Verification of the Dialogue Model
ثبت نشده
چکیده
that users immediately start to go beyond the limits of the system directed dialogue structure and utilizing the built-in shortcuts. An even more pronounced effect of user habituation can be expected when users are exposed to a larger number of dialogues.Speech recognition error rates for digit strings and word spotting were found to be 16% on average. This seemed sufficient to ensure user acceptance, but further stresses the importance of the dialogue design to ensure high user acceptance. The preceding sections have shown that the strategy of maintaining a system directed dialogue on the surface and then provide shortcuts for more experienced users has proved successful. The aim of Trial 2 was to investigate to what extent customers are prepared to accept voice controlled access to their bank accounts. The preliminary results strongly indicates that this is the case. The tested dialogue was very small, containing only a few sub tasks, so the next step will evidently be to expand the dialogue to cover a larger number of tasks, and a more complex task structure. Another very interesting experiment will be to subject users to a number of different dialogue models, in order to verify to what extent this influences their attitudes towards the system.
منابع مشابه
Verifying Strategies in Dialogue Games
The aim of the paper is to consider a game-theoretic properties of strategies available to players in dialogue games. We treat speech acts formulated in a dialogue as moves in a dialogue game and rules for their appropriateness as rules of this game. We would like to analyze dialogical systems as a Nash-style games, and explore verification possibilities for some properties of such games e.g. d...
متن کاملModeling Lateral Communication in Holonic Multi Agent Systems
Agents, in a multi agent system, communicate with each other through the process of exchanging messages which is called dialogue. Multi agent organization is generally used to optimize agents’ communications. Holonic organization demonstrates a self-similar recursive and hierarchical structure in which each holon may include some other holons. In a holonic system, lateral communication occurs b...
متن کاملConstruction of Dialogue among couples in Yazd : Towards a Grounded Theory
Introduction: Considering the importance of Constructive communication among families; The present study has studied and explained the understanding and experience of dialogue among couples in families in Yazd. Method: In this study, a qualitative approach and grounded theory method and Purposive and theoretical sampling were used and 31 couples from normal families in Yazd were selected and ...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملConstruction of Dialogue among couples in Yazd : Towards a Grounded Theory
Introduction: Considering the importance of Constructive communication among families; The present study has studied and explained the understanding and experience of dialogue among couples in families in Yazd. Method: In this study, a qualitative approach and grounded theory method and Purposive and theoretical sampling were used and 31 couples from normal families in Yazd were selected and ...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997