{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:06:38Z","timestamp":1760609198318,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:00Z","timestamp":1559088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,29]]},"DOI":"10.1145\/3325291.3325357","type":"proceedings-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T12:18:47Z","timestamp":1572610727000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Using Pre-trained Embeddings to Detect the Intent of an Email"],"prefix":"10.1145","author":[{"given":"Zaid","family":"Alibadi","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, University of South Carolina, Columbia, SC USA"}]},{"given":"Mingzhe","family":"Du","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, University of South Carolina, Columbia, SC USA"}]},{"given":"Jose M.","family":"Vidal","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, University of South Carolina, Columbia, SC USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Crocker D. 1982. Standard for the format of ARPA Internet text messages (No. RFC 822).  Crocker D. 1982. Standard for the format of ARPA Internet text messages (No. RFC 822).","DOI":"10.17487\/rfc0822"},{"volume-title":"Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 309--312)","author":"Fisher D.","key":"e_1_3_2_1_2_1","unstructured":"Fisher , D. , Brush , A.J. , Gleave , E. and Smith , M.A ., 2006, November. Revisiting Whittaker & Sidner's email overload ten years later . In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 309--312) . ACM. Fisher, D., Brush, A.J., Gleave, E. and Smith, M.A., 2006, November. Revisiting Whittaker & Sidner's email overload ten years later. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 309--312). ACM."},{"volume-title":"Proceedings of the sigchi conference on human factors in computing systems (pp. 793--802)","author":"Grevet C.","key":"e_1_3_2_1_3_1","unstructured":"Grevet , C. , Choi , D. , Kumar , D. and Gilbert , E ., 2014, April. Overload is overloaded: email in the age of Gmail . In Proceedings of the sigchi conference on human factors in computing systems (pp. 793--802) . ACM. Grevet, C., Choi, D., Kumar, D. and Gilbert, E., 2014, April. Overload is overloaded: email in the age of Gmail. In Proceedings of the sigchi conference on human factors in computing systems (pp. 793--802). ACM."},{"volume-title":"Proceedings of the 24th International Conference on World Wide Web (pp. 603--613). International World Wide Web Conferences Steering Committee.","author":"Kooti F.","key":"e_1_3_2_1_4_1","unstructured":"Kooti , F. , Aiello , L.M. , Grbovic , M. , Lerman , K. and Mantrach , A ., 2015, May. Evolution of conversations in the age of email overload . In Proceedings of the 24th International Conference on World Wide Web (pp. 603--613). International World Wide Web Conferences Steering Committee. Kooti, F., Aiello, L.M., Grbovic, M., Lerman, K. and Mantrach, A., 2015, May. Evolution of conversations in the age of email overload. In Proceedings of the 24th International Conference on World Wide Web (pp. 603--613). International World Wide Web Conferences Steering Committee."},{"key":"e_1_3_2_1_5_1","first-page":"68","volume-title":"Communications of the ACM","author":"Whittaker S.","unstructured":"Whittaker , S. , Bellotti , V. and Gwizdka , J ., 2006. Email in personal information management . Communications of the ACM , pp. 68 -- 73 . Whittaker, S., Bellotti, V. and Gwizdka, J., 2006. Email in personal information management. Communications of the ACM, pp. 68--73."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001&2_4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191740"},{"key":"e_1_3_2_1_8_1","unstructured":"Whittaker S. Bellotti V. and Cwizdka J. 2007. CD Everything through Email. Personal information management p. 167.  Whittaker S. Bellotti V. and Cwizdka J. 2007. CD Everything through Email. Personal information management p. 167."},{"volume-title":"Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 913--921)","author":"Koren Y.","key":"e_1_3_2_1_9_1","unstructured":"Koren , Y. , Liberty , E. , Maarek , Y. and Sandler , R ., 2011, August. Automatically tagging email by leveraging other users' folders . In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 913--921) . ACM. Koren, Y., Liberty, E., Maarek, Y. and Sandler, R., 2011, August. Automatically tagging email by leveraging other users' folders. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 913--921). ACM."},{"key":"e_1_3_2_1_10_1","unstructured":"Brutlag J.D. and Meek C. 2000 June. Challenges of the email domain for text classification. In ICML (pp. 103--110).  Brutlag J.D. and Meek C. 2000 June. Challenges of the email domain for text classification. In ICML (pp. 103--110)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/325737.325843"},{"volume-title":"Proceedings of the 12th international conference on Intelligent user interfaces (pp. 190--197)","author":"Cselle G.","key":"e_1_3_2_1_12_1","unstructured":"Cselle , G. , Albrecht , K. and Wattenhofer , R ., 2007, January. BuzzTrack: topic detection and tracking in email . In Proceedings of the 12th international conference on Intelligent user interfaces (pp. 190--197) . ACM. Cselle, G., Albrecht, K. and Wattenhofer, R., 2007, January. BuzzTrack: topic detection and tracking in email. In Proceedings of the 12th international conference on Intelligent user interfaces (pp. 190--197). ACM."},{"volume-title":"Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 431--440)","author":"Dabbish L.A.","key":"e_1_3_2_1_13_1","unstructured":"Dabbish , L.A. and Kraut , R.E ., 2006, November. Email overload at work: an analysis of factors associated with email strain . In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 431--440) . ACM. Dabbish, L.A. and Kraut, R.E., 2006, November. Email overload at work: an analysis of factors associated with email strain. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 431--440). ACM."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 276--283)","author":"Whittaker C.","year":"1996","unstructured":"S. Whittaker & C. Sidner , \"Email overload : exploring personal information management of email \", in Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 276--283) . ACM, ( 1996 , April). S. Whittaker & C. Sidner, \"Email overload: exploring personal information management of email\", in Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 276--283). ACM, (1996, April)."},{"volume-title":"Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing.","author":"Cohen W.W.","key":"e_1_3_2_1_15_1","unstructured":"Cohen , W.W. , Carvalho , V.R. and Mitchell , T.M ., 2004. Learning to Classify Email into 34Speech Acts \". In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing. Cohen, W.W., Carvalho, V.R. and Mitchell, T.M., 2004. Learning to Classify Email into 34Speech Acts\". In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing."},{"volume-title":"How to do things with words: The William James lectures","author":"Austin J.L.","key":"e_1_3_2_1_16_1","unstructured":"Austin , J.L. , 1962. How to do things with words: The William James lectures . Cambridge, MA . Austin, J.L., 1962. How to do things with words: The William James lectures. Cambridge, MA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/58566.58567"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078186"},{"volume-title":"Proceedings of the 2018 International Conference on Data Science (ICDATA'18)","author":"Alibadi Z.","key":"e_1_3_2_1_19_1","unstructured":"Alibadi , Z. and Vidal , J .. \" To Read or To Do? That's The Task \". In Proceedings of the 2018 International Conference on Data Science (ICDATA'18) , ISBN: 1-60132-481-2, CSREA Press, (pp. 279--285). Alibadi, Z. and Vidal, J.. \"To Read or To Do? That's The Task\". In Proceedings of the 2018 International Conference on Data Science (ICDATA'18), ISBN: 1-60132-481-2, CSREA Press, (pp. 279--285)."},{"key":"e_1_3_2_1_20_1","unstructured":"Mikolov T. Chen K. Corrado G. and Dean J. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781.  Mikolov T. Chen K. Corrado G. and Dean J. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_1_21_1","first-page":"328","volume-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (Vol. 1","author":"Howard J.","unstructured":"Howard , J. and Ruder , S ., 2018. Universal language model fine-tuning for text classification . In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (Vol. 1 , pp. 328 -- 339 ). Howard, J. and Ruder, S., 2018. Universal language model fine-tuning for text classification. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (Vol. 1, pp. 328--339)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Cer D. Yang Y. Kong S.Y. Hua N. Limtiaco N. John R.S. Constant N. Guajardo-Cespedes M. Yuan S. Tar C. and Sung Y.H. 2018. Universal sentence encoder. arXiv preprint arXiv:1803.11175.  