{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:45:10Z","timestamp":1775245510339,"version":"3.50.1"},"reference-count":207,"publisher":"Emerald","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"abstract":"<jats:p>Email has been an essential communication medium for many years. As a result, the information accumulated in our mailboxes has become valuable for all of our personal and professional activities. For years, researchers have been developing interfaces, models and algorithms to facilitate search, discovery and organization of email data. In this survey, we attempt to bring together these diverse research directions, and provide both a historical background, as well as a comprehensive overview of the recent advances in the field. In particular, we lay out all the components needed in the design of a privacy-centric email search engine, including search interface, indexing, document and query understanding, retrieval, ranking and evaluation. We also go beyond search, presenting recent work on intelligent task assistance in email. Finally, we discuss some emerging trends and future directions in email search and discovery research.<\/jats:p>","DOI":"10.1561\/1500000069","type":"journal-article","created":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T09:22:57Z","timestamp":1625563377000},"page":"1-133","source":"Crossref","is-referenced-by-count":2,"title":["Search and Discovery in Personal Email Collections"],"prefix":"10.1561","volume":"15","author":[{"given":"Michael","family":"Bendersky","sequence":"first","affiliation":[{"name":"Google"}]},{"given":"Xuanhui","family":"Wang","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Marc","family":"Najork","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Donald","family":"Metzler","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"140","published-online":{"date-parts":[[2021,7,6]]},"reference":[{"key":"2026040314430017900_ref001","first-page":"308","volume-title":"Proceedings of the 2016 ACM SIGS AC Conference on Computer and Communications Security.","author":"Abadi","year":"2016"},{"issue":"5","key":"2026040314430017900_ref002","doi-asserted-by":"publisher","first-page":"44","DOI":"10.5121\/ijcsit.2010.2504.","article-title":"\u201cA New Email Retrieval Ranking Approach\u201d.","volume":"2","author":"AbdelRahman","year":"2010","journal-title":"Journal of Computer Science and Information Technology."},{"key":"2026040314430017900_ref003","article-title":"\u201cThe Learning Behind Gmail Priority Inbox\u201d","volume-title":"LCCC: NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds","author":"Aberdeen","year":"2010"},{"key":"2026040314430017900_ref004","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1299015.1299021","volume-title":"Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit","author":"Abu-Nimeh","year":"2007"},{"key":"2026040314430017900_ref005","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/3308558.3313697","volume-title":"Proceedings of the World Wide Web Conference. WWW \u201919","author":"Agarwal","year":"2019"},{"key":"2026040314430017900_ref006","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1145\/3289600.3291017","article-title":"\u201cEstimating Position Bias without Intrusive Interventions\u201d","volume-title":"Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. WSDM \u201919","author":"Agarwal","year":"2019"},{"key":"2026040314430017900_ref007","first-page":"901","volume-title":"Proceedings of the 31st International Conference on Very Large Data Bases (VLDB 2005)","author":"Aggarwal","year":"2005"},{"key":"2026040314430017900_ref008","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1148170.1148177","volume-title":"Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR \u201906","author":"Agichtein","year":"2006"},{"key":"2026040314430017900_ref009","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/3209978.3209986","volume-title":"The 41st International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR \u201918","author":"Ai","year":"2018"},{"key":"2026040314430017900_ref010","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1145\/3038912.3052615","article-title":"\u201cCharacterizing Email Search using Large-scale Behavioral Logs and Surveys\u201d","volume-title":"Proceedings of the 26th International Conference on World Wide Web, WWW 2017, Perth, Australia, April 3-7, 2017","author":"Ai","year":"2017"},{"issue":"2","key":"2026040314430017900_ref011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439861","article-title":"\u201cUnbiased Learning to Rank: Online or Offline?\u201d","volume":"39","author":"Ai","year":"2021","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"2026040314430017900_ref012","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1145\/2433396.2433447","article-title":"\u201c\u201cThreading Machine Generated Email\u201d\u201d","volume-title":"Sixth ACM International Conference on Web Search and Data Mining, WSDM 2013, Rome, Italy, February 4-8, 2013","author":"Ailon","year":"2013"},{"key":"2026040314430017900_ref013","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/3176349.3176398","volume-title":"Proceedings of the 2018 Conference on Human Information Interaction &Retrieval. CHIIR \u201918","author":"Airashed","year":"2018"},{"key":"2026040314430017900_ref014","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1145\/1460096.1460127","volume-title":"Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval","author":"Anguera","year":"2008"},{"key":"2026040314430017900_ref015","unstructured":"Apple\n          . (2017).\u201cLearning with Privacy at Scale\u201d. URL:https:\/\/machinelearning.apple.com\/docs\/learning-with-privacy-at-scale\/appledifferentialprivacysystem.pdf."