{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558069","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Predicting relevant documents for enterprise communication contexts"],"prefix":"10.1145","author":[{"given":"Shashwat","family":"Garg","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, New Delhi, India"}]},{"given":"Krishna K.","family":"Dhara","sequence":"additional","affiliation":[{"name":"Avaya Labs Research, Basking Ridge, NJ"}]},{"given":"Venkatesh","family":"Krishnaswamy","sequence":"additional","affiliation":[{"name":"Avaya Labs Research, Basking Ridge, NJ"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138016"},{"key":"e_1_3_2_1_2_1","volume-title":"Information retrieval: implementing and evaluating search engines","author":"Clarke Charles L. A","year":"2010","unstructured":"Stefan. B\u00e3ijttcher, Charles L. A Clarke , and Gordon V. Cormack . Information retrieval: implementing and evaluating search engines . MIT Press, Cambridge , Mass ., 2010 . Stefan. B\u00e3ijttcher, Charles L. A Clarke, and Gordon V. Cormack. Information retrieval: implementing and evaluating search engines. MIT Press, Cambridge, Mass., 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442670.2442673"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181135"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.7.2.115-131"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357208"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Conference on Email and Anti-Spam (CEAS)","author":"Minkov E.","year":"2006","unstructured":"E. Minkov and William W. Cohen . An email and meeting assistant using graph walks . Proceedings of the Conference on Email and Anti-Spam (CEAS) , 2006 . E. Minkov and William W. Cohen. An email and meeting assistant using graph walks. Proceedings of the Conference on Email and Anti-Spam (CEAS), 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1877766.1877770"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148179"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390409"},{"key":"e_1_3_2_1_12_1","volume-title":"Probabilistic Topic Models","author":"Steyvers Mark","year":"2007","unstructured":"Mark Steyvers and Tom Griffiths . Probabilistic Topic Models . Lawrence Erlbaum Associates , 2007 . Mark Steyvers and Tom Griffiths. Probabilistic Topic Models. Lawrence Erlbaum Associates, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842993.1843001"},{"key":"e_1_3_2_1_14_1","unstructured":"W. Weerkamp K. Balog and M. de Rijke. Using contextual information to improve search in email archives.  W. Weerkamp K. Balog and M. de Rijke. Using contextual information to improve search in email archives."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_3_2_1_16_1","volume-title":"Managing gigabytes: Compressing and indexing documents and images - errata","author":"Witten I. H.","year":"1996","unstructured":"I. H. Witten , A. Moffat , and T. C. Bell . Managing gigabytes: Compressing and indexing documents and images - errata , 1996 . I. H. Witten, A. Moffat, and T. C. Bell. Managing gigabytes: Compressing and indexing documents and images - errata, 1996."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076059"}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":17,"alternative-id":["10.1145\/2557977.2558069","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558069","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}