By Topic

Mining the bit pipes: Discovering and leveraging users' behavior

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Brenner, M. ; Alcatel-Lucent, Murray Hill, NJ, USA ; Daping Wang

This paper explores ways to enhance services provided to a user, based on the user's own behavior and context. The assumption is that the user continues to simply use data communication services, while the service provider (SP) mines the content exchanged over the communication pipes for information that can be used to further personalize the same service or other services to which the user has subscribed or opted-in. The content of the messages exchanged by the user may either directly or indirectly present mining opportunities. Messages may be exchanged between users leveraging communication technologies used in wireless networks (e.g. short message service (SMS)) or combinations of wireless and wireline networks (e.g. instant messaging (IM) over a next generation network (NGN) IP multimedia subsystem (IMS). Such messages may be intercepted or forwarded for content screening (CS) for subsequent content analysis (CA) (e.g. similar to deep packet inspection (DPI) techniques). The CA outcome represents information that can be applied to augment existing user's personal and context data, and be further used to offer new or enhanced services to the user (e.g. personalized advertising). In this paper, in addition to exploring the mining of data communication pipes, we are also describing how existing and/or emerging application enablement standards (e.g. OMA's converged IP messaging (CPM), categorization based content screening (CBCS), global permissions management (GPM), services user profile management (ServUserProf), etc.) can be combined and augmented with additional capabilities to create a well integrated ecosystem for personalized services. A specific example of a new or enhanced service that can feed on this ecosystem is also explored, using another emerging OMA standard, OMA mobile advertising (MobAd). A thorough architectural description of most of the open mobile alliance (OMA) specifications referred to in this paper, and how they relate to each other can- be found in the work of Brenner and Unmehopa (2008).

Published in:

Intelligence in Next Generation Networks, 2009. ICIN 2009. 13th International Conference on

Date of Conference:

26-29 Oct. 2009