Automatic Analysis of Call-center Conversations
|
|
|
- Madeline Melton
- 10 years ago
- Views:
Transcription
1 Automatic Analysis of Call-center Conversations Gilad Mishne Informatics Institute, University of Amsterdam Kruislaan 403, 1098SJ Amsterdam The Netherlands David Carmel, Ron Hoory, Alexey Roytman, Aya Soffer IBM Research Lab in Haifa Haifa 31905, Israel ABSTRACT We describe a system for automating call-center analysis and monitoring. Our system integrates transcription of incoming calls with analysis of their content; for the analysis, we introduce a novel method of estimating the domain-specific importance of conversation fragments, based on divergence of corpus statistics. Combining this method with Information Retrieval approaches, we provide knowledge-mining tools both for the call-center agents and for administrators of the center. Categories and Subject Descriptors H.3.1 [Information Storage and Retrieval]: Content Analysis and Indexing; H.4 [Information Systems Applications]: Miscellaneous General Terms Languages, Management Keywords Call centers, automatic speech recognition 1. INTRODUCTION The role of call-centers is becoming increasingly central to corporates in recent years; this is caused by two main factors. First, the increase in the importance of individuals to companies, and the drive of the latter to acquire and keep customers for the long haul. Second, the rapid pace of advances in technology creates an ever-growing gap between users and automated systems, prompting them to require more technical assistance. Call-centers are a general term for help desks, information lines and customer service centers; among the services typically provided by these centers are customer support, opera- Work done while visiting IBM Research Haifa. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CIKM 05, October 31 November 5, 2005, Bremen, Germany. Copyright 2005 ACM /05/ $5.00. tor services, inbound and outbound telemarketing, and webbased services. While the name call center implies voice conversations, it includes any dialog-based support system in which a user receives a service by a professional; indeed, some call-centers provide additional means of conversing, e.g. online chat services. Recent years have witnessed significant improvements in technologies related to call-centers. Methods for Automatic Speech Re-cognition (ASR) are constantly improving; while the accuracy of ASR systems depends on the scenario and environment, state-of-the-art systems achieve better than 90% accuracy in transcription of clean, high quality speech and 70%-80% in transcription of telephone calls. In parallel, research in the fields of Information Retrieval (IR) and Text Analysis has been progressing rapidly, largely spawned by the growth of the world wide web and the amount of available information on the internet. The advances in ASR technology, which result in cleaner text than that previously produced by transcription systems, enables the application of text analysis methods to text transcribed from call-center voice conversations, opening new opportunities in this field. In this paper, we describe a system that uses text analytics and search algorithms to effectively address two issues callcenter administrators are facing: Assisting the call-center agent. The online nature of the dialog requires the expert to provide a quick solution to the user, both to preserve customer satisfaction and to shorten the dialog and reduce the costs of the support system. For this, the user s problem should be identified as quickly as possible, and presented to the expert in a way that will assist her in providing a solution to it. Agent monitoring. Dialog systems require continuous monitoring of incoming calls for many management purposes; examples are gathering statistics about the type of issues addressed, and preventing abuse of the call-center resources for private conversations. The rest of the paper is organized as follows. In the remaining part of this section we give a brief overview of related systems and technologies. In Section 2 we describe our approach for using text analysis to address the two tasks defined above. Section 3 follows with a detailed description of the components of our system, including the text transcription process and the text analysis. In Section 4 we illustrate the system s usage with examples; we conclude in Section 5.
