BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
email
Google email

Tag #email

165 papers:

EDMEDM-2019-UnnamTA #feedback #generative
Grading emails and generating feedback (AU, RT, VA).
MSRMSR-2019-Zhu0 #empirical #multi #repository #version control
An empirical study of multiple names and email addresses in OSS version control repositories (JZ, JW0), pp. 409–420.
KDDKDD-2019-JinHSWLSK #network
Smart Roles: Inferring Professional Roles in Email Networks (DJ, MH, TS, MW, WL, LS, DK), pp. 2923–2933.
CIKMCIKM-2018-Avigdor-Elgrabli #identification #thread
More than Threads: Identifying Related Email Messages (NAE, RG, IGZ, AR), pp. 1711–1714.
CIKMCIKM-2018-RepkeKEHHKSSZ #corpus #interactive #scalability
Beacon in the Dark: A System for Interactive Exploration of Large Email Corpora (TR, RK, JE, MH, JH, DK, HS, NS, AZ), pp. 1871–1874.
CIKMCIKM-2018-ShenKBQM #clustering #learning #multi #query #ranking
Multi-Task Learning for Email Search Ranking with Auxiliary Query Clustering (JS, MK, MB, ZQ, DM), pp. 2127–2135.
ECIRECIR-2018-RepkeK #network
Bringing Back Structure to Free Text Email Conversations with Recurrent Neural Networks (TR, RK), pp. 114–126.
KDDKDD-2018-ShengTWXZN #information management #privacy #scalability
Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email (YS0, ST, JBW, JX0, QZ, MN), pp. 734–743.
CIKMCIKM-2017-GuptaLR #optimisation
Optimizing Email Volume For Sitewide Engagement (RG, GL, RR), pp. 1947–1955.
CIKMCIKM-2017-GyselMVRKGC #recommendation
Reply With: Proactive Recommendation of Email Attachments (CVG, BM, MV, RR, GK, PG, NC), pp. 327–336.
CIKMCIKM-2017-Mondal0L #distributed #privacy #profiling
Privacy Aware Temporal Profiling of Emails in Distributed Setup (SM, MS0, SL), pp. 1229–1238.
CIKMCIKM-2016-Najork #experience #machine learning #using
Using Machine Learning to Improve the Email Experience (MN), p. 891.
KDDKDD-2016-GuptaLTVCR #optimisation
Email Volume Optimization at LinkedIn (RG, GL, HPT, RKHV, XC, RR), pp. 97–106.
KDDKDD-2016-KannanKRKTMCLGY #automation
Smart Reply: Automated Response Suggestion for Email (AK, KK, SR, TK, AT, BM, GC, LL, MG, PY, VR), pp. 955–964.
KDDKDD-2016-WangELBZGC #challenge #recommendation
The Million Domain Challenge: Broadcast Email Prioritization by Cross-domain Recommendation (BW, ME, YL, JB, YZ, ZG, DC), pp. 1895–1904.
CHICHI-2015-CecchinatoCB #bound #difference
Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
CHICHI-2015-HanrahanP #interactive
Lost in Email: Pulling Users Down a Path of Interaction (BVH, MAPQ), pp. 3981–3984.
HCIHCI-DE-2015-KobayashiTAF #delivery
E-Mail Delivery Mediation System Based on User Interruptibility (YK, TT, KA, KF), pp. 370–380.
ICEISICEIS-v2-2015-FariasNOCM #case study #commit #mining #repository
Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
CIKMCIKM-2015-CarmelHLMR #rank
Rank by Time or by Relevance?: Revisiting Email Search (DC, GH, LLE, YM, AR), pp. 283–292.
KDDKDD-2015-ZhangAYJS #information management
Annotating Needles in the Haystack without Looking: Product Information Extraction from Emails (WZ, AA, JY, VJ, AJS), pp. 2257–2266.
MLDMMLDM-2015-PatchalaBG #using
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
ASEASE-2015-SorboPVPCG #developer #development #mining
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) (ADS, SP, CAV, MDP, GC, HCG), pp. 12–23.
ICSEICSE-v2-2015-HermansM #analysis #dataset #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
CHICHI-2014-GrevetCKG
Overload is overloaded: email in the age of Gmail (CG, DC, DK, EG), pp. 793–802.
CHICHI-2014-RectorH #named
MinEMail: SMS alert system for managing critical emails (KR, JMH), pp. 783–792.
CSCWCSCW-2014-MejovaGWD #behaviour #comprehension
Giving is caring: understanding donation behavior through email (YM, VRKG, IW, MCD), pp. 1297–1307.
CSCWCSCW-2014-MunsonKRR #monitoring #performance
Monitoring email to indicate project team performance and mutual attraction (SAM, KK, LPRJ), pp. 542–549.
CIKMCIKM-2014-GrbovicHKM #category theory #how
How Many Folders Do You Really Need?: Classifying Email into a Handful of Categories (MG, GH, ZSK, YM), pp. 869–878.
KMISKMIS-2014-FrancoisMA #communication #design #problem #traceability #using
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
SIGIRSIGIR-2014-GrausDTWR #communication #enterprise #graph #recommendation #using
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
CSCWCSCW-2013-KokkalisKPCBK #crowdsourcing #named
EmailValet: managing email overload through private, accountable crowdsourcing (NK, TK, CP, DC, MSB, SRK), pp. 1291–1300.
HCIHCI-AS-2013-MatsumotoAK #development #learning #using #word
Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
WICSA-ECSAWICSA-ECSA-2012-RathfelderBKR #monitoring #performance #predict #scalability #using
Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
CHICHI-2012-MarkVC #empirical #quote
“A pace not dictated by electrons”: an empirical study of work without email (GM, SV, AC), pp. 555–564.
CHICHI-2012-TopkaraPLDWB #enterprise #quote #video
“You’ve got video”: increasing clickthrough when sharing enterprise video with email (MT, SP, JCL, AD, SW, JB), pp. 565–568.
ECIRECIR-2012-HarveyE #query
Exploring Query Patterns in Email Search (MH, DE), pp. 25–36.
ECIRECIR-2012-TamFL #approach #automation
Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
ICMLICML-2012-PrasseSLS #identification #learning #regular expression
Learning to Identify Regular Expressions that Describe Email Campaigns (PP, CS, NL, TS), p. 146.
ICPRICPR-2012-LiPMH #classification #incremental #learning #using
Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
SIGIRSIGIR-2012-XuO
Exploring example-based person search in email (TX, DWO), pp. 1067–1068.
ICSEICSE-2012-BacchelliSDL #classification #development
Content classification of development emails (AB, TDS, MD, ML), pp. 375–385.
ICDARICDAR-2011-KaratzasMMNR #challenge #contest #image #robust #web
ICDAR 2011 Robust Reading Competition — Challenge 1: Reading Text in Born-Digital Images (Web and Email) (DK, SRM, JM, FN, PPR), pp. 1485–1490.
VLDBVLDB-2011-JoshiCNDH #performance
Auto-Grouping Emails For Faster E-Discovery (SJ, DC, KN, PMD, TH), pp. 1284–1294.
CHICHI-2011-ChiZXYW #authoring #collaboration #coordination #using
Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHICHI-2011-MahmudMWML #collaboration #named
Topika: integrating collaborative sharing with email (JM, TM, SW, TM, TL), pp. 3161–3164.
CHICHI-2011-WainerDK
Should I open this email?: inbox-level cues, curiosity and attention to email (JW, LD, RK), pp. 3439–3448.
CHICHI-2011-WhittakerMCBT #case study
Am I wasting my time organizing email?: a study of email refinding (SW, TM, JAC, HB, JCT), pp. 3449–3458.
CSCWCSCW-2011-Johri #communication #distributed #exclamation #tool support
Look ma, no email!: blogs and IRC as primary and preferred communication tools in a distributed firm (AJ), pp. 305–308.
HCIHCI-MIIE-2011-KarthikP #adaptation #approach #classification #machine learning
Adaptive Machine Learning Approach for Emotional Email Classification (KK, RP), pp. 552–558.
