Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,179,893 papers from all fields of science
Search
Sign In
Create Free Account
Inbox by Gmail
Known as:
Google Inbox
Inbox by Gmail is an email app by Google for Android, iOS, as well as the browsers Chrome, Firefox, and Safari. The app is focused on improving email…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Android
CNET
Firefox
Gmail
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
What I learned on Change Islands: reflections on IT and pace of life
Phoebe Sengers
INTR
2011
Corpus ID: 11302811
Although I take advantage of these opportunities, I am not convinced this is a good thing. Though computers are attuned to it…
Expand
Highly Cited
2010
Highly Cited
2010
The Learning Behind Gmail Priority Inbox
Douglas Aberdeen
,
Ondrey Pacovsky
,
Andrew Slater
2010
Corpus ID: 59593475
Review
2010
Review
2010
Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing
Mostafa Raad
,
Norizan Mohd Yeassen
,
G. M. Alam
,
B. Zaidan
,
A. A. Zaidan
2010
Corpus ID: 885969
Several companies suffered from considering their e-mail advertisements as a spam. While others advertising those companies by…
Expand
2010
2010
An In-depth Analysis of Spam and Spammers
D. Nagamalai
,
B. Dhinakaran
,
Jae-Kwang Lee
arXiv.org
2010
Corpus ID: 18924556
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this…
Expand
Review
2009
Review
2009
Who ’ s Afraid of Peer Review ?
Jude Samulski
2009
Corpus ID: 53660150
60 IL L U S T R A T IO N : D A V ID P L U N K E R T On 4 July, good news arrived in the inbox of Ocorrafoo Cobange, a biologist…
Expand
Highly Cited
2009
Highly Cited
2009
Misleading Learners: Co-opting Your Spam Filter
B. Nelson
,
M. Barreno
,
+6 authors
Kai Xia
2009
Corpus ID: 62246815
Using statistical machine learning for making security decisions intro- duces new vulnerabilities in large scale systems. We show…
Expand
Highly Cited
2006
Highly Cited
2006
Inferring Trust Relationships in Web-Based Social Networks
J. Golbeck
,
J. Hendler
2006
Corpus ID: 14114214
The growth of web-based social networking and the properties of those networks have created great potential for producing…
Expand
Highly Cited
2006
Highly Cited
2006
Email in personal information management
S. Whittaker
,
V. Bellotti
,
J. Gwizdka
CACM
2006
Corpus ID: 14361855
Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management…
Expand
Review
2005
Review
2005
Understanding email use: predicting action on a message
Laura A. Dabbish
,
R. Kraut
,
Susan R. Fussell
,
S. Kiesler
International Conference on Human Factors in…
2005
Corpus ID: 3931863
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why…
Expand
Highly Cited
2004
Highly Cited
2004
Blog Assisted Language Learning (BALL): Push button publishing for the pupils
J. Ward
2004
Corpus ID: 60311829
This paper examines the definitions of ‘weblog’, explains the weblog’s history and discusses how weblogs develop writing, reading…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE