Context and Intent In Call Processing Tom Gray, Ramiro Liscano, Barry Wellman, Anabel Quan Haase, T. Radhakrishnan, Yongseok Choi.

Slides:



Advertisements
Similar presentations
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Advertisements

CLUE REQUIREMENTS IETF 80 Allyn Romanow
Information Document 18-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI)
ENT4310 Business Economics and Marketing A six-step model for marketing research Arild Aspelund.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Theories of CMC.
1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
3GPP Presence Requirements Requirements for Presence Service based on 3GPP specifications and wireless environment characteristics draft-kiss-simple-presence-wireless-
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
Communication in Organizations
Postmodern definition of a culture in the education of intercultural communication Katja Keisala.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
1 A Study on Wearable Computing Kunal Ganguly CS898A – Mobile / Wireless Communications.
PRAGMATICS. 3- Pragmatics is the study of how more gets communicated than is said. It explores how a great deal of what is unsaid is recognized. 4.
1 Objective of today’s lesson S oftware engineering occurs as a consequence of a process called system engineering. Instead of concentrating solely on.
Course Instructor: Aisha Azeem
Online Communities Academic Publishing Perspective.
Call Center – What Really Makes Sense? Call Center – ce este cu adevarat important?
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
November 2008 Michael Smith (SAIC) Steve Lockwood (PB Consult) NCHRP Project SP20-59 (17) CAPTA Costing Asset Protection: An All Hazards Guide for Transportation.
Sales Force Automation and Automated Customer Service Centers
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
WELCOME TO UNIT 7 Customer Service MT 221 Marilyn Radu, Instructor.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
GOOGLE TALK, TRANSLATE, VOICE Group #6: Michelle Nakamoto, Jennifer Morgan, Ashley Uhrin October 23, 2013 Westphal EDT321.
Chapter 12 The Impact of Globalization on Customer Service
Tussel in Cyberspace Based on Slides by I. Stoica.
CHAPTER 5 Learning-centred Leadership Sisilia P Indahayu
© Aastra Telecom Schweiz AG – 2013 Sales Presentation Updated as of Release 2.1 [depl-1658v2.10] Aastra 400 and Aastra BluStar Ecosystem All-in-one Business.
Features, Policies and Their Interactions Joanne M. Atlee Department of Computer Science University of Waterloo.
CONCEPTS AND DEFINITIONS IN KM B.V.L.Narayana Senior professor (T M ), RSC/BRC.
1 Anabel Quan-Haase Barry Wellman Feature Interaction Workshop: Panel on New Features Ottawa, June Designing vs. Using Features of Communication.
The Art of Networking Competences for Networking in European Education Cultural Diversity in Networks: Opportunities and Challenges.
Information Management LIS /1/99 Martha Richardson.
OCRI Partnership Conference Series - Ottawa, Presence Services: A Look at the Future Tom Gray Luigi Logrippo Pinetel Université du Québec.
Appendix A UM in Microsoft® Exchange Server 2010.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
VIRTUAL WORLDS IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Enterprise Systems Architectures EGN 5621 Enterprise Systems Collaboration (Professional MSEM) Fall, 2012.
From Objects to Assets: The Fungibility of Knowledge Christopher W. Higgins, Esq.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion José Simões Fraunhofer Institute FOKUS
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Social Groups andOrganizations Chapter 6. Social group  Consists of a number of people who have a common identity, some feeling of unity, and certain.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Do not turn on your computers.
Industry’s Perspective on Industry-University Intellectual Property External Research Directors Network Industrial Research Institute, Inc. April 17, 2001.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
SSE3 Knowledge mangement concepts 1. Agenda What is knowledge management Classification of knowledge Knowledge management process Common/shared information.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
WELCOME TO UNIT 7. Unit 7 The Impact of Globalization on Customer Service Objectives Understand the impact globalization has had on the world economy.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Internet Business Associate v2.0
Contextual Intelligence as a Driver of Services Innovation
Reading Interests of Adults
Presentation transcript:

Context and Intent In Call Processing Tom Gray, Ramiro Liscano, Barry Wellman, Anabel Quan Haase, T. Radhakrishnan, Yongseok Choi

Technological Change Technological change now facing vendors of enterprise PBXs Development of IP and wireless technologies for this market is apace Large investment However sales are not as hoped

Assumption Change Connections are made between devices Devices are fixed in location User identity is their device directory number Device functions to a single user’s preferences Busy is a device state

How & Why People Communicate Thomas J. Allen’s networks –networks of recognized competence –success correlated directly with amount of informal interaction negative correlation - literature consultation and success –informal - new & tacit knowledge –communication and knowledge management are directly key to success

Current Tools Babble (IBM Erickson, Kellogg, Bradner) social translucence - social affordances visibility & higher performance –online, status, involvement with others Hillier architecture predictive model of interaction from visibility Both augment rather than recreate reality

Features - Proactive Availability Engender informal interaction by increasing casual visibility voice mail - asynchronous | telephone - synchronous Availability - willingness to talk filters to allow visibility but to protect from unwanted interactions –multiple locations with multiple expectations of proper operation –visible clues from Hillier, Buxton … –organizational norms »stability

Role As Relationship

New Feature Types Two new feature types –reactive (CoC) and proactive (PoA) CoC –similar to current feature set but keyed to user current activity and role within organization PoA –detect and analyze current user state and project availability for discussion

Call Processing & Presence Presence & Availability –relation to PoA & possible interactions –availability determined by state of call processing features (DND example) –presence is really hypothetical call processing –presence and call processing are specializations of a higher level concept

Context & Intent Context ‘any information that can characterize the situation of an entity. An entity is a person, place or object that is relevant to the interaction between a user and an application including the user and applications themselves’ similarity to role Context can indicate Intent (purpose) and therefore proper call handling c.f. Hillier, Babble, Buxton etc who, what, when, where => why

Tri-partite Architecture

Context-Aware Call Processing

FI and Context Rules Filtering & Avoidance Resolution emphasized over detection Sociological resolution (generic rules) Rules –most specific –newest –random –absolute –contextual background - importance and interruptability

Current & Future Work Policy Languages –human-aware filtering Context and User Activity Sensing Test and Development System Native Call Processing Policy Engine Add Hoc Distributed Meeting Tools

Conclusions Current feature set does not full exploit possibilities of IP telephony New areas of feature operation becoming available informal and ad hoc group services Personalization is about group behavior Polices offer way forward FI - filtering and resolution