{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:03Z","timestamp":1750220283515,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T00:00:00Z","timestamp":1644537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,11]]},"DOI":"10.1145\/3488560.3501393","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:42:57Z","timestamp":1644961377000},"page":"1617-1619","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Search and Discovery in Personal Email Collections"],"prefix":"10.1145","author":[{"given":"Michael","family":"Bendersky","sequence":"first","affiliation":[{"name":"Google Research, Mountain View, CA, USA"}]},{"given":"Xuanhui","family":"Wang","sequence":"additional","affiliation":[{"name":"Google Research, Mountain View, CA, USA"}]},{"given":"Marc","family":"Najork","sequence":"additional","affiliation":[{"name":"Google Research, Mountain View, CA, USA"}]},{"given":"Donald","family":"Metzler","sequence":"additional","affiliation":[{"name":"Google Research, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2010.2504"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313697"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052615"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433447"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176398"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331266"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/725"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000069"},{"key":"e_1_3_2_1_9_1","volume-title":"Schroeder","author":"Birrell Andrew D.","year":"1997","unstructured":"Andrew D. Birrell, Edward P. Wobber, and Michael D. Schroeder. 1997. Pachyderm . http:\/\/birrell.org\/andrew\/pachywww\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11687238_21"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium (SEC","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In Proceedings of the 28th USENIX Conference on Security Symposium (SEC 2019). 267--284."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806471"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052659"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835803"},{"volume-title":"Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 72--79","author":"Dumais Susan","key":"e_1_3_2_1_15_1","unstructured":"Susan Dumais, Edward Cutrell, JJ Cadiz, Gavin Jancke, Raman Sarin, and Daniel C. Robbins. 2003. Stuff I've Seen: A System for Personal Information Retrieval and Re-use. In Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 72--79."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2741694"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313706"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080683"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018736"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018699"},{"key":"e_1_3_2_1_21_1","unstructured":"Govind Kaushal. 2016. Inbox by Gmail: Find Answers Even Faster. https:\/\/www.blog.google\/products\/gmail\/inbox-by-gmail-find-answers-even-faster\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Accountable Crowdsourcing. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1291--1300","author":"Kokkalis Nicolas","year":"2013","unstructured":"Nicolas Kokkalis, Thomas K\u00f6hn, Carl Pfeiffer, Dima Chornyi, Michael S Bernstein, and Scott R Klemmer. 2013. EmailValet: Managing Email Overload Through Private, Accountable Crowdsourcing. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 1291--1300."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/1699571.1699632"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331250"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"J. Liang L. Jiang L. Cao Y. Kalantidis L. Li and A. G. Hauptmann. 2019. Focal Visual-Text Attention for Memex Question Answering. IEEE Transactions on Pattern Analysis and Machine Intelligence (2019) 1--1. https:\/\/doi.org\/10.1109\/TPAMI.2018.2890628","DOI":"10.1109\/TPAMI.2018.2890628"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3050916"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the First Biennial Conference on Design of Experimental Search & Information Retrieval Systems","author":"Najork Marc","year":"2018","unstructured":"Marc Najork. 2018. Training On-Device Ranking Models from Cross-User Interactions in a Privacy-Preserving Fashion. In Proceedings of the First Biennial Conference on Design of Experimental Search & Information Retrieval Systems, Bertinoro, Italy, August 28--31, 2018. 108. http:\/\/ceur-ws.org\/Vol-2167\/short11.pdf"},{"key":"e_1_3_2_1_28_1","unstructured":"Kristin Naragon. 2018. We Still Love Email But We're Spreading the Love with Other Channels. https:\/\/theblog.adobe.com\/love-email-but-spreading-the-love-other-channels\/ Accessed: 2020-01-06."},{"key":"e_1_3_2_1_29_1","volume-title":"Avocado Research Email Collection","author":"Oard Douglas","year":"2015","unstructured":"Douglas Oard, William Webber, David Kirsch, and Sergey Golitsynskiy. 2015. Avocado Research Email Collection. Philadelphia: Linguistic Data Consortium (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219901"},{"key":"e_1_3_2_1_31_1","unstructured":"Brian Strope and Ray Kurzweil. 2017. Efficient Smart Reply now for Gmail. https:\/\/www.blog.google\/products\/gmail\/inbox-by-gmail-find-answers-even-faster\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126603"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132979"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911537"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_3_2_1_36_1","volume-title":"Smart Compose: Using Neural Networks to Help Write Emails. https:\/\/ai.googleblog.com\/2018\/05\/smart-compose-using-neural-networks-to.html","author":"Wu Yonghui","year":"2018","unstructured":"Yonghui Wu. 2018. Smart Compose: Using Neural Networks to Help Write Emails. https:\/\/ai.googleblog.com\/2018\/05\/smart-compose-using-neural-networks-to.html"}],"event":{"name":"WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Virtual Event AZ USA","acronym":"WSDM '22"},"container-title":["Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3501393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488560.3501393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:20Z","timestamp":1750188680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488560.3501393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,11]]},"references-count":36,"alternative-id":["10.1145\/3488560.3501393","10.1145\/3488560"],"URL":"https:\/\/doi.org\/10.1145\/3488560.3501393","relation":{},"subject":[],"published":{"date-parts":[[2022,2,11]]},"assertion":[{"value":"2022-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}