Abstract:
Techniques are described herein that are capable of suggesting intent frame(s) for user request(s). For instance, the intent frame(s) may be suggested to elicit a request from a user. An intent frame is a natural language phrase (e.g., a sentence) that includes at least one carrier phrase and at least one slot. A slot in an intent frame is a placeholder that is identified as being replaceable by one or more words that identify an entity and/or an action to indicate an intent of the user. A carrier phrase in an intent frame includes one or more words that suggest a type of entity and/or action that is to be identified by the one or more words that may replace the corresponding slot. In accordance with these techniques, the intent frame(s) are suggested in response to determining that natural language functionality of a processing system is activated.
Abstract:
A computerized interactor system uses physical, three-dimensional objects as metaphors for input of user intent to a computer system. When one or more interactors are engaged with a detection field, the detection field reads an identifier associated with the object and communicates the identifier to a computer system. The computer system determines the meaning of the interactor based upon its identifier and upon a semantic context in which the computer system is operating. The interactors can be used to control other systems, such as audio systems, or it can be used as intuitive inputs into a computer system for such purposes as marking events in a temporal flow. The interactors, as a minimum, communicate their identity, but may also be more sophisticated in that they can communicate additional processed or unprocessed data, i.e. they can include their own data processors. The detection field can be one-dimensional or multi-dimensional, and typically has different semantic meanings associated with different parts of the detection field.
Abstract:
A method of providing a ringback tone to a calling party. The method includes receiving a call directed to a subscriber from the calling party. At least one of an adaptive ringback tone and an actionable ringback tone is provided to the calling party. The adaptive ringback tone is based on state data.
Abstract:
A method of providing a ringback tone to a calling party. The method includes receiving a call directed to a subscriber from the calling party. At least one of an adaptive ringback tone and an actionable ringback tone is provided to the calling party. The adaptive ringback tone is based on state data.
Abstract:
A method and system for providing efficient menu services for an information processing system that uses a telephone or other form of audio user interface. In one embodiment, the menu services provide effective support for novice users by providing a full listing of available keywords and rotating house advertisements which inform novice users of potential features and information. For experienced users, cues are rendered so that at any time the user can say a desired keyword to invoke the corresponding application. The menu is flat to facilitate its usage. Full keyword listings are rendered after the user is given a brief cue to say a keyword. Service messages rotate words and word prosody. When listening to receive information from the user, after the user has been cued, soft background music or other audible signals are rendered to inform the user that a response may now be spoken to the service. Other embodiments determine default cities, on which to report information, based on characteristics of the caller or based on cities that were previously selected by the caller. Other embodiments provide speech concatenation processes that have co-articulation and real-time subject-matter-based word selection which generate human sounding speech. Other embodiments reduce the occurrences of falsely triggered barge-ins during content delivery by only allowing interruption for certain special words. Other embodiments offer special services and modes for calls having voice recognition trouble. The special services are entered after predetermined criterion have been met by the call. Other embodiments provide special mechanisms for automatically recovering the address of a caller.
Abstract:
Systems and methods of a machine-moderated mobile social networking for managing queries are disclosed here. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of receiving queries from a mobile device and intelligently distributing the queries among users that are deemed suitable to provide useful insight to the queries. The queries are typically questions asked by potential patrons regarding specific venues, patrons looking for specific businesses and/or events that fit their specific criteria, by way of example but not limitation, geography, locale, type of cuisine, ambience, music, etc. In most instances, a consumer can send the query from a portable device (e.g., cell phone, Blackberry, telephone, iPhone, Treo, etc.) in various formats (e.g., SMS text, voice call, USSD message, IM, and/or email, etc.) to a predetermined phone number and/or other types of address identifiers.
Abstract:
A computerized interactor system uses physical, three-dimensional objects as metaphors for input of user intent to a computer system. When one or more interactors are engaged with a detection field, the detection field reads an identifier associated with the object and communicates the identifier to a computer system. The computer system determines the meaning of the interactor based upon its identifier and upon a semantic context in which the computer system is operating. The interactors can be used to control other systems, such as audio systems, or it can be used as intuitive inputs into a computer system for such purposes as marking events in a temporal flow. The interactors, as a minimum, communicate their identity, but may also be more sophisticated in that they can communicate additional processed or unprocessed data, i.e. they can include their own data processors. The detection field can be one-dimensional or multi-dimensional, and typically has different semantic meanings associated with different parts of the detection field.
Abstract:
Information associated with messages and/or missed calls is provided to a subscriber. Calls received but not answered by the subscriber may be monitored. Each monitored call is classified as one of a missed call and a message. The monitored calls may be summarized based on a customizable rule set to create a summary. The summary is provided to the subscriber via, for example, a voice notification.
Abstract:
Techniques are described herein that are capable of suggesting intent frame(s) for user request(s). For instance, the intent frame(s) may be suggested to elicit a request from a user. An intent frame is a natural language phrase (e.g., a sentence) that includes at least one carrier phrase and at least one slot. A slot in an intent frame is a placeholder that is identified as being replaceable by one or more words that identify an entity and/or an action to indicate an intent of the user. A carrier phrase in an intent frame includes one or more words that suggest a type of entity and/or action that is to be identified by the one or more words that may replace the corresponding slot. In accordance with these techniques, the intent frame(s) are suggested in response to determining that natural language functionality of a processing system is activated.
Abstract:
A computerized interactor system uses physical, three-dimensional objects as metaphors for input of user intent to a computer system. When one or more interactors are engaged with a detection field, the detection field reads an identifier associated with the object and communicates the identifier to a computer system. The computer system determines the meaning of the interactor based upon its identifier and upon a semantic context in which the computer system is operating. The interactors can be used to control other systems, such as audio systems, or it can be used as intuitive inputs into a computer system for such purposes as marking events in a temporal flow. The interactors, as a minimum, communicate their identity, but may also be more sophisticated in that they can communicate additional processed or unprocessed data, i.e. they can include their own data processors. The detection field can be one-dimensional or multi-dimensional, and typically has different semantic meanings associated with different parts of the detection field.