Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method for verifying a caller for spam detection. SOLUTION: A caller verification method includes a step for generating a challenge 322 sent to a caller which requires a response from the caller prior to the acceptance of a call. A response to the challenge or lack thereof is determined from the caller, and the response is analyzed relative to a predetermined acceptable response to determine whether the caller is acceptable to communicate with. If the caller is acceptable, the call may be accepted. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for generating an annotated network topology. SOLUTION: A method of generating an annotated network topology of a network is disclosed. The method includes determining available band width "B" of a network, on a network path connecting a pair of endpoints by performing Transfer Control Protocol (TCP) flows between the pair of endpoints, with the network having a plurality of network paths; identifying a bottleneck link in the network path; and annotating all edges in a network path, wherein available bandwidth annotation of the links inside the network is determined using end-to-end network measurements. A system for generating the annotated network topology of a network is also disclosed. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
Mechanisms, and associated methods, for conducting voice analysis (e.g., speaker ID verification) directly from a compressed domain of a voice signal. Preferably, the feature vector is directly segmented, based on its corresponding physical meaning, from the compressed bit stream.