Jean Arlat
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2014
- [c42]Jean Arlat, Michel Diaz, Mohamed Kaâniche:
Towards resilient cyber-physical systems: The ADREAM project. DTIS 2014: 1-5 - 2012
- [j16]Jean Arlat, Zbigniew Kalbarczyk, Takashi Nanya:
Nanocomputing: Small Devices, Large Dependability Challenges. IEEE Security & Privacy 10(1): 69-72 (2012) - [c41]David Powell, Jean Arlat, Hoang Nam Chu, Félix Ingrand, Marc-Olivier Killijian:
Testing the Input Timing Robustness of Real-Time Control Software for Autonomous Systems. EDCC 2012: 73-83 - 2011
- [c40]David Powell, Jean Arlat, Yves Deswarte, Karama Kanoun:
Tolerance of Design Faults. Dependable and Historic Computing 2011: 428-452 - [c39]Jean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood:
Introduction to the fifth workshop on dependable and secure nanocomputing. DSN Workshops 2011: 39-40 - [c38]Jean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood:
Introduction to the fifth workshop on dependable and secure nanocomputing. DSN 2011: 588-589 - [c37]Jean Arlat, Regina Moraes
:
Collecting, Analyzing and Archiving Results from Fault Injection Experiments. LADC 2011: 100-105 - 2010
- [c36]Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:
Fourth workshop on dependable and secure nanocomputing. DSN 2010: 619-620
2000 – 2009
- 2009
- [c35]Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:
Third workshop on dependable and secure nanocomputing. DSN 2009: 596-597 - 2008
- [j15]Arnaud Albinet, Jean Arlat, J. Fabre:
Robustesse des logiciels exécutifs. Caractérisation de l'impact de pilotes défaillants par injection de fautes. Technique et Science Informatiques 27(9-10): 1253-1286 (2008) - [c34]Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis:
Second workshop on dependable and secure nanocomputing. DSN 2008: 546-547 - [c33]Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat:
Safety and Security Architectures for Avionics. DCSOFT 2008: 46-52 - 2007
- [c32]Jean Arlat, Ravishankar K. Iyer, Michael Nicolaidis:
Workshop on Dependable and Secure Nanocomputing. DSN 2007: 809-810 - [c31]Jean Arlat:
Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? LADC 2007: 3-6 - 2006
- [j14]Jean Arlat, Andrea Bondavalli
, Boudewijn R. Haverkort
, Paulo Veríssimo
:
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia. IEEE Trans. Dependable Sec. Comput. 3(3): 169-171 (2006) - [c30]Anis Youssef, Yves Crouzet, Agnan de Bonneval, Jean Arlat, Jean-Jacques Aubert, Patrice Brot:
Communication Integrity in Networks for Critical Control Systems. EDCC 2006: 23-34 - 2005
- [c29]Yves Crouzet, Jacques Henri Collet, Jean Arlat:
Mitigating Soft Errors to Prevent a Hard Threat to Dependable Computing. IOLTS 2005: 295-298 - 2004
- [j13]Manuel Rodríguez, Jean-Charles Fabre, Jean Arlat:
Empaquetâches de tolérance aux fautes pour les systèmes temps réel. Technique et Science Informatiques 23(4): 479-514 (2004) - [c28]Ali Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat:
Benchmarking The Dependability of Windows NT4, 2000 and XP. DSN 2004: 681-686 - [c27]Arnaud Albinet, Jean Arlat, Jean-Charles Fabre:
Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel. DSN 2004: 867-876 - [c26]Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun:
Benchmarking Operating System Dependability: Windows 2000 as a Case Study. PRDC 2004: 261-270 - 2003
- [j12]Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther H. Leber:
Comparison of Physical and Software-Implemented Fault Injection Techniques. IEEE Trans. Computers 52(9): 1115-1133 (2003) - [c25]Manuel Rodríguez, Jean-Charles Fabre, Jean Arlat:
Building SWIFI Tools from Temporal Logic Specifications. DSN 2003: 95-104 - 2002
- [j11]Jean Arlat, Jean-Charles Fabre, Manuel Rodríguez, Frédéric Salles:
Dependability of COTS Microkernel-Based Systems. IEEE Trans. Computers 51(2): 138-163 (2002) - [c24]Manuel Rodríguez, Arnaud Albinet, Jean Arlat:
MAFALDA-RT: A Tool for Dependability Assassment of Real-Time Systems. DSN 2002: 267-272 - [c23]Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun:
Experimental Analysis of the Errors Induced into Linux by Three Fault Injection Techniques. DSN 2002: 331-336 - [c22]Manuel Rodríguez, Jean-Charles Fabre, Jean Arlat:
Wrapping Real-Time Systems from Temporal Logic Specifications. EDCC 2002: 253-270 - [c21]Eric Marsden, Nicolas Perrot, Jean-Charles Fabre, Jean Arlat:
Dependability Characterization of Middleware Services. DIPES 2002: 121-130 - [c20]Jean Arlat:
From Experimental Assessment of Fault-Tolerant Systems to Dependability Benchmarking. IPDPS 2002 - [c19]Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, Thomas Marteau:
Analysis of the Effects of Real and Injected Software Faults: . PRDC 2002: 51-58 - [c18]Eric Marsden, Jean-Charles Fabre, Jean Arlat:
Dependability of CORBA Systems: Service Characterization by Fault Injection. SRDS 2002: 276-285 - 2001
- [c17]Mohamed Kaâniche, Yannick Le Guédart, Jean Arlat, Thierry Boyer:
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models. SAFECOMP 2001: 130-144 - 2000
- [c16]Jean-Charles Fabre, Manuel Rodríguez, Jean Arlat, J.-M. Sizun:
Building dependable COTS microkernel-based systems using MAFALDA. PRDC 2000: 85-94 - [c15]Manuel Rodríguez, Jean-Charles Fabre, Jean Arlat:
Formal Specification for Building Robust Real-time Microkernels. RTSS 2000: 119-128
1990 – 1999
- 1999
- [j10]Jean Arlat, Jérome Boué, Yves Crouzet:
Validation-based development of dependable systems. IEEE Micro 19(4): 66-79 (1999) - [j9]Michel Cukier, David Powell, Jean Arlat:
Coverage Estimation Methods for Stratified Fault Injection. IEEE Trans. Computers 48(7): 707-723 (1999) - [j8]David Powell, Jean Arlat, Ljerka Beus-Dukic, Andrea Bondavalli
, P. Coppola, Alessandro Fantechi, Eric Jenn, Christophe Rabéjac, Andy J. Wellings:
GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems. IEEE Trans. Parallel Distrib. Syst. 10(6): 580-599 (1999) - [c14]Manuel Rodríguez, Frédéric Salles, Jean-Charles Fabre, Jean Arlat:
MAFALDA: Microkernel Assessment by Fault Injection and Design Aid. EDCC 1999: 143-160 - [c13]Frédéric Salles, Manuel Rodríguez, Jean-Charles Fabre, Jean Arlat:
MetaKernels and Fault Containment Wrappers. FTCS 1999: 22-29 - 1997
- [c12]D. Essame, Jean Arlat, David Powell:
Available fail-safe systems. FTDCS 1997: 176-182 - [c11]Frédéric Salles, Jean Arlat, Jean-Charles Fabre:
Can we rely on COTS microkernels for building fault-tolerant systems? FTDCS 1997: 189-195 - 1996
- [j7]Dimiter R. Avresky, Jean Arlat, Jean-Claude Laprie, Yves Crouzet:
Fault injection for formal testing of fault tolerance. IEEE Trans. Reliability 45(3): 443-455 (1996) - [c10]David Powell, Michel Cukier, Jean Arlat:
On Stratified Sampling for High Coverage Estimations. EDCC 1996: 37-54 - [c9]Jean Arlat, Nobuyasu Kanekawa, Arturo M. Amendola, Jean-Luis Dufour, Yuji Hirao, Joseph A. Profeta III:
Dependability of Railway Control Systems. FTCS 1996: 150-155 - [c8]Yinong Chen, Jean Arlat:
Modeling Software Dependability Growth under Input Partition Testing. SAFECOMP 1996: 136-145 - 1995
- [j6]David Powell, Eliane Martins, Jean Arlat, Yves Crouzet:
Estimators for Fault Tolerance Coverage Evaluation. IEEE Trans. Computers 44(2): 261-274 (1995) - [c7]Tullio Vardanega
, P. David, J.-F. Chane, Wolfgang R. Mader, R. Messaros, Jean Arlat:
On the Development of Fault-Tolerant On-Board Control Software and its Evaluation by Fault Injection. FTCS 1995: 510-515 - 1994
- [c6]Eric Jenn, Jean Arlat, Marcus Rimén, Joakim Ohlsson, Johan Karlsson:
Fault Injection into VHDL Models: The MEFISTO Tool. FTCS 1994: 66-75 - 1993
- [j5]Jean Arlat, Alain Costes, Yves Crouzet, Jean-Claude Laprie, David Powell:
Fault Injection and Dependability Evaluation of Fault-Tolerant Systems. IEEE Trans. Computers 42(8): 913-923 (1993) - [c5]David Powell, Eliane Martins, Jean Arlat, Yves Crouzet:
Estimators for Fault Tolerance Coverage Evaluation. FTCS 1993: 228-237 - [c4]C. Béoumes, Karama Kanoun, Martine Aguera, Jean-Claude Laprie, Jean Arlat, Sylvain Metge, S. Bachmann, Jorge Moreira de Souza, C. Bourdeau, David Powell, J.-E. Doucet, P. Spiesser:
SURF-2: A Program for Dependability Evaluation of Complex Hardware and Software Systems. FTCS 1993: 668-673 - 1992
- [c3]Dimiter R. Avresky, Jean Arlat, Jean-Claude Laprie, Yves Crouzet:
Fault Injection for the Formal Testing of Fault Tolerance. FTCS 1992: 345-354 - 1990
- [j4]Jean-Claude Laprie, Jean Arlat, Christian Béounes, Karama Kanoun:
Definition and Analysis of Hardware- and Software-Fault-Tolerant Architectures. IEEE Computer 23(7): 39-51 (1990) - [j3]Jean Arlat, Karama Kanoun, Jean-Claude Laprie:
Dependability Modeling and Evaluation of Software Fault-Tolerant Systems. IEEE Trans. Computers 39(4): 504-513 (1990) - [j2]Jean Arlat, Martine Aguera, Louis Amat, Yves Crouzet, Jean-Charles Fabre, Jean-Claude Laprie, Eliane Martins, David Powell:
Fault Injection for Dependability Validation: A Methodology and Some Applications. IEEE Trans. Software Eng. 16(2): 166-182 (1990)
1980 – 1989
- 1989
- [c2]Jean Arlat, Yves Crouzet, Jean-Claude Laprie:
Fault injection for dependability validation of fault-tolerant computing systems. FTCS 1989: 348-355 - 1988
- [c1]Jean Arlat, Karama Kanoun, Jean-Claude Laprie:
Dependability evaluation of software fault-tolerance. FTCS 1988: 142-177 - 1984
- [j1]Jean Arlat, William C. Carter:
Implementation and Evaluation of a (b, k)-Adjacent Error-Correcting/Detecting Scheme for Supercomputer Systems. IBM Journal of Research and Development 28(2): 159-169 (1984)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-10-20 23:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint