Activity-centric Search in Email

نویسندگان

  • Einat Minkov
  • William W. Cohen
چکیده

We consider activity-centered tasks in email, including the novel tasks of predicting future involvement of persons from the enterprise in an ongoing activity represented by a folder, and a novel task where we identify email messages that are related to a to-do item. We also evaluate the task of email foldering, and the inverse task, of tracking messages relevant to a folder associated with an ongoing project. Empirical evaluation using authentic email data, applying a graph based link analysis method and a vector-space model, shows potential utility to facilitate activity management in email.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Graph Approach to Spelling Correction in Domain-Centric Search

Spelling correction for keyword-search queries is challenging in restricted domains such as personal email (or desktop) search, due to the scarcity of query logs, and due to the specialized nature of the domain. For that task, this paper presents an algorithm that is based on statistics from the corpus data (rather than the query log). This algorithm, which employs a simple graph-based approach...

متن کامل

مقایسه فعالیت عضلات ماضغه و گیجگاهی به وسیله الکترومیوگرافی در بیماران کلاس III اسکلتی

Electromyographic (EMG) investigations about the activities of the muscles have been the focus of attention for many years. In the field of orthodontics, investigators, among other things, tried to evaluate correlation between EMG activity, occlusal relationships and craniofacial morphology to analyze the effect of muscular activity, as an etiological factor in malocclusion. The purpose of the ...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Towards the use of user-centric meta-knowledge in applying organizational memory to email communications

The communicative act in a learning organization is subject to a number of threats to its validity (Habermas 1981), in particular the comprehensibility, truth, trustworthiness, and appropriateness of a given message. Organizational Memories can be used to address these threats. Our focus is on email communications which suffers from the same threats identified by Habermas. The integration of em...

متن کامل

A taskonomy for the Semantic Web

The modalities of search and browse dominate current thinking about interaction with the Web. Given the Web’s origins as a global hypertext system, it is understandable that these document-centric interaction patterns prevail. However, these modalities alone are inadequate as a conceptual model of interaction with the global Linked Data space that is the Semantic Web. Realising the full potenti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008