CIKMCIKM-2011-YooYC #classification #modelling #personalisation
Modeling personalized email prioritization: classification-based and regression-based approaches (SY, YY, JGC), pp. 729–738.
ECIRECIR-2011-ElsweilerBR #case study #what
What Makes Re-finding Information Difficult? A Study of Email Re-finding (DE, MB, IR), pp. 568–579.
KDDKDD-2011-KorenLMS #automation
Automatically tagging email by leveraging other users’ folders (YK, EL, YM, RS), pp. 913–921.
MLDMMLDM-2011-ChenHCS #detection #similarity
Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
MLDMMLDM-2011-HaoCCCS #adaptation #detection #modelling
Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
SIGIRSIGIR-2011-ElsweilerHH #behaviour #comprehension #interactive
Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
ICSEICSE-2011-Bacchelli #re-engineering
Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
ICSEICSE-2011-BacchelliLD #named #tool support
Miler: a toolset for exploring email data (AB, ML, MD), pp. 1025–1027.
KEODKEOD-2010-ChatterjeeKRD #automation #classification #ontology #using
Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
SIGIRSIGIR-2010-LiuW #learning #multi
Multi-field learning for email spam filtering (WL, TW), pp. 745–746.
SACSAC-2010-IqbalKFD #forensics #verification
e-mail authorship verification for forensic investigation (FI, LAK, BCMF, MD), pp. 1591–1598.
ICSMEICSM-2009-LuciaFGT #design #repository
Recovering design rationale from email repositories (ADL, FF, CG, GT), pp. 543–546.
HCIHIMI-DIE-2009-MinakuchiM #named
Richbiff: E-Mail Message Notification with Richer Clues (MM, HM), pp. 570–578.
HCIHIMI-II-2009-AyodeleZK #approach #machine learning #predict
Email Reply Prediction: A Machine Learning Approach (TA, SZ, RK), pp. 114–123.
HCIOCSC-2009-WentzL #network #social
Email Accessibility and Social Networking (BW, JL), pp. 134–140.
ICEISICEIS-HCI-2009-MuranoMH #evaluation #feedback #user interface
Evaluation of Anthropomorphic User Interface Feedback in an Email Client Context and Affordances (PM, AM, POH), pp. 15–20.
ICEISICEIS-SAIC-2009-GandhiT #categorisation #ontology #using
Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEISICEIS-SAIC-2009-SammourDVW
Identiying Homogenous Customer Segments for Low Risk Email Marketing Experiments (GNS, BD, KV, GW), pp. 89–94.
ECIRECIR-2009-GanstererP #classification
E-Mail Classification for Phishing Defense (WNG, DP), pp. 449–460.
ECIRECIR-2009-WeerkampBR #information management #using
Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ICMLICML-2009-HaiderS #clustering #detection
Bayesian clustering for email campaign detection (PH, TS), pp. 385–392.
KDDKDD-2009-KolczC #composition
Genre-based decomposition of email class noise (AK, GVC), pp. 427–436.
KDDKDD-2009-YooYLM #mining #network #personalisation #social
Mining social networks for personalized email prioritization (SY, YY, FL, ICM), pp. 967–976.
SIGIRSIGIR-2009-CormackC #on the
On the relative age of spam and ham training samples for email filtering (GVC, JMMdC), pp. 744–745.
SACSAC-2009-LiuAD #internet
Incorporating accountability into internet email (WL, SA, ZD), pp. 875–882.
SACSAC-2009-WanMKJ #communication #detection #network
Link-based event detection in email communication networks (XW, EEM, NK, JJ), pp. 1506–1510.
SACSAC-2009-WeiSW #algorithm #clustering #fuzzy #novel #string
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm (CW, AS, GW), pp. 889–890.
SACSAC-2009-YounM #ontology #personalisation #using
Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
SACSAC-2009-YounM09a #embedded #image
Improved spam filtering by extraction of information from text embedded image e-mail (SY, DM), pp. 1754–1755.
