摘要 |
The subject matter of this disclosure can be implemented in, among other things, a method performed by a computing device. In these examples, the method includes determining an identity of an originator of an incoming communication using an originating address of the incoming communication, and applying a first set of rules to the identity of the originator of the incoming communication to determine an importance of the incoming communication. The first set of rules includes rules generated based at least on information about the originator included in a directory of the computing device. The method may also include applying a second set of rules to the identity of the originator. The second set of rules includes rules generated based at least on previous interactions between the computing device and the originator. |