Folgen
Manuel Huber
Manuel Huber
Bestätigte E-Mail-Adresse bei in.tum.de
Titel
Zitiert von
Zitiert von
Jahr
Connecting artificial brains to robots in a comprehensive simulation framework: the neurorobotics platform
E Falotico, L Vannucci, A Ambrosano, U Albanese, S Ulbrich, ...
Frontiers in neurorobotics 11, 2, 2017
1482017
Ids reference architecture model. industrial data space. version 2.0
B Otto, S Lohmann, S Steinbuss, A Teuscher, S Auer, M Boehmer, J Bohn, ...
International Data Spaces Association, 2018
1312018
SEVered: Subverting AMD's virtual machine encryption
M Morbitzer, M Huber, J Horsch, S Wessel
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
1082018
Shadow tracking on multi-touch tables
F Echtler, M Huber, G Klinker
Proceedings of the working conference on Advanced visual interfaces, 388-391, 2008
1002008
Dominance as a new trusted computing primitive for the internet of things
M Xu, M Huber, Z Sun, P England, M Peinado, S Lee, A Marochko, ...
2019 IEEE Symposium on Security and Privacy (SP), 1415-1430, 2019
742019
A system architecture for ubiquitous tracking environments
M Huber, D Pustka, P Keitler, F Echtler, G Klinker
2007 6th IEEE and ACM International Symposium on Mixed and Augmented Reality …, 2007
722007
Spatial relationship patterns: Elements of reusable tracking and calibration systems
D Pustka, M Huber, M Bauer, G Klinker
2006 IEEE/ACM International Symposium on Mixed and Augmented Reality, 88-97, 2006
662006
The city of sights: Design, construction, and measurement of an augmented reality stage set
L Gruber, S Gauglitz, J Ventura, S Zollmann, M Huber, M Schlegel, ...
2010 IEEE International Symposium on Mixed and Augmented Reality, 157-163, 2010
582010
Reference architecture model for the industrial data space
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, ...
Fraunhofer-Gesellschaft, 2017
542017
Extracting secrets from encrypted virtual machines
M Morbitzer, M Huber, J Horsch
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
522019
Improving mobile device security with operating system-level virtualization
S Wessel, M Huber, F Stumpf, C Eckert
Computers & Security 52, 207-220, 2015
392015
An ecosystem and IoT device architecture for building trust in the industrial data space
GS Brost, M Huber, M Weiß, M Protsenko, J Schütte, S Wessel
Proceedings of the 4th ACM workshop on cyber-physical system security, 39-50, 2018
372018
Tracking for distributed mixed reality environments
J Newman, A Bornik, D Pustka, F Echtler, M Huber, D Schmalstieg, ...
Workshop on Trands and Issues in Tracking for Virtual Environments at the …, 2007
342007
Automatic configuration of pervasive sensor networks for augmented reality
D Pustka, M Huber, C Waechter, F Echtler, P Keitler, J Newman, ...
IEEE Pervasive Computing 10 (3), 68-79, 2010
332010
The lazarus effect: Healing compromised devices in the internet of small things
M Huber, S Hristozov, S Ott, V Sarafov, M Peinado
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
312020
Temporal calibration in multisensor tracking setups
M Huber, M Schlegel, G Klinker
2009 8th IEEE International Symposium on Mixed and Augmented Reality, 195-196, 2009
272009
Optical outside-in tracking using unmodified mobile phones
D Pustka, JP Hülß, J Willneff, F Pankratz, M Huber, G Klinker
2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), 81-89, 2012
212012
A multi-sensor platform for wide-area tracking
C Waechter, M Huber, P Keitler, M Schlegel, G Klinker, D Pustka
2010 IEEE International Symposium on Mixed and Augmented Reality, 275-276, 2010
202010
Applying real-time programming to legacy embedded control software
S Resmerita, A Naderlinger, M Huber, K Butts, W Pree
2015 IEEE 18th International Symposium on Real-Time Distributed Computing, 1-8, 2015
182015
Freeze and Crypt: Linux kernel support for main memory encryption
M Huber, J Horsch, J Ali, S Wessel
Computers & Security 86, 420-436, 2019
162019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20