Nuisance level of a voice call

In our everyday life, we communicate with many people such as family, friends, neighbors, and colleagues. We communicate with them using different communication media such as email, telephone calls, and face-to-face interactions. While email is not real-time and face-to-face communications require geographic proximity, voice and video communications are preferred over other modes of communication. However, real-time voice/video calls may create nuisance to the receiver. In this article, we describe a mathematical model for computing nuisance level of incoming voice/video calls. We computed the closeness and nuisance level using the calling patterns between the caller and the callee. To validate the nuisance model, we collected cell phone call records of real-life people at our university and computed the nuisance value for all voice calls. We validated the nuisance levels using the feedback from those real-life people. Such a nuisance model is useful for predicting unwanted voice and video sessions in an IP communication network.

[1]  Ram Dantu,et al.  Automatic Calibration Using Receiver Operating Characteristics Curves , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[2]  Ram Dantu,et al.  Socio-technical defense against voice spamming , 2007, TAAS.

[3]  Nathan Eagle,et al.  Machine perception and learning of complex social systems , 2005 .

[4]  John F. Canny,et al.  The Future of Human-Computer Interaction , 2006, ACM Queue.

[5]  K.K. Tam,et al.  Session Initiation Protocol , 2002, 2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..

[6]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[7]  Udi Manber,et al.  Finding Similar Files in a Large File System , 1994, USENIX Winter.

[8]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[9]  Georgios Paliouras,et al.  A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists , 2004, Information Retrieval.

[10]  William W. Cohen Learning Rules that Classify E-Mail , 1996 .

[11]  N. Soonthornphisaj,et al.  Anti-spam filtering: a centroid-based classification approach , 2002, 6th International Conference on Signal Processing, 2002..

[12]  Newton Lee,et al.  ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.

[13]  Jeffrey O. Kephart,et al.  MailCat: an intelligent assistant for organizing e-mail , 1999, AGENTS '99.

[14]  Susan T. Dumais,et al.  A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.

[15]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[16]  Salvatore J. Stolfo,et al.  Identifying spam without peeking at the contents , 2004, CROS.

[17]  P. V. Marsden,et al.  Measuring Tie Strength , 1984 .

[18]  Isidore Rigoutsos,et al.  Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM) , 2004, CEAS.

[19]  Salvatore J. Stolfo,et al.  Combining email models for false positive reduction , 2005, KDD '05.

[20]  Cullen Jennings,et al.  The Session Initiation Protocol (SIP) and Spam , 2008, RFC.

[21]  Ashraf Khalil,et al.  Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.

[22]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[23]  Ashraf Khalil,et al.  Improving Cell Phone Awareness by Using Calendar Information , 2005, INTERACT.