2 1.1 Related Work Most text-analysis research related to call-centers is focused on Call Routing [5, 12] the task of forwarding callers to the right resource in the call center. Here, IR techniques are typically used to compare the customer s request to a set of known, classified requests. The relatively restricted domain of this classification task results in good performance of many of the approaches in this area. A few systems use more complex text analysis for additional call-center administration, to perform tasks similar to the ones we describe (but with different approaches). Busemann et al. use shallow NLP and machine learning to select solutions for problems presented in s sent to a support center [2]; Tan et al. use similar techniques for analyzing the amount of resources needed to handle types of issues found in call-center records. eresponder [4] provides an integrated solution for automatic responses to user questions. It stores question and answer pairs that have previously been asked and answered. These pairs can be used to either provide an immediate response to user questions, or to assist customer service representatives in drafting new responses to similar questions or to yet unanswered questions. When a new question arrives, the system searches its databases for similar questions as well as for relevant answers to this question and finds the most relevant Q&A pair based on both these measures. A similar system is presented in [10]. 2. IMPORTANCE ESTIMATION IN CALL- CENTER TRAFFIC As presented earlier, the two challenges we are facing are (1) assisting the agent in addressing the issue raised by the caller, and (2) monitoring the usage of the call-center resources. We argue that these tasks share a common ground: both are related to the relative importance of parts of the conversation. This can be illustrated with two examples, 1 given in Figures 1 and 2, (both taken from our corpus of transcribed calls to the IBM customer support center, described in Section 4). Operator Caller Operator Caller Thank you for calling IBM customer service this is John am I speaking with Kate Yeah you are Morning how can I help you Oh I m I am trying to connect remotely... it s um ah of course on the worse day possible as always... prompting me for a new password I put one in and it won t accept it... no matter what I put in this happens every time it prompts me what is the problem... every single time it doesn t you know... I m following all the password rules it doesn t matter it rejects... every password I put in and I have to call you guys okay I m done venting can you help me Figure 1: Beginning of typical call To effectively provide the agent with tools assisting her to answer the user s needs, the main issue raised by the user should be detected. In the call shown in Figure 1, we see a typical description of a problem by a user; unlike written problem reports (such as s to support centers), 1 For clarity we present manually transcribed versions of the examples. oral descriptions tend to be long, un-focused and repetitive. However, upon closer examination of the fragments of the text (separated by ellipses) we note that some of them tend to be more significant than other e.g., prompting me for a new password I put one in and it won t accept it seems more relevant than other fragments of the text. Consequently, the problem of identifying the main issue presented by the user can be viewed as identifying the important fragments in the beginning of the conversation. Caller Serial number four four six six six six... yes ma am that s easy to remember Operator Wait a minute okay Caller I d say I d be able to um mark of the beast plus one Operator The mark of a beast plus one Caller Yes ma am, you never heard of the mark of a beast Operator No Caller Oh sure they been tough with you... yeah after the battle of Armageddon Operator mhm Caller when uh tribulation period when... Figure 2: Off-topic section in a call In the second example Figure 2 we see a call which has gone off-track, discussing topics which are irrelevant to the call-center. To detect such abuse of the call-center resources, it is necessary to identify parts of calls (or complete conversations) which are of low relevancy to the domain of the call-center. This too can be viewed as a problem of importance estimation of call fragments, where the importance is defined as the pertinence of the fragment in the context of the call-center. A simple way of estimating the significance level of a fragment of a call is to estimate the significance level of each word in the fragment and combine these individual values. In most text analysis systems, the significance of words is inversely related to their frequency: the more common a word is, the less significance it has. Thus, stopwords words with very high frequency are usually ignored when indexing text for retrieval purposes. However, this rule of thumb does not hold for the type of importance estimation we are facing. For example, in our data which consists of conversations dealing with software and hardware issues important fragments tend to contain a high concentration of common words such as error, password, and so on. However, it is certainly not the case that all common words are important stopwords such as the are insignificant within almost any domain. Therefore, estimating the significance level of a word requires an evaluation of how characteristic the word is to a specific domain, compared to other domains. Rather than global significance, we are actually estimating domain-specific word significance (and hence, domain-specific fragment significance. More formally, we propose the following method for domainspecific significance estimation. Word-level Significance Estimation. First, we pre-compute importance values for words; this is done once, offline, by
