<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Year-2014</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/123" rel="alternate"/>
<subtitle/>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/123</id>
<updated>2026-04-11T17:00:59Z</updated>
<dc:date>2026-04-11T17:00:59Z</dc:date>
<entry>
<title>Perception of data privacy in digital forensic investigation</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/210" rel="alternate"/>
<author>
<name>Verma, Robin</name>
</author>
<author>
<name>Gupta, Gaurav</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/210</id>
<updated>2017-07-24T17:15:35Z</updated>
<published>2014-12-25T07:23:25Z</published>
<summary type="text">Perception of data privacy in digital forensic investigation
Verma, Robin; Gupta, Gaurav
The use of digital technology in conventional as well as new age crimes is increasing throughout the world, and researchers are&#13;
working to develop digital forensics techniques to investigate such crimes. Digital forensic investigation process requires the digital&#13;
forensic investigator to manually examine the forensic image of the seized storage media. The investigator gets full access of all the&#13;
data contained in the forensic image including the accused or the victim’s private or sensitive data that may be entirely unrelated&#13;
to the given case. The unrestricted access on the seized media or its forensic image becomes a significant threat to the accused&#13;
or the victim’s data privacy as the investigator can view or copy the data at will. There is no legal or technical infrastructure in&#13;
place to stop such abuse. The paper presents a study containing three different surveys for the three stakeholders in the digital&#13;
forensic investigation and aim to capture their perception of the accused or the victim’s data privacy. The surveys were circulated in&#13;
India among the digital forensic investigators, cyber lawyers and the general public respectively. These surveys included questions&#13;
related to the privacy of digital data present on the storage media during the course of digital forensic investigation and subsequent&#13;
trial in court of law. The surveys collected 15, 10 and 1889 responses from participants of respective target audience classes. The&#13;
responses show lack of professional ethics among investigators, lack of legal support for lawyers to protect data privacy during&#13;
digital forensic investigation and confusion among the general public regarding their data privacy rights. The findings would help&#13;
in justifying the need for privacy preserving digital forensic investigation framework that protect privacy during the digital forensic&#13;
investigation process without compromising on efficiency and performance.
</summary>
<dc:date>2014-12-25T07:23:25Z</dc:date>
</entry>
<entry>
<title>An smartphone-based algorithm to measure and model quantity of sleep</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/197" rel="alternate"/>
<author>
<name>Gautam, Alvika</name>
</author>
<author>
<name>Naik, Vinayak</name>
</author>
<author>
<name>Gupta, Archie</name>
</author>
<author>
<name>Sharma, SK</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/197</id>
<updated>2017-07-24T17:15:09Z</updated>
<published>2014-09-17T08:14:38Z</published>
<summary type="text">An smartphone-based algorithm to measure and model quantity of sleep
Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK
Sleep quantity affects an individual’s personal health.&#13;
The gold standard of measuring sleep and diagnosing sleep&#13;
disorders is Polysomnography (PSG). Although PSG is accurate,&#13;
it is expensive and it lacks portability. A number of wearable&#13;
devices with embedded sensors have emerged in the recent past&#13;
as an alternative to PSG for regular sleep monitoring directly&#13;
by the user. These devices are intrusive and cause discomfort&#13;
besides being expensive. In this work, we present an algorithm&#13;
to detect sleep using a smartphone with the help of its inbuilt&#13;
accelerometer sensor. We present three different approaches to&#13;
classify raw acceleration data into two states - Sleep and Wake. In&#13;
the first approach, we take an equation from Kushida’s algorithm&#13;
to process accelerometer data. Henceforth, we call it Kushida’s&#13;
equation. While the second is based on statistical functions,&#13;
the third is based on Hidden Markov Model (HMM) training.&#13;
Although all the three approaches are suitable for a phone’s&#13;
resources, each approach demands different amount of resources.&#13;
While Kushida’s equation-based approach demands the least, the&#13;
HMM training-based approach demands the maximum.&#13;
We collected data from mobile phone’s accelerometer for four&#13;
subjects for twelve days each. We compare accuracy of sleep&#13;
detection using each of the three approaches with that of Zeo&#13;
sensor, which is based on Electroencephalogram (EEG) sensor to&#13;
detect sleep. EEG is an important modality in PSG. We find that&#13;
HMM training-based approach is as much as 84% accurate. It is&#13;
15% more accurate as compared to Kushida’s equation-based&#13;
approach and 10% more accurate as compared to statistical&#13;
method-based approach. In order to concisely represent the sleep&#13;
quality of people, we model their sleep data using HMM. We&#13;
present an analysis to find out a tradeoff between the amount&#13;
of training data and the accuracy provided in the modeling&#13;
of sleep. We find that six days of sleep data is sufficient for&#13;
accurate modeling. We compare accuracy of our HMM trainingbased&#13;
algorithm with a representative third party app SleepTime&#13;
available from Google Play Store for Android. We find that the&#13;
detection done using HMM approach is closer to that done by&#13;
Zeo by 13% as compared to the third party Android application&#13;
SleepTime. We show that our HMM training-based approach is&#13;
efficient as it takes less than ten seconds to get executed on Moto&#13;
G Android phone.