},{"key":"2026040314430017900_ref016","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/2063576.2063611","volume-title":"Proceedings of the 20th ACM International Conference on Information and Knowledge Management. CIKM \u201911","author":"Arguello","year":"2011"},{"key":"2026040314430017900_ref017","first-page":"1699","article-title":"\u201cPersonalized Federated Search at LinkedIn\u201d","volume-title":"Proceedings of the 24th ACM International Conference on Information and Knowledge Management","author":"Arya","year":"2015"},{"key":"2026040314430017900_ref018","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1145\/2009916.2010058","volume-title":"Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR \u201911","author":"Asadi","year":"2011"},{"key":"2026040314430017900_ref019","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1145\/3331184.3331266","volume-title":"Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2019)","author":"Ashkan","year":"2019"},{"key":"2026040314430017900_ref020","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-319-68474-1_3","volume-title":"International Conference on Similarity Search and Applications","author":"Aum\u00fcller","year":"2017"},{"key":"2026040314430017900_ref021","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/2983323.2983350","volume-title":"Proceedings of the 25th ACM International Conference on Information and Knowledge Management. CIKM \u201916","author":"Avigdor-Elgrabli","year":"2016"},{"key":"2026040314430017900_ref022","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1145\/3289600.3290984","volume-title":"Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining","author":"Azarbonyad","year":"2019"},{"key":"2026040314430017900_ref023","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/3341981.3344241","article-title":"\u201cPersonal Knowledge Graphs: A Research Agenda\u201d","volume-title":"Proceedings of the 2019 ACM SIGIR International Conference on Theory of Information Retrieval","author":"Balog","year":"2019"},{"key":"2026040314430017900_ref024","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/ICDM.2006.35","article-title":"\u201cCluster Ranking with an Application to Mining Mailbox Networks\u201d","volume-title":"Sixth International Conference on Data Mining (ICDM\u201906)","author":"Bar-Yossef","year":"2006"},{"issue":"4","key":"2026040314430017900_ref025","first-page":"837","article-title":"\u201cPrivacypreserving Indexing of Documents on the Network\u201d","volume":"18","author":"Bawa","year":"2009","journal-title":"The VLDB Journal\u2014The International Journal on Very Large Data Bases"},{"key":"2026040314430017900_ref026","article-title":"\u201cAutomatic Categorization of Email into Folders: Benchmark Experiments on Enron and SRI Corpora\u201d","volume-title":"Tech. rep. No. 218. Computer Science Department Faculty Publication Series, University of Massachusetts Amherst","author":"Bekkerman","year":"2004"},{"issue":"2","key":"2026040314430017900_ref027","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1345448.1345465","article-title":"\u201cLessons from the Netflix Prize Challenge.\u201d","volume":"9","author":"Bell","year":"2007","journal-title":"SiGKDD Explorations"},{"key":"2026040314430017900_ref028","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1145\/3018661.3018712","volume-title":"Proceedings of the Tenth ACM International Conference on Web Search and Data Mining","author":"Bendersky","year":"2017"},{"key":"2026040314430017900_ref029","doi-asserted-by":"publisher","first-page":"5219","DOI":"10.24963\/ijcai.2018\/725","volume-title":"Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI 2018)","author":"Bendersky","year":"2018"},{"key":"2026040314430017900_ref030","first-page":"1137","article-title":"\u201cA Neural Probabilistic Language Model\u201d","volume":"3","author":"Bengio","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"2026040314430017900_ref031","first-page":"324","volume-title":"Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference","author":"Bennett","year":"2007"},{"key":"2026040314430017900_ref032","author":"Berry","year":"2001"},{"key":"2026040314430017900_ref033","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v29i1.9282","article-title":"\u201cOn Correcting Misspelled Queries in Email Search.\u201d","volume-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence","author":"Bhole","year":"2015"},{"key":"2026040314430017900_ref034","doi-asserted-by":"crossref","unstructured":"Bhushan, A., K.Pogran, R.Tomlinson, and J.White. (1973).\u201cStandardizing Network Mail Headers\u201d.https:\/\/tools.ietf.org\/html\/rfc561","DOI":"10.17487\/rfc0561"},{"key":"2026040314430017900_ref035","unstructured":"Birrell, A. D., E. P.Wobber, and M. D.Schroeder. (1997).\u201cPachyderm\u201d.http:\/\/birrell.org\/andrew\/pachywww\/"},{"issue":"1-7","key":"2026040314430017900_ref036","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","article-title":"\u201cThe Anatomy of a Large-scale Hypertex- tual Web Search Engine\u201d","volume":"30","author":"Brin","year":"1998","journal-title":"Computer Networks and ISDN Systems"},{"key":"2026040314430017900_ref037","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/11687238_21","volume-title":"Advances in Database Technology - EDBT 2006","author":"Broder","year":"2006"},{"issue":"23-581","key":"2026040314430017900_ref038","first-page":"81","article-title":"\u201cFrom RankNet to LambdaRank to LambdaMART: An overview\u201d","volume":"11","author":"Burges","year":"2010","journal-title":"Learning"},{"key":"2026040314430017900_ref039","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1242572.1242586","author":"Carenini","year":"(2007)","journal-title":"Proceedings of the 16th International Conference on World Wide Web (WWW 2007)."},{"key":"2026040314430017900_ref040","first-page":"267","article-title":"\u201cThe Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks\u201d","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium (SEC 2019)","author":"Carlini","year":"2019"},{"key":"2026040314430017900_ref041","first-page":"283","volume-title":"Proceedings of the 24th ACM International Conference on Information and Knowledge Management","author":"Carmel","year":"2015"},{"key":"2026040314430017900_ref042","doi-asserted-by":"publisher","first-page":"1551","DOI":"10.1145\/3038912.3052659","volume-title":"Proceedings of the 26th International Conference on World Wide Web. WWW \u201917","author":"Carmel","year":"2017"},{"key":"2026040314430017900_ref043","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1145\/3038912.3052658","volume-title":"Proceedings of the 26th International Conference on World Wide Web (WWW 2017)","author":"Carmel","year":"2017"},{"issue":"1","key":"2026040314430017900_ref044","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1023\/A:1007379606734","article-title":"\u201cMultitask Learning\u201d","volume":"28","author":"Caruana","year":"1997","journal-title":"Machine Learning"},{"key":"2026040314430017900_ref045","article-title":"\u201cLearning to Extract Signature and Reply Lines from Email\u201d","volume":"2004","author":"Carvalho","year":"2004","journal-title":"Proceedings of the Conference on Email and Anti-Spam"},{"key":"2026040314430017900_ref046","first-page":"68","volume-title":"Proceedings of the 2007 SIAM International Conference on Data Mining","author":"Carvalho","year":"2007"},{"key":"2026040314430017900_ref047","first-page":"321","volume-title":"European Conference on Information Retrieval","author":"Carvalho","year":"2008"},{"key":"2026040314430017900_ref048","doi-asserted-by":"publisher","first-page":"575:1","DOI":"10.1145\/3290605.3300805","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI 2019). CHI \u201919","author":"Chen","year":"2019"},{"key":"2026040314430017900_ref049","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1145\/3292500.3330723","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. KDD \u201919","author":"Chen","year":"2019"},{"key":"2026040314430017900_ref050","volume-title":"Tech. rep.","author":"Chui","year":"2012"},{"key":"2026040314430017900_ref051","doi-asserted-by":"publisher","DOI":"10.2200\/S00654ED1V01Y201507ICR043","volume-title":"Click Models for Web Search","author":"Chuklin","year":"2015"},{"key":"2026040314430017900_ref052","volume-title":"Tech. rep.","author":"Cincotta","year":"1983"},{"key":"2026040314430017900_ref053","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1145\/2063576.2063646","volume-title":"Proceedings of the 20th ACM International Conference on Information and Knowledge Management","author":"Claude","year":"2011"},{"key":"2026040314430017900_ref054","first-page":"25","volume-title":"AAAI Spring Symposium on Machine Learning in Information Access","author":"Cohen","year":"1996"},{"key":"2026040314430017900_ref055","first-page":"309","article-title":"\u201cLearning to Classify Email into \u201cSpeech Acts\u201d\u201d","volume-title":"Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing","author":"Cohen","year":"2004"},{"key":"2026040314430017900_ref056","unstructured":"Cohen, W. W.\n          . (2015).\u201cEnron Email Dataset\u201d.http:\/\/www.cs.cmu.edu\/~enron\/."},{"key":"2026040314430017900_ref057","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.500-274.spam-overview","article-title":"\u201cTREC 2007 Spam Track Overview\u201d","volume-title":"Proceedings of the Sixteenth Text REtrieval Conference (TREC 2007)","author":"Cormack","year":"2007"},{"key":"2026040314430017900_ref058","first-page":"414","article-title":"\u201cAdaptive Regularization of Weight Vectors\u201d","volume-title":"Advances in neural information processing systems","author":"Crammer","year":"2009"},{"key":"2026040314430017900_ref059","first-page":"199","article-title":"\u201cOverview of the TREC 2005 Enterprise Track\u201d","volume":"5","author":"Craswell","year":"2005","journal-title":"Proceedings of the Fourteenth Text REtrieval Conference (TREC 2005)"},{"key":"2026040314430017900_ref060","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1145\/3038912.3052654","volume-title":"Proceedings of the 26th International Conference on World Wide Web. WWW \u201917","author":"Cui","year":"2017"},{"key":"2026040314430017900_ref061","article-title":"\u201cReport from the Third Strategic Workshop on Information Retrieval (SWIRL)\u201d","author":"Culpepper","year":"2018"},{"issue":"1","key":"2026040314430017900_ref062","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/1107458.1107492","article-title":"\u201cSearching to Eliminate Personal Information Management\u201d","volume":"49","author":"Cutrell","year":"2006","journal-title":"Commun. ACM"},{"key":"2026040314430017900_ref063","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1145\/1054972.1055068","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Dabbish","year":"2005"},{"key":"2026040314430017900_ref064","doi-asserted-by":"crossref","unstructured":"Dai, N., M.Shokouhi, and B. D.Davison. (2011). \u201cLearning to Rank for Freshness and Relevance\u201d. In: Proceedings of the 34th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval.https:\/\/www.microsoft.com\/en-us\/research\/publication\/learning-to-rank-for-freshness-and-relevance\/.","DOI":"10.1145\/2009916.2009933"},{"key":"2026040314430017900_ref065","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1145\/3184558.3186582","volume-title":"Companion Proceedings of the The Web Conference 2018. WWW \u201918","author":"Di Castro","year":"2018"},{"key":"2026040314430017900_ref066","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1145\/2835776.2835811","volume-title":"Proceedings of the 9th ACM International Conference on Web Search and Data Mining (WSDM 2016)","author":"Di Castro","year":"2016"},{"key":"2026040314430017900_ref067","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1145\/2835776.2835803","volume-title":"Proceedings of the Ninth ACM International Conference on Web Search and Data Mining","author":"Di Castro","year":"2016"},{"key":"2026040314430017900_ref068","first-page":"72","volume-title":"Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Dumais","year":"2003"},{"key":"2026040314430017900_ref069","first-page":"1","volume-title":"Proceedings of the 5th International Conference on Theory and Applications of Models of Computation (TAMC 2008)","author":"Dwork","year":"2008"},{"key":"2026040314430017900_ref070","first-page":"95","volume-title":"Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS 2006)","author":"Elsayed","year":"2006"},{"key":"2026040314430017900_ref071","unstructured":"European Parliament and Council of the European Union\n          . (2016).\u201cGeneral Data Protection Regulation\u201d.http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"2026040314430017900_ref072","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1145\/3331184.3331238","volume-title":"Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2019)","author":"Fang","year":"2019"},{"key":"2026040314430017900_ref073","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1145\/2009916.2009969","article-title":"\u201cCrowdLogging: distributed, private, and anonymous search logging\u201d","volume-title":"Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval","author":"Feild","year":"2011"},{"key":"2026040314430017900_ref074","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1145\/1242572.1242660","volume-title":"Proceedings of the 16th International Conference on World Wide Web (WWW 2007)","author":"Fette","year":"2007"},{"key":"2026040314430017900_ref075","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1145\/3209978.3210116","article-title":"\u201cSemantic Location in Email Query Suggestion\u201d","volume-title":"The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, SIGIR 2018, Ann Arbor, MI, USA, July 08-12, 