An Analysis of Telephone Messages: Minimizing Unproductive Replay Time

نویسندگان

  • Michael D. Fleetwood
  • Danielle L. Paige
  • Chris S. Fick
چکیده

This paper reports the results of a research project to study the nature and structure of phone messages and the design characteristics of phone messaging systems that would optimize the retrieval of relevant message information. Of particular concern with respect to the structure of a phone message was the location of a phone number left in the message. In order to replay any portion of a message, most messaging systems require the user to listen to the message from its beginning. Because it was found that phone numbers are typically left towards the end of a message, such a system is quite inefficient. One proposed solution is the implementation of a "back" button. A simple equation is employed to optimize the length of time encompassed by the back button, which would result in substantial time savings to users at least 17 seconds per message in which it was used. The ramifications of such time savings are discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter

The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...

متن کامل

A replay-attack resistant message authentication scheme using time-based keying hash functions and unique message identifiers

Hash-based message authentication codes are an extremely simple yet hugely effective construction for producing keyed message digests using shared secrets. HMACs have seen widespread use as ad-hoc digital signatures in many Internet applications. While messages signed with an HMAC are secure against sender impersonation and tampering in transit, if used alone they are susceptible to replay atta...

متن کامل

An anti-replay window protocol with controlled shift

The anti-replay window protocol is used to secure IP against an adversary that can insert (possibly replayed) messages in the message stream from a source computer to a destination computer in the Internet. In this paper, we discuss this important protocol and point out a potential problem faced by the protocol, in which severe reorder of messages can cause the protocol to discard a lot of good...

متن کامل

On the Security of a Secure Batch Verification with Group Testing for VANET

Vehicular communication networking can provide wellsuited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to response message...

متن کامل

Minimizing information overload: the ranking of electronic messages

The decision to examine a message at a particular point in time should be made rationally and economically if the message recipient is to operate efficiently. Electronic message distribution systems, electronic bulletin board systems, and telephone systems capable of leaving digitized voice messages can contribute to “information overload,” defined as the economic loss associated with the exami...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002