</summary>
<dc:date>2014-09-17T08:14:38Z</dc:date>
</entry>
<entry>
<title>ACCORD : an analytical cache contention model using reuse distances for modern multiprocessors</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/196" rel="alternate"/>
<author>
<name>Hemani, Rakhi</name>
</author>
<author>
<name>Banerjee, Subhasis</name>
</author>
<author>
<name>Guha, Apala</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/196</id>
<updated>2017-07-24T17:15:45Z</updated>
<published>2014-09-15T10:56:05Z</published>
<summary type="text">ACCORD : an analytical cache contention model using reuse distances for modern multiprocessors
Hemani, Rakhi; Banerjee, Subhasis; Guha, Apala
Simultaneous execution of multiple threads on multicores&#13;
is necessary for good resource utilization. However, such&#13;
utilization calls for accurate models to predict the impact on&#13;
performance due to contention of shared resources, primarily&#13;
the last level cache and memory. The major challenges in&#13;
developing such a model for commercial multicore machines&#13;
are the unavailability of cache implementation details and the&#13;
scalability of the performance prediction model for multiple&#13;
threads. In this paper we propose a cache contention model&#13;
addressing both these challenges. We leverage observed cache&#13;
behaviour and reuse distance profile of applications for this&#13;
purpose. We implement our model on a Xeon Sandy Bridge&#13;
multicore and observe an RMS error of less than 0.06, for single&#13;
threaded and multi-threaded workloads. Further we compare the&#13;
effectiveness of using ACCORD model against the popular LRU&#13;
Model and find that ACCORD is upto 2.7 times more accurate.
</summary>
<dc:date>2014-09-15T10:56:05Z</dc:date>
</entry>
<entry>
<title>Consumer privacy and targeted pricing with stochastic valuations</title>
<link href="http://repository.iiitd.edu.in/xmlui/handle/123456789/160" rel="alternate"/>
<author>
<name>Mishra, Shreemoy</name>
</author>
<id>http://repository.iiitd.edu.in/xmlui/handle/123456789/160</id>
<updated>2017-07-24T17:15:08Z</updated>
<published>2014-07-16T11:30:00Z</published>
<summary type="text">Consumer privacy and targeted pricing with stochastic valuations
Mishra, Shreemoy
I study the market for consumer information. Firms cannot commit to privacy, so buyers anticipate&#13;
disclosure of purchase history for targeted pricing. In the literature, strategic rejections&#13;
of informative o ers make purchase data worthless, which is paradoxical given the large investments&#13;
in data analytics. I show that buyers' uncertainty regarding future preferences allows full&#13;
separation of types, leading to valuable purchase data. Buyers of any given type are assumed&#13;
to share similar expectations about the evolution of future valuations. Preference uncertainty&#13;
generates consumer-to-consumer externalities, which is why strategic consumers are sometimes&#13;
better o  when they remain unaware of targeted pricing. When preferences are transitory,  rms&#13;
have an incentive to raise consumer awareness about targeted pricing.
</summary>
<dc:date>2014-07-16T11:30:00Z</dc:date>
</entry>
</feed>