3 comparing the frequency of a word in the domain-specific corpus to its frequency in an open-domain corpus. The comparison can be done using any statistical test for distribution difference such as chi-squared or log likelihood measures [7]. At the end of this stage, we have a list of words with their corresponding importance levels for the specific domain. If we normalize all values between 1 and 1, words with values close to 1 will be very indicative of the domain, words with values close to 1 will be very indicative of being unrelated to the domain, and words with values around 0 will be neither related nor unrelated to the domain. In addition to the usage of single words as the basic unit of significance estimation, it is also possible to use word n-grams. Fragment Significance Estimation. Once the word-level domain-specific significance levels are computed, we can assign fragment-level significance levels in a straightforward manner: given a text fragment, the total importance is a combination of the importance values of the words in the fragment (e.g., a sum, product, maximal value etc). A benefit of this approach is that since the calculation of the individual values (which requires corpus comparison) is done offline, the fragment-level estimation is very fast: it involves only lookups in the pre-built lexicon, which is typically small enough to be kept in memory. This is particularly beneficial for call-center data analysis which must be performed on the fly to be effective. Related Approaches. Our method is somewhat related to the sentence-level importance calculation described by Schiffman for news articles [13]. While that approach also makes use of pre-constructed lexicons, it is aimed at open-domain text rather than domain-specific; as a result, the significant words detected are important in a general sense, without respect to a particular document... [having] a global importance. Additionally, while Schiffman uses the fact that news articles tend to include more important information in their first sentences, we rely only on statistical corpus divergence (since important sections can appear in any section of a call-center conversation). An additional related concept is Kleinberg s notion of burstiness [9], which uses changes in frequency counts over time to detect locally-important words within a text. 3. SYSTEM DESCRIPTION We now give an overview of our call-center monitoring system, and provide technical details about its modules. The information flow in our system is represented in Figure 3. Audio from the call-center is delivered to the IBM Transcription Server prototype where it is transcribed to plain text (see Section 3.1). This text, along with call metadata such as time-stamps and channel identification (to distinguish between the caller and the operator), is sent in turn to an annotator implemented within the IBM UIMA framework [6]. The annotator analyzes the text and marks it with additional knowledge, regarding the local significance of each part of the conversation; additional details about this stage and about UIMA are given in Section 3.2. Lastly, the annotated text is analyzed by various applications, described in Section Transcribing Call-center Data The transcription server, used for transcribing the callcenter data, is an IBM research prototype; it was built on top of existing IBM core WebSphere technology, in particular WebSphere Voice Server [14] and its major components such as the speech recognition engine facilities. The transcription server is able to get an audio stream or a URI to a prerecorded audio file, and transcribe it. The transcription output is an XML file, which includes the transcript and some meta-data; for example, each word has time-stamps of its beginning and its end. These time-stamps enable the synchronization of the audio and the text data. The server uses the latest Large Vocabulary Continuous Speech Recognition (LVCSR) technology developed in IBM research [8], to transcribe continuous spontaneous 6KHz speech recorded by a call-center into text. The output words are selected from a large US English vocabulary, which has a good coverage of the spoken language. In general, an LVCSR system includes an engine, a vocabulary, a language model and an acoustic model. Those define the scope of transcription, the language domain in which it is expected to be, and the acoustic environment of the recordings. The full process can be characterized by several steps: the input speech signal is first analyzed into a sequence of acoustic feature vectors, and then statistical methods are used to determine the most probable word sequence. In the latter stage, the acoustic model is used for computing the probability of the observed sequence of vectors given a word sequence and the language model for computing the probability of a word sequence, independently of the speech input. The recognition process is carried out by maximizing the product of the two (Bayes law). The transcription server can be configured to apply unsupervised adaptation techniques, in order to further adapt the recognition to the speaker or environment, and thus significantly improve transcription accuracy. The adaptation is carried out by an iterative process recognition is first performed using the speaker independent models and standard acoustic features. The results of this first pass over the speech data are then used to adapt the models or to adapt the acoustic features used in the recognition process. Subsequent passes over the data use the adapted models or adapted acoustic features. The adaptation process is applied in off-line transcription of a recorded call, but some variants of it can also be used for online transcription. In call-center calls, comprising of a dialog between an operator (agent) and a caller, speaker adaptation is carried out separately for the speech sections of the operator and the caller. The operator can have pre-trained models that are applied when recognizing his speech, even without adaptation. Hence, in the current transcription server prototype, in order to enable the usage of adaptation and pre-trained models, the input should comprise two separate channels. If that is not the case, future versions of the transcription server will be able to apply automatic speaker segmentation, in order to segment the two speakers automatically. Furthermore, identifying the speakers using automatic speaker identification will allow the server to use previously trained models on identified speech sections. The transcription word error rate (WER) for typical call-center data is 30%-40% using speaker independent models and 20%-30% using unsupervised adaptation. Generally, these levels of accuracy, which might be practically hard to read by a human, are more than suffi-
