Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 23

Content of Issue 1
Functional Programming: Past, Present, and Future.
Contributions dedicated to
D. A. Turner on his 70th Birthday
R. Dueire Lins 1
Abstract Data Types without the Types.
Dedicated to David Turner on the occasion of his 70'th birthday
P. Wadler 5
A Logical Reconstruction of Batcher's Mergers
Or: Bitonicity is a Red Herring
R. Hinze, C. Martin 21
Trees that Grow S. Najd, S.P. Jones 42
Higher Inductive Types in Programming H. Basold, H. Geuvers, N. van der Weide 63
A General Method for Defining Objects by Recursion over Syntax S. Thompson 89
First-Class Functions in an Imperative World R. Ierusalimschy 112
Content of Issue 2
Managing Editor's Column C. Gütl 127
Communication in Abstract State Machines E. Börger, K.-D. Schewe 129
A Method for Privacy-preserving Collaborative Filtering Recommendations C.K. Georgiadis, N. Polatidis, H. Mouratidis, E. Pimenidis 146
Design, Implementation and Evaluation of SPOCs at the Universidad Carlos III de Madrid P.J. Muñoz-Merino, E. Méndez Rodríguez, C. Delgado Kloos, J.A. Ruipérez-Valiente 167
Does the Users' Tendency to Seek Information Affect Recommender Systems' Performance? U. Panniello, L. Ardito, A. Messeni Petruzzelli 187
A Cost-Effective Approach for Procedural Training in Virtual Worlds M. Rico, J. Ramírez, D. Riofrío-Luzcando, M. Berrocal-Lobo 208
Content of Issue 3
Analyzing Political Discourse in On-line Social Networks A. Almeida, P. Orduña 233
Generating Politician Profiles based on Content Analysis of Social Network Datasets K. Grčić, M. Bagić Babac, V. Podobnik 236
Terrorism in the 2015 Election Period in Turkey: Content Analysis of Political Leaders' Social Media Activity A. Güneyli, M. Ersoy, Ş. Kıralp 256
On Predicting Election Results using Twitter and Linked Open Data: The Case of the UK 2010 Election E. Kalampokis, A. Karamanou, E. Tambouris, K. Tarabanis 280
Electoral Preferences Prediction of the YouGov Social Network Users Based on Computational Intelligence Algorithms S. Ortiz-Ángeles, Y. Villuendas-Rey, I. López-Yáñez, O. Camacho-Nieto, C. Yáñez-Márquez 304
Framework for Affective News Analysis of Arabic News: 2014 Gaza Attacks Case Study M. Al-Ayyoub, H. Al-Sarhan, M. Al-So'ud, M. Al-Smadi, Y. Jararweh 327
Content of Issue 4
Managing Editor's Column C. Gütl 352
Twister Generator of Arbitrary Uniform Sequences A.F. Deon, Y.A. Menyaev 353
Selecting a Software Elicitation Technique According to Layers of Knowledge and Preciseness: A Case Study M.-I. Sanchez-Segura, F. Medina-Dominguez, D.-M. Vásquez-Bravo, G. Illescas, C. García de Jesús 385
Contactless Vulnerability Analysis using Google and Shodan K. Simon, C. Moucha, J. Keller 404
Content of Issue 5
Managing Editor's Column C. Gütl 431
Computational Evaluation of Effects of Motivation Reinforcement on Player Retention D. Ašeriškis, R. Damaševičius 432
Steganography in VLC Systems G. Blinowski, K. Szczypiorski 454
Solving a Large Real-world Bus Driver Scheduling Problem with a Multi-assignment based Heuristic Algorithm A.A. Constantino, C.F.X. de Mendonca Neto, S.A. de Araujo, D. Landa-Silva, R. Calvi, A.F. dos Santos 479
A Comparative Study of Objective Video Quality Assessment Metrics C.A. Mello, M.M. Saraiva, D.P. Menor, R. Nishihara 505