2018","author":"Foley","year":"2018"},{"key":"2026040314430017900_ref076","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1145\/2740908.2741694","article-title":"\u201cYou Will Get Mail! Predicting the Arrival of Future Email\u201d","volume-title":"Proceedings of the 24th International Conference on World Wide Web Companion, WWW 2015, Florence, Italy, May 18-22, 2015 - Companion Volume","author":"Gamzu","year":"2015"},{"key":"2026040314430017900_ref077","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1145\/3159652.3159698","volume-title":"Proceedings of the 11th ACM International Conference on Web Search and Data Mining (WSDM 2018)","author":"Gamzu","year":"2018"},{"issue":"1","key":"2026040314430017900_ref078","first-page":"2096","article-title":"\u201cDomain-Adversarial Training of Neural Networks\u201d","volume":"17","author":"Ganin","year":"2016","journal-title":"The Journal of Machine Learning Research"},{"key":"2026040314430017900_ref079","doi-asserted-by":"crossref","first-page":"24","DOI":"10.18653\/v1\/W16-1305","article-title":"\u201cKnowledge base population for organization mentions in email\u201d","volume-title":"Proceedings of the 5th Workshop on Automated Knowledge Base Construction","author":"Gao","year":"2016"},{"issue":"7674","key":"2026040314430017900_ref080","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1038\/550016a","article-title":"\u201cEthics of Internet Research Trigger Scrutiny\u201d","volume":"550","author":"Gibney","year":"2017","journal-title":"Nature News"},{"key":"2026040314430017900_ref081","unstructured":"Gmail Help\n            \n          . (2018).\u201cSearch operators you can use with Gmail\u201d.https:\/\/support.google.com\/mail\/answer\/7190?hl=en."},{"key":"2026040314430017900_ref082","unstructured":"Google Search\n            \n          . (2018).\u201cHow Search Organizes Information\u201d.https:\/\/www.google.com\/search\/howsearchworks\/crawling-indexing\/."},{"key":"2026040314430017900_ref083","unstructured":"Graham, P.\n          . (2003).\u201cBetter Bayesian Filtering\u201d.http:\/\/www.paulgraham.com\/better.html."},{"key":"2026040314430017900_ref084","unstructured":"Grammarly\n            \n          . (2018).\u201c5 Ways Grammarly Helps You Learn While You Write\u201d.https:\/\/www.grammarly.com\/blog\/grammarly-helps-you-learn\/."},{"key":"2026040314430017900_ref085","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2930238.2930239","volume-title":"Proceedings of the 2016 Conference on User Modeling Adaptation and Personalization. UMAP 16","author":"Graus","year":"2016"},{"key":"2026040314430017900_ref086","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1145\/2661829.2662018","article-title":"\u201cHow Many Folders Do You Really Need?: Classifying Email into a Handful of Categories\u201d","volume-title":"Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, CIKM 2014, Shanghai, China, November 3-7, 2014","author":"Grbovic","year":"2014"},{"key":"2026040314430017900_ref087","doi-asserted-by":"publisher","first-page":"2785","DOI":"10.1145\/3308558.3313706","volume-title":"The World Wide Web Conference. WWW 19","author":"Gupta","year":"2019"},{"key":"2026040314430017900_ref088","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-030-37188-3_8","volume-title":"International Conference on Big Data Analytics","author":"Gupta","year":"2019"},{"key":"2026040314430017900_ref089","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/2047196.2047206","volume-title":"Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology. UIST \u201911","author":"Hangal","year":"2011"},{"key":"2026040314430017900_ref090","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"Hastie","year":"2009"},{"key":"2026040314430017900_ref091","first-page":"645","volume-title":"Modern Information Retrieval, 2nd Edition","author":"Hawking","year":"2010"},{"key":"2026040314430017900_ref092","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1145\/1871437.1871594","volume-title":"Proceedings of the 19th ACM International Conference on Information and Knowledge Management. CIKM \u201910","author":"He","year":"2010"},{"key":"2026040314430017900_ref093","article-title":"\u201cExploring Enron: A Sketch of Visual Data Mining of Email\u201d","volume-title":"Email Archive Visualization Workshop, University of Maryland","author":"Heer","year":"2005"},{"key":"2026040314430017900_ref094","first-page":"937","volume-title":"Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Horovitz","year":"2017"},{"key":"2026040314430017900_ref095","first-page":"357","article-title":"\u201cContrasting the interaction structure of an email and a telephone corpus: A machine learning approach to annotation of dialogue function units\u201d","volume-title":"Proceedings of the SIGDIAL 2009 Conference","author":"Hu","year":"2009"},{"key":"2026040314430017900_ref096","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1145\/3018661.3018736","volume-title":"Proceedings of the Tenth ACM International Conference on Web Search and Data Mining","author":"Jiang","year":"2017"},{"key":"2026040314430017900_ref097","first-page":"133","volume-title":"Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Joachims","year":"2002"},{"issue":"2","key":"2026040314430017900_ref098","doi-asserted-by":"publisher","DOI":"10.1145\/1229179.1229181","article-title":"\u201cEvaluating the Accuracy of Implicit Feedback from Clicks and Query Reformulations in Web Search\u201d","volume":"25","author":"Joachims","year":"2007","journal-title":"ACM Trans. Inf. Syst."},{"key":"2026040314430017900_ref099","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1145\/3018661.3018699","volume-title":"Proceedings of the Tenth ACM International Conference on Web Search and Data Mining","author":"Joachims","year":"2017"},{"key":"2026040314430017900_ref100","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1145\/1526709.1526817","article-title":"\u201cComputers and iPhones and Mobile Phones, Oh My!: A Logs-based Comparison of Search Users on Different Devices\u201d","volume-title":"Proceedings of the 18th international conference on World wide web","author":"Kamvar","year":"2009"},{"key":"2026040314430017900_ref101","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1145\/2939672.2939801","article-title":"\u201cSmart Reply: Automated Response Suggestion for Email\u201d","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016","author":"Kannan","year":"2016"},{"key":"2026040314430017900_ref102","unstructured":"Kaushal, G.\n          . (2016).\u201cInbox by Gmail: Find Answers Even Faster\u201d.https:\/\/blog.google\/products\/gmail\/inbox-by-gmail-find-answers-even-faster\/."},{"key":"2026040314430017900_ref103","first-page":"301","volume-title":"Proceedings of the 2001 Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2001)","author":"Kiritchenko","year":"2001"},{"issue":"5","key":"2026040314430017900_ref104","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","article-title":"\u201cAuthoritative Sources in a Hyperlinked Environment\u201d","volume":"46","author":"Kleinberg","year":"1999","journal-title":"J. ACM"},{"key":"2026040314430017900_ref105","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1145\/2441776.2441922","article-title":"\u201cEmailValet: Managing Email Overload Through Private, Accountable Crowdsourcing\u201d","volume-title":"Proceedings of the 2013 conference on Computer supported cooperative work","author":"Kokkalis","year":"2013"},{"key":"2026040314430017900_ref106","article-title":"\u201cFederated Optimization: Distributed Machine Learning for On-Device Intelligence\u201d","volume-title":"arXiv:1610.02527 [cs.LG]","author":"Konecn\u00fd","year":"2016"},{"key":"2026040314430017900_ref107","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1145\/2020408.2020560","volume-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201911","author":"Koren","year":"2011"},{"issue":"1","key":"2026040314430017900_ref108","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000053","article-title":"\u201cSearching the Enterprise\u201d","volume":"11","author":"Kruschwitz","year":"2017","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"2026040314430017900_ref109","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1145\/1935826.1935862","volume-title":"Proceedings of the Fourth ACM International Conference on Web Search and Data Mining. WSDM \u201911","author":"Kulkarni","year":"2011"},{"key":"2026040314430017900_ref110","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1145\/3077136.3080660","volume-title":"Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2017)","author":"Kuzi","year":"2017"},{"key":"2026040314430017900_ref111","first-page":"767","article-title":"\u201cCascading Bandits: Learning to Rank in the Cascade Model\u201d","volume-title":"International Conference on Machine Learning","author":"Kveton","year":"2015"},{"key":"2026040314430017900_ref112","article-title":"\u201cExploiting E-mail Structure to Improve Summarization\u201d","volume-title":"PhD thesis","author":"Lam","year":"2002"},{"key":"2026040314430017900_ref113","first-page":"919","volume-title":"Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing","author":"Lampert","year":"2009"},{"key":"2026040314430017900_ref114","first-page":"984","volume-title":"Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics","author":"Lampert","year":"2010"},{"issue":"2","key":"2026040314430017900_ref115","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/382979.383041","article-title":"\u201cSALSA: The Stochastic Approach for Link-Structure Analysis\u201d","volume":"19","author":"Lempel","year":"2001","journal-title":"ACM Trans. Inf. Syst."},{"key":"2026040314430017900_ref116","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1145\/3331184.3331250","volume-title":"Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2019)","author":"Li","year":"2019"},{"key":"2026040314430017900_ref117","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.1145\/3292500.3330676","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201919","author":"Li","year":"2019"},{"key":"2026040314430017900_ref118","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPAMI.2018.2890628","article-title":"\u201cFocal Visual-Text Attention for Memex Question Answering\u201d","author":"Liang","year":"2019","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2026040314430017900_ref119","unstructured":"Liao, S.\n          . (2010).\u201cYahoo Mail is still scanning your emails for data to sell to advertisers\u201d.https:\/\/www.theverge.com\/2018\/8\/28\/17792522\/yahoo-mail-email-scan-data-advertisers-opt-out."},{"key":"2026040314430017900_ref120","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11931","article-title":"\u201cActionable Email Intent Modeling with Reparametrized RNNs\u201d","volume-title":"Thirty-Second AAAI Conference on Artificial Intelligence","author":"Lin","year":"2018"},{"issue":"1","key":"2026040314430017900_ref121","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","article-title":"\u201cAmazon.com Recommendations: Item-to-item Collaborative Filtering\u201d","volume":"7","author":"Linden","year":"2003","journal-title":"IEEE Internet Computing"},{"key":"2026040314430017900_ref122","unstructured":"Litmus Email Analytics\n            \n          . (2019).\u201cThe 2019 Email Client Market Share\u201d.https:\/\/litmus.com\/blog\/infographic-the-2019-email-client-market-share."},{"issue":"4","key":"2026040314430017900_ref123","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1023\/A:1022869011914","article-title":"\u201cLearning Quickly when Irrelevant Attributes Abound: A New Linear-threshold Algorithm\u201d","volume":"2","author":"Littlestone","year":"1988","journal-title":"Machine Learning"},{"key":"2026040314430017900_ref124","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3038912.3050916","volume-title":"Proceedings of the 26th International Conference on World Wide Web (\u2019WWW 2017)","author":"Maarek","year":"2017"},{"key":"2026040314430017900_ref125","unstructured":"McMahan, B. and D.Ramage. (2017).\u201cFederated Learning: Collaborative Machine Learning without Centralized Training Data\u201d.https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html."},{"key":"2026040314430017900_ref126","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1341531.1341540","volume-title":"Proceedings of the 2008 International Conference on Web Search and Data Mining (WSDM 2008)","author":"Mei","year":"2008"},{"key":"2026040314430017900_ref127","unstructured":"Microsoft 365\n            \n          . (2020). Manage mailbox auditing.https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/enable-mailbox-auditing."},{"key":"2026040314430017900_ref128","volume-title":"11th Annual Conference of the International Speech Communication Association (INTERSPEECH 2010)","author":"Mikolov","year":"2010"},{"key":"2026040314430017900_ref129","first-page":"443","volume-title":"Proceedings of the Conference on Human Language Technology and Empirical Methods in Natural Language Processing","author":"Minkov","year":"2005"},{"issue":"1","key":"2026040314430017900_ref130","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1500000061","article-title":"\u201cAn Introduction to Neural Information Retrieval\u201d","volume":"13","author":"Mitra","year":"2018","journal-title":"Foundations and Trends\u00ae in Information Retrieval"},{"key":"2026040314430017900_ref131","article-title":"\u201cA Dual Embedding Space Model for Document Ranking\u201d","volume-title":"arXiv:1602.01137 [cs.IR]","author":"Mitra","year":"2016"},{"key":"2026040314430017900_ref132","first-page":"70","volume-title":"Proceedings of the 2nd Workshop on Computational Approaches to Subjectivity and Sentiment Analysis. WASSA \u201911","author":"Mohammad","year":"2011"},{"key":"2026040314430017900_ref133","article-title":"\u201cSmart To-Do : Automatic Generation of To-Do List from Emails\u201d","volume-title":"Annual Conference of the Association for Computational Linguistics (ACL 2020)","author":"Mukherjee","year":"2020"},{"key":"2026040314430017900_ref134","doi-asserted-by":"crossref","first-page":"3520","DOI":"10.1007\/978-0-387-39940-9_465","article-title":"\u201cWeb Spam Detection.\u201d","volume":"1","author":"Najork","year":"2009","journal-title":"Encyclopedia of Database Systems"},{"key":"2026040314430017900_ref135","unstructured":"Najork, M.\n          . (2018). \u201cTraining On-Device Ranking Models from CrossUser Interactions in a Privacy-Preserving Fashion\u201d. In: Proceedings of the First Biennial Conference on Design of Experimental Search & Information Retrieval Systems, Bertinoro, Italy, August 28-31, 2018. 108.http:\/\/ceur-ws.org\/Vol-2167\/shortll.pdf."},{"key":"2026040314430017900_ref136","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1145\/1321440.1321465","volume-title":"Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management. CIKM \u201907","author":"Najork","year":"2007"},{"key":"2026040314430017900_ref137","unstructured":"Naragon, K.\n          . (2018).\u201cWe Still Love Email, But We\u2019re Spreading the Love with Other Channels\u201d.https:\/\/theblog.adobe.com\/love-email-but-spreading-the-love-other-channels\/."},{"key":"2026040314430017900_ref138","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/3020165.3020175","volume-title":"Proceedings of the 2017 Conference on Computer Human Information Interaction and Retrieval. CHIIR \u201917","author":"Narang","year":"2017"},{"key":"2026040314430017900_ref139","article-title":"\u201cRobust De-anonymization of Large Datasets\u201d","volume-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy, May 2008","author":"Narayanan","year":"2008"},{"key":"2026040314430017900_ref140","unstructured":"Nowak, P.\n          . (2010).\u201cPrivacy commissioner reviewing Google Buzz\u201d.https:\/\/www.cbc.ca\/news\/technology\/privacy-commissioner-reviewing-google-buzz-1.899267."},{"key":"2026040314430017900_ref141","author":"Oard","year":"2015"},{"issue":"2-3","key":"2026040314430017900_ref142","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1561\/1500000025","article-title":"\u201cInformation retrieval for e-discovery\u201d","volume":"7","author":"Oard","year":"2013","journal-title":"Foundations and Trends in Information Retrieval"},{"key":"2026040314430017900_ref143","volume-title":"Proceedings of the Fourteenth Text REtrieval Conference (TREC 2005)","author":"Ogilvie","year":"2005"},{"issue":"3","key":"2026040314430017900_ref144","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1561\/1500000017","article-title":"\u201cWeb Crawling\u201d","volume":"4","author":"Olston","year":"2010","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"2026040314430017900_ref145","first-page":"845","volume-title":"The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval","author":"Oosterhuis","year":"2018"},{"key":"2026040314430017900_ref146","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1145\/3437963.3441794","article-title":"\u201cUnifying Online and Counterfactual Learning to Rank: A Novel Counterfactual Estimator that Effectively Utilizes Online Interventions\u201d","volume-title":"Proceedings of the 14th ACM International Conference on Web Search and Data Mining","author":"Oosterhuis","year":"2021"},{"key":"2026040314430017900_ref147","first-page":"95","article-title":"\u201cSpamcop: A Spam Classification & Organization Program\u201d","volume-title":"Proceedings of AAAI-98 Workshop on Learning for Text Categorization","author":"Pantel","year":"1998"},{"key":"2026040314430017900_ref148","article-title":"\u201cStatistical Language-model Based System for Detection of Missing Attachments\u201d","author":"Perronnin","year":"2009"},{"key":"2026040314430017900_ref149","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1458082.1458092","volume-title":"Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008)","author":"Radlinski","year":"2008"},{"key":"2026040314430017900_ref150","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1145\/2911451.2911458","volume-title":"Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR 16","author":"Ramarao","year":"2016"},{"key":"2026040314430017900_ref151","first-page":"105","volume-title":"Proceedings of HLT-NAACL 2004","author":"Rambow","year":"2004"},{"key":"2026040314430017900_ref152","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-04117-4_23","volume-title":"Handbook of Information and Communication Security","author":"Ramzan","year":"2010"},{"key":"2026040314430017900_ref153","first-page":"519","article-title":"\u201cLarge Scale Distributed Semi-supervised Learning Using Streaming Approximation\u201d","volume-title":"Artificial Intelligence and Statistics","author":"Ravi","year":"2016"},{"key":"2026040314430017900_ref154","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/2959100.2959130","volume-title":"Proceedings of the 10th ACM Conference on Recommender Systems","author":"Rogers","year":"2016"},{"key":"2026040314430017900_ref155","first-page":"98","volume-title":"Proceedings of AAAI-98 Workshop on Learning for Text Categorization","author":"Sahami","year":"1998"},{"key":"2026040314430017900_ref156","article-title":"\u201cProtecting Privacy When Disclosing Information: k-anonymity and its Enforcement Through Generalization and Suppression\u201d","volume-title":"Tech. rep.","author":"Samarati","year":"1998"},{"issue":"1","key":"2026040314430017900_ref157","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000040","article-title":"\u201cSearch Result Diversification\u201d","volume":"9","author":"Santos","year":"2015","journal-title":"Foundations and Trends\u00ae in Information Retrieval"},{"key":"2026040314430017900_ref158","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1145\/3397271.3401284","article-title":"\u201cA Test Collection for Relevance and Sensitivity\u201d","volume-title":"Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Sayed","year":"2020"},{"key":"2026040314430017900_ref159","volume-title":"Introduction to Information Retrieval","author":"Sch\u00fctze","year":"2008"},{"key":"2026040314430017900_ref160","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.500-274.spam-tufts.sculley","article-title":"\u201cRelaxed Online SVMs in the TREC Spam Filtering Track.