4 Figure 3: Information flow in the system cient for textual access methods such as document indexing and retrieval or topic detection and tracking [1]. 3.2 Data Annotation Once the call is transcribed, we proceed to evaluating the importance of every fragment in the call as outlined in Section 2. Comparing Corpora. For calculating the word-level significance values, we compare the frequency counts of the words in our corpus to a general corpus the spoken component of the British National Corpus [11]). The comparison is done using a variation of the Mann-Whitney test. Table 1 shows the normalized values calculated for some example words in our data; words which are more common in our domain than in the general domain are assigned positive values, words which are more common in the general domain have negative values, and words which are equally common have zero or near-zero values. click the born ibm we president password he council lotus were club Table 1: Sample word-level importance values Call Segmentation. Ideally, the estimation of the significance should be carried out at the sentence level, or with grammatically-chunked parts of sentences; however, sentence delimiters are nonexistent in transcribed conversations, and grammatical analysis of it is very poor. A naive solution to dividing the call to segments is to choose a fixed-size window of words; this proves non-optimal for the domain, because of the large variation in sentence length which is typical of phone calls. We therefore take a heuristic approach to call segmentation, marking an end of fragment whenever the speaker has changed, or after a certain period of inactivity in the call. See for example Figure 1 where an ellipsis is used to delimit identified fragments. Fragment-level significance. To assign a significance level to each fragment, we sum over the significance values of the words in the fragment, normalizing by the length of the fragment. Both the call segmentation and the assignment of the significance level is done using the UIMA SDK. UIMA. UIMA (Unstructured Information Management Architecture) is a software architecture for supporting applications that integrate search and analytics over a combination of structured and unstructured information; it has recently been publicly released. 2 UIMA is based on document- 2 level analysis performed by component processing elements named Text Analysis Engines (TAEs). Examples of TAEs include language translators, document summarizers, namedentity detectors, and relationship extractors. Each TAE specializes in discovering specific concepts (or semantic entities ) implicit in the document text. The document analysis is based on a data structure, named the Common Analysis Structure (CAS), which contains the original document (the subject of analysis) and associated metadata in the form of annotation with respect the original text. The CAS is passed through an application-specified sequence of TAEs. Each TAE in the sequence considers the input CAS, potentially infers and adds additional annotations, and outputs an updated CAS. Annotations in the CAS are maintained separately from the document itself, and they often over-lap. A main goal of UIMA is to support semantic search the capability to find documents based on the semantic content discovered by the TAEs. To this end, UIMA specifies search engine indexing and query interfaces: the indexing interface supports the indexing of tokens as well as the indexing of annotations; correspondingly, the query interface supports queries that may be predicated on nested or over-lapping structures of annotations and tokens in addition to Boolean combinations of tokens and annotations. Using UIMA, we annotate each word in the text with its significance value, mark boundaries of fragments in the call, and annotate each fragment with its aggregated importance level. UIMA search is used to provide a basic search functionality over the transcribed data. 3.3 Call Analysis At this stage the call is transcribed and annotated; the next stage in our system is an analysis of it for addressing the two issues we described, namely, assisting the agent and monitoring the call-center resources Suggesting Potential Solutions to Presented Problems Many issues with which users address a call-center have been encountered previously. Typically, the call-center maintains a knowledge base of issues and their solutions; this gives the agents the ability to search or browse the collection of encountered issues, assisting them in addressing requests of types they are not familiar with. As an extension to this helper application, we automatically detect the main issue addressed in the call, and retrieve possible solutions for it as the call progresses. We used the Juru IR engine [3] to index a collection of 7152 software and hardware issues and their solutions, manually developed by domain experts. An example issue from this collection is given in Figure 4. Each issue from the collection is indexed as a single document containing two fields: title (the problem) and body (the solution). As the call topic, we simply take the first few fragments of
