{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:59Z","timestamp":1750308719295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T00:00:00Z","timestamp":1409011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,26]]},"DOI":"10.1145\/2637002.2637014","type":"proceedings-article","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T12:19:23Z","timestamp":1408623563000},"page":"86-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["E-mail categorization using partially related training examples"],"prefix":"10.1145","author":[{"given":"Maya","family":"Sappelli","sequence":"first","affiliation":[{"name":"TNO and Radboud University, Nijmegen"}]},{"given":"Suzan","family":"Verberne","sequence":"additional","affiliation":[{"name":"Radboud University Nijmegen"}]},{"given":"Wessel","family":"Kraaij","sequence":"additional","affiliation":[{"name":"TNO and Radboud University, Nijmegen"}]}],"member":"320","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds","author":"Aberdeen D.","year":"2010","unstructured":"D. Aberdeen , O. Pacovsky , and A. Slater . The learning behind gmail priority inbox . In LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds , 2010 . D. Aberdeen, O. Pacovsky, and A. Slater. The learning behind gmail priority inbox. In LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds, 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Getting Things Done. The Art of Stress-Free Productivity","author":"Allen D.","year":"2003","unstructured":"D. Allen . Getting Things Done. The Art of Stress-Free Productivity . Penguin , January 2003 . ISBN-10: 0142000280 ISBN-13: 978-0142000281. D. Allen. Getting Things Done. The Art of Stress-Free Productivity. Penguin, January 2003. ISBN-10: 0142000280 ISBN-13: 978-0142000281."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.92"},{"key":"e_1_3_2_1_4_1","first-page":"218","volume-title":"Automatic categorization of email into folders: Benchmark experiments on Enron and SRI corpora","author":"Bekkerman R.","year":"2004","unstructured":"R. Bekkerman . Automatic categorization of email into folders: Benchmark experiments on Enron and SRI corpora . Computer Science Department Faculty Publication Series , page 218 , 2004 . R. Bekkerman. Automatic categorization of email into folders: Benchmark experiments on Enron and SRI corpora. Computer Science Department Faculty Publication Series, page 218, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.55"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017197"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378820"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1552262.1552265"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00344744"},{"key":"e_1_3_2_1_10_1","first-page":"36","volume-title":"Email'08: Proceedings of the Workshop on Enhanced Messaging-AAAI","author":"Huang Y.","year":"2008","unstructured":"Y. Huang and T. M. Mitchell . Exploring hierarchical user feedback in email clustering . In Email'08: Proceedings of the Workshop on Enhanced Messaging-AAAI , pages 36 -- 41 , 2008 . Y. Huang and T. M. Mitchell. Exploring hierarchical user feedback in email clustering. In Email'08: Proceedings of the Workshop on Enhanced Messaging-AAAI, pages 36--41, 2008."},{"key":"e_1_3_2_1_11_1","first-page":"8","volume-title":"Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research","author":"Kiritchenko S.","unstructured":"S. Kiritchenko and S. Matwin . Email classification with co-training . In Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research , page 8 . Citeseer, 2001. S. Kiritchenko and S. Matwin. Email classification with co-training. In Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research, page 8. Citeseer, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020560"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948448.1948475"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225753.1225780"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.5.375"},{"issue":"6","key":"e_1_3_2_1_16_1","article-title":"Automatic e-mail classification using dynamic category hierarchy and semantic features","volume":"27","author":"Park S.","year":"2010","unstructured":"S. Park and D. U. An . Automatic e-mail classification using dynamic category hierarchy and semantic features . IETE Technical Review , 27 ( 6 ), 2010 . S. Park and D. U. An. Automatic e-mail classification using dynamic category hierarchy and semantic features. IETE Technical Review, 27(6), 2010.","journal-title":"IETE Technical Review"},{"key":"e_1_3_2_1_17_1","volume-title":"Email statistics report","author":"Radicati S.","year":"2010","unstructured":"S. Radicati . Email statistics report , 2010 . S. Radicati. Email statistics report, 2010."},{"key":"e_1_3_2_1_18_1","first-page":"98","volume-title":"Learning for Text Categorization: Papers from the 1998 workshop","author":"Sahami M.","year":"1998","unstructured":"M. Sahami , S. Dumais , D. Heckerman , and E. Horvitz . A bayesian approach to filtering junk e-mail . In Learning for Text Categorization: Papers from the 1998 workshop , volume 62 , pages 98 -- 105 , 1998 . M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 workshop, volume 62, pages 98--105, 1998."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362724.2362777"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 25th Benelux Conference on Artificial Intelligence","author":"Sappelli M.","year":"2013","unstructured":"M. Sappelli , S. Verberne , and W. Kraaij . Combining textual and non-textual features for e-mail importance estimation . In Proceedings of the 25th Benelux Conference on Artificial Intelligence , 2013 . M. Sappelli, S. Verberne, and W. Kraaij. Combining textual and non-textual features for e-mail importance estimation. In Proceedings of the 25th Benelux Conference on Artificial Intelligence, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/301136.301209"},{"key":"e_1_3_2_1_22_1","volume-title":"COMMIT P7 SWELL","author":"Verberne S.","year":"2013","unstructured":"S. Verberne and M. Sappelli . D3.2 activity classification. Technical report , COMMIT P7 SWELL , 2013 . Available on http:\/\/www.swell-project.net\/results\/deliverables. S. Verberne and M. Sappelli. D3.2 activity classification. Technical report, COMMIT P7 SWELL, 2013. Available on http:\/\/www.swell-project.net\/results\/deliverables."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 21th International Conference on User Modeling, Adaptation and Personalization","author":"Verberne S.","year":"2013","unstructured":"S. Verberne , M. Sappelli , and W. Kraaij . Term extraction for user profiling: evaluation by the user . In Proceedings of the 21th International Conference on User Modeling, Adaptation and Personalization , 2013 . S. Verberne, M. Sappelli, and W. Kraaij. Term extraction for user profiling: evaluation by the user. In Proceedings of the 21th International Conference on User Modeling, Adaptation and Personalization, 2013."},{"key":"e_1_3_2_1_24_1","volume-title":"Interacting with Computers","author":"Warren P.","year":"2013","unstructured":"P. Warren . Personal information management: The case for an evolutionary approach . Interacting with Computers , 2013 . P. Warren. Personal information management: The case for an evolutionary approach. Interacting with Computers, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-008-0216-y"}],"event":{"name":"IIiX '14: Fifth Information Interaction in Context Symposium","sponsor":["University of Regensburg University of Regensburg","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Regensburg Germany","acronym":"IIiX '14"},"container-title":["Proceedings of the 5th Information Interaction in Context Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637002.2637014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2637002.2637014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:31Z","timestamp":1750277671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637002.2637014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,26]]},"references-count":26,"alternative-id":["10.1145\/2637002.2637014","10.1145\/2637002"],"URL":"https:\/\/doi.org\/10.1145\/2637002.2637014","relation":{},"subject":[],"published":{"date-parts":[[2014,8,26]]},"assertion":[{"value":"2014-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}