© 2011

Modeling Intention in Email

Speech Acts, Information Leaks and Recommendation Models


Part of the Studies in Computational Intelligence book series (SCI, volume 349)

Table of contents

  1. Front Matter
  2. Vitor R. Carvalho
    Pages 1-4
  3. Vitor R. Carvalho
    Pages 5-34
  4. Vitor R. Carvalho
    Pages 35-51
  5. Vitor R. Carvalho
    Pages 53-68
  6. Vitor R. Carvalho
    Pages 69-89
  7. Vitor R. Carvalho
    Pages 91-92
  8. Back Matter

About this book


Everyday more than half of American adult internet users read or write email messages at least once. The prevalence of email has significantly impacted the working world, functioning as a great asset on many levels, yet at times, a costly liability. In an effort to improve various aspects of work-related communication, this work applies sophisticated machine learning techniques to a large body of email data. Several effective models are proposed that can aid with the prioritization of incoming messages, help with coordination of shared tasks, improve tracking of deadlines, and prevent disastrous information leaks. Carvalho presents many data-driven techniques that can positively impact work-related email communication and offers robust models that may be successfully applied to future machine learning tasks.


Computational Intelligence Email Modeling Intenion

Authors and affiliations

  1. 1.RedmondUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences


From the reviews:

“The targeted audience consists mainly of computer scientists, either researchers in machine learning or professionals who use email services in their work. The book would also be useful in education, especially to generate assignments for advanced students. Readers should have a machine learning background, but in general this monograph is easily readable. It provides a brief but comprehensive introduction to the peculiarities of email problems and the appropriate methods for addressing them. The updated bibliography and related work sections are useful for further study.” (Lefteris Angelis, ACM Computing Reviews, June, 2012)