5 Issue: Lotus Printing Cell Formulas Using Preview and Page Setup Solution: From the menu bar, select File. Select Preview and Page Setup from the 123 menu options. Click on the Include tab in the Properties for Preview and Page Setup dialog box. Under Show, select Formulas. Note: When the workbook is printed, formulas and their locations will print on a separate page Figure 4: collection Sample problem/solution pair from our 0-1 the call that are significant enough according to our significance estimation model; for this, we define two thresholds: the minimal significance value needed for a fragment to be considered as part of the topic, and a maximum total significance value for the topic. During the incoming call, every fragment is analyzed for significance; if it exceeds the minimal value, it is added to the detected topic of the call, until the maximal threshold is reached. Typically, the topics span 1-3 fragments. Once the topic is identified, we use it as a query to the Juru engine, searching both in the title and the body fields (and assigning a higher weight to the title). We display the top retrieved results in a pop-up window to the agent as she is listening to the call, enabling her to quickly scan possible solutions or different reformulations of the issue while the customer is describing the problem. An example of this process is shown in Section 4. In our experience, the queries tend to be relatively long, producing high-quality, relevant results Detecting Off-topic Segments Given the analysis of the significance of each fragment in the call, identifying calls which are completely off-topic, or off-topic sections within legitimate calls, is straightforward. While variation in the importance level of sentences in a conversation (as well as occasional low-importance fragments) is normal, long segments within a call which have low significance are unusual, and typically indicate irrelevant calls or parts thereof. Therefore, we simply keep track of the significance of each fragment in the call, and detect continuous spans of fragments that fail to reach a minimal significance value. To illustrate this, Figure 5 shows two graphs of significance levels of fragments within calls: a standard call, and a call containing a long off-topic section. 4. EXAMPLES Our corpus consists of 2276 calls made to the IBM internal customer support service during 2001; the calls deal with a range of software and hardware problems. The total number of words in the collection is 1.7M, and the unique number of words is Preliminary experimentation with the system on manually transcribed data shows promising results. We show two typical screen-captures from our system: the display to the agent during the call, when the system identified the topic and retrieved possible solutions for it (Figure 6) and a highlighted off-topic segment, shown to the administrator (Figure 7) Figure 5: Significance levels of fragments throughout calls: typical dialog (top) and call containing off-topic segment (bottom). Continuous (blue) line is actual fragment significance; dashed (red) line marks local average. 5. CONCLUSIONS We presented a system for monitoring call-center conversations, which uses text analytics to assist both the callcenter agents and administrators. Our system provides an end-to-end solution, incorporating technologies for Automatic Speech Recognition, Text Analysis, and Information Retrieval. The main novelty of our system is a method for identifying the domain-specific importance levels of fragments in the call, and usage of this method both for retrieving possible solutions to the problem presented in the conversation, and for detecting abuse of the call-center resources. To demonstrate our system in this work, we used manuallytranscribed data; testing the effect of recognition errors on the system s performance is beyond the scope of this paper. Having said that, we anticipate that our algorithm will be fairly robust to moderate error rates, since it makes use of word redundancy within a fragment. While error rates of 20% may result in an incorrect word or two within a fragment (on average), this is unlikely to drastically change the significance level of the entire fragment. Similar robustness assumptions have been made in the IR domain on ASRtranscribed data, and were found correct [1].
6 Figure 6: Retrieved solutions for a call Figure 7: Highlighted possible off-topic segment
7 In the future, we plan a more rigorous evaluation of our system, including testing our algorithm on ASR-transcribed data and examining the effect of the recognition errors on its performance. Acknowledgments. We thank Olivier Siohan from the IBM T.J. Watson research center for providing the required data and for assistance on ASR topics. 6. REFERENCES [1] J. Allan. Perspectives on information retrieval and speech. In Information Retrieval Techniques for Speech Applications, pages Springer, [2] S. Busemann, S. Schmeier, and R. G. Arens. Message classification in the call center. In Proceedings of the sixth conference on Applied natural language processing, pages , San Francisco, CA, USA, Morgan Kaufmann Publishers Inc. [3] D. Carmel, E. Amitay, M. Herscovici, Y. S. Maarek, Y. Petruschka, and A. Soffer. Juru at trec 10 - experiments with index pruning. In TREC, [4] D. Carmel, M. Shtalhaim, and A. Soffer. eresponder: Electronic Question Responder. In CooplS 00: Proceedings of the 7th International Conference on Cooperative Information Systems, pages , London, UK, Springer-Verlag. [5] J. Chu-Carroll and B. Carpenter. Vector-based natural language call routing. Comput. Linguist., 25(3): , [6] D. Ferrucci and A. Lally. UIMA: an architectural approach to unstructured information processing in the corporate research environment. Natural Language Engineering, 10(3): , [7] A. Kilgarriff. Comparing corpora. International Journal of Corpus Linguistics, 6(1):1 37, [8] B. Kingsbury, L. Mangu, G. Saon, G. Zweig, S. Axelrod, V. Goel, K. Visweswariah, and M. Picheny. Towards domain-inependent conversational speech recognition. In Eurospeech, Geneva, Switzerland, September [9] J. Kleinberg. Bursty and hierarchical structure in streams. In KDD 02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages , New York, NY, USA, ACM Press. [10] L. Kosseim, S. Beauregard, and G. Lapalme. Using information extraction and natural language generation to answer . Data & Knowledge Engineering, 38(1):85 100, [11] G. Leech, P. Rayson, and A. Wilson. Word Frequencies in Written and Spoken English: based on the British National Corpus. Longman, [12] G. Riccardi, A. Gorin, A. Ljolje, and M. Riley. A spoken language system for automated call routing. In Proc. ICASSP 97, pages , Munich, Germany, [13] B. Schiffman. Building a Resource for Evaluating the Importance of Sentences. In LREC02, Las Palmas, Spain, May June [14] IBM WebSphere Voice Server. http : // server.