PDPPDP-2009-Payeras-CapellaPFR #performance #protocol
No Author Based Selective Receipt in an Efficient Certified E-mail Protocol (MPC, MMP, JLFG, LHiR), pp. 387–392.
CSCWCSCW-2008-GuyJMRS #network #social
Public vs. private: comparing public social network information with email (IG, MJ, NM, IR, ES), pp. 393–402.
CIKMCIKM-2008-TsengSC #abstraction #detection #novel
A novel email abstraction scheme for spam detection (CYT, PCS, MSC), pp. 1393–1394.
ECIRECIR-2008-EreraC #detection
Conversation Detection in Email Systems (SE, DC), pp. 498–505.
ECIRECIR-2008-YahyaeiM #retrieval
Applying Maximum Entropy to Known-Item Email Retrieval (SY, CM), pp. 406–413.
SACSAC-2008-KageyamaMS #architecture
A pull-based e-mail architecture (EK, CM, AOS), pp. 468–472.
SACSAC-2008-WeiSWS #forensics #identification #mining
Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
CHICHI-2007-KumaraguruRACHN #design #embedded #evaluation #people
Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
HCIHCI-AS-2007-NodaST #communication #evaluation
Project Evaluation by E-Mail Communication Pattern (JN, RS, HT), pp. 702–711.
HCIHCI-MIE-2007-JungS #adaptation #multi
A Location-Adaptive Human-Centered Audio Email Notification Service for Multi-user Environments (RJ, TS), pp. 340–348.
HCIHIMI-IIE-2007-FisherBHSJ #lessons learnt #metadata #social #using
Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HCIHIMI-IIE-2007-MitsumotoW #people #visual notation
Exchanging Graphical Emails Among Elderly People and Kindergarten Children (MM, SHW), pp. 74–83.
ICEISICEIS-AIDSS-2007-BermejoGP #using
Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
CIKMCIKM-2007-PeraN #similarity #using #word
Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
ICMLICML-2007-HaiderBS #clustering #detection #streaming
Supervised clustering of streaming data for email batch detection (PH, UB, TS), pp. 345–352.
CASECASE-2007-NarasimhaKS #approach #information management #markov #process
A Semi Markov Decision Process Approach To E-mail Management In A Knowledge Work Environment (CYN, MK, RS), pp. 1051–1056.
MSRMSR-2006-BirdGDGS #mining #network #social
Mining email social networks (CB, AG, PTD, MG, AS), pp. 137–143.
MSRMSR-2006-BirdGDGS06a #mining #network #social
Mining email social networks in Postgres (CB, AG, PTD, MG, AS), pp. 185–186.
CHICHI-2006-GawFF
Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
CHICHI-2006-ViegasGD #visualisation
Visualizing email content: portraying relationships from conversational histories (FBV, SAG, JSD), pp. 979–988.
CSCWCSCW-2006-DabbishK #analysis
Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
CSCWCSCW-2006-FisherBGS #years after
Revisiting Whittaker & Sidner’s “email overload” ten years later (DF, AJBB, EG, MAS), pp. 309–312.
CSCWCSCW-2006-SiuIT
Going with the flow: email awareness and task management (NS, LI, AT), pp. 441–450.
ECIRECIR-2006-FreschiSB #obfuscation #string
Filtering Obfuscated Email Spam by means of Phonetic String Matching (VF, AS, AB), pp. 505–509.
ECIRECIR-2006-KeBO #classification #named
PERC: A Personal Email Classifier (SWK, CB, MPO), pp. 460–463.
SIGIRSIGIR-2006-MacdonaldO
Combining fields in known-item email search (CM, IO), pp. 675–676.
SIGIRSIGIR-2006-MinkovCN #ambiguity #graph #using
Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SACSAC-2006-BergerMD #categorisation #set
Exploiting partial decision trees for feature subset selection in e-mail categorization (HB, DM, MD), pp. 1105–1109.
SACSAC-2006-TailbyDMS #automation #classification
Email classification for automated service handling (RT, RD, BM, DS), pp. 1073–1077.
