摘要:
An embodiment of the invention automatically generates for a crowdsourcing procedure to achieve a goal. A first template pertaining to the prespecified goal is constructed, and provides a specified context and set of rules, and is associated with one or more data repositories. The first template is used to generate first level tasks, wherein a given first level task is completed by selecting a single object from a repository of objects, and then performing an operation requiring information from the single object. The first template is used further to generate second level tasks, a given second level task being completed by selecting a plurality of objects from the same or from different repositories, and then performing a single operation requiring information supplied by respective objects. The given second level task is submitted to the crowdsourcing procedure for execution.
摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
摘要:
A computer implemented method that analyzes and improves a dial plan. A dial plan design template system receives an existing dial plan. The dial plan design template system models the existing dial plan as a directed graph. The dial plan design template system analyzes the directed graph to determine compliance with a set of edge rules. The dial plan design template system analyzes the directed graph to determine compliance with a set of connectivity type rules.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
A plurality of equivalent representations of a process are identified. The process has a plurality of tasks. Each of the representations specifies a different order of the tasks. The plurality of equivalent representations are consolidated into a single representation. The single representation captures, in at least one flexible order grouping, at least two of the tasks that may be performed in more than one order. At least one constraint is specified for the at least one flexible order grouping. Techniques for merging two or more flexible representations are also provided.
摘要:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.
摘要:
Techniques are provided for broadcasting history or coarse representations or both of stroke media and other media. Levels are created for media, and the levels are periodically broadcast. The levels segment the media and allow the media to be examined with details that range from coarse to fine or examined with varying importance or both. The periodic broadcast of the levels provides history of the media. In particular, for stroke data, levels of detail are determined through a certain method. Each level of detail is periodically broadcast. The levels of detail may be shown by themselves or combined at a receiver to create segmented views of the stroke data. A user can select a coarse view of the stroke data to quickly see the stroke history. Additionally, techniques are provided for quickly and repeatedly accessing data elements in already existing data structures. Generally, a description is created that describes data elements in a preexisting data structure. One or more links are created, from the description, which allow a user to directly access particular data elements for the preexisting data structure.
摘要:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
摘要:
The present invention is directed to a method for propagating contextual data in an audio communication by storing the contextual data obtained from a calling party in an extensible mark-up language formatted text document. A telephone call between a first party and a second party is converted to a session initiation protocol based voice over internet protocol communication, and the stored text document is attached to session initiation protocol messages that control the voice over internet protocol communication. The document is attached to the signaling messages by embedding the text document in a session description payload associated with the session initiation protocol message. The attached document is propagated with the audio communication, including when the signaling messages are used to transfer the audio communication from the second party to a third party or to add one or more addition parties to the audio communication.