{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:54:32Z","timestamp":1756000472889,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Army Young Investigator Award","award":["No. W911NF1810397"],"award-info":[{"award-number":["No. W911NF1810397"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["Graduate Research Fellowship","IIS 1845491"],"award-info":[{"award-number":["Graduate Research Fellowship","IIS 1845491"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,20]]},"DOI":"10.1145\/3336191.3371828","type":"proceedings-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T19:08:16Z","timestamp":1579720096000},"page":"492-500","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Toward Activity Discovery in the Personal Web"],"prefix":"10.1145","author":[{"given":"Tara","family":"Safavi","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Adam","family":"Fourney","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Robert","family":"Sim","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Marcin","family":"Juraszek","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Shane","family":"Williams","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Ned","family":"Friend","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Danai","family":"Koutra","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Paul N.","family":"Bennett","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Michael Bendersky Xuanhui Wang Donald Metzler and Marc Najork. 2017. Learning from user interactions in personal search via attribute parameterization. In WSDM. ACM 791--799.  Michael Bendersky Xuanhui Wang Donald Metzler and Marc Najork. 2017. Learning from user interactions in personal search via attribute parameterization. In WSDM. ACM 791--799.","DOI":"10.1145\/3018661.3018712"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Jan R Benetka John Krumm and Paul N Bennett. 2019. Understanding Context for Tasks and Activities. In CHIIR. ACM 133--142.  Jan R Benetka John Krumm and Paul N Bennett. 2019. Understanding Context for Tasks and Activities. In CHIIR. ACM 133--142.","DOI":"10.1145\/3295750.3298929"},{"key":"e_1_3_2_1_3_1","volume-title":"JMLR","volume":"3","author":"Blei David M","year":"2003","unstructured":"David M Blei , Andrew Y Ng , and Michael I Jordan . 2003 . Latent dirichlet allocation . JMLR , Vol. 3 , Jan (2003), 993--1022. David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. JMLR , Vol. 3, Jan (2003), 993--1022."},{"key":"e_1_3_2_1_4_1","volume-title":"Atlantic Monthly","volume":"176","author":"Bush Vannevar","year":"1945","unstructured":"Vannevar Bush . 1945 . As we may think . Atlantic Monthly , Vol. 176 (1945). Vannevar Bush. 1945. As we may think. Atlantic Monthly , Vol. 176 (1945)."},{"key":"e_1_3_2_1_5_1","volume-title":"David Maxwell Chickering, and Susan T Dumais","author":"Carterette Ben","year":"2008","unstructured":"Ben Carterette , Paul N Bennett , David Maxwell Chickering, and Susan T Dumais . 2008 . Here or there. In ECIR. Springer , 16--27. Ben Carterette, Paul N Bennett, David Maxwell Chickering, and Susan T Dumais. 2008. Here or there. In ECIR. Springer, 16--27."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Mark Dredze Tessa Lau and Nicholas Kushmerick. 2006. Automatically classifying emails into activities. In IUI. ACM 70--77.  Mark Dredze Tessa Lau and Nicholas Kushmerick. 2006. Automatically classifying emails into activities. In IUI. ACM 70--77.","DOI":"10.1145\/1111449.1111471"},{"key":"e_1_3_2_1_8_1","volume-title":"IUI Workshop on Ubiquitous User Modeling .","author":"Dredze Mark","year":"2008","unstructured":"Mark Dredze and Hanna Wallach . 2008 . User models for email activity management . In IUI Workshop on Ubiquitous User Modeling . Mark Dredze and Hanna Wallach. 2008. User models for email activity management. In IUI Workshop on Ubiquitous User Modeling ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Susan Dumais Edward Cutrell JJ Cadiz Gavin Jancke Raman Sarin and Daniel C Robbins. 2003. Stuff I've seen: a system for personal information retrieval and re-use. In SIGIR. ACM 72--79.  Susan Dumais Edward Cutrell JJ Cadiz Gavin Jancke Raman Sarin and Daniel C Robbins. 2003. Stuff I've seen: a system for personal information retrieval and re-use. In SIGIR. ACM 72--79.","DOI":"10.1145\/860435.860451"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2888422.2888425"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1145\/1008992.1009137","article-title":"Implicit queries (IQ) for contextualized search","volume":"4","author":"Dumais Susan","year":"2004","unstructured":"Susan Dumais , Edward Cutrell , Raman Sarin , and Eric Horvitz . 