Tag #email
165 papers:
- EDM-2019-UnnamTA #feedback #generative
- Grading emails and generating feedback (AU, RT, VA).
- MSR-2019-Zhu0 #empirical #multi #repository #version control
- An empirical study of multiple names and email addresses in OSS version control repositories (JZ, JW0), pp. 409–420.
- KDD-2019-JinHSWLSK #network
- Smart Roles: Inferring Professional Roles in Email Networks (DJ, MH, TS, MW, WL, LS, DK), pp. 2923–2933.
- CIKM-2018-Avigdor-Elgrabli #identification #thread
- More than Threads: Identifying Related Email Messages (NAE, RG, IGZ, AR), pp. 1711–1714.
- CIKM-2018-RepkeKEHHKSSZ #corpus #interactive #scalability
- Beacon in the Dark: A System for Interactive Exploration of Large Email Corpora (TR, RK, JE, MH, JH, DK, HS, NS, AZ), pp. 1871–1874.
- CIKM-2018-ShenKBQM #clustering #learning #multi #query #ranking
- Multi-Task Learning for Email Search Ranking with Auxiliary Query Clustering (JS, MK, MB, ZQ, DM), pp. 2127–2135.
- ECIR-2018-RepkeK #network
- Bringing Back Structure to Free Text Email Conversations with Recurrent Neural Networks (TR, RK), pp. 114–126.
- KDD-2018-ShengTWXZN #information management #privacy #scalability
- Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email (YS0, ST, JBW, JX0, QZ, MN), pp. 734–743.
- CIKM-2017-GuptaLR #optimisation
- Optimizing Email Volume For Sitewide Engagement (RG, GL, RR), pp. 1947–1955.
- CIKM-2017-GyselMVRKGC #recommendation
- Reply With: Proactive Recommendation of Email Attachments (CVG, BM, MV, RR, GK, PG, NC), pp. 327–336.
- CIKM-2017-Mondal0L #distributed #privacy #profiling
- Privacy Aware Temporal Profiling of Emails in Distributed Setup (SM, MS0, SL), pp. 1229–1238.
- CIKM-2016-Najork #experience #machine learning #using
- Using Machine Learning to Improve the Email Experience (MN), p. 891.
- KDD-2016-GuptaLTVCR #optimisation
- Email Volume Optimization at LinkedIn (RG, GL, HPT, RKHV, XC, RR), pp. 97–106.
- KDD-2016-KannanKRKTMCLGY #automation
- Smart Reply: Automated Response Suggestion for Email (AK, KK, SR, TK, AT, BM, GC, LL, MG, PY, VR), pp. 955–964.
- KDD-2016-WangELBZGC #challenge #recommendation
- The Million Domain Challenge: Broadcast Email Prioritization by Cross-domain Recommendation (BW, ME, YL, JB, YZ, ZG, DC), pp. 1895–1904.
- CHI-2015-CecchinatoCB #bound #difference
- Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
- CHI-2015-HanrahanP #interactive
- Lost in Email: Pulling Users Down a Path of Interaction (BVH, MAPQ), pp. 3981–3984.
- HCI-DE-2015-KobayashiTAF #delivery
- E-Mail Delivery Mediation System Based on User Interruptibility (YK, TT, KA, KF), pp. 370–380.
- ICEIS-v2-2015-FariasNOCM #case study #commit #mining #repository
- Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
- CIKM-2015-CarmelHLMR #rank
- Rank by Time or by Relevance?: Revisiting Email Search (DC, GH, LLE, YM, AR), pp. 283–292.
- KDD-2015-ZhangAYJS #information management
- Annotating Needles in the Haystack without Looking: Product Information Extraction from Emails (WZ, AA, JY, VJ, AJS), pp. 2257–2266.
- MLDM-2015-PatchalaBG #using
- Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
- ASE-2015-SorboPVPCG #developer #development #mining
- Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) (ADS, SP, CAV, MDP, GC, HCG), pp. 12–23.
