168 research outputs found

    Jotmail: A voicemail interface that enables you to see what was said

    Get PDF
    stevew/julia/urs @ research.att.com Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly problematic for users. We present a novel, Web-based, voicemail interface, Jotmail. The design was based on data from several studies of voicemail tasks and user strategies. The GUI has two main elements: (a) personal annotations that serve as a visual analogue to underlying speech; (b) automatically derived message header information. We evaluated Jotmail in an 8-week field trial, where people used it as their only means for accessing voicemail. Jotmail was successful in supporting most key voicemail tasks, although users ' electronic annotation and archiving behaviors were different from our initial predictions. Our results argue for the utility of a combination of annotation based indexing and automatically derived information, as a general technique for accessing speech archives

    Handling Policy Conflicts in Call Control

    Get PDF
    Policies are becoming increasingly important in modern computer systems as a mechanism for end users and organisations to exhibit a level of control over software. Policies have long been established as an effective mechanism for enabling appropriate access control over resources, and for enforcing security considerations. However they are now becoming valued as a more general management mechanism for large-scale heterogeneous systems, including those exhibiting adaptive or autonomic behaviour. In the telecommunications domain, features have been widely used to provide users with (limited) control over calls. However, features have the disadvantage that they are low-level and implementation-oriented in nature. Furthermore, apart from limited parameterisation of some features, they tend to be very inflexible. Policies, in contrast, have the potential to be much higher-level, goaloriented, and very flexible. This paper presents an architecture and its realisation for distributed and hierarchical policies within the telecommunications domain. The work deals with the important issue of policy conflict – the analogy of feature interaction

    Automatic summarization of voicemail messages using lexical and prosodic features

    Get PDF
    This article presents trainable methods for extracting principal content words from voicemail messages. The short text summaries generated are suitable for mobile messaging applications. The system uses a set of classifiers to identify the summary words with each word described by a vector of lexical and prosodic features. We use an ROC-based algorithm, Parcel, to select input features (and classifiers). We have performed a series of objective and subjective evaluations using unseen data from two different speech recognition systems as well as human transcriptions of voicemail speech

    COMMUNICATION LINKING UTP VOICEMAIL SYSTEM ADD-ON

    Get PDF
    This paper is intended to present author's Final Year Project (FYP), Communication Linking: Voicemail System Add-on (VMSA) for small and medium size company. The project dissertation explains in detail about proposed prototype, "Universiti Teknologi PETRONAS (UTP) Voicemail System", which is implemented based on VMSA to enhance current traditional phone extension in UTP. It shows the importance of this system in UTP; how it benefits both students and lecturers in UTP. Moreover, this paper will discuss the built-in features and tools to assist user accessing their voicemail more effectively and efficiently. Besides describing the system in general, it will discuss all VMSA features to be added to the "UTP Voicemail System" such as local area network (LAN) call, voicemail capability with E-mail and SMS notification, voice-prompt with text to speech tool, phone number filtering, and Voicemail Graphical User Interface (VMGUI). Furthermore, it will introduce "Asterisk" open-source Private Branch Exchange (PBX) software for handling voice communication and voice recording and some other open-source software. Lastly, it will explain result of each development phase of the prototype and some recommendations for future improvement

    Content-based access to spoken audio

    Get PDF
    The amount of archived audio material in digital form is increasing rapidly, as advantage is taken of the growth in available storage and processing power. Computational resources are becoming less of a bottleneck to digitally record and archive vast amounts of spoken material, both television and radio broadcasts and individual conversations. However, listening to this ever-growing amount of spoken audio sequentially is too slow, and the bottleneck will become the development of effective ways to access content in these voluminous archives. The provision of accurate and efficient computer-mediated content access is a challenging task, because spoken audio combines information from multiple levels (phonetic, acoustic, syntactic, semantic and discourse). Most systems that assist humans in accessing spoken audio content have approached the problem by performing automatic speech recognition, followed by text-based information access. These systems have addressed diverse tasks including indexing and retrieving voicemail messages, searching for broadcast news, and extracting information from recordings of meetings and lectures. Spoken audio content is far richer than what a simple textual transcription can capture as it has additional cues that disclose the intended meaning and speaker’s emotional state. However, the text transcription alone still provides a great deal of useful information in applications. This article describes approaches to content-based access to spoken audio with a qualitative and tutorial emphasis. We describe how the analysis, retrieval and delivery phases contribute making spoken audio content more accessible, and we outline a number of outstanding research issues. We also discuss the main application domains and try to identify important issues for future developments. The structure of the article is based on general system architecture for content-based access which is depicted in Figure 1. Although the tasks within each processing stage may appear unconnected, the interdependencies and the sequence with which they take place vary

    Improving customer service through efficient and effective processes and procedures

    Get PDF
    The goal of this project is to determine whether the South Carolina Department on Aging is effectively and efficiently utilizing all resources at the front desk to give exceptional customer service to clients and constituents. The main goal of the receptionist is to receive calls, transfer calls, and to input all calls into the database. Currently, there are no adequate processes and procedures in place to ensure that the calls have been properly transferred, inputted, and assisted. If these processes were in place, through accountability and controls, the agency can leverage the data and increase effectiveness and efficiency, which would ensure that clients receive adequate services to meet their needs

    Novel System and Method For Telephone Network Planing Based on Neutrosophic Graph

    Get PDF
    Telephony is gaining momentum in the daily lives of individuals and in the activities of all companies. With the great trend towards telephony networks, whether analogue or digital known as Voice over IP (VoIP), the number of calls an individual can receive becomes considerably high. However, effective management of incoming calls to subscribers becomes a necessity. Recently, much attention has been paid towards applications of single-valued neutrosophic graphs in various research fields. One of the suitable reason is it provides a generalized representation of fuzzy graphs (FGs) for dealing with human nature more effectively when compared to existing models i.e. intuitionistic fuzzy graphs (IFGs), inter-valued fuzzy graphs (IVFGs) and bipolar-valued fuzzy graphs (BPVFGs) etc. In this paper we focused on precise analysis of useful information extracted by calls received, not received due to some reasons using the properties of SVNGs. Hence the proposed method introduced one of the first kind of mathematical model for precise analysis of instantaneous traffic beyond the Erlang unit. To achieve this goal an algorithm is proposed for a neutrosophic mobile network model (NMNM) based on a hypothetical data set. In addition, the drawback and further improvement of proposed method with a mathematical proposition is established for it precise applications

    Comparative Evaluation of Mobile Forensic Tools

    Get PDF
    The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime. Therefore, proper steps need to be ensured for Confidentiality, Integrity, Authenticity and legal acquisition of any form of digital evidence from the mobile devices. This study evaluates some mobile forensic tools that were developed mainly for mobile devices memory and SIM cards. An experiment was designed with five android phones with different Operating System. Four tools were used to find out the capability and efficiency of the tools when used on the sampled phones. This would help the forensic investigator to know the type of tools that will be suitable for each phone to be investigated for acquiring digital evidence. The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit. The experimental result shows that, Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data

    Policies for H.323 Internet Telephony

    Get PDF
    Firstly, this report examines in which mode an H.323 gatekeeper should work for enforcing policies. Then, it explores how the gatekeeper can cooperate with a policy server. The report discusses how to complement a gatekeeper with policies, using GNU Gk as the basis. The approach takes into account issues of robustness, simplicity and scalability. Finally, the report investigates how to design H.323 policies, and how to combine these with SIP policies on a policy server
    • 

    corecore