@inproceedings{20125,
abstract = {Datacenter applications have different resource requirements from network and developing flow scheduling heuristics for every workload is practically infeasible. In this paper, we show that deep reinforcement learning (RL) can be used to efficiently learn flow scheduling policies for different workloads without manual feature engineering. Specifically, we present LFS, which learns to optimize a high-level performance objective, e.g., maximize the number of flow admissions while meeting the deadlines. The LFS scheduler is trained through deep RL to learn a scheduling policy on continuous online flow arrivals. The evaluation results show that the trained LFS scheduler admits 1.05x more flows than the greedy flow scheduling heuristics under varying network load.},
author = {Hasnain, Asif and Karl, Holger},
booktitle = {2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)},
keyword = {Flow scheduling, Deadlines, Reinforcement learning},
location = {Las Vegas, USA},
publisher = {IEEE Computer Society},
title = {{Learning Flow Scheduling}},
doi = {https://doi.org/10.1109/CCNC49032.2021.9369514},
year = {2021},
}
@inproceedings{21447,
abstract = {Even though the spectrum of parts is expected to shift over the long term as a result of increasing e-mobility, there is still an extremely high demand for complex components made of high-strength materials which can only be produced by hydroforming technologies. The innovative combination of hydroforming processes with other forming processes, as well as the improvement of the processes themselves, offers considerable potential for improvement.
A number of promising ways of improving the hydroforming process chain are therefore the subject of this contribution. The focus of the article is on possible approaches for combining (incremental) pre- and post-forming operations, which can permit considerable improvements in both quality and features at a reduced cost. Furthermore, a novel combination of quasi-static and high-speed forming processes is presented, leading to an improved overall forming process (with a high application potential) for the production of complex parts.
},
author = {Wiens, Eugen and Djakow, Eugen and Homberg, Werner},
booktitle = {Nebu/Nehy 2020},
keyword = {Hydroforming, Incremental Forming, Internal Flow-turning, High-speed Forming},
title = {{Some ideas for the further development of hydroforming process chains}},
year = {2020},
}
@inproceedings{2332,
abstract = {Ein wichtiges Element der Digitalen Transformation ist die Digitalisierung der Prozesse in Unternehmen. Eine Herausforderung besteht hierbei in der systematischen Erkennung von Digitalisierungspotenzialen in Prozessen. Bestehende Ansätze benötigen Experten, welche Potenziale über ihre Erfahrung oder zeitaufwendig mithilfe von Musterkatalogen identifizieren.
In diesem Artikel werden verschiedene Digitalisierungspotenziale klassifiziert und Muster für ein zukünftiges musterbasiertes Analyseverfahren zur automatisierten Identifikation von Digitalisierungspotenzialen in BPMN-Diagrammen beschrieben. Im Vergleich zu bestehenden Ansätzen erlaubt es Experten die Identifizierung von Digitalisierungspotenzialen effizienter und effektiver durchzuführen.},
author = {Rittmeier, Florian and Engels, Gregor and Teetz, Alexander},
booktitle = {Joint Proceedings of the Workshops at Modellierung 2018 co-located with Modellierung 2018, Braunschweig, Germany, February 21, 2018.},
keyword = {Digitalisierungspotenziale, BPI, Digitale Transformation, Information Flow-Modellierung, Patterns, Requirements Engineering},
pages = {215----221},
publisher = {CEUR-WS.org},
title = {{Digitalisierungspotenziale in Geschäftsprozessen effizient und effektiv erkennen (Effective and Efficient Identification of Digitalization Potentials in Business Processes)}},
volume = {2060},
year = {2018},
}
@article{10129,
abstract = {There are many hard conjectures in graph theory, like Tutte's 5-flow conjecture, and the 5-cycle double cover conjecture, which would be true in general if they would be true for cubic graphs. Since most of them are trivially true for 3-edge-colorable cubic graphs, cubic graphs which are not 3-edge-colorable, often called snarks, play a key role in this context. Here, we survey parameters measuring how far apart a non 3-edge-colorable graph is from being 3-edge-colorable. We study their interrelation and prove some new results. Besides getting new insight into the structure of snarks, we show that such measures give partial results with respect to these important conjectures. The paper closes with a list of open problems and conjectures.},
