Bursty and hierarchical structure in streams
J Kleinberg - Proceedings of the eighth ACM SIGKDD international …, 2002 - dl.acm.org
A fundamental problem in text data mining is to extract meaningful structure from document
streams that arrive continuously over time. E-mail and news articles are two natural …
streams that arrive continuously over time. E-mail and news articles are two natural …
[PDF][PDF] Personal information management: from information consumption to curation
S Whittaker - Annual review of information science and technology, 2011 - academia.edu
An implicit, but pervasive view in the information science community is that people are
perpetual seekers after new public information, incessantly identifying and consuming new …
perpetual seekers after new public information, incessantly identifying and consuming new …
The enron corpus: A new dataset for email classification research
B Klimt, Y Yang - European conference on machine learning, 2004 - Springer
Automated classification of email messages into user-specific folders and information
extraction from chronologically ordered email streams have become interesting areas in text …
extraction from chronologically ordered email streams have become interesting areas in text …
[BOOK][B] Personal information management
Personal information management (PIM) refers to the practice and the study of the activities
a person performs in order to acquire or create, store, organize, maintain, retrieve, use, and …
a person performs in order to acquire or create, store, organize, maintain, retrieve, use, and …
Computer system architecture for automatic context associations
SD Farnham, A Turski, DP Vronay, L Cheng… - US Patent …, 2008 - Google Patents
US7343365B2 - Computer system architecture for automatic context associations - Google
Patents US7343365B2 - Computer system architecture for automatic context associations …
Patents US7343365B2 - Computer system architecture for automatic context associations …
Adaptive interfaces and agents
A Jameson - The human-computer interaction handbook, 2007 - api.taylorfrancis.com
Introduction................................. 434Concepts.................................... 434Functions: Supporting
System Use............... 435Taking Over Parts of Routine Tasks............... 435Adapting the …
System Use............... 435Taking Over Parts of Routine Tasks............... 435Adapting the …
Machine learning for user modeling
At first blush, user modeling appears to be a prime candidate for straightforward application
of standard machine learning techniques. Observations of the user's behavior can provide …
of standard machine learning techniques. Observations of the user's behavior can provide …
Email mining: tasks, common techniques, and tools
G Tang, J Pei, WS Luk - Knowledge and Information Systems, 2014 - Springer
Email is one of the most popular forms of communication nowadays, mainly due to its
efficiency, low cost, and compatibility of diversified types of information. In order to facilitate …
efficiency, low cost, and compatibility of diversified types of information. In order to facilitate …
Taking email to task: the design and evaluation of a task management centered email tool
Email has come to play a central role in task management, yet email tool features have
remained relatively static in recent years, lagging behind users? evolving practices. The …
remained relatively static in recent years, lagging behind users? evolving practices. The …
[BOOK][B] Kee** found things found: The study and practice of personal information management
W Jones - 2010 - books.google.com
Kee** Found Things Found: The Study and Practice of Personal Information Management
is the first comprehensive book on new'favorite child'of R&D at Microsoft and elsewhere …
is the first comprehensive book on new'favorite child'of R&D at Microsoft and elsewhere …