Abstract:
A plurality of requests for service are obtained, each of the requests specifying a description of work, at least one constraint, and at least one objective function. Each request is routed to a corresponding first target resource, according to a routing table, in a manner to satisfy the at least one constraint and the at least one objective function. Tracking is carried out to determine whether the first target resource accepts a given request, rejects the given request, or passes on the given request to a second resource. The routing table is updated based on the tracking.
Abstract:
A plurality of base templates are generated. Each of the base templates models a corresponding process. A plurality of instances of each of the base templates are instantiated. Each of the plurality of instances corresponds to an application of the corresponding process to a particular environment. Each of the instances of each of the base templates is annotated, based, in each case, upon observation of functioning of the instance in the particular environment.
Abstract:
Techniques for dispatching one or more services requests to one or more agents are provided. The techniques include obtaining one or more attributes of each service request, obtaining one or more attributes of each agent, obtaining feedback from each of one or more agent queues, and using the one or more attributes of each service request, the one or more attributes of each agent and the feedback from each of the one or more agent queues to determine one or more suitable agents to receive a dispatch for each of the one or more service requests. Techniques are also provided for generating a database of one or more attributes of one or more service requests and one or more attributes of one or more agents.
Abstract:
Mechanisms, and associated methods, for conducting voice analysis (e.g., speaker ID verification) directly from a compressed domain of a voice signal. Preferably, the feature vector is directly segmented, based on its corresponding physical meaning, from the compressed bit stream.
Abstract:
Techniques for dispatching one or more services requests to one or more agents are provided. The techniques include obtaining one or more attributes of each service request, obtaining one or more attributes of each agent, obtaining feedback from each of one or more agent queues, and using the one or more attributes of each service request, the one or more attributes of each agent and the feedback from each of the one or more agent queues to determine one or more suitable agents to receive a dispatch for each of the one or more service requests. Techniques are also provided for generating a database of one or more attributes of one or more service requests and one or more attributes of one or more agents.
Abstract:
A plurality of equivalent representations of a process are identified. The process has a plurality of tasks. Each of the representations specifies a different order of the tasks. The plurality of equivalent representations are consolidated into a single representation. The single representation captures, in at least one flexible order grouping, at least two of the tasks that may be performed in more than one order. At least one constraint is specified for the at least one flexible order grouping. Techniques for merging two or more flexible representations are also provided.
Abstract:
There are provided methods and systems for authenticating a user. A method includes receiving a voice signature certificate corresponding to a setup portion of a Voice over Internet Protocol (VoIP) call. The VoIP call further has a voice conversation portion. The voice signature certificate includes a voice signature segment. The method further includes reproducing the voice signature segment to enable verification of voice continuity from the setup portion to the voice conversation portion. The verification is performing by comparing the voice signature segment to a user's voice during the voice conversation portion.
Abstract:
A plurality of base templates is generated. Each of the base templates models a corresponding process. A plurality of instances of each of the base templates is instantiated. Each of the plurality of instances corresponds to an application of the corresponding process to a particular environment. Each of the instances of each of the base templates is annotated, based, in each case, upon observation of functioning of the instance in the particular environment.
Abstract:
A caller verification system and method include generating a challenge to be sent to a caller which requires a response from the caller prior to accepting a call. A response or lack thereof is determined from the caller, and the response is analyzed relative to an acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted.
Abstract:
An n-ways conferencing system using only the participants' telephony devices and without an external conference server. A plurality of telephony devices dial in to and report their mixing capability to a connection topology manager. The connection topology manager also determines the location of each telephony device and neighboring telephony device pairs in the conference service, as each telephony device is used for mixing voice signals of its closest neighbors, and calculates a minimum conference traffic delay for each telephony device. The connection topology manager then builds a topology for the conference service based on the mixing capability, location, and minimum conference traffic delay, wherein the connection topology manager distributes a mixing computation in a substantially uniform manner across the plurality of telephony devices. When a change in the network condition is detected, the connection topology manager rebuilds the topology to bypass the change in the network condition.