2004 . Implicit queries (IQ) for contextualized search . In SIGIR , Vol. 4. 594 -- 594 . Susan Dumais, Edward Cutrell, Raman Sarin, and Eric Horvitz. 2004. Implicit queries (IQ) for contextualized search. In SIGIR, Vol. 4. 594--594.","journal-title":"SIGIR"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Victor M Gonz\u00e1lez and Gloria Mark. 2004. Constant constant multi-tasking craziness: managing multiple working spheres. In CHI. ACM 113--120.  Victor M Gonz\u00e1lez and Gloria Mark. 2004. Constant constant multi-tasking craziness: managing multiple working spheres. In CHI. ACM 113--120.","DOI":"10.1145\/985692.985707"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Catherine Grevet David Choi Debra Kumar and Eric Gilbert. 2014. Overload is overloaded: email in the age of Gmail. In CHI. ACM 793--802.  Catherine Grevet David Choi Debra Kumar and Eric Gilbert. 2014. Overload is overloaded: email in the age of Gmail. In CHI. ACM 793--802.","DOI":"10.1145\/2556288.2557013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In KDD. ACM 855--864.  Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In KDD. ACM 855--864.","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_15_1","series-title":"SIAM review","volume-title":"Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix decompositions","author":"Halko Nathan","year":"2011","unstructured":"Nathan Halko , Per-Gunnar Martinsson , and Joel A Tropp . 2011. Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix decompositions . SIAM review , Vol. 53 , 2 ( 2011 ), 217--288. Nathan Halko, Per-Gunnar Martinsson, and Joel A Tropp. 2011. Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix decompositions. SIAM review , Vol. 53, 2 (2011), 217--288."},{"key":"e_1_3_2_1_16_1","unstructured":"Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS. 1024--1034.  Will Hamilton Zhitao Ying and Jure Leskovec. 2017. Inductive representation learning on large graphs. In NeurIPS. 1024--1034."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Glen Jeh and Jennifer Widom. 2002. SimRank: a measure of structural-context similarity. In KDD. ACM 538--543.  Glen Jeh and Jennifer Widom. 2002. SimRank: a measure of structural-context similarity. In KDD. ACM 538--543.","DOI":"10.1145\/775047.775126"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Di Jin Mark Heimann Ryan A. Rossi and Danai Koutra. 2019 a. Node2bits: Compact Time- and Attribute-aware Node Representations for User Stitching. In ECML\/PKDD .  Di Jin Mark Heimann Ryan A. Rossi and Danai Koutra. 2019 a. Node2bits: Compact Time- and Attribute-aware Node Representations for User Stitching. In ECML\/PKDD .","DOI":"10.1007\/978-3-030-46150-8_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Di Jin Mark Heimann Tara Safavi Mengdi Wang Wei Lee Lindsay Snider and Danai Koutra. 2019 b. Smart Roles: Inferring Professional Roles in Email Networks. In KDD. ACM 2923--2933.  Di Jin Mark Heimann Tara Safavi Mengdi Wang Wei Lee Lindsay Snider and Danai Koutra. 2019 b. Smart Roles: Inferring Professional Roles in Email Networks. In KDD. ACM 2923--2933.","DOI":"10.1145\/3292500.3330735"},{"key":"e_1_3_2_1_20_1","volume-title":"Personal information management. Annual review of information science and technology","author":"Jones William","year":"2007","unstructured":"William Jones . 2007. Personal information management. Annual review of information science and technology , Vol. 41 , 1 ( 2007 ), 453--504. William Jones. 2007. Personal information management. Annual review of information science and technology , Vol. 41, 1 (2007), 453--504."},{"key":"e_1_3_2_1_21_1","unstructured":"Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR .  Thomas N Kipf and Max Welling. 2017. Semi-supervised classification with graph convolutional networks. In ICLR ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556612"},{"key":"e_1_3_2_1_23_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In NeurIPS . 3111--3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In NeurIPS . 3111--3119."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ashequl Qadir Michael Gamon Patrick Pantel and Ahmed Hassan Awadallah. 2016. Activity modeling in email. In NAACL-HLT. 1452--1462.  Ashequl Qadir Michael Gamon Patrick Pantel and Ahmed Hassan Awadallah. 