- ICSE-v2-2015-HermansM #analysis #dataset #spreadsheet
- Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
- CHI-2014-GrevetCKG
- Overload is overloaded: email in the age of Gmail (CG, DC, DK, EG), pp. 793–802.
- CHI-2014-RectorH #named
- MinEMail: SMS alert system for managing critical emails (KR, JMH), pp. 783–792.
- CSCW-2014-MejovaGWD #behaviour #comprehension
- Giving is caring: understanding donation behavior through email (YM, VRKG, IW, MCD), pp. 1297–1307.
- CSCW-2014-MunsonKRR #monitoring #performance
- Monitoring email to indicate project team performance and mutual attraction (SAM, KK, LPRJ), pp. 542–549.
- CIKM-2014-GrbovicHKM #category theory #how
- How Many Folders Do You Really Need?: Classifying Email into a Handful of Categories (MG, GH, ZSK, YM), pp. 869–878.
- KMIS-2014-FrancoisMA #communication #design #problem #traceability #using
- Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
- SIGIR-2014-GrausDTWR #communication #enterprise #graph #recommendation #using
- Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
- CSCW-2013-KokkalisKPCBK #crowdsourcing #named
- EmailValet: managing email overload through private, accountable crowdsourcing (NK, TK, CP, DC, MSB, SRK), pp. 1291–1300.
- HCI-AS-2013-MatsumotoAK #development #learning #using #word
- Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
- WICSA-ECSA-2012-RathfelderBKR #monitoring #performance #predict #scalability #using
- Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
- CHI-2012-MarkVC #empirical #quote
- “A pace not dictated by electrons”: an empirical study of work without email (GM, SV, AC), pp. 555–564.
- CHI-2012-TopkaraPLDWB #enterprise #quote #video
- “You’ve got video”: increasing clickthrough when sharing enterprise video with email (MT, SP, JCL, AD, SW, JB), pp. 565–568.
- ECIR-2012-HarveyE #query
- Exploring Query Patterns in Email Search (MH, DE), pp. 25–36.
- ECIR-2012-TamFL #approach #automation
- Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
- ICML-2012-PrasseSLS #identification #learning #regular expression
- Learning to Identify Regular Expressions that Describe Email Campaigns (PP, CS, NL, TS), p. 146.
- ICPR-2012-LiPMH #classification #incremental #learning #using
- Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
- SIGIR-2012-XuO
- Exploring example-based person search in email (TX, DWO), pp. 1067–1068.
- ICSE-2012-BacchelliSDL #classification #development
- Content classification of development emails (AB, TDS, MD, ML), pp. 375–385.
- ICDAR-2011-KaratzasMMNR #challenge #contest #image #robust #web
- ICDAR 2011 Robust Reading Competition — Challenge 1: Reading Text in Born-Digital Images (Web and Email) (DK, SRM, JM, FN, PPR), pp. 1485–1490.
- VLDB-2011-JoshiCNDH #performance
- Auto-Grouping Emails For Faster E-Discovery (SJ, DC, KN, PMD, TH), pp. 1284–1294.
- CHI-2011-ChiZXYW #authoring #collaboration #coordination #using
- Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
- CHI-2011-MahmudMWML #collaboration #named
- Topika: integrating collaborative sharing with email (JM, TM, SW, TM, TL), pp. 3161–3164.
- CHI-2011-WainerDK
- Should I open this email?: inbox-level cues, curiosity and attention to email (JW, LD, RK), pp. 3439–3448.
- CHI-2011-WhittakerMCBT #case study
- Am I wasting my time organizing email?: a study of email refinding (SW, TM, JAC, HB, JCT), pp. 3449–3458.
- CSCW-2011-Johri #communication #distributed #exclamation #tool support
- Look ma, no email!: blogs and IRC as primary and preferred communication tools in a distributed firm (AJ), pp. 305–308.
- HCI-MIIE-2011-KarthikP #adaptation #approach #classification #machine learning
- Adaptive Machine Learning Approach for Emotional Email Classification (KK, RP), pp. 552–558.