\u201d","volume-title":"Proceedings of the Sixteenth Text REtrieval Conference (TREC 2007)","author":"Sculley","year":"2007"},{"key":"2026040314430017900_ref161","first-page":"107","volume-title":"AAAI 2000 Spring Symposium on Adaptive User Interfaces","author":"Segal","year":"2000"},{"key":"2026040314430017900_ref162","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/3331184.3331189","volume-title":"Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2019)","author":"Shao","year":"2019"},{"key":"2026040314430017900_ref163","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1145\/3269206.3272019","volume-title":"Proceedings of the 27th ACM International Conference on Information and Knowledge Management","author":"Shen","year":"2018"},{"key":"2026040314430017900_ref164","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-38844-6_29","volume-title":"Proceedings of the 21st International Conference on User Modeling, Adaptation, and Personalization (UMAP 2013)","author":"Shen","year":"2013"},{"key":"2026040314430017900_ref165","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1145\/3219819.3219901","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD 2018)","author":"Sheng","year":"2018"},{"issue":"1 & 2","key":"2026040314430017900_ref166","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000013","article-title":"\u201cMining Query Logs: Turning Search Usage Data into Knowledge\u201d","volume":"4","author":"Silvestri","year":"2010","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"2026040314430017900_ref167","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1145\/3219819.3220088","volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"Singh","year":"2018"},{"key":"2026040314430017900_ref168","doi-asserted-by":"publisher","first-page":"196","DOI":"10.3115\/v1\/N15-1020","volume-title":"Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Sordoni","year":"2015"},{"issue":"2","key":"2026040314430017900_ref169","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/2207243.2207252","article-title":"\u201cSurvey on Web Spam Detection: Principles and Algorithms\u201d","volume":"13","author":"Spirin","year":"2012","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"2026040314430017900_ref170","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1109\/BigData.2018.8622048","volume-title":"2018 IEEE International Conference on Big Data (Big Data)","author":"Sun","year":"2018"},{"key":"2026040314430017900_ref171","first-page":"3104","article-title":"\u201cSequence to sequence learning with neural networks\u201d","volume":"27","author":"Sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"issue":"4","key":"2026040314430017900_ref172","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1561\/2200000013","article-title":"\u201cAn Introduction to Conditional Random Fields\u201d","volume":"4","author":"Sutton","year":"2012","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"2026040314430017900_ref173","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1145\/3126594.3126603","volume-title":"Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology. UIST \u201917","author":"Swaminathan","year":"2017"},{"key":"2026040314430017900_ref174","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1145\/1358628.1358651","article-title":"\u201cTag-It, Snag-It, or Bag-It: Combining Tags, Threads, and Folders in e-Mail\u201d","volume-title":"CHI \u201908 Extended Abstracts on Human Factors in Computing Systems","author":"Tang","year":"2008"},{"key":"2026040314430017900_ref175","volume-title":"The Future of Email Archives","author":"Task Force on Technical Approaches for Email Archives","year":"2018"},{"key":"2026040314430017900_ref176","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1145\/3097983.3098048","volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2017)","author":"Tata","year":"2017"},{"key":"2026040314430017900_ref177","article-title":"\u201cThe War Against Spam: A Report From the Front Line\u201d","volume-title":"NIPS 2007 Workshop on Machine Learning in Adversarial Environments for Computer Security","author":"Taylor","year":"2007"},{"key":"2026040314430017900_ref178","unstructured":"The Radicati Group, Inc.\n          . (2015).\u201cEmail Statistics Report 2015-2019\u201d.https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2015\/02\/Email-Statistics-Report-2015-2019-Executive-Summary.pdf."},{"key":"2026040314430017900_ref179","unstructured":"The Radicati Group, Inc.\n          . (2018).\u201cEmail Statistics Report 2018-2022\u201d.https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2018\/01\/Email_Statistics_Report,_2018-2022_Executive_Summary.pdf."},{"key":"2026040314430017900_ref180","unstructured":"The Radicati Group, Inc.\n          . (2019).\u201cEmail Statistics Report 2019-2023\u201d.https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2018\/12\/Email-Statistics-Report-2019-2023-Executive-Summary.pdf."},{"key":"2026040314430017900_ref181","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3331184.3331204","volume-title":"Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR\u201919","author":"Tran","year":"2019"},{"key":"2026040314430017900_ref182","unstructured":"Tsotsis, A.\n          . (2011).\u201cComScore Says You Don\u2019t Got Mail: Web Email Usage Declines, 59% Among Teens!\u201d.https:\/\/techcrunch.com\/2011\/02\/07\/comscore-says-you-dont-got-mail-web-email-usage-declines-59-among-teens\/."},{"issue":"6","key":"2026040314430017900_ref183","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/0306-4573(95)00020-H","article-title":"\u201cQuery evaluation: strategies and optimizations\u201d","volume":"31","author":"Turtle","year":"1995","journal-title":"Information Processing & Management"},{"key":"2026040314430017900_ref184","unstructured":"US Department of Health and Human Services\n          . (2012).