skip to main content
article
Free Access

Envoys in electronic mail systems

Published:01 December 1986Publication History
Skip Abstract Section

Abstract

Envoys are electronic mail messages that make requests at remote electronic mailers. Envoys differ from conventional messages in that they might be routed to recipients that have not been specified, their requests can often be carried out with no human intervention, they can be modified as they move from mailer to mailer, and they return to the original sender to inform her what actions have been taken. An electronic mailer that supports envoys needs reasoning systems to determine the recipients of the envoy and handle the requests.

References

  1. 1 COMER, D.E., AND PETERSON, L.L. Conversation based mail. Technical Report CSD-TR-465, Computer Science Department, Purdue University, 1984.Google ScholarGoogle Scholar
  2. 2 FLORES, C.F. Management and communication in the office of the future. Undated.Google ScholarGoogle Scholar
  3. 3 GOLD, E., ETC: an AI based electronic mailer. Tektronix Laboratories Technical Report No. CR~85-25. Tektronix, Inc., 1985.Google ScholarGoogle Scholar
  4. 4 HOGG, J., MAZER, M., GANVROULAS, S. AND TSI- CHRITZIS, D. Imail - an intelligent mail system, iEEE Database Engineering 6, 3 (Sept.,1983).Google ScholarGoogle Scholar
  5. 5 NILSSON, N.J. Principles of Artificial lntellegence. Tioga Publishing Company, Palo Alto, California, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 PHILLIPS B., STALEY, J. AND GOLD, E. Artificial intelligence in project support. Tektronix Laboratories Technical Report No. CR-85--20. Tektronix, Inc., 1985.Google ScholarGoogle Scholar
  7. 7 RICH, E. Artificial Intelligence. McGraw-Hill, Inc., 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 WIHOGRAD, T., Computer software for working with language. Scientific American, 1984.Google ScholarGoogle Scholar

Index Terms

  1. Envoys in electronic mail systems

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGOIS Bulletin
                ACM SIGOIS Bulletin  Volume 7, Issue 2-3
                Summer-Fall 1986
                117 pages
                ISSN:0894-0819
                DOI:10.1145/15847
                Issue’s Table of Contents
                • cover image ACM Conferences
                  COCS '86: Proceedings of the third ACM-SIGOIS conference on Office information systems
                  December 1986
                  122 pages
                  ISBN:0897912101
                  DOI:10.1145/15433

                Copyright © 1986 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 December 1986

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader