Filters








55,079 Hits in 3.1 sec

Expertise identification using email communications

Christopher S. Campbell, Paul P. Maglio, Alex Cozzi, Byron Dom
2003 Proceedings of the twelfth international conference on Information and knowledge management - CIKM '03  
An evaluation was done using email and explicit expertise ratings from two different organizations.  ...  Email documents seem particularly well suited to this task of "expertise location", as people routinely communicate what they know.  ...  The same logic can be applied to expertise location based on patterns of email communication.  ... 
doi:10.1145/956958.956965 fatcat:vfrjhjsqb5ejzjqsrwcguifxqe

Expertise identification using email communications

Christopher S. Campbell, Paul P. Maglio, Alex Cozzi, Byron Dom
2003 Proceedings of the twelfth international conference on Information and knowledge management - CIKM '03  
An evaluation was done using email and explicit expertise ratings from two different organizations.  ...  Email documents seem particularly well suited to this task of "expertise location", as people routinely communicate what they know.  ...  The same logic can be applied to expertise location based on patterns of email communication.  ... 
doi:10.1145/956863.956965 dblp:conf/cikm/CampbellMCD03 fatcat:6qziqaouafhq7pjoturfwpw6fm

Finding experts and their eetails in e-mail corpora

Krisztian Balog, Maarten de Rijke
2006 Proceedings of the 15th international conference on World Wide Web - WWW '06  
Evaluation is done using the e-mail lists in the W3C corpus.  ...  We present methods for finding experts (and their contact details) using e-mail messages. We locate messages on a topic, and then find the associated experts.  ...  CONCLUSIONS AND FURTHER WORK We have presented methods for expertise identification using e-mail communications.  ... 
doi:10.1145/1135777.1136002 dblp:conf/www/BalogR06 fatcat:irqupg2sordbxday66ylicvcui

The design and evaluation of EKE, a semi-automated email knowledge extraction tool

Sara Tedmori, Thomas W Jackson
2012 Knowledge Management Research & Practice  
The use of the well established communication medium, email, was seen by the groups as a flexible source of knowledge areas.  ...  It identifies important ideas and communication networks from corporate email by analysing parameters including the flow, subject matter, frequency and context of the email communication.  ... 
doi:10.1057/kmrp.2011.40 fatcat:2wbvf4mpm5hzlfyrmq3zofseuy

Extracting Semantic User Networks from Informal Communication Exchanges [chapter]

Anna Lisa Gentile, Vitaveska Lanfranchi, Suvodeep Mazumdar, Fabio Ciravegna
2011 Lecture Notes in Computer Science  
Specifically we claim it is possible to automatically model people's expertise by monitoring informal communication exchanges (email) and semantically annotating their content to derive dynamic user profiles  ...  We validate the approach using contents from a research group internal mailing list, using email exchanges within the group collected over a ten months period.  ...  Email content, and addressee and recipient, often provide clues about the interests and expertise of participants [5] and they are used as a source for automatic expertise identification and knowledge  ... 
doi:10.1007/978-3-642-25073-6_14 fatcat:s3vpc4hrt5bvxb2noif4jzpc3y

Email between private use and organizational purpose

Uwe V. Riss
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
They are not only used for personal communication but also for the management of information and the coordination of activities within organizations.  ...  Since these two features are essential success factors for the use of email they cannot be simply ignored.  ...  Consequently, both aspects expertise and network identification are analyze in combination [21] .  ... 
doi:10.1145/2187980.2188209 dblp:conf/www/Riss12 fatcat:k5ehbomlgzgpjpze4oupgv67gq

Roles in social networks: Methodologies and research issues

Mathilde Forestier, Anna Stavrianou, Julien Velcin, Djamel A. Zighed
2012 Web Intelligence and Agent Systems  
In this article, a survey of the state-of-the-art approaches is presented regarding the identification of roles within the context of a social network.  ...  Techniques for the identification of expertise inside forums are proposed in [76] .  ...  For example, in [76] the identification of the expertise level per actor leads in a ranking of experts.  ... 
doi:10.3233/wia-2012-0236 fatcat:wb5uwcz2rfdo3lytd3bhc2cs6q

The Boundaries of Natural Language Processing Techniques in Extracting Knowledge from Emails