- CIKM-2011-YooYC #classification #modelling #personalisation
- Modeling personalized email prioritization: classification-based and regression-based approaches (SY, YY, JGC), pp. 729–738.
- ECIR-2011-ElsweilerBR #case study #what
- What Makes Re-finding Information Difficult? A Study of Email Re-finding (DE, MB, IR), pp. 568–579.
- KDD-2011-KorenLMS #automation
- Automatically tagging email by leveraging other users’ folders (YK, EL, YM, RS), pp. 913–921.
- MLDM-2011-ChenHCS #detection #similarity
- Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
- MLDM-2011-HaoCCCS #adaptation #detection #modelling
- Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
- SIGIR-2011-ElsweilerHH #behaviour #comprehension #interactive
- Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
- ICSE-2011-Bacchelli #re-engineering
- Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
- ICSE-2011-BacchelliLD #named #tool support
- Miler: a toolset for exploring email data (AB, ML, MD), pp. 1025–1027.
- KEOD-2010-ChatterjeeKRD #automation #classification #ontology #using
- Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
- SIGIR-2010-LiuW #learning #multi
- Multi-field learning for email spam filtering (WL, TW), pp. 745–746.
- SAC-2010-IqbalKFD #forensics #verification
- e-mail authorship verification for forensic investigation (FI, LAK, BCMF, MD), pp. 1591–1598.
- ICSM-2009-LuciaFGT #design #repository
- Recovering design rationale from email repositories (ADL, FF, CG, GT), pp. 543–546.
- HIMI-DIE-2009-MinakuchiM #named
- Richbiff: E-Mail Message Notification with Richer Clues (MM, HM), pp. 570–578.
- HIMI-II-2009-AyodeleZK #approach #machine learning #predict
- Email Reply Prediction: A Machine Learning Approach (TA, SZ, RK), pp. 114–123.
- OCSC-2009-WentzL #network #social
- Email Accessibility and Social Networking (BW, JL), pp. 134–140.
- ICEIS-HCI-2009-MuranoMH #evaluation #feedback #user interface
- Evaluation of Anthropomorphic User Interface Feedback in an Email Client Context and Affordances (PM, AM, POH), pp. 15–20.
- ICEIS-SAIC-2009-GandhiT #categorisation #ontology #using
- Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
- ICEIS-SAIC-2009-SammourDVW
- Identiying Homogenous Customer Segments for Low Risk Email Marketing Experiments (GNS, BD, KV, GW), pp. 89–94.
- ECIR-2009-GanstererP #classification
- E-Mail Classification for Phishing Defense (WNG, DP), pp. 449–460.
- ECIR-2009-WeerkampBR #information management #using
- Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
- ICML-2009-HaiderS #clustering #detection
- Bayesian clustering for email campaign detection (PH, TS), pp. 385–392.
- KDD-2009-KolczC #composition
- Genre-based decomposition of email class noise (AK, GVC), pp. 427–436.
- KDD-2009-YooYLM #mining #network #personalisation #social
- Mining social networks for personalized email prioritization (SY, YY, FL, ICM), pp. 967–976.
- SIGIR-2009-CormackC #on the
- On the relative age of spam and ham training samples for email filtering (GVC, JMMdC), pp. 744–745.
- SAC-2009-LiuAD #internet
- Incorporating accountability into internet email (WL, SA, ZD), pp. 875–882.
- SAC-2009-WanMKJ #communication #detection #network
- Link-based event detection in email communication networks (XW, EEM, NK, JJ), pp. 1506–1510.
- SAC-2009-WeiSW #algorithm #clustering #fuzzy #novel #string
- Clustering malware-generated spam emails with a novel fuzzy string matching algorithm (CW, AS, GW), pp. 889–890.
- SAC-2009-YounM #ontology #personalisation #using
- Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
- SAC-2009-YounM09a #embedded #image
- Improved spam filtering by extraction of information from text embedded image e-mail (SY, DM), pp. 1754–1755.
- PDP-2009-Payeras-CapellaPFR #performance #protocol
- No Author Based Selective Receipt in an Efficient Certified E-mail Protocol (MPC, MMP, JLFG, LHiR), pp. 387–392.
- CSCW-2008-GuyJMRS #network #social
- Public vs. private: comparing public social network information with email (IG, MJ, NM, IR, ES), pp. 393–402.
- CIKM-2008-TsengSC #abstraction #detection #novel
- A novel email abstraction scheme for spam detection (CYT, PCS, MSC), pp. 1393–1394.
- ECIR-2008-EreraC #detection
- Conversation Detection in Email Systems (SE, DC), pp. 498–505.
- ECIR-2008-YahyaeiM #retrieval
- Applying Maximum Entropy to Known-Item Email Retrieval (SY, CM), pp. 406–413.
- SAC-2008-KageyamaMS #architecture
- A pull-based e-mail architecture (EK, CM, AOS), pp. 468–472.
- SAC-2008-WeiSWS #forensics #identification #mining
- Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
- CHI-2007-KumaraguruRACHN #design #embedded #evaluation #people
- Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
- HCI-AS-2007-NodaST #communication #evaluation
- Project Evaluation by E-Mail Communication Pattern (JN, RS, HT), pp. 702–711.
- HCI-MIE-2007-JungS #adaptation #multi
- A Location-Adaptive Human-Centered Audio Email Notification Service for Multi-user Environments (RJ, TS), pp. 340–348.
- HIMI-IIE-2007-FisherBHSJ #lessons learnt #metadata #social #using
- Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
- HIMI-IIE-2007-MitsumotoW #people #visual notation
- Exchanging Graphical Emails Among Elderly People and Kindergarten Children (MM, SHW), pp. 74–83.
- ICEIS-AIDSS-2007-BermejoGP #using
- Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
- CIKM-2007-PeraN #similarity #using #word
- Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
- ICML-2007-HaiderBS #clustering #detection #streaming
- Supervised clustering of streaming data for email batch detection (PH, UB, TS), pp. 345–352.
- CASE-2007-NarasimhaKS #approach #information management #markov #process
- A Semi Markov Decision Process Approach To E-mail Management In A Knowledge Work Environment (CYN, MK, RS), pp. 1051–1056.
- MSR-2006-BirdGDGS #mining #network #social
- Mining email social networks (CB, AG, PTD, MG, AS), pp. 137–143.
- MSR-2006-BirdGDGS06a #mining #network #social
- Mining email social networks in Postgres (CB, AG, PTD, MG, AS), pp. 185–186.
- CHI-2006-GawFF
- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
- CHI-2006-ViegasGD #visualisation
- Visualizing email content: portraying relationships from conversational histories (FBV, SAG, JSD), pp. 979–988.
- CSCW-2006-DabbishK #analysis
- Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
- CSCW-2006-FisherBGS #years after
- Revisiting Whittaker & Sidner’s “email overload” ten years later (DF, AJBB, EG, MAS), pp. 309–312.
- CSCW-2006-SiuIT
- Going with the flow: email awareness and task management (NS, LI, AT), pp. 441–450.
- ECIR-2006-FreschiSB #obfuscation #string
- Filtering Obfuscated Email Spam by means of Phonetic String Matching (VF, AS, AB), pp. 505–509.
- ECIR-2006-KeBO #classification #named
- PERC: A Personal Email Classifier (SWK, CB, MPO), pp. 460–463.
- SIGIR-2006-MacdonaldO
- Combining fields in known-item email search (CM, IO), pp. 675–676.
- SIGIR-2006-MinkovCN #ambiguity #graph #using
- Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
- SAC-2006-BergerMD #categorisation #set
- Exploiting partial decision trees for feature subset selection in e-mail categorization (HB, DM, MD), pp. 1105–1109.
- SAC-2006-TailbyDMS #automation #classification
- Email classification for automated service handling (RT, RD, BM, DS), pp. 1073–1077.