2016. Activity modeling in email. In NAACL-HLT. 1452--1462.","DOI":"10.18653\/v1\/N16-1171"},{"key":"e_1_3_2_1_26_1","unstructured":"Jianqiang Shen Lida Li Thomas G Dietterich and Jonathan L Herlocker. 2006. A hybrid learning system for recognizing user tasks from desktop activities and email messages. In IUI. ACM 86--92.  Jianqiang Shen Lida Li Thomas G Dietterich and Jonathan L Herlocker. 2006. A hybrid learning system for recognizing user tasks from desktop activities and email messages. In IUI. ACM 86--92."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729893"},{"key":"e_1_3_2_1_28_1","first-page":"992","article-title":"Pathsim: Meta path-based top-k similarity search in heterogeneous information networks","volume":"4","author":"Sun Yizhou","year":"2011","unstructured":"Yizhou Sun , Jiawei Han , Xifeng Yan , Philip S Yu , and Tianyi Wu . 2011 . Pathsim: Meta path-based top-k similarity search in heterogeneous information networks . VLDB , Vol. 4 , 11 (2011), 992 -- 1003 . Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S Yu, and Tianyi Wu. 2011. Pathsim: Meta path-based top-k similarity search in heterogeneous information networks. VLDB , Vol. 4, 11 (2011), 992--1003.","journal-title":"VLDB"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107488"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Xuanhui Wang Michael Bendersky Donald Metzler and Marc Najork. 2016. Learning to rank with selection bias in personal search. In SIGIR. ACM 115--124.  Xuanhui Wang Michael Bendersky Donald Metzler and Marc Najork. 2016. Learning to rank with selection bias in personal search. In SIGIR. ACM 115--124.","DOI":"10.1145\/2911451.2911537"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Xuanhui Wang Nadav Golbandi Michael Bendersky Donald Metzler and Marc Najork. 2018. Position bias estimation for unbiased learning to rank in personal search. In WSDM. ACM 610--618.  Xuanhui Wang Nadav Golbandi Michael Bendersky Donald Metzler and Marc Najork. 2018. Position bias estimation for unbiased learning to rank in personal search. In WSDM. ACM 610--618.","DOI":"10.1145\/3159652.3159732"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Steve Whittaker Tara Matthews Julian Cerruti Hernan Badenes and John Tang. 2011. Am I wasting my time organizing email?: a study of email refinding. In CHI. ACM 3449--3458.  Steve Whittaker Tara Matthews Julian Cerruti Hernan Badenes and John Tang. 2011. Am I wasting my time organizing email?: a study of email refinding. In CHI. ACM 3449--3458.","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Steve Whittaker and Candace Sidner. 1996. Email overload: exploring personal information management of email. In CHI. ACM 276--283.  Steve Whittaker and Candace Sidner. 1996. Email overload: exploring personal information management of email. In CHI. ACM 276--283.","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Hamed Zamani Michael Bendersky Xuanhui Wang and Mingyang Zhang. 2017. Situational context for ranking in personal search. In WWW. 1531--1540.  Hamed Zamani Michael Bendersky Xuanhui Wang and Mingyang Zhang. 2017. Situational context for ranking in personal search. In WWW. 1531--1540.","DOI":"10.1145\/3038912.3052648"},{"key":"e_1_3_2_1_36_1","volume-title":"Shane Williams, Adam D Troy, and Susan T Dumais.","author":"Zhao Qian","year":"2018","unstructured":"Qian Zhao , Paul N Bennett , Adam Fourney , Anne Loomis Thompson , Shane Williams, Adam D Troy, and Susan T Dumais. 2018 . Calendar-aware proactive email recommendation. In SIGIR. ACM , 655--664. Qian Zhao, Paul N Bennett, Adam Fourney, Anne Loomis Thompson, Shane Williams, Adam D Troy, and Susan T Dumais. 2018. Calendar-aware proactive email recommendation. In SIGIR. ACM, 655--664."}],"event":{"name":"WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Houston TX USA","acronym":"WSDM '20"},"container-title":["Proceedings of the 13th International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371828","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371828","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3336191.3371828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:14Z","timestamp":1750202594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3336191.3371828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":36,"alternative-id":["10.1145\/3336191.3371828","10.1145\/3336191"],"URL":"https:\/\/doi.org\/10.1145\/3336191.3371828","relation":{},"subject":[],"published":{"date-parts":[[2020,1,20]]},"assertion":[{"value":"2020-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}