Tree

Navigation ...

lh_home.png
lh_personal.png

Scientific Writing ...

lh_AA.png
lh_AC.png
lh_BE.png
lh_CS.png
lh_DA.png
lh_ED.png
lh_GP.png
lh_LW.png
lh_MA.png
lh_ME.png
lh_PR.png
lh_SA.png
lh_SF.png

Other Writing ...

lh_AR.png
lh_ES.png
lh_MU.png
lh_SP.png

The title field is colour coded. Books are coded in red and chapters are colour coded in orange. Everything else is simply black.


2011 - 2015

This is a collection of all my recent scientific work, all categories mixed together. Editorials are excluded however.

Author(s) Year Title Reference Category More details

Les Hatton , Greg Warr

2015b

Reproducibility package for pone_0125663.html

WEBDApone_0125663_reproducibility.html

Les Hatton , Greg Warr

2015a

Protein structure and Evolution: Are they Constrained Globally by a Principle Derived from Information Theory ?

PLOS ONE 10.1371/journal.pone.0125663CSpone_0125663.html

Les Hatton

2014d4

Dataset used in Hurricane Frequency and Intensity analysis -2013

WEBDAData_Hurricanes_1946-2013.hmtl

Les Hatton

2014d3

1977-2013 Worldwide Hurricane Activity

WEBMEHurricaneActivity1977-2013.html

Les Hatton

2014d2

Reproducibility deliverables for TSE-2013-08-0271

WEBDAData_TSE-2013-08-0271_V1.0a.html

Les Hatton

2014d1

Conservation of Information: Software's Hidden Clockwork ?

IEEE Transactions on Software Engineering, April 2014CSTSE-2013-08-0271_V1.0a.html

Michiel van Genuchten , Les Hatton

2013d1

Metrics with Impact

IEEE Software 30(4): 99-101 (2013)CSMetricsWithImpact.html

Anne-Fran?oise Rutkowski , Carol Stoak Saunders, Les Hatton

2013c1

The Generational Impact of Software

IEEE Software 30(3): 87-89 (2013)CSGenerationalImpact.html

Les Hatton

2013a1

E-mail Forensics: Eliminating Spam, Scams and Phishing

Presented at IET, London, Jan 2013PRIET-25-01-2013_EmailForensics.html

Les Hatton

2012l2

Software?s Hidden Clockwork: Power-laws, defects and the conservation of information in token-based systems

National University of Singapore, Dec 2012PRNUS_23-11-2012.html

Les Hatton

2012i2

Power-laws and the Conservation of Information in discrete token systems: Part 2 The role of defect.

WEBCSarxiv_sep2012_part2.html

Les Hatton

2012g1

Power-Laws and the Conservation of Information in discrete token systems: Part 1 General Theory

WEBCSarxiv_jul2012_hatton.html

Les Hatton

2012f3

Software?s Hidden Clockwork: a general theory of software defects

IEEE SES2012, London, June 2012PRSES-26-06-2012.html

Les Hatton

2012f2

Equilibriation of information in software systems

CiE 2012, CambridgePRCiE-17-06-2012.html

Cameron Neylon , Jan Aerts, C. Brown, Simon J. Coles, Les Hatton, Daniel Lemire, K. Millman, Peter Murray-Rust, Fernando Perez, Neil F. W. Saun

2012f1

Changing computational research. The challenges ahead.

Source Code for Biology and Medicine 7: 2 (2012)CSSourceBiology_2012.html

Michiel Genuchten , Les Hatton

2012d4

Compound Annual Growth Rate for Software

IEEE Software 29(4): 19-21 (2012)CSCAGR_2012.html

Les Hatton

2012c3

Software Defects are almost certainly inevitable

iMechE, 29 March 2012, Software Reliability ConferencePRiMechE_29-05-2012.html

Les Hatton

2012c2

Computing the Distance of a Hammer Throw

WEBMALH_HammerDistance.html

Les Hatton Adrian Gordani

2012c1

How can Computational Science Surpass the Software Error Plateau

WEBCSCERN_Grid_21-02-2012.html

Les Hatton

2012b2

E-mail forensics: eliminating spam, scams and phishing

WEBPRSurrey-08-02-2012_EmailForensics.html

Darrel Ince Les Hatton, John Graham-Cumming

2012b1

The case for open computer programs

doi:10.1038/nature10836CSNature_nearfinal.html

Les Hatton , Michiel van Genuchten

2012a2

Early Design Decisions

IEEE Software 29(1): 87-89 (2012)CSEarlyDesignDecisions.html

Les Hatton

2012a1

Some notes on development testing

WEBCSlh_devtest_Jan2011.html

Les Hatton

2011l1

Defects, Scientific Computation and the Scientific Method

Invited talk at CERN, 14-12-2011PRCERN-14-12-2011_SDSCSM.html

Les Hatton

2011j4

Email Forensics: Eliminating Spam, Scam and Phishing

ISBN 978-1-908422-00-2CSemailforensics.html

Les Hatton

2011j3

High-Integrity Software, Computation and the Scientific Method

Presented at ICAPELPCS 2011, GrenoblePRICALEPCS-14-10-2011_HighIntegrity.html

Les Hatton

2011j2

High-Integrity Software, Computation and the Scientific Method

ICALEPSCS 2011 conference proceedingsCSHatton_ICALEPCS2011.html

Les Hatton

2011j1

Defects, Scientific Computation and the Scientific Method

IFIP Advances in Information and Communications Technology, vol CSHatton_IFIP2011_19Oct2011.html

Les Hatton

2011h3

Specfications: Sometimes, Safety-Critical Systems Can't be Specified

Royal Surrey Hospital, August 2011PRRSH-and-specs-17-08-2011.html

Les Hatton

2011h1

Scientific Computation and the Scientific Method: a tentative road map for convergence

IFIP Working Group, NIST, Boulder Colorado, Aug 2011PRIFIP-02-08-2011_Uncertainty.html

Les Hatton

2011f1

A linear interpolant model for the pre-dinner speech

WEBPRAdaCore_2011_predinner.html

Michiel van Genuchten Les Hatton

2011e1

Software Mileage

IEEE Software 28(5): 24-26 (2011)CSSoftwareMileage.html

Les Hatton

2011d2

Mail filter performance

Regular web updateCSmail_filters.html

Les Hatton

2011d1

On the evolution of unnatural language

LNCS vol 6652CSUnnaturalLanguage_06-2011.html

Les Hatton , John Graham-Cumming, Darrel Ince

2011c4

A Case for Open Programs

Accepted for publicationCSNatureVersion_20-10-2011.html

Les Hatton

2011c2

Dataset used in Hurricane Frequency and Intensity analysis

WEBDAData_Hurricanes_1946-2010.html

Les Hatton

2011c1

1946-2010: Worldwide Hurricane Activity

WEBMEHurricaneActivity1946-2010.html

Les Hatton

2011b1

A personal reflection on software engineering 1990-2010

Invited paper SCSC 20th anniversary.CSscsc_may2011.html

Summary: number of books 1, number of invited chapters 0, number of other articles 37


Auto-generated: $Revision: 1.57 $, $Date: 2015/05/14 12:04:41 $, Copyright Les Hatton 2001-