author = {Fiol, M. A. and Mazzuoccolo, Guiseppe and Steffen, Eckhard},
journal = {The Electronic Journal of Combinatorics},
keyword = {Cubic graph, Tait coloring, Snark, Boole coloring, Berge's conjecture, Tutte's 5-flow conjecture},
number = {4},
title = {{Measures of Edge-Uncolorability of Cubic Graphs}},
volume = {25},
year = {2018},
}
@inproceedings{17651,
abstract = {Consider mitigating the effects of denial of service or of malicious traffic in networks by deleting edges. Edge deletion reduces the DoS or the number of the malicious flows, but it also inadvertently removes some of the desired flows. To model this important problem, we formulate two problems: (1) remove all the undesirable flows while minimizing the damage to the desirable ones and (2) balance removing the undesirable flows and not removing too many of the desirable flows. We prove these problems are equivalent to important theoretical problems, thereby being important not only practically but also theoretically, and very hard to approximate in a general network. We employ reductions to nonetheless approximate the problem and also provide a greedy approximation. When the network is a tree, the problems are still MAX SNP-hard, but we provide a greedy-based 2l-approximation algorithm, where l is the longest desirable flow. We also provide an algorithm, approximating the first and the second problem within {\$}{\$}2 {\backslash}sqrt{\{} 2{\backslash}left| E {\backslash}right| {\}}{\$}{\$}and {\$}{\$}2 {\backslash}sqrt{\{}2 ({\backslash}left| E {\backslash}right| + {\backslash}left| {\backslash}text {\{}undesirable flows{\}} {\backslash}right| ){\}}{\$}{\$}, respectively, where E is the set of the edges of the network. We also provide a fixed-parameter tractable (FPT) algorithm. Finally, if the tree has a root such that every flow in the tree flows on the path from the root to a leaf, we solve the problem exactly using dynamic programming.},
author = {Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees},
booktitle = {Combinatorial Optimization and Applications},
editor = {Kim, Donghyun and Uma, R. N. and Zelikovsky, Alexander},
isbn = {978-3-030-04651-4},
keyword = {flow, Red-Blue Set Cover, Positive-Negative Partial Set Cover, approximation, tree, MAX SNP-hard, root, leaf, dynamic programming, FPT},
pages = {217--232},
publisher = {Springer International Publishing},
title = {{Removing Undesirable Flows by Edge Deletion}},
year = {2018},
}
@inproceedings{17652,
author = {Polevoy, Gleb and Trajanovski, Stojan and Grosso, Paola and de Laat, Cees},
booktitle = {Combinatorial Optimization and Applications: 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I},
isbn = {978-3-319-71150-8},
keyword = {flow, filter, MMSA, set cover, approximation, local ratio algorithm},
pages = {3--17},
publisher = {Springer International Publishing},
title = {{Filtering Undesirable Flows in Networks}},
doi = {10.1007/978-3-319-71150-8_1},
year = {2017},
}
@article{4873,
abstract = {Banks face a 'behavioralization' of their balance sheets since deposit funding increasingly consists of non-maturing deposits with uncertain cash flows exposing banks to asset liability (ALM) risk. Thus, this study examines the behavior of banks’ retail customers regarding non-maturing deposits. Our unique sample comprises the contract and cash flow data for 2.2 million individual contracts from 1991 to 2010. We find that contractual rewards, i.e., qualified interest payments, and government subsidies, effectively stabilize saving behavior and thus bank funding. The probability of an early deposit withdrawal decreases by approximately 40%, and cash flow volatility drops by about 25%. Our findings provide important insights for banks using pricing incentives to steer desired saving patterns for their non-maturing deposit portfolios. Finally, these results are informative regarding the bank liquidity regulations (Basel III) concerning the stability of deposits and the minimum requirements for risk management (European Commission DIRECTIVE 2006/48/EC). },
author = {Schlueter, Tobias and Sievers, Sönke and Hartmann-Wendels, Thomas},
journal = {Journal of Banking & Finance (VHB-JOURQUAL 3 Ranking A)},
keyword = {retail saving behavior, non-maturing deposits, deposit funding, contractual rewards, interest rate bonus, saving persistence, cash flow volatility},
pages = {43--61},
title = {{Bank funding stability, pricing strategies and the guidance of depositors}},
doi = {10.2139/ssrn.2001449},