Cer D. Yang Y. Kong S.Y. Hua N. Limtiaco N. John R.S. Constant N. Guajardo-Cespedes M. Yuan S. Tar C. and Sung Y.H. 2018. Universal sentence encoder. arXiv preprint arXiv:1803.11175.","DOI":"10.18653\/v1\/D18-2029"},{"key":"e_1_3_2_1_23_1","unstructured":"Kraut R. Fussell S. Lerch F. and Espinosa A. 2005. Coordination in teams: Evidence from a simulated management game.  Kraut R. Fussell S. Lerch F. and Espinosa A. 2005. Coordination in teams: Evidence from a simulated management game."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Schapire R.E. and Singer Y. 1999. Improved boosting algorithms using confidence-rated predictions. Machine learning 37(3) pp. 297--336.  Schapire R.E. and Singer Y. 1999. Improved boosting algorithms using confidence-rated predictions. Machine learning 37(3) pp. 297--336.","DOI":"10.1023\/A:1007614523901"},{"volume-title":"Proceedings of the HLT-NAACL 2006 Workshop on Analyzing Conversations in Text and Speech (pp. 35--41)","author":"Carvalho V.R.","key":"e_1_3_2_1_25_1","unstructured":"Carvalho , V.R. and Cohen , W.W ., 2006, June. Improving email speech acts analysis via n-gram selection . In Proceedings of the HLT-NAACL 2006 Workshop on Analyzing Conversations in Text and Speech (pp. 35--41) . Association for Computational Linguistics. Carvalho, V.R. and Cohen, W.W., 2006, June. Improving email speech acts analysis via n-gram selection. In Proceedings of the HLT-NAACL 2006 Workshop on Analyzing Conversations in Text and Speech (pp. 35--41). Association for Computational Linguistics."},{"volume-title":"Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (pp. 984--992)","author":"Lampert A.","key":"e_1_3_2_1_26_1","unstructured":"Lampert , A. , Dale , R. and Paris , C ., 2010, June. Detecting emails containing requests for action . In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (pp. 984--992) . Association for Computational Linguistics. Lampert, A., Dale, R. and Paris, C., 2010, June. Detecting emails containing requests for action. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (pp. 984--992). Association for Computational Linguistics."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Hall M. Frank E. Holmes G. Pfahringer B. Reutemann P. and Witten I.H. 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11(1) pp. 10--18.  Hall M. Frank E. Holmes G. Pfahringer B. Reutemann P. and Witten I.H. 2009. The WEKA data mining software: an update. ACM SIGKDD explorations newsletter 11(1) pp. 10--18.","DOI":"10.1145\/1656274.1656278"},{"volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 748--758)","author":"Qadir A.","key":"e_1_3_2_1_28_1","unstructured":"Qadir , A. and Riloff , E ., 2011, July. Classifying sentences as speech acts in message board posts . In Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 748--758) . Association for Computational Linguistics. Qadir, A. and Riloff, E., 2011, July. Classifying sentences as speech acts in message board posts. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 748--758). Association for Computational Linguistics."},{"volume-title":"Proceedings of the ACL-02 Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics-Volume 1 (pp. 63--70)","author":"Loper E.","key":"e_1_3_2_1_29_1","unstructured":"Loper , E. and Bird , S ., 2002, July. NLTK: The natural language toolkit . In Proceedings of the ACL-02 Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics-Volume 1 (pp. 63--70) . Association for Computational Linguistics. Loper, E. and Bird, S., 2002, July. NLTK: The natural language toolkit. In Proceedings of the ACL-02 Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics-Volume 1 (pp. 63--70). Association for Computational Linguistics."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Peters M.E. Neumann M. Iyyer M. Gardner M. Clark C. Lee K. and Zettlemoyer L. 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365.  Peters M.E. Neumann M. Iyyer M. Gardner M. Clark C. Lee K. and Zettlemoyer L. 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365.","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_1_31_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805.","author":"Devlin J.","year":"2018","unstructured":"Devlin , J. , Chang , M.W. , Lee , K. and Toutanova , K. , 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. Devlin, J., Chang, M.W., Lee, K. and Toutanova, K., 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-968X.1951.tb00249.x"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"key":"e_1_3_2_1_34_1","first-page":"1681","volume-title":"Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers) (Vol. 1","author":"Iyyer M.","unstructured":"Iyyer , M. , Manjunatha , V. , Boyd-Graber , J. and Daum\u00e9 III, H., 2015. Deep unordered composition rivals syntactic methods for text classification . In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers) (Vol. 1 , pp. 1681 -- 1691 ). Iyyer, M., Manjunatha, V., Boyd-Graber, J. and Daum\u00e9 III, H., 2015. Deep unordered composition rivals syntactic methods for text classification. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers) (Vol. 1, pp. 1681--1691)."},{"key":"e_1_3_2_1_35_1","unstructured":"Vaswani A. Shazeer N. Parmar N. Uszkoreit J. Jones L. Gomez A.N. Kaiser \u0141. and Polosukhin I. 2017. Attention is all you need. In Advances in Neural Information Processing Systems (pp. 5998--6008).  Vaswani A. Shazeer N. Parmar N. Uszkoreit J. Jones L. Gomez A.N. Kaiser \u0141. and Polosukhin I. 2017. Attention is all you need. In Advances in Neural Information Processing Systems (pp. 5998--6008)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Peters M.E. Ammar W. Bhagavatula C. and Power R. 2017. Semi-supervised sequence tagging with bidirectional language models. arXiv preprint arXiv:1705.00108.  Peters M.E. Ammar W. Bhagavatula C. and Power R. 2017. Semi-supervised sequence tagging with bidirectional language models. arXiv preprint arXiv:1705.00108.","DOI":"10.18653\/v1\/P17-1161"},{"key":"e_1_3_2_1_37_1","unstructured":"McCann B. Bradbury J. Xiong C. and Socher R. 2017. Learned in translation: Contextualized word vectors. In Advances in Neural Information Processing Systems (pp. 6294--6305).  McCann B. Bradbury J. Xiong C. and Socher R. 2017. Learned in translation: Contextualized word vectors. In Advances in Neural Information Processing Systems (pp. 6294--6305)."},{"volume-title":"Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) (pp. 1532--1543)","author":"Pennington J.","key":"e_1_3_2_1_38_1","unstructured":"Pennington , J. , Socher , R. and Manning , C ., 2014. Glove: Global vectors for word representation . In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) (pp. 1532--1543) . Pennington, J., Socher, R. and Manning, C., 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) (pp. 1532--1543)."},{"volume-title":"In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks.","author":"Rehurek R.","key":"e_1_3_2_1_39_1","unstructured":"Rehurek , R. and Sojka , P ., 2010. Software framework for topic modelling with large corpora . In In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. Rehurek, R. and Sojka, P., 2010. Software framework for topic modelling with large corpora. In In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks."},{"volume-title":"Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 869--878)","author":"Grbovic M.","key":"e_1_3_2_1_40_1","unstructured":"Grbovic , M. , Halawi , G. , Karnin , Z. and Maarek , Y ., 2014, November. How many folders do you really need?: Classifying email into a handful of categories . In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 869--878) . ACM. Grbovic, M., Halawi, G., Karnin, Z. and Maarek, Y., 2014, November. How many folders do you really need?: Classifying email into a handful of categories. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 869--878). ACM."},{"key":"e_1_3_2_1_41_1","unstructured":"Aberdeen D. Pacovsky O. and Slater A. 2010. The learning behind Gmail priority inbox.  Aberdeen D. Pacovsky O. and Slater A. 2010. The learning behind Gmail priority inbox."}],"event":{"name":"ACIT 2019: 7th ACIS International Conference on Applied Computing and Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Honolulu HI USA","acronym":"ACIT 2019"},"container-title":["Proceedings of the 7th ACIS International Conference on Applied Computing and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325291.3325357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325291.3325357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:17Z","timestamp":1750204457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325291.3325357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,29]]},"references-count":41,"alternative-id":["10.1145\/3325291.3325357","10.1145\/3325291"],"URL":"https:\/\/doi.org\/10.1145\/3325291.3325357","relation":{},"subject":[],"published":{"date-parts":[[2019,5,29]]},"assertion":[{"value":"2019-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}