Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
For the business communication by email with cellular phones, it has an important weak point. That is to hard to tell to be utterance speed and the pitch of sounds involved in the ...
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking...
A study of email responsiveness was conducted to understand how the timing of email responses conveys important information. Interviews and observations explored users’ perceptio...
The lack of structure in the content of email messages makes it very hard for data channelled between the sender and the recipient to be correctly interpreted and acted upon. As a...
Simon Scerri, Myriam Mencke, Brian Davis, Siegfrie...
Email archives are full of social information, including how messages are addressed and frequency of contact between senders and receivers. To study the use of this rich metadata ...
Danyel Fisher, A. J. Bernheim Brush, Bernie Hogan,...
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
As businesses become more reliance on information technology, electronic information is often produced as vital evidence during civil litigation. The process of discovering electr...
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...