Separation of Duties

Matthias Huber; Christian Henrich; Jörn Müller-Quade; Carmen Kempka

Collaboration


Dive into the Matthias Huber's collaboration.

Top Co-Authors

Avatar

Jörn Müller-Quade

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Klemens Böhm

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Frank Eichinger

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Carmen Kempka

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Christian Henrich

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Matthias Gabel

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ralf H. Reussner

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Andreas Oberweis

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Clemens Heidinger

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dirk Achenbach

Karlsruhe Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge