Tree

Navigation ...

lh_home.png
lh_personal.png

Scientific Writing ...

lh_AA.png
lh_AC.png
lh_BE.png
lh_CS.png
lh_DA.png
lh_ED.png
lh_GP.png
lh_LW.png
lh_MA.png
lh_ME.png
lh_PR.png
lh_SA.png
lh_SF.png

Other Writing ...

lh_AR.png
lh_ES.png
lh_MU.png
lh_SP.png

The title field is colour coded. Books are coded in red and chapters are colour coded in orange. Everything else is simply black.


2009 - 2013

This is a collection of all my recent scientific work, all categories mixed together. Editorials are excluded however.

Author(s) Year Title Reference Category More details

Michiel van Genuchten , Les Hatton

2013d1

Metrics with Impact

IEEE Software 30(4): 99-101 (2013)CSMetricsWithImpact.html

Anne-Fran?oise Rutkowski , Carol Stoak Saunders, Les Hatton

2013c1

The Generational Impact of Software

IEEE Software 30(3): 87-89 (2013)CSGenerationalImpact.html

Les Hatton

2013a1

E-mail Forensics: Eliminating Spam, Scams and Phishing

Presented at IET, London, Jan 2013PRIET-25-01-2013_EmailForensics.html

Les Hatton

2012l2

Software?s Hidden Clockwork: Power-laws, defects and the conservation of information in token-based systems

National University of Singapore, Dec 2012PRNUS_23-11-2012.html

Les Hatton

2012i2

Power-laws and the Conservation of Information in discrete token systems: Part 2 The role of defect.

WEBCSarxiv_sep2012_part2.html

Les Hatton

2012g1

Power-Laws and the Conservation of Information in discrete token systems: Part 1 General Theory

WEBCSarxiv_jul2012_hatton.html

Les Hatton

2012f3

Software?s Hidden Clockwork: a general theory of software defects

IEEE SES2012, London, June 2012PRSES-26-06-2012.html

Les Hatton

2012f2

Equilibriation of information in software systems

CiE 2012, CambridgePRCiE-17-06-2012.html

Cameron Neylon , Jan Aerts, C. Brown, Simon J. Coles, Les Hatton, Daniel Lemire, K. Millman, Peter Murray-Rust, Fernando Perez, Neil F. W. Saun

2012f1

Changing computational research. The challenges ahead.

Source Code for Biology and Medicine 7: 2 (2012)CSSourceBiology_2012.html

Michiel Genuchten , Les Hatton

2012d4

Compound Annual Growth Rate for Software

IEEE Software 29(4): 19-21 (2012)CSCAGR_2012.html

Les Hatton

2012c3

Software Defects are almost certainly inevitable

iMechE, 29 March 2012, Software Reliability ConferencePRiMechE_29-05-2012.html

Les Hatton

2012c2

Computing the Distance of a Hammer Throw

WEBMALH_HammerDistance.html

Les Hatton Adrian Gordani

2012c1

How can Computational Science Surpass the Software Error Plateau

WEBCSCERN_Grid_21-02-2012.html

Les Hatton

2012b2

E-mail forensics: eliminating spam, scams and phishing

WEBPRSurrey-08-02-2012_EmailForensics.html

Darrel Ince Les Hatton, John Graham-Cumming

2012b1

The case for open computer programs

doi:10.1038/nature10836CSNature_nearfinal.html

Les Hatton , Michiel van Genuchten

2012a2

Early Design Decisions

IEEE Software 29(1): 87-89 (2012)CSEarlyDesignDecisions.html

Les Hatton

2012a1

Some notes on development testing

WEBCSlh_devtest_Jan2011.html

Les Hatton

2011l1

Defects, Scientific Computation and the Scientific Method

Invited talk at CERN, 14-12-2011PRCERN-14-12-2011_SDSCSM.html

Les Hatton

2011j4

Email Forensics: Eliminating Spam, Scam and Phishing

ISBN 978-1-908422-00-2CSemailforensics.html

Les Hatton

2011j3

High-Integrity Software, Computation and the Scientific Method

Presented at ICAPELPCS 2011, GrenoblePRICALEPCS-14-10-2011_HighIntegrity.html

Les Hatton

2011j2

High-Integrity Software, Computation and the Scientific Method

ICALEPSCS 2011 conference proceedingsCSHatton_ICALEPCS2011.html

Les Hatton

2011j1

Defects, Scientific Computation and the Scientific Method

IFIP Advances in Information and Communications Technology, vol CSHatton_IFIP2011_19Oct2011.html

Les Hatton

2011h3

Specfications: Sometimes, Safety-Critical Systems Can't be Specified

Royal Surrey Hospital, August 2011PRRSH-and-specs-17-08-2011.html

Les Hatton

2011h1

Scientific Computation and the Scientific Method: a tentative road map for convergence

IFIP Working Group, NIST, Boulder Colorado, Aug 2011PRIFIP-02-08-2011_Uncertainty.html

Les Hatton

2011f1

A linear interpolant model for the pre-dinner speech

WEBPRAdaCore_2011_predinner.html

Michiel van Genuchten Les Hatton

2011e1

Software Mileage

IEEE Software 28(5): 24-26 (2011)CSSoftwareMileage.html

Les Hatton

2011d2

Mail filter performance

Regular web updateCSmail_filters.html

Les Hatton

2011d1

On the evolution of unnatural language

LNCS vol 6652CSUnnaturalLanguage_06-2011.html

Les Hatton , John Graham-Cumming, Darrel Ince

2011c4

A Case for Open Programs

Accepted for publicationCSNatureVersion_20-10-2011.html

Les Hatton

2011c2

Dataset used in Hurricane Frequency and Intensity analysis

WEBDAData_Hurricanes_1946-2010.html

Les Hatton

2011c1

1946-2010: Worldwide Hurricane Activity

WEBMEHurricaneActivity1946-2010.html

Les Hatton

2011b1

A personal reflection on software engineering 1990-2010

Invited paper SCSC 20th anniversary.CSscsc_may2011.html

Les Hatton

2010k1

The characteristic shape of software

Invited talk to Lysator, University of Linkoping, 16-11-2010PRLysator-16-11-2010_PowerLaw.html

Les Hatton

2010j2

FOSS systems: Why do we not use them more ?

Plenary at BCS OSSG health informatics conference 27-10-2010PRFOSS_2010.html

Les Hatton

2010j1

C v C++ in embedded control systems

Plenary at MISRA C Day, Stuttgart, Germany, 29th Sept 2010PRCvC++_LH_04-10-2010.html

Les Hatton

2010i1

Symmetric ciphers without prior key agreement

Research seminarACWHopf_08-09-2010.html

Les Hatton

2010h2

Trebuchets, warbows and optimising javelin flight

Talk given to IET, Savoy place, London, August 2010.PRIET_Aug2010.html

Les Hatton

2010g1

Dataset used in assessing how well engineers predict maintenance tasks

WEBDAData_Maintenance_19-07-2010.html

Les Hatton

2010f2

Computer says ... adventures of an analog person in a digital world

WEBCSComputer-says_June2010.html

Les Hatton

2010c3

e-mail forensics

WEBACKingston-26-03-2010_EmailForensics.html

Les Hatton

2010c2

Kile, Latex and tensor mathematics

WEBCSKileAndTensorMaths.html

Les Hatton

2010c1

Power-laws, persistence and the distribution of information in software systems

WEBPRKingston-04-03-2010.html

Les Hatton

2010b2

Bureaucracy, safety and software: a potentially lethal cocktail

WEBPRSSS10_Feb2010.html

Michiel van Genuchten Les Hatton

2010a4

Software: Whats in it and whats it in ?

IEEE Software, 27 (1), pp. 14-16CSIEEE_Software_0210.html

Les Hatton

2010a2

1999-2009: Has the intensity and frequency of hurricanes increased ?

Probably unpublishable in the light of the CRU leaksMEHurricanes_2010.html

Les Hatton

2010a1

Power-laws, persistence and the distribution of information in software systems

Submitted for publicationCSvariations_2010.html

Les Hatton

2009l1

Open source data handling: an introduction to Scilab

Lecture to MSc engineersACKingston_Scilab1_01-10-2009.html

Les Hatton

2009k

An efficient cryptographic scheme based on asymmetric diffusion and the discrete Wiener-Hopf equations

Submitted for publicationMAWienerHopf.html

Les Hatton

2009i

Modulated power-law behaviour in Stirling's approximation

WEBMAstirling_0809.html

Les Hatton

2009h

Bureaucracy, Safety and Software: a potentially lethal cocktail

"Making Systems Safer", Springer ISBN 978-1-84996-085-4CSbureaucracy_0909.html

Les Hatton

2009g

Functionality, power-laws and defect evolution in software systems

WEBCSvariations_0509.html

Les Hatton

2009f

Unifying power-law behaviour, functionality and defect distribution in general software systems

Kingston University Research SeminarACKingston-29-04-2009_Statmech.html

Les Hatton

2009d

How to build successful complex software systems

WEBCSComplexSystems_03_2009.html

Les Hatton

2009c3

Software to convert ascii format files to .wav files in ISO C.

WEBSFascii_to_wav_format_in_C.html

Les Hatton

2009c2

.wav files of airgun arrays and depth transponders scaled for humans and odontoceti

WEBGPEARS_airgun-depthpulses_2009.html

Les Hatton

2009c1

Airgun array and depth transponder signatures as they might be heard by odontoceti

WEBGPhow-odontoceti-hear-airguns-and-depth-transponders.html

Michiel van Genuchten , Les Hatton

2009b

Point / counterpoint: embedded systems are the same as conventional systems

IEEE Software 26(3): 66-69 (2009)CSPCP_IEEESoftware2009.html

Les Hatton

2009a2

How to tie yourself in knots with words: the student loan scheme

WEBCSdevilinthedetails.html

Les Hatton

2009a1

Some comments on the teaching of mathematics

WEBMATheTeachingOfMathematics.html

Summary: number of books 1, number of invited chapters 0, number of other articles 58


Auto-generated: $Revision: 1.54 $, $Date: 2013/09/05 23:26:56 $, Copyright Les Hatton 2001-