{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:35:47Z","timestamp":1768592147013,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":27,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3054147","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"89-98","source":"Crossref","is-referenced-by-count":14,"title":["eAssistant"],"prefix":"10.1145","author":[{"given":"Hamid R. Motahari","family":"Nezhad","sequence":"first","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Kalpa","family":"Gunaratna","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]},{"given":"Juan","family":"Cappi","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3054147-1","unstructured":"P. Adams. The end of apps as we know them. https:\/\/blog.intercom.com\/ the-end-of-apps-as-we-know-them\/, 2014. Accessed: 01\/05\/2017."},{"key":"key-10.1145\/3041021.3054147-2","doi-asserted-by":"crossref","unstructured":"V. Bellotti, N. Ducheneaut, M. Howard, and I. Smith. Taking email to task: the design and evaluation of a task management centered email tool. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 345--352. ACM, 2003.","DOI":"10.1145\/642611.642672"},{"key":"key-10.1145\/3041021.3054147-3","doi-asserted-by":"crossref","unstructured":"E. Blanzieri and A. Bryl. A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev., 29(1):63--92, Mar. 2008.","DOI":"10.1007\/s10462-009-9109-6"},{"key":"key-10.1145\/3041021.3054147-4","unstructured":"A. Carlson, C. Cumby, J. Rosen, and D. Roth. The snow learning architecture. Technical report, UIUCDCS, 1999."},{"key":"key-10.1145\/3041021.3054147-5","unstructured":"L. Chiticariu, R. Krishnamurthy, Y. Li, S. Raghavan, F. R. Reiss, and S. Vaithyanathan. Systemt: an algebraic approach to declarative information extraction. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, pages 128--137. Association for Computational Linguistics, 2010."},{"key":"key-10.1145\/3041021.3054147-6","unstructured":"M. Dredze. Email research. https:\/\/sites.google. com\/site\/emailresearchorg\/bibliography, 2016. Accessed: 01\/05\/2017."},{"key":"key-10.1145\/3041021.3054147-7","doi-asserted-by":"crossref","unstructured":"M. Dredze, T. Lau, and N. Kushmerick. Automatically classifying emails into activities. In Proceedings of the 11th international conference on Intelligent user interfaces, pages 70--77. ACM, 2006.","DOI":"10.1145\/1111449.1111471"},{"key":"key-10.1145\/3041021.3054147-8","doi-asserted-by":"crossref","unstructured":"M. Dredze, H. M. Wallach, D. Puller, T. Brooks, J. Carroll, J. Magarick, J. Blitzer, F. Pereira, et al. Intelligent email: Aiding users with ai. In AAAI, pages 1524--1527, 2008.","DOI":"10.1145\/1378773.1378820"},{"key":"key-10.1145\/3041021.3054147-9","unstructured":"Flow. https:\/\/www.getflow.com, 2016. Accessed: 01\/05\/2017."},{"key":"key-10.1145\/3041021.3054147-10","unstructured":"T. Garsiel and P. Irish. How browsers work: Behind the scenes of modern web browsers. Google Project, August, 2011."},{"key":"key-10.1145\/3041021.3054147-11","doi-asserted-by":"crossref","unstructured":"A. K. Kalia, H. R. Motahari-Nezhad, C. Bartolini, and M. P. Singh. Monitoring commitments in people-driven service engagements. In Services Computing (SCC), 2013 IEEE International Conference on, pages 160--167. IEEE, 2013.","DOI":"10.1109\/SCC.2013.62"},{"key":"key-10.1145\/3041021.3054147-12","unstructured":"B. Klimt and Y. Yang. Introducing the enron corpus. In CEAS, 2004."},{"key":"key-10.1145\/3041021.3054147-13","unstructured":"N. Kushmerick, T. Lau, M. Dredze, and R. Khoussainov. Activity-centric email: A machine learning approach. In Proceedings of the National Conference on Artificial Intelligence, volume 21, page 1634. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2006."},{"key":"key-10.1145\/3041021.3054147-14","unstructured":"A. Lampert, R. Dale, and C. Paris. The nature of requests and commitments in email messages. In Proceedings of the AAAI Workshop on Enhanced Messaging, pages 42--47, 2008."},{"key":"key-10.1145\/3041021.3054147-15","unstructured":"MailPilot. http:\/\/mindsense.co\/mailpilot, 2016. Accessed: 01\/05\/2017."},{"key":"key-10.1145\/3041021.3054147-16","doi-asserted-by":"crossref","unstructured":"L. M&#224;rquez, X. Carreras, K. C. Litkowski, and S. Stevenson. Semantic role labeling: An introduction to the special issue. Comput. Linguist., 34(2):145--159, June 2008.","DOI":"10.1162\/coli.2008.34.2.145"},{"key":"key-10.1145\/3041021.3054147-17","doi-asserted-by":"crossref","unstructured":"L. McDowell, O. Etzioni, A. Halevy, and H. Levy. Semantic email. In Proceedings of the 13th international conference on World Wide Web, pages 244--254. ACM, 2004.","DOI":"10.1145\/988672.988706"},{"key":"key-10.1145\/3041021.3054147-18","unstructured":"H. R. M. Nezhad. Cognitive assistance at work. In AAAI Fall Symposium Series. AAAI Publications, 2015."},{"key":"key-10.1145\/3041021.3054147-19","unstructured":"T. Petrocelli. Taming notifications before they run rampant. http:\/\/www.cmswire.com\/social-business\/ taming-notifications-before-they-run-rampant\/, 2015. Accessed: 01\/05\/2017."},{"key":"key-10.1145\/3041021.3054147-20","doi-asserted-by":"crossref","unstructured":"M. Purver, P. Ehlen, and J. Niekrasz. Detecting action items in multi-party meetings: Annotation and initial experiments. In Machine Learning for Multimodal Interaction, pages 200--211. Springer, 2006.","DOI":"10.1007\/11965152_18"},{"key":"key-10.1145\/3041021.3054147-21","doi-asserted-by":"crossref","unstructured":"A. Qadir, M. Gamon, P. Pantel, and A. H. Awadallah. Activity modeling in email. In Proceedings of NAACL-HLT, pages 1452--1462, 2016.","DOI":"10.18653\/v1\/N16-1171"},{"key":"key-10.1145\/3041021.3054147-22","unstructured":"A. Qadir and E. Riloff. Classifying sentences as speech acts in message board posts. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages 748--758. ACL, 2011."},{"key":"key-10.1145\/3041021.3054147-23","unstructured":"M. J. Rees. Evolving the browser towards a standard user interface architecture. In Proceedings of the Third Australasian Conference on User Interfaces - Volume 7, AUIC '02, pages 1--7, Darlinghurst, Australia, Australia, 2002. Australian Computer Society, Inc."},{"key":"key-10.1145\/3041021.3054147-24","unstructured":"S. Scerri, G. Gossen, B. Davis, and S. Handschuh. Classifying action items for semantic email. In LREC, 2010."},{"key":"key-10.1145\/3041021.3054147-25","doi-asserted-by":"crossref","unstructured":"J. R. Searle. Speech acts: An essay in the philosophy of language, volume 626. Cambridge university press, 1969.","DOI":"10.1017\/CBO9781139173438"},{"key":"key-10.1145\/3041021.3054147-26","doi-asserted-by":"crossref","unstructured":"T. Winograd. Designing a new foundation for design. Communications of the ACM, 49(5):71--74, 2006.","DOI":"10.1145\/1125944.1125978"},{"key":"key-10.1145\/3041021.3054147-27","doi-asserted-by":"crossref","unstructured":"Y. Yang, S. Yoo, F. Lin, and I.-C. Moon. Personalized email prioritization based on content and social network analysis. IEEE Intelligent Systems, 25(4):12--18, July 2010","DOI":"10.1109\/MIS.2010.56"}],"event":{"name":"the 26th International Conference","location":"Perth, Australia","acronym":"WWW '17 Companion","number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2017,4,3]]},"end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3054147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3054147&ftid=1865237&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:18Z","timestamp":1750215798000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3054147"}},"subtitle":["Cognitive Assistance for Identification and Auto-Triage of Actionable Conversations"],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1145\/3041021.3054147","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}