Spoken Document Retrieval from Call-Center Conversations
Spoken Document Retrieval from Call-Center Conversations Jonathan Mamou, David Carmel, Ron Hoory IBM Haifa Research Labs Haifa 31905, Israel {mamou,carmel,hoory}@il.ibm.com ABSTRACT We are interested in
IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International
IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
C E D A T 8 5. Innovating services and technologies for speech content management
C E D A T 8 5 Innovating services and technologies for speech content management Company profile 25 years experience in the market of transcription/reporting services; Cedat 85 Group: Cedat 85 srl Subtitle
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
The Prolog Interface to the Unstructured Information Management Architecture
The Prolog Interface to the Unstructured Information Management Architecture Paul Fodor 1, Adam Lally 2, David Ferrucci 2 1 Stony Brook University, Stony Brook, NY 11794, USA, [email protected] 2 IBM
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts
MIRACLE at VideoCLEF 2008: Classification of Multilingual Speech Transcripts Julio Villena-Román 1,3, Sara Lana-Serrano 2,3 1 Universidad Carlos III de Madrid 2 Universidad Politécnica de Madrid 3 DAEDALUS
Call Recorder Oygo Manual. Version 1.001.11
Call Recorder Oygo Manual Version 1.001.11 Contents 1 Introduction...4 2 Getting started...5 2.1 Hardware installation...5 2.2 Software installation...6 2.2.1 Software configuration... 7 3 Options menu...8
Knowledge Management and Speech Recognition
Knowledge Management and Speech Recognition by James Allan Knowledge Management (KM) generally refers to techniques that allow an organization to capture information and practices of its members and customers,
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
PMML and UIMA Based Frameworks for Deploying Analytic Applications and Services
PMML and UIMA Based Frameworks for Deploying Analytic Applications and Services David Ferrucci 1, Robert L. Grossman 2 and Anthony Levas 1 1. Introduction - The Challenges of Deploying Analytic Applications
Specialty Answering Service. All rights reserved.
0 Contents 1 Introduction... 2 1.1 Types of Dialog Systems... 2 2 Dialog Systems in Contact Centers... 4 2.1 Automated Call Centers... 4 3 History... 3 4 Designing Interactive Dialogs with Structured Data...
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 [email protected] 2 [email protected] Abstract A vast amount of assorted
IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications
IBM Software Information Management Scaling strategies for mission-critical discovery and navigation applications Scaling strategies for mission-critical discovery and navigation applications Contents
GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING
MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT
SemWeB Semantic Web Browser Improving Browsing Experience with Semantic and Personalized Information and Hyperlinks
SemWeB Semantic Web Browser Improving Browsing Experience with Semantic and Personalized Information and Hyperlinks Melike Şah, Wendy Hall and David C De Roure Intelligence, Agents and Multimedia Group,
Sentiment analysis on tweets in a financial domain
Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine
Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user
IBM Watson Ecosystem. Getting Started Guide
IBM Watson Ecosystem Getting Started Guide Version 1.1 July 2014 1 Table of Contents: I. Prefix Overview II. Getting Started A. Prerequisite Learning III. Watson Experience Manager A. Assign User Roles
Office of History. Using Code ZH Document Management System
Office of History Document Management System Using Code ZH Document The ZH Document (ZH DMS) uses a set of integrated tools to satisfy the requirements for managing its archive of electronic documents.
