skip to main content
research-article

Nuisance level of a voice call

Published:30 October 2008Publication History
Skip Abstract Section

Abstract

In our everyday life, we communicate with many people such as family, friends, neighbors, and colleagues. We communicate with them using different communication media such as email, telephone calls, and face-to-face interactions. While email is not real-time and face-to-face communications require geographic proximity, voice and video communications are preferred over other modes of communication. However, real-time voice/video calls may create nuisance to the receiver. In this article, we describe a mathematical model for computing nuisance level of incoming voice/video calls. We computed the closeness and nuisance level using the calling patterns between the caller and the callee. To validate the nuisance model, we collected cell phone call records of real-life people at our university and computed the nuisance value for all voice calls. We validated the nuisance levels using the feedback from those real-life people. Such a nuisance model is useful for predicting unwanted voice and video sessions in an IP communication network.

References

  1. Biever, C. 2004. Move over spam, make way for “spit.” http://www.newscientist.com/article.ns?id=dn6445.Google ScholarGoogle Scholar
  2. Canny, J. 2006. Is an HCI revolution just around the corner? ACM Queue 4, 6.Google ScholarGoogle Scholar
  3. Cohen, W. W. 1996. Learning rules that classify e-mail. In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access.Google ScholarGoogle Scholar
  4. Dantu, R. and Kolan, P. 2004. Preventing voice spamming. In Proceedings of the IEEE GlobeComm Workshop on VoIP Security.Google ScholarGoogle Scholar
  5. Dantu, R. and Kolan, P. 2005. Detecting spam in VoIP networks. In Proceedings of USENIX, SRUTI (Steps for Reducing Unwanted Traffic on the Internet). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dantu, R. and Kolan, P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey, http://secnet.csci.unt. edu/nuisance/.Google ScholarGoogle Scholar
  7. Eagle, N. 2005. Machine perception and learning of complex social systems. PhD Dissertation, Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  8. Graham, P. 2002. A Plan for Spam. http://paulgraham.com/spam.html.Google ScholarGoogle Scholar
  9. Granovetter, M. S. 1973. The strength of Weak Ties. Amer. J. Sociol. 78, 1360--1380.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hershkop, S. 2005. URL Clustering to Classify Spam, Columbia University.Google ScholarGoogle Scholar
  11. Hershkop, S. and Stolfo, S. J. 2004. Identifying spam without peeking at the contents. ACM Crossroads. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hershkop, S. and Stolfo, S. J. 2005. Combining emails models for false positive reduction. In Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 98--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Khalil, A. and Connelly, K. H. 2005. Improving cell phone awareness by using calendar information. In Proceedings of International Conference on Human-Computer Interaction (INTERACT). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Khalil, A. and Connelly, K. H. 2006. Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the Conference on Computer Supported Collaborative Work (CSCW). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kolan, P., Vaithilingam, R., and Dantu, R. 2007. Automatic calibration using receiver operating characteristics curves. In Comsware Workshop. Bangalore, India.Google ScholarGoogle Scholar
  16. Kolan, P. and Dantu, R. 2007. Socio-technical defense against voice spamming, ACM Trans. Auton. Adapt. Syst. 2, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lucy, S. 2006. Is your VoIP phone vulnerable? http://www.businessweek.com/technology/content/jun2006/tc20060613_799282. htm?campaign_id=bier_tcj.Google ScholarGoogle Scholar
  18. Manber, U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco, CA), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Marsden, P. V. and Campbell, K. E. 1984. Measuring tie strength. Social Forces 63, 2, 482--501.Google ScholarGoogle ScholarCross RefCross Ref
  20. Mitchell, T. M. 1997. Machine Learning. McGraw-Hill. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rigoutsos, I. and Huynh, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the first Conference on E-mail and Anti-Spam.Google ScholarGoogle Scholar
  22. Rosenberg, J., Shulzrinne, H., Camerillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and Schooler, E. 2002. Session Initiation Protocol. RFC 3261.Google ScholarGoogle Scholar
  23. Rosenberg, J., Jennings, C., and Peterson, J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txtGoogle ScholarGoogle Scholar
  24. Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization—Papers from the National Conference on Artificial Intelligence Workshop, 55--62, AAAI Tech. Rep. WS-98-05.Google ScholarGoogle Scholar
  25. Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C. D., and Stamatopoulos, P. 2003. A memory based approach to anti-spam filtering for mailing lists. Information Retrieval. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Salton, G. and McGill, M. J. 1998. Introduction to Modern Information Retrieval. McGraw-Hill. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Segal, R. B. and Kephart, J. O. 1999. MailCat: An intelligent assistant for organizing e-mail. In Proceedings of the 3rd International Conference on Autonomous Agents. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Shin, D. and Shim, C. 2005. Voice spam control with gray leveling. In Proceedings of 2nd VoIP Security Workshop, Washington, DC.Google ScholarGoogle Scholar
  29. Soonthornphisaj, N., Chaikulseriwat, K., and Tang-on, P. 2002. Anti-spam filtering: A centroid based classification approach. Proceedings of the IEEE International Conference on Software Processes.Google ScholarGoogle Scholar

Index Terms

  1. Nuisance level of a voice call

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Multimedia Computing, Communications, and Applications
          ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 5, Issue 1
          October 2008
          201 pages
          ISSN:1551-6857
          EISSN:1551-6865
          DOI:10.1145/1404880
          Issue’s Table of Contents

          Copyright © 2008 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 October 2008
          • Accepted: 1 October 2007
          • Revised: 1 July 2007
          • Received: 1 October 2006
          Published in tomm Volume 5, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!