1 Overview CUTE (Columbia University Telecommunication service Editor) GUI-based service creation tool to help inexperienced users to create services Service.

Slides:



Advertisements
Similar presentations
Feature Interaction Handling in LESS Xiaotao Wu and Henning Schulzrinne Internet Real Time Laboratory.
Advertisements

Pesticides, Health, and Poverty -Further Perspectives Pesticides, Health, and Poverty Further Perspectives.
Work Flows of the Online Review System Copernicus Office Editor Copernicus Publications | April 2014.
ICD 9 to 10 Translation Tool Slide 1. Agenda Framework Overview Functional Coverage Feature List Screenshots Conversion Approach Framework Architecture.
Machine Learning: Lecture 9
Chapter 4 Quality Assurance in Context
Note: See the text itself for full citations. Information Technology Project Management, Seventh Edition.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Artificial Intelligence MEI 2008/2009 Bruno Paulette.
Chapter 11 Artificial Intelligence and Expert Systems.
Switching Bridging and Switching Risanuri Hidayat Bridges and switches are data communications devices that operate principally at Layer 2 of the OSI reference.
A Tool to Support Ontology Creation Based on Incremental Mini- Ontology Merging Zonghui Lian Data Extraction Research Group Supported by Spring Conference.
Requirements Structure 2.0 Clark Elliott Instructor With debt to Chris Thomopolous and Ali Merchant Original Authors.
12.The Chi-square Test and the Analysis of the Contingency Tables 12.1Contingency Table 12.2A Words of Caution about Chi-Square Test.
Social Network Priyanka Agrawal. Introduction Social Network is a social structure made of nodes that are tied by one or more specific types of relations.
Projects Overview Andrea Forte Fast L3 handoff Passive DAD (pDAD) Cooperative Roaming (CR) Highly congested IEEE networks – Measurements.
Overview and Introduction
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
UCTE CIM VISUALIZATION & EDITING TOOL Jun Zhu, Power Info LLC CIM User Group Meeting, Genval 2009.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Condor Technology Solutions, Inc. Grace RFTS Application Extension Phase.
Voice over IP Spring LNA Meeting April 1, What is Voice over IP? n A technology for transporting integrated digital voice, video and data over IP.
Kalpaware, Inc presents.... SimNetwork Game overview Genre: Real Time Strategy Similar to SimCity Player is a network designer of a large telecommunications.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
First things, First Do you belong in here? – 10 – 12 – Comp. Discovery or Keyboard/Comp Apps – Do you have any experience with Web Page Design?????
Developing a Predictive Model of Quality of Experience for Internet Video Athula Balachandran -CMU.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 11 Project Risk Management.
 Goals:  Explain the relationship between risk and return when investing.  Describe how to evaluate the level of risk you should accept when investing.
Module 4: Systems Development Chapter 12: (IS) Project Management.
Risk Management in the Built Environment Qualitative and Quantitative Risk Management By Professor Simon Burtonshaw-Gunn – licensed under the Creative.
Ubiquitous Programmable Internet Telephony End System Services Xiaotao Wu Internet Real Time Laboratory Thesis defense 02/06/2007.
Storing Organizational Information - Databases
 Building Networks. First Decisions  What do the nodes represent?  What do the edges represent?  Know this before doing anything with data!
By: Guleed, Eugene & Niesanthan.  The topic of this project is to determine the effect that technology has had on the way people interact with each other.
SIPPING - IETF 62 - Minneapolis (March 2005) LESS effort, more services Xiaotao Wu Henning Schulzrinne Dept. of Computer Science Columbia University.
Bio – group. The big ideas Track the implications of results from other aspects of biology. Make sense of mass phenotyping datasets Address the paradox:
Luis F. Aguas Technological innovation Project Telecommunications and Digital TV.
Client Management Production Process.
Background Nowadays, different software systems developed in- house are growing; companies or organization is facing problems of new collaborations and.
Introduction defining communication. communication let’s draw our map.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
© 2005 Prentice Hall1-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Cis339 Chapter 4 Identifying and Selecting Systems Development Projects 4.1 Modern Systems Analysis and Design Fifth Edition.
Organizational Design, Diagnosis, & Development Session 1 An Overview of Organizational Design, Diagnosis, & Development.
H&PE New Curriculum, New Approach Health & Physical Education Department - TCDSB.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
Why Sell Cookies?. Cookie sales are part of a mission to help girls learn 5 skills that are essential to leadership, to success, and to life.  Skill.
0 Corporate Finance Ross  Westerfield  Jaffe Seventh Edition 6 Chapter Six Some Alternative Investment Rules.
Personal Power 5: Value and belief system
Microsoft NetMeeting Setup and Use. First Steps Find out what your network address is. –Start/Run. Type “command.” –At the prompt, type “ipconfig.” –Write.
“…the patterns of unequal access to information technology based on income, race, ethnicity, gender, age, and geography…” “The metaphor of a great chasm.
The Testing Process I1 Testing Programs Even a non-programmer can test a program. In fact each of us evaluates a program when we run it for a first time.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Development Project Management Jim Kowalkowski. Outline Planning and managing software development – Definitions – Organizing schedule and work (overall.
Exploring Entrepreneurship  Entrepreneurship is the process of starting a new business.  Just having a good idea is not enough. Entrepreneurs must be.
Understanding Software Technology Transfer Noor Mahammad Chervu
OCLC Online Computer Library Center 1 Building & Sustaining Library Partnerships.
Data Mining is the process of analyzing data and summarizing it into useful information Data Mining is usually used for extremely large sets of data It.
Work Flows of the Online Review System Copernicus Office Editor
UCTE CIM Visualization & Editing Tool
What’s New in Conference Host Led by Michael Fogarty & Dennis Le Yat
التأهيل التربوي المملكة العربية السعودية جامعة الملك عبدالعزيز
التعلم بالإكتشاف المراجع:
Student Experience It’s your education.
Financial Statement Analysis
Kansas Social Studies Standards
Fault Tree Analysis Summary Process Steps
Presentation transcript:

1 Overview CUTE (Columbia University Telecommunication service Editor) GUI-based service creation tool to help inexperienced users to create services Service learning and service management Service learning Service risk management Handling feature interactions

2 CUTE (Columbia University Telecommunication service Editor)

3 Survey on CUTE Evaluating how likely an end user can create telecommunication services by himself and how useful and friendly CUTE is

4 Service learning and service risks Service learning and service risks Causal relationship between call information and call decisions Decision tree induction Incremental Tree Induction algorithm Service risk management Identify: Lose connection, privacy, money, attention Analyze: Possibility, impact, overall risk Resolve: Change communication methods, transfer, reduce overall risk Contingency plan

5 Feature interaction handling Feature interaction handling accept Tree merging + = If time is between 10:00AM and 11:00AM If address is hgs Forward to conf Incoming call If time is between 10:00AM and 11:00AM If address is hgs reject Forward to conf reject accept Take actions from both scripts. Simply setting precedence rules cannot work.

6 Serivce management Serivce management