Flylib.com
Voice User Interface Design 2004
Voice User Interface Design 2004
ISBN: 321185765
EAN: N/A
Year: 2005
Pages: 117
BUY ON AMAZON
Voice User Interface Design
Table of Contents
Copyright
Praise for Voice User Interface Design
About the Authors and Radio Rex
Preface
Organization of The Book
Audience
Web Site
Acknowledgments
Part I: Introduction
Chapter 1. Introduction to Voice User Interfaces
1.1 What Is a Voice User Interface?
1.2 Why Speech?
1.3 Where Do We Go from Here?
Chapter 2. Overview of Spoken Language Technology
2.1 Architecture of a Spoken Language System
2.2 The Impact of Speech Technology on Design Decisions
2.3 Conclusion
Chapter 3. Overview of the Methodology
3.1 Methodological Principles
3.2 Steps of the Methodology
3.3 Applying the Methodology to Real-World Applications
3.4 Conclusion
Part II: Definition Phase: Requirements Gathering and High-Level Design
Chapter 4. Requirements and High-Level Design Methodology
4.1 Requirements Definition
4.2 High-Level Design
4.3 Conclusion
Chapter 5. High-Level Design Elements
5.1 Dialog Strategy and Grammar Type
5.2 Pervasive Dialog Elements
5.3 Conclusion
Chapter 6. Creating Persona, by Design
6.1 What Is Persona?
6.2 Where Does Persona Come From?
6.3 A Checklist for Persona Design
6.4 Persona Definition
6.5 Conclusion
Chapter 7. Sample Application: Requirements and High-Level Design
7.1 Lexington Brokerage
7.2 Requirements Definition
7.3 High-Level Design
7.4 Conclusion
Part III: Design Phase: Detailed Design
Chapter 8. Detailed Design Methodology
8.1 Anatomy of a Dialog State
8.2 Call Flow Design
8.3 Prompt Design
8.4 User Testing
8.5 Design Principles
8.6 Conclusion
Chapter 9. Minimizing Cognitive Load
9.1 Conceptual Complexity
9.2 Memory Load
9.3 Attention
9.4 Conclusion
Chapter 10. Designing Prompts
10.1 Conversation as Discourse
10.2 Cohesion
10.3 Information Structure
10.4 Spoken Versus Written English
10.5 Register and Consistency
10.6 Jargon
10.7 The Cooperative Principle
10.8 Conclusion
Chapter 11. Planning Prosody
11.1 What Is Prosody?
11.2 Functions of Prosody
11.3 Stress
11.4 Intonation
11.5 Concatenating Phone Numbers
11.6 Minimizing Concatenation Splices
11.7 Pauses
11.8 TTS Guidelines
11.9 Conclusion
Chapter 12. Maximizing Efficiency and Clarity
12.1 Efficiency
12.2 Clarity
12.3 Balancing Efficiency and Clarity
12.4 Conclusion
Chapter 13. Optimizing Accuracy and Recovering from Errors
13.1 Measuring Accuracy
13.2 Dialog Design Guidelines for Maximizing Accuracy
13.3 Recovering from Errors
13.4 Conclusion
Chapter 14. Sample Application: Detailed Design
14.1 Call Flow Design
14.2 Prompt Design
14.3 User Testing
14.4 Conclusion
Part IV: Realization Phase: Development, Testing, and Tuning
Chapter 15. Development, Testing, and Tuning Methodology
15.1 Development
15.2 Testing
15.3 Tuning
15.4 Conclusion
Chapter 16. Creating Grammars
16.1 Grammar Development
16.2 Grammar Testing
16.3 Grammar Tuning
16.4 Conclusion
Chapter 17. Working with Voice Actors
17.1 Scripting for Success
17.2 Choosing Your Voice Actor
17.3 Running a Recording Session
17.4 Conclusion
Chapter 18. Sample Application: Development, Testing, and Tuning
18.1 Development
18.2 Testing
18.3 Tuning
Chapter 19. Conclusion
Appendix APPENDIX
Bibliography
Works Cited
Works Consulted
Voice User Interface Design 2004
ISBN: 321185765
EAN: N/A
Year: 2005
Pages: 117
BUY ON AMAZON
Project Management JumpStart
Initiating the Project
Defining the Project Goals
Assessing Risk
Closing the Books
Appendix B Sample Project Management Forms
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Introduction
Summary
Semaphore Operations
A.2. Manual Page Format
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Resource Risk
Managing Project Risk
Conclusion
Appendix A Selected Detail From the PERIL Database
A+ Fast Pass
Domain 3 Preventive Maintenance
Domain 5 Printers
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 2 Installation, Configuration, and Upgrading
WebLogic: The Definitive Guide
Security Configuration
Configuring JDBC Connectivity
Configuring a Mail Session
Using J2EE Services on the Object Tier
SNMP Proxies
Building Web Applications with UML (2nd Edition)
Modeling Secure Systems
Summary
Architectural Viewpoints
Discussion
UML to HTML
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies