BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (15)
classif (10)
base (10)
manag (7)
detect (7)

Stem email$ (all stems)

111 papers:

CHICHI-2015-CecchinatoCB #bound #difference #email
Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
CHICHI-2015-HanrahanP #email #interactive
Lost in Email: Pulling Users Down a Path of Interaction (BVH, MAPQ), pp. 3981–3984.
ICEISICEIS-v2-2015-FariasNOCM #case study #commit #email #mining #repository
Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
KDDKDD-2015-ZhangAYJS #email #information management
Annotating Needles in the Haystack without Looking: Product Information Extraction from Emails (WZ, AA, JY, VJ, AJS), pp. 2257–2266.
MLDMMLDM-2015-PatchalaBG #email #using
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
ICSEICSE-v2-2015-HermansM #analysis #dataset #email #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
CHICHI-2014-GrevetCKG #email
Overload is overloaded: email in the age of Gmail (CG, DC, DK, EG), pp. 793–802.
CHICHI-2014-RectorH #email #named
MinEMail: SMS alert system for managing critical emails (KR, JMH), pp. 783–792.
CSCWCSCW-2014-MejovaGWD #behaviour #comprehension #email
Giving is caring: understanding donation behavior through email (YM, VRKG, IW, MCD), pp. 1297–1307.
CSCWCSCW-2014-MunsonKRR #email #monitoring #performance
Monitoring email to indicate project team performance and mutual attraction (SAM, KK, LPRJ), pp. 542–549.
CIKMCIKM-2014-GrbovicHKM #category theory #email #how
How Many Folders Do You Really Need?: Classifying Email into a Handful of Categories (MG, GH, ZSK, YM), pp. 869–878.
KMISKMIS-2014-FrancoisMA #communication #design #email #problem #traceability #using
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
SIGIRSIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation #using
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
CSCWCSCW-2013-KokkalisKPCBK #crowdsourcing #email #named
EmailValet: managing email overload through private, accountable crowdsourcing (NK, TK, CP, DC, MSB, SRK), pp. 1291–1300.
CHICHI-2012-MarkVC #email #empirical #quote
“A pace not dictated by electrons”: an empirical study of work without email (GM, SV, AC), pp. 555–564.
CHICHI-2012-TopkaraPLDWB #email #enterprise #quote #video
“You’ve got video”: increasing clickthrough when sharing enterprise video with email (MT, SP, JCL, AD, SW, JB), pp. 565–568.
ECIRECIR-2012-HarveyE #email #query
Exploring Query Patterns in Email Search (MH, DE), pp. 25–36.
ECIRECIR-2012-TamFL #approach #automation #email
Automatic Foldering of Email Messages: A Combination Approach (TT, AF, AL), pp. 232–243.
ICMLICML-2012-PrasseSLS #email #identification #learning #regular expression
Learning to Identify Regular Expressions that Describe Email Campaigns (PP, CS, NL, TS), p. 146.
ICPRICPR-2012-LiPMH #classification #email #incremental #learning #using
Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
SIGIRSIGIR-2012-XuO #email
Exploring example-based person search in email (TX, DWO), pp. 1067–1068.
ICSEICSE-2012-BacchelliSDL #classification #development #email
Content classification of development emails (AB, TDS, MD, ML), pp. 375–385.
ICDARICDAR-2011-KaratzasMMNR #challenge #contest #email #image #robust #web
ICDAR 2011 Robust Reading Competition — Challenge 1: Reading Text in Born-Digital Images (Web and Email) (DK, SRM, JM, FN, PPR), pp. 1485–1490.
VLDBVLDB-2011-JoshiCNDH #email #performance
Auto-Grouping Emails For Faster E-Discovery (SJ, DC, KN, PMD, TH), pp. 1284–1294.
CHICHI-2011-ChiZXYW #authoring #collaboration #coordination #email #using
Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHICHI-2011-MahmudMWML #collaboration #email #named
Topika: integrating collaborative sharing with email (JM, TM, SW, TM, TL), pp. 3161–3164.
CHICHI-2011-WainerDK #email
Should I open this email?: inbox-level cues, curiosity and attention to email (JW, LD, RK), pp. 3439–3448.
CHICHI-2011-WhittakerMCBT #case study #email
Am I wasting my time organizing email?: a study of email refinding (SW, TM, JAC, HB, JCT), pp. 3449–3458.
CSCWCSCW-2011-Johri #communication #distributed #email #exclamation #tool support
Look ma, no email!: blogs and IRC as primary and preferred communication tools in a distributed firm (AJ), pp. 305–308.
HCIHCI-MIIE-2011-KarthikP #adaptation #approach #classification #email #machine learning
Adaptive Machine Learning Approach for Emotional Email Classification (KK, RP), pp. 552–558.
CIKMCIKM-2011-YooYC #classification #email #modelling #personalisation
Modeling personalized email prioritization: classification-based and regression-based approaches (SY, YY, JGC), pp. 729–738.
ECIRECIR-2011-ElsweilerBR #case study #email #what
What Makes Re-finding Information Difficult? A Study of Email Re-finding (DE, MB, IR), pp. 568–579.
KDDKDD-2011-KorenLMS #automation #email
Automatically tagging email by leveraging other users’ folders (YK, EL, YM, RS), pp. 913–921.
MLDMMLDM-2011-ChenHCS #detection #email #similarity
Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
MLDMMLDM-2011-HaoCCCS #adaptation #detection #email #modelling
Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
SIGIRSIGIR-2011-ElsweilerHH #behaviour #comprehension #email #interactive
Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
ICSEICSE-2011-Bacchelli #email #re-engineering
Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
ICSEICSE-2011-BacchelliLD #email #named #tool support
Miler: a toolset for exploring email data (AB, ML, MD), pp. 1025–1027.
KEODKEOD-2010-ChatterjeeKRD #automation #classification #email #ontology #using
Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
SIGIRSIGIR-2010-LiuW #email #learning #multi
Multi-field learning for email spam filtering (WL, TW), pp. 745–746.
ITiCSEITiCSE-2009-Sant #assessment #automation #quote
“Mailing it in”: email-centric automated assessment (JAS), pp. 308–312.
ICSMEICSM-2009-LuciaFGT #design #email #repository
Recovering design rationale from email repositories (ADL, FF, CG, GT), pp. 543–546.
HCIHIMI-II-2009-AyodeleZK #approach #email #machine learning #predict
Email Reply Prediction: A Machine Learning Approach (TA, SZ, RK), pp. 114–123.
HCIOCSC-2009-WentzL #email #network #social
Email Accessibility and Social Networking (BW, JL), pp. 134–140.
ICEISICEIS-HCI-2009-MuranoMH #email #evaluation #feedback #user interface
Evaluation of Anthropomorphic User Interface Feedback in an Email Client Context and Affordances (PM, AM, POH), pp. 15–20.
ICEISICEIS-SAIC-2009-GandhiT #categorisation #email #ontology #using
Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEISICEIS-SAIC-2009-SammourDVW #email
Identiying Homogenous Customer Segments for Low Risk Email Marketing Experiments (GNS, BD, KV, GW), pp. 89–94.
ICEISICEIS-SAIC-2009-TruongMLBCDGKLMMPSW #enterprise
Email-based Interoperability Service Utilities for Cooperative Small and Medium Enterprises (HLT, EM, ML, TB, MC, CD, PG, KK, DLL, CAM, CM, AP, MS, DW), pp. 95–101.
ECIRECIR-2009-WeerkampBR #email #information management #using
Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ICMLICML-2009-HaiderS #clustering #detection #email
Bayesian clustering for email campaign detection (PH, TS), pp. 385–392.
KDDKDD-2009-KolczC #composition #email
Genre-based decomposition of email class noise (AK, GVC), pp. 427–436.
KDDKDD-2009-YooYLM #email #mining #network #personalisation #social
Mining social networks for personalized email prioritization (SY, YY, FL, ICM), pp. 967–976.
SIGIRSIGIR-2009-CormackC #email #on the
On the relative age of spam and ham training samples for email filtering (GVC, JMMdC), pp. 744–745.
SACSAC-2009-LiuAD #email #internet
Incorporating accountability into internet email (WL, SA, ZD), pp. 875–882.
SACSAC-2009-WanMKJ #communication #detection #email #network
Link-based event detection in email communication networks (XW, EEM, NK, JJ), pp. 1506–1510.
SACSAC-2009-WeiSW #algorithm #clustering #email #fuzzy #novel #string
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm (CW, AS, GW), pp. 889–890.
CSCWCSCW-2008-GuyJMRS #email #network #social
Public vs. private: comparing public social network information with email (IG, MJ, NM, IR, ES), pp. 393–402.
CIKMCIKM-2008-TsengSC #abstraction #detection #email #novel
A novel email abstraction scheme for spam detection (CYT, PCS, MSC), pp. 1393–1394.
ECIRECIR-2008-EreraC #detection #email
Conversation Detection in Email Systems (SE, DC), pp. 498–505.
ECIRECIR-2008-YahyaeiM #email #retrieval
Applying Maximum Entropy to Known-Item Email Retrieval (SY, CM), pp. 406–413.
SACSAC-2008-WeiSWS #email #forensics #identification #mining
Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
CHICHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
HCIHCI-MIE-2007-JungS #adaptation #email #multi
A Location-Adaptive Human-Centered Audio Email Notification Service for Multi-user Environments (RJ, TS), pp. 340–348.
HCIHIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social #using
Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HCIHIMI-IIE-2007-MitsumotoW #email #people #visual notation
Exchanging Graphical Emails Among Elderly People and Kindergarten Children (MM, SHW), pp. 74–83.
CIKMCIKM-2007-PeraN #email #similarity #using #word
Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
ICMLICML-2007-HaiderBS #clustering #detection #email #streaming
Supervised clustering of streaming data for email batch detection (PH, UB, TS), pp. 345–352.
MSRMSR-2006-BirdGDGS #email #mining #network #social
Mining email social networks (CB, AG, PTD, MG, AS), pp. 137–143.
MSRMSR-2006-BirdGDGS06a #email #mining #network #social
Mining email social networks in Postgres (CB, AG, PTD, MG, AS), pp. 185–186.
CHICHI-2006-GawFF #email
Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
CHICHI-2006-ViegasGD #email #visualisation
Visualizing email content: portraying relationships from conversational histories (FBV, SAG, JSD), pp. 979–988.
CSCWCSCW-2006-DabbishK #analysis #email
Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
CSCWCSCW-2006-FisherBGS #email #years after
Revisiting Whittaker & Sidner’s “email overload” ten years later (DF, AJBB, EG, MAS), pp. 309–312.
CSCWCSCW-2006-SiuIT #email
Going with the flow: email awareness and task management (NS, LI, AT), pp. 441–450.
ECIRECIR-2006-FreschiSB #email #obfuscation #string
Filtering Obfuscated Email Spam by means of Phonetic String Matching (VF, AS, AB), pp. 505–509.
ECIRECIR-2006-KeBO #classification #email #named
PERC: A Personal Email Classifier (SWK, CB, MPO), pp. 460–463.
SIGIRSIGIR-2006-MacdonaldO #email
Combining fields in known-item email search (CM, IO), pp. 675–676.
SIGIRSIGIR-2006-MinkovCN #ambiguity #email #graph #using
Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SACSAC-2006-TailbyDMS #automation #classification #email
Email classification for automated service handling (RT, RD, BM, DS), pp. 1073–1077.
CHICHI-2005-DabbishKFK #comprehension #email #predict
Understanding email use: predicting action on a message (LAD, REK, SRF, SBK), pp. 691–700.
CHICHI-2005-GarfinkelMSNM #email #how
How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
KDDKDD-2005-CareniniNZ #email #scalability
Scalable discovery of hidden emails from large folders (GC, RTN, XZ), pp. 544–549.
KDDKDD-2005-HershkopS #email #modelling #reduction
Combining email models for false positive reduction (SH, SJS), pp. 98–107.
KDDKDD-2005-TangLCT #email
Email data cleaning (JT, HL, YC, ZT), pp. 489–498.
SIGIRSIGIR-2005-CarvalhoC #classification #email #on the #speech
On the collective classification of email “speech acts” (VRdC, WWC), pp. 345–352.
SIGIRSIGIR-2005-TuulosPT #email #information retrieval #multi #scalability
Multi-faceted information retrieval system for large scale email archives (VHT, JP, HT), p. 683.
SIGIRSIGIR-2005-WuO #email #retrieval #thread
Indexing emails and email threads for retrieval (YW, DWO), pp. 665–666.
RERE-2005-FickasRS #requirements
The Role of Deferred Requirements in a Longitudinal Study of Emailing (SF, WNR, MMS), pp. 145–156.
SACSAC-2005-CareniniNZZ #email
Discovery and regeneration of hidden emails (GC, RTN, XZ, EZ), pp. 503–510.
ICEISICEIS-v4-2004-SuiAM #approach #e-commerce #email
Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
SIGIRSIGIR-2004-AeryC #classification #email #named
eMailSift: mining-based approaches to email classification (MA, SC), pp. 580–581.
SIGIRSIGIR-2004-Leuski #email #people
Email is a stage: discovering people roles from email archives (AL), pp. 502–503.
SASSAS-2003-AbadiB #email #protocol #verification
Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
CHICHI-2003-BellottiDHS #design #email #evaluation
Taking email to task: the design and evaluation of a task management centered email tool (VB, ND, MH, IS), pp. 345–352.
CHICHI-2003-VenoliaN #comprehension #email #sequence #visualisation
Understanding sequence and reply relationships within email conversations: a mixed-model visualization (GDV, CN), pp. 361–368.
ICEISICEIS-v2-2003-LamontagneL #email #reasoning
Applying Case-Based Reasoning to Email Response (LL, GL), pp. 115–123.
CIKMCIKM-2003-CampbellMCD #email #identification #using
Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
SACSAC-2003-NenkovaB #classification #email
Email Classification for Contact Centers (AN, AB), pp. 789–792.
CSCWCSCW-2002-KrautMTFCS #email #question
Markets for attention: will postage for email help? (REK, JM, RT, DF, MC, SS), pp. 206–215.
ICMLICML-2002-CrawfordKM #email #named
IEMS — The Intelligent Email Sorter (EC, JK, EM), pp. 83–90.
SACSAC-2002-Hidalgo #categorisation #email
Evaluating cost-sensitive Unsolicited Bulk Email categorization (JMGH), pp. 615–620.
ICEISICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation #using
Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
SIGIRSIGIR-2001-Mock #categorisation #email #framework
An Experimental Framework for Email Categorization and Management (KJM), pp. 392–393.
ITiCSEITiCSE-2000-Hobbs #assessment #email #learning
Email groups for learning and assessment (MH), p. 183.
CHICHI-2000-Balter #analysis #email
Keystroke level analysis of email message organization (OB), pp. 105–112.
ICMLICML-2000-BrutlagM #challenge #classification #email
Challenges of the Email Domain for Text Classification (JDB, CM), pp. 103–110.
SACSAC-2000-Armstrong #email #reliability
Increasing the Reliability of Email Services (JLA), pp. 627–632.
FMFM-v1-1999-ZhouC #analysis #communication #formal method #protocol
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
CHICHI-1998-WalkerFFMH #email #interface #what
What can I say? Evaluating a Spoken Language Interface to Email (MAW, JF, GDF, CM, DH), pp. 582–589.
ITiCSEITiCSE-1996-ArnowC #email #programming #web
Extending the conversation: integrating email and Web technology in CS programming classes (DMA, DC), pp. 93–95.
CHICHI-1996-WhittakerS #email #information management
Email Overload: Exploring Personal Information Management of Email (SW, CLS), pp. 276–283.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.