/ WSEAS TRANSACTIONS
on INFORMATION SCIENCE & APPLICATIONS

Issue 3, Volume 3, March2006

ISSN 1709-0832
Forward Guided Search Symbpolic Model Checking for Statecharts / 479
Junyan Qian , Baowen Xu
Spider Algorithm for Clustering Multivariate Time Series / 485
Shohei Kameda , Masayuki Yamamura
An Enhanced Tele-Working Platform Supporting Public Administrational Bureaus / 493
Sotiriadis, P., Economou,G., Dimopoulos, K.G, Lymperopoulos, D.K.
Comparison of Cluster Validation Methods / 502
Csaba Legany, Sandor Juhasz , Attila Babos
Building Data Warehouse :Design and Case Analysis / 510
Carlo Dell’Aquilla, Ezio Lefons, Filippo Tangorra
A Fitness Function for Computer-Generated Music using Genetic Algorithms / 518
Manuel Alfonceca, Manuel Cebrian, Alfonso Ortega
AN Open Distance Learning e-system to support SMES e-enteprising / 526
A.S.Drigas , L.G.Koukainakis
A virtual lab for Hellenic cultural heritage / 532
A.S.Drigas , L.G.Koukainakis
Pose Estimation for Variable Configuration Objects:an Evolutionary Approach to Vision-based Navigation and Inspection / 538
Claudio Rossi, Mohamed Abderrahim
Building Ontologies for Conceptual Model Management / 546
Kazuhisa Seta, Kazuya Koyama, Yusuke Hayashi, Mitsuku Ikeda
Stereo Vision-based Pedestrian Recognition for ITS Applications / 554
I. Parra, D.Fernandez, M.A. Sotelo, P. Revenga, I. M. Bergasa, M. Ocana, J. Nuevo , R. Flores
A new Approach to Tunning Heuristic Parameters of Genetic Algorithms / 562
Martin Holera
AClass: Classification Algorithm Based Association Rule Mining / 570
B.Tunc, H.Dag
A Framework of Business Recovery from Large Legacy Systems / 576
Xinyu Wang, Jianlig Sun, Xiaohu Yang, Zhijun He
The Weakness of Efficient Nonce –Based Remote User Authentication Scheme Using Smart Cards / 584
Wen-Gong Shieh
Neural network analysis of the effect of Mount Pinatubo eruption on the Southern Hemisphere High Latitude ozone / 588
M.Parodi, A.Ceccatto, D.Piacentini
595
Using Arabic Scripts in Internationalized Domain Names
Abdulaziz H AL-Zoman
An RBAC-Based Model to Prevent Information Leakage in C Applications / 602
Shih-Chien Chou
Visual based Control System for a Tentacle Manipulator / 610
Mircea Ivanescu, Dorian Cojocaru, Nirvana Popescu , Tudor Tanashie
Rough Fuzzy Approach for web Usage mining / 618
Surat Spinou. Naomie Salim, Witcha Champhlee, Siniporn Champhlee
Different Clustering Possibilities Used in Web Usage Mining / 622
Renata Ivancsy, Ferenc Kovacs
Code Design as an Optimization Problem: from Mixed Integer Programming to a High Performance Randomized Algorithm and from this one to an Improved Genetic Algorithm / 629
Jose Barahova Da Fonseca
Condext Independent Classification of Person Names / 636
Raju Balakrishanm
Project Knowledge Management / 644
Nahid Hashemian Bojnord, Abbas Afrazeh
Implementation of Frequent Sub Graph Discovery / 651
MRS. Reshmy, S. K. Srivatsa, Ramakrishna
Methods and Techniques in Handwritten Form Recognition / 656
Jae Adams, Trenton Pack, E. A .Yfantis, Dean Curtis
A Payment System for E-commerce based on Mobile phones and SMS / 662
Haikel S.Hichri, Basma Marhoon, Mohamed Alrubaiy, Amirhosein
Feature Extraction Methods for Form Recognition Applications / 666
Jae Adams, E,A Yfantis, Curtis, Trenton Pack
Classification and Clustering of Handwritten Numeral Characters using Modular Genelar Fuzzy Hypersphere Neural Network / 672
Pradeep M. Patil, S. N. Kulkarni, D.D. Doye, Uday V. Kulkarni, T. R. Sontakke