Architected Blended Big Data with Pentaho
Architected Blended Big Data with Pentaho A Solution Brief Copyright 2013 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information,
A Business Process Services Portal
A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru
Using Text and Data Mining Techniques to extract Stock Market Sentiment from Live News Streams
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. XX (2012) (2012) IACSIT Press, Singapore Using Text and Data Mining Techniques to extract Stock Market Sentiment
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
OpenScape Contact Center Campaign Director. Creating Profitable Customer Experiences
OpenScape Contact Center Campaign Director Creating Profitable Customer Experiences From responsive to proactive customer care Customers are the core of your business. So why would you wait for them to
ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE
ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE GETTING STARTED WITH ADOBE ACROBAT CONNECT PRO MOBILE FOR IPHONE AND IPOD TOUCH Overview Attend Acrobat Connect Pro meetings using your iphone
Internet-based remote support for help desks
Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2
A System for Labeling Self-Repairs in Speech 1
A System for Labeling Self-Repairs in Speech 1 John Bear, John Dowding, Elizabeth Shriberg, Patti Price 1. Introduction This document outlines a system for labeling self-repairs in spontaneous speech.
Flattening Enterprise Knowledge
Flattening Enterprise Knowledge Do you Control Your Content or Does Your Content Control You? 1 Executive Summary: Enterprise Content Management (ECM) is a common buzz term and every IT manager knows it
Shallow Parsing with Apache UIMA
Shallow Parsing with Apache UIMA Graham Wilcock University of Helsinki Finland [email protected] Abstract Apache UIMA (Unstructured Information Management Architecture) is a framework for linguistic
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
POINT OF SALES SYSTEM (POSS) USER MANUAL
Page 1 of 24 POINT OF SALES SYSTEM (POSS) USER MANUAL System Name : POSI-RAD System Release Version No. : V4.0 Total pages including this covering : 23 Page 2 of 24 Table of Contents 1 INTRODUCTION...
Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0
Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without
How To Use Marketing Automation
The Missing Piece of Marketing Automation: Your Phone What matters most is the strategy and skill with which you use it. It s an ambition for businesses all over the globe: discover a way to market your
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Search Engine Optimization with Jahia
Search Engine Optimization with Jahia Thomas Messerli 12 Octobre 2009 Copyright 2009 by Graduate Institute Table of Contents 1. Executive Summary...3 2. About Search Engine Optimization...4 3. Optimizing
Folksonomies versus Automatic Keyword Extraction: An Empirical Study
Folksonomies versus Automatic Keyword Extraction: An Empirical Study Hend S. Al-Khalifa and Hugh C. Davis Learning Technology Research Group, ECS, University of Southampton, Southampton, SO17 1BJ, UK {hsak04r/hcd}@ecs.soton.ac.uk
ELPUB Digital Library v2.0. Application of semantic web technologies
ELPUB Digital Library v2.0 Application of semantic web technologies Anand BHATT a, and Bob MARTENS b a ABA-NET/Architexturez Imprints, New Delhi, India b Vienna University of Technology, Vienna, Austria
Virtual Phone System User Guide v4.7
Virtual Phone System User Guide v4.7 169 Saxony Road, Suite 212 Encinitas, CA 92024 Phone & Fax: (800) 477-1477 Welcome! Thank you for choosing FreedomVoice. This User Guide is designed to help you understand
Prerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.
White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,
Deploying Cisco Unified Contact Center Express Volume 1
Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
Information for teachers about online TOEIC Listening and Reading practice tests from
oxford english testing.com Information for teachers about online TOEIC Listening and Reading practice tests from www.oxford english testing.com oxford english testing.com What do the online TOEIC Listening
Automatic Speech Recognition and Hybrid Machine Translation for High-Quality Closed-Captioning and Subtitling for Video Broadcast
Automatic Speech Recognition and Hybrid Machine Translation for High-Quality Closed-Captioning and Subtitling for Video Broadcast Hassan Sawaf Science Applications International Corporation (SAIC) 7990
WebSphere Business Monitor
WebSphere Business Monitor Monitor models 2010 IBM Corporation This presentation should provide an overview of monitor models in WebSphere Business Monitor. WBPM_Monitor_MonitorModels.ppt Page 1 of 25
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
IP Contact Center: Realize the Full Business Potential of IP Contact Centers
IP Contact Center: Realize the Full Business Potential of IP Contact Centers WHITEPAPER The joint solution from Cisco and IBM provides people, processes, and technology needed to maximize the return on
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...
Auto-Classification for Document Archiving and Records Declaration
Auto-Classification for Document Archiving and Records Declaration Josemina Magdalen, Architect, IBM November 15, 2013 Agenda IBM / ECM/ Content Classification for Document Archiving and Records Management
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Using News Articles to Predict Stock Price Movements
Using News Articles to Predict Stock Price Movements Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 9237 [email protected] 21, June 15,
Virtual Contact Center
Virtual Contact Center Zendesk Integration Configuration Guide Version 7.1 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents
Digital Voice Services User Guide
Digital Voice Services User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding
SyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
WebEx. Remote Support. User s Guide
WebEx Remote Support User s Guide Version 6.5 Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior notice. The reader should
Virtual Contact Center
Virtual Contact Center Zendesk Integration with 8x8 Contact Center Agent Guide Revision 1.0 Copyright 2014, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
Towards a Transparent Proactive User Interface for a Shopping Assistant
Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany [email protected]
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Patterns of Information Management
PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy
2014/02/13 Sphinx Lunch
2014/02/13 Sphinx Lunch Best Student Paper Award @ 2013 IEEE Workshop on Automatic Speech Recognition and Understanding Dec. 9-12, 2013 Unsupervised Induction and Filling of Semantic Slot for Spoken Dialogue
A Framework-based Online Question Answering System. Oliver Scheuer, Dan Shen, Dietrich Klakow
A Framework-based Online Question Answering System Oliver Scheuer, Dan Shen, Dietrich Klakow Outline General Structure for Online QA System Problems in General Structure Framework-based Online QA system
Device SIP Trunking Administrator Manual
Table of Contents Device SIP Trunking Administrator Manual Version 20090401 Table of Contents... 1 Your SIP Trunking Service... 2 Terminology and Definitions... 2 PBX, IP-PBX or Key System... 2 Multi-port
NEW. ProduCt information
NEW ProduCt information Your customers expect you to provide optimal service with maximum availability. We can help. ELSBETH Communication Manager (ECM) is the innovative solution for centralized management
Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software
Records-enable your applications, content, documents and e-mail IBM Information Management software Add the compliance and discovery benefits of records management to your business solutions. Records management
UIMA: Unstructured Information Management Architecture for Data Mining Applications and developing an Annotator Component for Sentiment Analysis
UIMA: Unstructured Information Management Architecture for Data Mining Applications and developing an Annotator Component for Sentiment Analysis Jan Hajič, jr. Charles University in Prague Faculty of Mathematics
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
WebSphere Business Monitor
WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page
What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy
What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence
High Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
Tools & Resources for Visualising Conversational-Speech Interaction
Tools & Resources for Visualising Conversational-Speech Interaction Nick Campbell NiCT/ATR-SLC Keihanna Science City, Kyoto, Japan. [email protected] Preamble large corpus data examples new stuff conclusion
Chapter 6: Send and Receive Instant Messages
Microsoft Office Communicator 2007 Getting Started Guide 33 Chapter 6: Send and Receive Instant Messages With Communicator, you can start an instant messaging session with a single contact or multiple
Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari [email protected]
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari [email protected] Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
IPOne Phone System User Interface Guide
IPOne Phone System User Interface Guide DoubleHorn Communications, LLC 1802 W. 6 th Street Austin, TX 78703 Main Office: 512-637-5200 Toll Free: 877-637-HORN (4676) DHC Support: Dial 611 IPOne Phone System
Digital Voice Services Residential User Guide
Digital Voice Services Residential User Guide 2 P a g e * Feature Access Codes *11 Broadworks Anywhere (pulling call to alternate phone) *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call
Chat Enhancements Optimize Customers Web Experience
Chat Enhancements Optimize Customers Web Experience Brands Realize Significant Benefits When Providing Automated Web Chat Support for Online Customers Executive Summary Chat, an effective interactive web
Setting up single signon with Zendesk Remote Authentication
Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.
Clear Choice Communications. Digital Voice Services User Guide
Clear Choice Communications Digital Voice Services User Guide 2 P a g e * Feature Access Codes *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call
Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis
Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Yue Dai, Ernest Arendarenko, Tuomo Kakkonen, Ding Liao School of Computing University of Eastern Finland {yvedai,
Automatic slide assignation for language model adaptation
Automatic slide assignation for language model adaptation Applications of Computational Linguistics Adrià Agustí Martínez Villaronga May 23, 2013 1 Introduction Online multimedia repositories are rapidly
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6
E-Mail Campaign Manager 2.0 Marketer's Guide Rev: 2014-06-11 E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter
11-792 Software Engineering EMR Project Report
11-792 Software Engineering EMR Project Report Team Members Phani Gadde Anika Gupta Ting-Hao (Kenneth) Huang Chetan Thayur Suyoun Kim Vision Our aim is to build an intelligent system which is capable of