Thomas W. Jackson, Sara Tedmori, Chris J. Hinde, Anoud I. Bani-Hani
2012 Journal of Emerging Technologies in Web Intelligence  
The aim of this research is to determine if natural language processing techniques can be used to fully automate the extraction of knowledge from emails.  ...  the system built by the authors and shows that although the f-measure results are world leading, there is still a requirement for user intervention to enable the system to be accurate enough to be of use  ...  In spite of the advancements in computing and communications technology, this tendency still holds; people remain the most valued and used source for knowledge [6] , [7] .  ... 
doi:10.4304/jetwi.4.2.119-127 fatcat:eorppeno3rat3nrtmy6moqdw2a

Emailing System with Elevated Safeguard Procedures

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
There is surely not enough a scheme by which person would in all probability get authenticate, in view that now no manipulate is had with the aid of us on the communications arriving at our mailbox.  ...  Email, e mail, or e mail, is considered probably the most normally employed solution on the net.  ...  The email components are encrypted through using uneven key cryptography algorithm in this web utility.  ... 
doi:10.35940/ijitee.i3124.0789s319 fatcat:y5wugtd76bgq3hrj7z3qybpr3m

Idiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics

Chad Steel
2014 Journal of Digital Forensics, Security and Law  
This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ongoing investigation.  ...  IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting  ...  The primary method for digitally exploiting social networks for expertise is through the subject's online communications.  ... 
doi:10.15394/jdfsl.2014.1160 fatcat:4bcmyer3trcipo4ovjpmkmzosa

Contributive Social Capital Extraction From Different Types of Online Data Sources [article]

Sebastian Schams, Georg Groh
2019 arXiv   pre-print
., Facebook), direct communication (e.g., email), scientometrics, and threaded discussion boards (e.g., Reddit).  ...  It is a recurring problem of online communication that the properties of unknown people are hard to assess.  ...  The determined rank can be used as input for CSC analysis. Expert identification in communities.  ... 
arXiv:1902.07636v1 fatcat:n34kktfxrvarfkfzx34z2ywfdm

Small Business Conformity with Quality Website Design Criteria in a Marketing Communication Context

Martine Robinson Beachboard
2017 Informing Science  
Their credibility is at risk if their websites do not excel in marketing message and use of medium.  ...  Future Research: Explore online communications of specialized populations such as digital marketing experts.  ...  IDENTIFICATION AND EXPERTISE INDICATORS About Us/History/Mission Statement. The purpose of the site is clear within a few seconds (Cumbrowski, 2016) .  ... 
doi:10.28945/3852 fatcat:uvvjmsxdwjdczimal4ulmv7nei

Communication across Boundaries: Work, Structure, and Use of Communication Technologies in a Large Organization

Pamela Hinds, Sara Kiesler
1995 Organization science (Providence, R.I.)  
These interactions generate a lot of data about personal communications which when combined with search engine results can be used for extraction of social networks in more efficient ways.  ...  to instant communication needs.  ...  b) E-mail Communications: Email is a valuable and pervasive mean of communication in the information society, is one of the primary ways that people use to communicate and access their widespread social  ... 
doi:10.1287/orsc.6.4.373 fatcat:rvavwonmkve7bazr344thg6bcu

The Role of Standards in Airborne Data

Joseph F. Koch, Siri Jodha S. Khalsa
2022 Zenodo  
NASA ESDIS Standards Coordination Office (ESCO) Community Standards Process Inside the Process How to Get Involved • Email us at esco-staff@lists.nasa.gov • Join us at ESIP or ESDSWG meetings (virtually  ...  Tell us what your areas of interest/expertise are. • Use what is already on the list of approved documents • Organized within ESDIS and managed by ESDIS, with contractor support. ○ The ESCO team includes  ... 
doi:10.5281/zenodo.6387595 fatcat:depjq6qu6jd6vmfxluitul7dly

EER: Enterprise Expert Ranking using Employee Reputation [article]

Saba Mahmood, Anwar Ghani, Ali Daud, Syed Muhammad Saqlain
2020 arXiv   pre-print
The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain.  ...  The existing reputation based approaches towards expertise ranking in enterprises utilize PageRank, normal distribution, and hidden Markov model for expertise ranking.  ...  Divya et alDivya, Kumar, Saijanani and Priyadharshini (2017)Kareem, Asker and Papapetrou (2017) utilized email communications of an organization to find experts using link structures.  ... 
arXiv:2004.14439v1 fatcat:ms7kvk5qt5g3nn3wmjvbjob3nq
« Previous Showing results 1 — 15 out of 55,079 results