- ICDAR-2005-AradhyeMH #analysis #categorisation #image #performance
- Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
- CHI-2005-DabbishKFK #comprehension #predict
- Understanding email use: predicting action on a message (LAD, REK, SRF, SBK), pp. 691–700.
- CHI-2005-GarfinkelMSNM #how
- How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
- ICEIS-v2-2005-RomeroOG
- A Methodology for Intelligent E-Mail Management (FPR, JAO, PJG), pp. 11–16.
- KDD-2005-CareniniNZ #scalability
- Scalable discovery of hidden emails from large folders (GC, RTN, XZ), pp. 544–549.
- KDD-2005-HershkopS #modelling #reduction
- Combining email models for false positive reduction (SH, SJS), pp. 98–107.
- KDD-2005-TangLCT
- Email data cleaning (JT, HL, YC, ZT), pp. 489–498.
- SEKE-2005-HuangLF #automation #mining #query
- A Chinese Text Mining Application: An Automatic Answer Reply to Customers’ E-mail Queries Model (JYH, HML, CLF), pp. 504–507.
- SIGIR-2005-BennettC #detection
- Detecting action-items in e-mail (PNB, JGC), pp. 585–586.
- SIGIR-2005-CarvalhoC #classification #on the #speech
- On the collective classification of email “speech acts” (VRdC, WWC), pp. 345–352.
- SIGIR-2005-TuulosPT #information retrieval #multi #scalability
- Multi-faceted information retrieval system for large scale email archives (VHT, JP, HT), p. 683.
- SIGIR-2005-WuO #retrieval #thread
- Indexing emails and email threads for retrieval (YW, DWO), pp. 665–666.
- SAC-2005-CareniniNZZ
- Discovery and regeneration of hidden emails (GC, RTN, XZ, EZ), pp. 503–510.
- SAC-2005-GoettlBJ #algorithm #search-based
- Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm (JSG, AWB, BAJ), pp. 947–951.
- SAC-2005-KhuranaSB #named
- SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
- ICEIS-v4-2004-SuiAM #approach #e-commerce
- Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
- SIGIR-2004-AeryC #classification #named
- eMailSift: mining-based approaches to email classification (MA, SC), pp. 580–581.
- SIGIR-2004-Leuski #people
- Email is a stage: discovering people roles from email archives (AL), pp. 502–503.
- SAC-2004-EgidiP #case study #certification
- Anonymity and certification: e-mail, a case study (LE, GP), pp. 397–403.
- SAC-2004-NenadicZB #delivery
- Fair certified e-mail delivery (AN, NZ, SB), pp. 391–396.
- CHI-2003-BellottiDHS #design #evaluation
- Taking email to task: the design and evaluation of a task management centered email tool (VB, ND, MH, IS), pp. 345–352.
- CHI-2003-VenoliaN #comprehension #sequence #visualisation
- Understanding sequence and reply relationships within email conversations: a mixed-model visualization (GDV, CN), pp. 361–368.
- ICEIS-v2-2003-LamontagneL #reasoning
- Applying Case-Based Reasoning to Email Response (LL, GL), pp. 115–123.
- CIKM-2003-CampbellMCD #identification #using
- Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
- SIGIR-2003-LeuskiOB #named
- eArchivarius: accessing collections of electronic mail (AL, DWO, RB), p. 468.
- SAS-2003-AbadiB #protocol #verification
- Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
- SAC-2003-NenkovaB #classification
- Email Classification for Contact Centers (AN, AB), pp. 789–792.
- CSCW-2002-KrautMTFCS #question
- Markets for attention: will postage for email help? (REK, JM, RT, DF, MC, SS), pp. 206–215.
- ICML-2002-CrawfordKM #named
- IEMS — The Intelligent Email Sorter (EC, JK, EM), pp. 83–90.
- SAC-2002-Hidalgo #categorisation
- Evaluating cost-sensitive Unsolicited Bulk Email categorization (JMGH), pp. 615–620.