ICDARICDAR-2005-AradhyeMH #analysis #categorisation #image #performance
Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
CHICHI-2005-DabbishKFK #comprehension #predict
Understanding email use: predicting action on a message (LAD, REK, SRF, SBK), pp. 691–700.
CHICHI-2005-GarfinkelMSNM #how
How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
ICEISICEIS-v2-2005-RomeroOG
A Methodology for Intelligent E-Mail Management (FPR, JAO, PJG), pp. 11–16.
KDDKDD-2005-CareniniNZ #scalability
Scalable discovery of hidden emails from large folders (GC, RTN, XZ), pp. 544–549.
KDDKDD-2005-HershkopS #modelling #reduction
Combining email models for false positive reduction (SH, SJS), pp. 98–107.
KDDKDD-2005-TangLCT
Email data cleaning (JT, HL, YC, ZT), pp. 489–498.
SEKESEKE-2005-HuangLF #automation #mining #query
A Chinese Text Mining Application: An Automatic Answer Reply to Customers’ E-mail Queries Model (JYH, HML, CLF), pp. 504–507.
SIGIRSIGIR-2005-BennettC #detection
Detecting action-items in e-mail (PNB, JGC), pp. 585–586.
SIGIRSIGIR-2005-CarvalhoC #classification #on the #speech
On the collective classification of email “speech acts” (VRdC, WWC), pp. 345–352.
SIGIRSIGIR-2005-TuulosPT #information retrieval #multi #scalability
Multi-faceted information retrieval system for large scale email archives (VHT, JP, HT), p. 683.
SIGIRSIGIR-2005-WuO #retrieval #thread
Indexing emails and email threads for retrieval (YW, DWO), pp. 665–666.
SACSAC-2005-CareniniNZZ
Discovery and regeneration of hidden emails (GC, RTN, XZ, EZ), pp. 503–510.
SACSAC-2005-GoettlBJ #algorithm #search-based
Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm (JSG, AWB, BAJ), pp. 947–951.
SACSAC-2005-KhuranaSB #named
SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
ICEISICEIS-v4-2004-SuiAM #approach #e-commerce
Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
SIGIRSIGIR-2004-AeryC #classification #named
eMailSift: mining-based approaches to email classification (MA, SC), pp. 580–581.
SIGIRSIGIR-2004-Leuski #people
Email is a stage: discovering people roles from email archives (AL), pp. 502–503.
SACSAC-2004-EgidiP #case study #certification
Anonymity and certification: e-mail, a case study (LE, GP), pp. 397–403.
SACSAC-2004-NenadicZB #delivery
Fair certified e-mail delivery (AN, NZ, SB), pp. 391–396.
CHICHI-2003-BellottiDHS #design #evaluation
Taking email to task: the design and evaluation of a task management centered email tool (VB, ND, MH, IS), pp. 345–352.
CHICHI-2003-VenoliaN #comprehension #sequence #visualisation
Understanding sequence and reply relationships within email conversations: a mixed-model visualization (GDV, CN), pp. 361–368.
ICEISICEIS-v2-2003-LamontagneL #reasoning
Applying Case-Based Reasoning to Email Response (LL, GL), pp. 115–123.
CIKMCIKM-2003-CampbellMCD #identification #using
Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
SIGIRSIGIR-2003-LeuskiOB #named
eArchivarius: accessing collections of electronic mail (AL, DWO, RB), p. 468.
SASSAS-2003-AbadiB #protocol #verification
Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
SACSAC-2003-NenkovaB #classification
Email Classification for Contact Centers (AN, AB), pp. 789–792.
CSCWCSCW-2002-KrautMTFCS #question
Markets for attention: will postage for email help? (REK, JM, RT, DF, MC, SS), pp. 206–215.
ICMLICML-2002-CrawfordKM #named
IEMS — The Intelligent Email Sorter (EC, JK, EM), pp. 83–90.
SACSAC-2002-Hidalgo #categorisation
Evaluating cost-sensitive Unsolicited Bulk Email categorization (JMGH), pp. 615–620.
