{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:10:07Z","timestamp":1750205407493,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313624","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"26-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating User Actions as a Proxy for Email Significance"],"prefix":"10.1145","author":[{"given":"Tarfah","family":"Alrashed","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Chia-Jung","family":"Lee","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Peter","family":"Bailey","sequence":"additional","affiliation":[{"name":"Microsoft, Australia"}]},{"given":"Christopher","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Milad","family":"Shokouhi","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Susan","family":"Dumais","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"volume-title":"LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds.","author":"Aberdeen D.","key":"e_1_3_2_1_1_1","unstructured":"D. Aberdeen , O. Pacovsky , and A. Slater . 2010. The learning behind Gmail Priority Inbox . In LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds. D. Aberdeen, O. Pacovsky, and A. Slater. 2010. The learning behind Gmail Priority Inbox. In LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148177"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176398"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/572020.572034"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22815"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858473"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055068"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970398.2970431"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835811"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/382899.383305"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059982"},{"key":"e_1_3_2_1_13_1","unstructured":"J. H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of Statistics(2001) 1189-1232.  J. H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of Statistics(2001) 1189-1232."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979125"},{"key":"e_1_3_2_1_15_1","volume-title":"Tech stress: How many emails can you handle a day. Retrieved","author":"Huessner K.M.","year":"2018","unstructured":"K.M. Huessner . 2010. Tech stress: How many emails can you handle a day. Retrieved 14 August , 2018 from https:\/\/abcnews.go.com\/Technology\/tech-stress-emails-handle-day\/story?id=11201183 K.M. Huessner. 2010. Tech stress: How many emails can you handle a day. Retrieved 14 August, 2018 from https:\/\/abcnews.go.com\/Technology\/tech-stress-emails-handle-day\/story?id=11201183"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"e_1_3_2_1_17_1","first-page":"3146","article-title":"LightGBM: A highly efficient gradient boosting decision tree","author":"Ke G.","year":"2017","unstructured":"G. Ke , Q. Meng , T. Finley , T. Wang , W. Chen , W. Ma , Q. Ye , and T.-Y. Liu . 2017 . LightGBM: A highly efficient gradient boosting decision tree . In Proc. NIPS. 3146 - 3154 . G. Ke, Q. Meng, T. Finley, T. Wang, W. Chen, W. Ma, Q. Ye, and T.-Y. Liu. 2017. LightGBM: A highly efficient gradient boosting decision tree. In Proc. NIPS. 3146-3154.","journal-title":"Proc. NIPS."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080837"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001%262_7"},{"volume-title":"Content analysis: An introduction to its methodology","author":"Krippendorff K.","key":"e_1_3_2_1_20_1","unstructured":"K. Krippendorff . 2004. Content analysis: An introduction to its methodology . Second Edition. Sage . K. Krippendorff. 2004. Content analysis: An introduction to its methodology. Second Edition. Sage."},{"key":"e_1_3_2_1_21_1","unstructured":"C. Neustaedter A.J. Bernheim Brush M. A. Smith and D. Fisher. 2005. The Social Network and Relationship Finder: Social Sorting for Email Triage. In CEAS.  C. Neustaedter A.J. Bernheim Brush M. A. Smith and D. Fisher. 2005. The Social Network and Relationship Finder: Social Sorting for Email Triage. In CEAS."},{"key":"e_1_3_2_1_22_1","volume-title":"Email Statistics Report","author":"Radicati S.","year":"2014","unstructured":"S. Radicati . 2014. Email Statistics Report , 2014 -2018. Retrieved 14 August, 2018 from http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2014\/01\/Email-Statistics-Report-2014-2018-Executive-Summary.pdf S. Radicati. 2014. Email Statistics Report, 2014-2018. Retrieved 14 August, 2018 from http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2014\/01\/Email-Statistics-Report-2014-2018-Executive-Summary.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"B. Reeves S. Roy B. Gorman and T. Morley. 2008. A marketplace for attention: Responses to a synthetic currency used to signal information importance in e-mail. First Monday 13 5 (2008).  B. Reeves S. Roy B. Gorman and T. Morley. 2008. A marketplace for attention: Responses to a synthetic currency used to signal information importance in e-mail. First Monday 13 5 (2008).","DOI":"10.5210\/fm.v13i5.2100"},{"volume-title":"The perceptron: a probabilistic model for information storage and organization in the brain.Psychological Review 65, 6","year":"1958","key":"e_1_3_2_1_24_1","unstructured":"Frank Rosenblatt. 1958. The perceptron: a probabilistic model for information storage and organization in the brain.Psychological Review 65, 6 ( 1958 ), 386. Frank Rosenblatt. 1958. The perceptron: a probabilistic model for information storage and organization in the brain.Psychological Review 65, 6 (1958), 386."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291028"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33247-0_14"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010057"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180942"},{"key":"e_1_3_2_1_29_1","volume-title":"Technical Report MSR-TR-2001-88. Microsoft Research.","author":"Venolia G.","year":"2001","unstructured":"G. Venolia , L. Dabbish , J.J. Cadiz , and A. Gupta . 2001 . Supporting email workflow. Technical Report MSR-TR-2001-88. Microsoft Research. G. Venolia, L. Dabbish, J.J. Cadiz, and A. Gupta. 2001. Supporting email workflow. Technical Report MSR-TR-2001-88. Microsoft Research."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979456"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080782"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063683"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557124"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:21Z","timestamp":1750204401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":34,"alternative-id":["10.1145\/3308558.3313624","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313624","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}