\u201cGuidance regarding methods for de-identification of protected health information in accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule\u201d.https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html."},{"issue":"5","key":"2026040314430017900_ref185","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1197\/jamia.M2444","article-title":"\u201cEvaluating the state-of-the-art in automatic de-identification\u201d","volume":"14","author":"Uzuner","year":"2007","journal-title":"Journal of the American Medical Informatics Association"},{"key":"2026040314430017900_ref186","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1145\/3132847.3132979","volume-title":"Proceedings of the 2017 ACM Conference on Information and Knowledge Management (CIKM 2017)","author":"Van Gysel","year":"2017"},{"key":"2026040314430017900_ref187","first-page":"5998","article-title":"\u201cAttention is all you need\u201d","volume-title":"Advances in Neural Information Processing Systems","author":"Vaswani","year":"2017"},{"key":"2026040314430017900_ref188","first-page":"549","volume-title":"Proceedings of the 20th International Conference on Computational Linguistics","author":"Wan","year":"2004"},{"key":"2026040314430017900_ref189","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/2911451.2911537","volume-title":"Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2016)","author":"Wang","year":"2016"},{"key":"2026040314430017900_ref190","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1145\/3159652.3159732","article-title":"\u201cPosition Bias Estimation for Unbiased Learning to Rank in Personal Search\u201d","volume-title":"Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining","author":"Wang","year":"2018"},{"key":"2026040314430017900_ref191","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2835776.2835824","volume-title":"Proceedings of the 9th ACM International Conference on Web Search and Data Mining (WSDM 2016)","author":"Wang","year":"2016"},{"key":"2026040314430017900_ref192","unstructured":"Watson Marketing\n          . (2018).\u201c2018 Marketing Benchmark Report: Email and Mobile Metrics for Smarter Marketing\u201d.https:\/\/www.ibrn.com\/downloads\/cas\/L2VNQYQ0."},{"key":"2026040314430017900_ref193","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1145\/2835776.2835780","article-title":"\u201cHierarchical Label Propagation and Discovery for Machine Generated Email\u201d","volume-title":"Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22-25, 2016","author":"Wendt","year":"2016"},{"key":"2026040314430017900_ref194","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1145\/1062745.1062868","volume-title":"Special Interest Tracks and Posters of the 14th International Conference on World Wide Web. WWW \u201905","author":"Wenyin","year":"2005"},{"issue":"1-2","key":"2026040314430017900_ref195","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/07370024.2005.9667361","article-title":"\u201cSupporting Collaborative Task Management in E-mail\u201d","volume":"20","author":"Whittaker","year":"2005","journal-title":"Human-Computer Interaction"},{"issue":"1","key":"2026040314430017900_ref196","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1107458.1107494","article-title":"\u201cEmail in personal information management\u201d","volume":"49","author":"Whittaker","year":"2006","journal-title":"Communications of the ACM"},{"key":"2026040314430017900_ref197","doi-asserted-by":"publisher","first-page":"3449","DOI":"10.1145\/1978942.1979457","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011)","author":"Whittaker","year":"2011"},{"key":"2026040314430017900_ref198","first-page":"277","volume-title":"Culture of the Internet","author":"Whittaker","year":"1997"},{"key":"2026040314430017900_ref199","unstructured":"Wu, Y.\n          . (2018).\u201cSmart Compose: Using Neural Networks to Help Write Emails\u201d.https:\/\/ai.googleblog.com\/2018\/05\/smart-compose-using-neural-networks-to.html."},{"key":"2026040314430017900_ref200","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380071","volume-title":"Proceedings of the Web Conference 2020 (WWW 2020)","author":"Xu","year":"2020"},{"key":"2026040314430017900_ref201","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1145\/1772690.1772793","volume-title":"Proceedings of the 19th International Conference on World Wide Web (WWW 2010)","author":"Yue","year":"2010"},{"key":"2026040314430017900_ref202","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1145\/3038912.3052648","volume-title":"Proceedings of the 26th International Conference on World Wide Web (WWW 2017)","author":"Zamani","year":"2017"},{"key":"2026040314430017900_ref203","first-page":"495","article-title":"\u201cEmail Category Prediction\u201d","volume-title":"Companion Proc, of the 26th International World Wide Web Conference","author":"Zhang","year":"2017"},{"key":"2026040314430017900_ref204","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1145\/2911451.2914732","volume-title":"Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2016)","author":"Zhang","year":"2016"},{"key":"2026040314430017900_ref205","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1145\/2020408.2020613","volume-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011)","author":"Zhang","year":"2011"},{"key":"2026040314430017900_ref206","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1145\/3209978.3210001","volume-title":"The first International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2018)","author":"Zhao","year":"2018"},{"key":"2026040314430017900_ref207","first-page":"2653","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Zhuang","year":"2019"}],"container-title":["Foundations and Trends\u00ae in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftinr\/article-pdf\/15\/1\/1\/11098508\/1500000069en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftinr\/article-pdf\/15\/1\/1\/11098508\/1500000069en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T18:45:56Z","timestamp":1775241956000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftinr\/article\/15\/1\/1\/1330389\/Search-and-Discovery-in-Personal-Email-Collections"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":207,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,7,6]]}},"URL":"https:\/\/doi.org\/10.1561\/1500000069","relation":{},"ISSN":["1554-0669","1554-0677"],"issn-type":[{"value":"1554-0669","type":"print"},{"value":"1554-0677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,6]]}}}