- SAC-2002-KarnouskosV
- Active electronic mail (SK, AVV), pp. 801–806.
- ICEIS-v1-2001-CounsellLSTM #data analysis #optimisation #using
- Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
- ICEIS-v2-2001-Weghorn #mobile
- Notification and Routing of Electronic Mail to Mobile Phone Devices (HW), p. 1188–?.
- SIGIR-2001-Mock #categorisation #framework
- An Experimental Framework for Email Categorization and Management (KJM), pp. 392–393.
- ITiCSE-2000-Hobbs #assessment #learning
- Email groups for learning and assessment (MH), p. 183.
- CHI-2000-Balter #analysis
- Keystroke level analysis of email message organization (OB), pp. 105–112.
- ICML-2000-BrutlagM #challenge #classification
- Challenges of the Email Domain for Text Classification (JDB, CM), pp. 103–110.
- SIGIR-2000-AndroutsopoulosKCS #anti #comparison #keyword #naive bayes
- An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages (IA, JK, KC, CDS), pp. 160–167.
- SAC-2000-Armstrong #reliability
- Increasing the Reliability of Email Services (JLA), pp. 627–632.
- HCI-CCAD-1999-RauS #overview
- Likes and dislikes of electronic mail addresses: a users’ survey (PLPR, GS), pp. 58–61.
- HCI-EI-1999-SanuiU #evaluation #grid
- Extracting Baby-Boomers’ Future Expectations by the Evaluation Grid Method Through E-Mail (JS, MU), pp. 760–763.
- SAC-1999-Krishnamurthi #education #programming
- Integrating E-Mail in a Programming Class: Implications for Teaching Programming (MK), pp. 126–131.
- TACAS-1999-BergeronM #analysis #automation #interactive
- An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
- HT-1998-TajimaMKT #query
- Cut as a Querying Unit for WWW, Netnews, e-mail (KT, YM, MK, KT), pp. 235–244.
- CHI-1998-WalkerFFMH #interface #what
- What can I say? Evaluating a Spoken Language Interface to Email (MAW, JF, GDF, CM, DH), pp. 582–589.
- ICPR-1998-ChenHS #analysis
- E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
- HCI-SEC-1997-TanakaKN #prototype
- Prototyping of Digital Ink E-Mail System Based on a Common Ink Format (HT, NK, MN), pp. 435–438.
- HCI-SEC-1997-YiuBSL #interface
- A Time-Based Interface for Electronic Mail and Task Management (KSY, RB, NS, BL), pp. 19–22.
- ITiCSE-1996-ArnowC #programming #web
- Extending the conversation: integrating email and Web technology in CS programming classes (DMA, DC), pp. 93–95.
- CHI-1996-WhittakerS #information management
- Email Overload: Exploring Personal Information Management of Email (SW, CLS), pp. 276–283.
- CIKM-1996-Hall #knowledge-based #named
- Infomod: A Knowledge-Based Moderator for Electronic Mail Help Lists (RJH), pp. 107–114.
- HPDC-1996-TsoiR #collaboration #multi #on-demand #web
- “Media-on-Demand” Multimedia Electronic Mail: A Tool for Collaboration on the Web (KNT, SMR), pp. 121–126.
- CHI-1995-CapucciatiCOW
- Neither Rain, Nor Sleet, Nor Gloom of Night: Adventures in Electronic Mail (MC, PC, KDO, AW), pp. 553–557.
- SAC-1995-Arnow #network #programming #using
- :-) When you grade that: using e-mail and the network in programming courses (DMA), pp. 10–13.
- VLDB-1988-KentTO #case study #experience
- Browsing Electronic Mail: Experiences Interfacing a Mail System to a DBMS (JK, DBT, WSO), pp. 112–123.
- CSCW-1988-Mackay #communication #using
- More than just a Communication System: Diversity in the Use of Electronic Mail (WEM), pp. 344–353.
- CSCW-1986-Feldman #communication #constraints
- Constraints on communication and electronic mail (MSF), pp. 73–90.