volume = {51},
year = {2015},
}
@article{5113,
abstract = {Standard equity valuation approaches (i.e., DDM, RIM, and DCF model) are derived under the assumption of ideal conditions, such as infinite payoffs and clean surplus accounting. Because these conditions are hardly ever met, we extend the standard approaches, based on the fundamental principle of financial statement articulation. The extended models are then tested empirically by employing two sets of forecasts: (1) analyst forecasts provided by Value Line and (2) forecasts generated by cross-sectional regression models. The main result is that our extended models yield considerably smaller valuation errors. Moreover, by construction, identical value estimates are obtained across the extended models. By reestablishing empirical equivalence under non-ideal conditions, our approach provides a benchmark that enables us to quantify the errors resulting from individual deviations from ideal conditions, and thus, to analyze the robustness of the standard approaches. Finally, by providing a level playing field for the different valuation approaches, our findings have implications for other empirical settings, for example, estimating the implied cost of capital. },
author = {Heinrichs, Nicolas and Hess, Dieter and Homburg, Carsten and Lorenz, Michael and Sievers, Sönke},
journal = {Contemporary Accounting Research (VHB-JOURQUAL 3 Ranking A)},
keyword = {Dividend Discount Model, Residual Income, Discounted Cash Flow, Dirty Surplus, Terminal Value, Valuation Error},
number = {1},
pages = {42--79},
publisher = {Wiley Online Library},
title = {{Extended dividend, cash flow, and residual income valuation models: Accounting for deviations from ideal conditions}},
doi = {10.2139/ssrn.1145201},
volume = {30},
year = {2013},
}
@article{17663,
abstract = {In this paper, we define and study a new problem, referred to as the Dependent Unsplittable Flow Problem (D-UFP). We present and discuss this problem in the context of large-scale powerful (radar/camera) sensor networks, but we believe it has important applications on the admission of large flows in other networks as well. In order to optimize the selection of flows transmitted to the gateway, D-UFP takes into account possible dependencies between flows. We show that D-UFP is more difficult than NP-hard problems for which no good approximation is known. Then, we address two special cases of this problem: the case where all the sensors have a shared channel and the case where the sensors form a mesh and route to the gateway over a spanning tree.},
author = {Cohen, R. and Nudelman, I. and Polevoy, Gleb},
issn = {1063-6692},
journal = {Networking, IEEE/ACM Transactions on},
keyword = {Approximation algorithms, Approximation methods, Bandwidth, Logic gates, Radar, Vectors, Wireless sensor networks, Dependent flow scheduling, sensor networks},
number = {5},
pages = {1461--1471},
title = {{On the Admission of Dependent Flows in Powerful Sensor Networks}},
doi = {10.1109/TNET.2012.2227792},
volume = {21},
year = {2013},
}
@inproceedings{10620,
author = {Anwer, Jahanzeb and Meisner, Sebastian and Platzner, Marco},
booktitle = {Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference on},
keyword = {fault tolerant computing, field programmable gate arrays, logic design, reliability, BYU-LANL tool, DRM tool flow, FPGA based hardware designs, avionic application, device technologies, dynamic reliability management, fault-tolerant operation, hardware designs, reconfiguring reliability levels, space applications, Field programmable gate arrays, Hardware, Redundancy, Reliability engineering, Runtime, Tunneling magnetoresistance},
pages = {1--6},
title = {{Dynamic reliability management: Reconfiguring reliability-levels of hardware designs at runtime}},
doi = {10.1109/ReConFig.2013.6732280},
year = {2013},
}
@article{10646,
author = {Danne, Klaus and Mühlenbernd, Roland and Platzner, Marco},
issn = {1751-8601},
journal = {IET Computers Digital Techniques},
keyword = {reconfigurable architectures, resource allocation, device reconfiguration time, dynamic hardware reconfiguration, dynamically reconfigurable hardware, light-weight runtime system, merge server distribute load, periodic real-time tasks, runtime system overheads, schedulability analysis, scheduling technique, server-based execution, synthesis tool flow},
number = {4},
pages = {295--302},
title = {{Server-based execution of periodic tasks on dynamically reconfigurable hardware}},
doi = {10.1049/iet-cdt:20060186},
volume = {1},
year = {2007},
}