We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Web search engines present search results in a rank ordered list. This works when what a user wants is near the top, but sometimes the information that the user really wants is lo...
Web services have been proposed as means to provide more convenient access to computation services. An issue that still must be dealt with is what to do if there is no web service...
The Internet is going through several major changes. It has become a vehicle of Web services rather than just a repository of information. Many organizations are putting their cor...
In this paper, we seek to contribute to the Ubiquitous Computing agenda by focusing on one of its earliest, but most difficult, design ambitions ? making technology "invisibl...
Peter Tolmie, James Pycock, Tim Diggins, Allan Mac...