{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:33:02Z","timestamp":1762032782462,"version":"3.41.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0627754CNS-0516807CNS-0619871CNS-0551694"],"award-info":[{"award-number":["CNS-0627754CNS-0516807CNS-0619871CNS-0551694"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2008,10]]},"abstract":"<jats:p>In our everyday life, we communicate with many people such as family, friends, neighbors, and colleagues. We communicate with them using different communication media such as email, telephone calls, and face-to-face interactions. While email is not real-time and face-to-face communications require geographic proximity, voice and video communications are preferred over other modes of communication. However, real-time voice\/video calls may create nuisance to the receiver. In this article, we describe a mathematical model for computing nuisance level of incoming voice\/video calls. We computed the closeness and nuisance level using the calling patterns between the caller and the callee. To validate the nuisance model, we collected cell phone call records of real-life people at our university and computed the nuisance value for all voice calls. We validated the nuisance levels using the feedback from those real-life people. Such a nuisance model is useful for predicting unwanted voice and video sessions in an IP communication network.<\/jats:p>","DOI":"10.1145\/1404880.1404886","type":"journal-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:43Z","timestamp":1225979383000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Nuisance level of a voice call"],"prefix":"10.1145","volume":"5","author":[{"given":"Prakash","family":"Kolan","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX"}]},{"given":"Jo\u00e3o W.","family":"Cangussu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX"}]}],"member":"320","published-online":{"date-parts":[[2008,10,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Biever C. 2004. Move over spam make way for \u201cspit.\u201d http:\/\/www.newscientist.com\/article.ns?id=dn6445.  Biever C. 2004. Move over spam make way for \u201cspit.\u201d http:\/\/www.newscientist.com\/article.ns?id=dn6445."},{"volume-title":"Is an HCI revolution just around the corner&quest","author":"Canny J.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access.","year":"1996","author":"Cohen W. W.","key":"e_1_2_1_3_1"},{"volume-title":"Proceedings of the IEEE GlobeComm Workshop on VoIP Security.","author":"Dantu R.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of USENIX, SRUTI (Steps for Reducing Unwanted Traffic on the Internet).","author":"Dantu R.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","unstructured":"Dantu R. and Kolan P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey http:\/\/secnet.csci.unt. edu\/nuisance\/.  Dantu R. and Kolan P. 2006. Survey of Calling Patterns. University of North Texas Internal Survey http:\/\/secnet.csci.unt. edu\/nuisance\/."},{"key":"e_1_2_1_8_1","unstructured":"Graham P. 2002. A Plan for Spam. http:\/\/paulgraham.com\/spam.html.  Graham P. 2002. A Plan for Spam. http:\/\/paulgraham.com\/spam.html."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"volume-title":"URL Clustering to Classify Spam","author":"Hershkop S.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1144403.1144406"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081885"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555261_48"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180947"},{"volume-title":"Comsware Workshop","author":"Kolan P.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216895.1216897"},{"volume-title":"Is your VoIP phone vulnerable&quest","year":"2006","author":"Lucy S.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"Manber U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco CA) 1--10.   Manber U. 1994. Finding similar files in a large file system. In Usenix Winter (San Fransisco CA) 1--10."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.2.482"},{"volume-title":"Machine Learning","author":"Mitchell T. M.","key":"e_1_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-2279-5"},{"volume-title":"Proceedings of the first Conference on E-mail and Anti-Spam.","author":"Rigoutsos I.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Rosenberg J. Shulzrinne H. Camerillo G. Johnston A. Peterson J. Sparks R. Handley M. and Schooler E. 2002. Session Initiation Protocol. RFC 3261.  Rosenberg J. Shulzrinne H. Camerillo G. Johnston A. Peterson J. Sparks R. Handley M. and Schooler E. 2002. Session Initiation Protocol. RFC 3261.","DOI":"10.17487\/rfc3261"},{"key":"e_1_2_1_23_1","unstructured":"Rosenberg J. Jennings C. and Peterson J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt  Rosenberg J. Jennings C. and Peterson J. 2006. The Session Initiation Protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt"},{"key":"e_1_2_1_24_1","unstructured":"Sahami M. Dumais S. Heckerman D. and Horvitz E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization\u2014Papers from the National Conference on Artificial Intelligence Workshop 55--62 AAAI Tech. Rep. WS-98-05.  Sahami M. Dumais S. Heckerman D. and Horvitz E. 1998. A bayesian approach to filtering junk e-mail. Learning for text categorization\u2014Papers from the National Conference on Artificial Intelligence Workshop 55--62 AAAI Tech. Rep. WS-98-05."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022948414856"},{"volume-title":"Introduction to Modern Information Retrieval","author":"Salton G.","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/301136.301209"},{"volume-title":"Proceedings of 2nd VoIP Security Workshop","author":"Shin D.","key":"e_1_2_1_28_1"},{"volume-title":"Proceedings of the IEEE International Conference on Software Processes.","author":"Soonthornphisaj N.","key":"e_1_2_1_29_1"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1404880.1404886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1404880.1404886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:38Z","timestamp":1750253378000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1404880.1404886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["10.1145\/1404880.1404886"],"URL":"https:\/\/doi.org\/10.1145\/1404880.1404886","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2008,10]]},"assertion":[{"value":"2006-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}