SACSAC-2002-KarnouskosV
Active electronic mail (SK, AVV), pp. 801–806.
ICEISICEIS-v1-2001-CounsellLSTM #data analysis #optimisation #using
Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
ICEISICEIS-v2-2001-Weghorn #mobile
Notification and Routing of Electronic Mail to Mobile Phone Devices (HW), p. 1188–?.
SIGIRSIGIR-2001-Mock #categorisation #framework
An Experimental Framework for Email Categorization and Management (KJM), pp. 392–393.
ITiCSEITiCSE-2000-Hobbs #assessment #learning
Email groups for learning and assessment (MH), p. 183.
CHICHI-2000-Balter #analysis
Keystroke level analysis of email message organization (OB), pp. 105–112.
ICMLICML-2000-BrutlagM #challenge #classification
Challenges of the Email Domain for Text Classification (JDB, CM), pp. 103–110.
SIGIRSIGIR-2000-AndroutsopoulosKCS #anti #comparison #keyword #naive bayes
An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages (IA, JK, KC, CDS), pp. 160–167.
SACSAC-2000-Armstrong #reliability
Increasing the Reliability of Email Services (JLA), pp. 627–632.
HCIHCI-CCAD-1999-RauS #overview
Likes and dislikes of electronic mail addresses: a users’ survey (PLPR, GS), pp. 58–61.
HCIHCI-EI-1999-SanuiU #evaluation #grid
Extracting Baby-Boomers’ Future Expectations by the Evaluation Grid Method Through E-Mail (JS, MU), pp. 760–763.
SACSAC-1999-Krishnamurthi #education #programming
Integrating E-Mail in a Programming Class: Implications for Teaching Programming (MK), pp. 126–131.
TACASTACAS-1999-BergeronM #analysis #automation #interactive
An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
HTHT-1998-TajimaMKT #query
Cut as a Querying Unit for WWW, Netnews, e-mail (KT, YM, MK, KT), pp. 235–244.
CHICHI-1998-WalkerFFMH #interface #what
What can I say? Evaluating a Spoken Language Interface to Email (MAW, JF, GDF, CM, DH), pp. 582–589.
ICPRICPR-1998-ChenHS #analysis
E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
HCIHCI-SEC-1997-TanakaKN #prototype
Prototyping of Digital Ink E-Mail System Based on a Common Ink Format (HT, NK, MN), pp. 435–438.
HCIHCI-SEC-1997-YiuBSL #interface
A Time-Based Interface for Electronic Mail and Task Management (KSY, RB, NS, BL), pp. 19–22.
ITiCSEITiCSE-1996-ArnowC #programming #web
Extending the conversation: integrating email and Web technology in CS programming classes (DMA, DC), pp. 93–95.
CHICHI-1996-WhittakerS #information management
Email Overload: Exploring Personal Information Management of Email (SW, CLS), pp. 276–283.
CIKMCIKM-1996-Hall #knowledge-based #named
Infomod: A Knowledge-Based Moderator for Electronic Mail Help Lists (RJH), pp. 107–114.
HPDCHPDC-1996-TsoiR #collaboration #multi #on-demand #web
“Media-on-Demand” Multimedia Electronic Mail: A Tool for Collaboration on the Web (KNT, SMR), pp. 121–126.
CHICHI-1995-CapucciatiCOW
Neither Rain, Nor Sleet, Nor Gloom of Night: Adventures in Electronic Mail (MC, PC, KDO, AW), pp. 553–557.
SACSAC-1995-Arnow #network #programming #using
:-) When you grade that: using e-mail and the network in programming courses (DMA), pp. 10–13.
VLDBVLDB-1988-KentTO #case study #experience
Browsing Electronic Mail: Experiences Interfacing a Mail System to a DBMS (JK, DBT, WSO), pp. 112–123.
CSCWCSCW-1988-Mackay #communication #using
More than just a Communication System: Diversity in the Use of Electronic Mail (WEM), pp. 344–353.
CSCWCSCW-1986-Feldman #communication #constraints
Constraints on communication and electronic mail (MSF), pp. 73–90.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.