Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 291 results for "Michael D. Slater" clear search
This model illustrates a positive ‘growth’ feedback loop in which the areal extent of an entity increases through time.
Multi-layer network agent-based model of the progression of the COVID19 infection, digital contact tracing
To investigate the potential of using Social Psychology Theory in ABMs of natural resource use and show proof of concept, we present an exemplary agent-based modelling framework that explicitly represents multiple and hierarchical agent self-concepts
An agent-based simulation of a game of basketball. The model implements most components of a standard game of basketball. Additionally, the model allows the user to test for the effect of two separate cognitive biases – the hot-hand effect and a belief in the team’s franchise player.
This model is a highly stylized land use model in the Clear Creek Watershed in Eastern Iowa, designed to illustrate the construction of stability landscapes within resilience theory.
This model aims to simulate Competition and Displacement of Online Interpersonal Communication Platforms process from a bottom-up angle. Individual interpersonal communication platform adoption and abandonment serve as the micro-foundation of the simulation model. The evolution mode of platform user online communication network determines how present platform users adjust their communication relationships as well as how new users join that network. This evolution mode together with innovations proposed by individual interpersonal communication platforms would also have impacts on the platform competition and displacement process and result by influencing individual platform adoption and abandonment behaviors. Three scenes were designed to simulate some common competition situations occurred in the past and current time, that two homogeneous interpersonal communication platforms competed with each other when this kind of platforms first came into the public eye, that a late entrant platform with a major innovation competed with the leading incumbent platform during the following days, as well as that both the leading incumbent and the late entrant continued to propose many small innovations to compete in recent days, respectively.
Initial parameters are as follows: n(Nmax in the paper), denotes the final node number of the online communication network node. mi (m in the paper), denotes the initial degree of those initial network nodes and new added nodes. pc(Pc in the paper), denotes the proportion of links to be removed and added in each epoch. pst(Pv in the paper), denotes the proportion of nodes with a viscosity to some platforms. comeintime(Ti in the paper), denotes the epoch when Platform 2 joins the market. pit(Pi in the paper), denotes the proportion of nodes adopting Platform 2 immediately at epoch comeintime(Ti). ct(Ct in the paper), denotes the Innovation Effective Period length. In Scene 2, There is only one major platform proposed by Platform 2, and ct describes that length. However, in Scene 3, Platform 2 and 1 will propose innovations alternately. And so, we set ct=10000 in simulation program, and every jtt epochs, we alter the innovation proposer from one platform to the other. Hence in this scene, jtt actually denotes the Innovation Effective Period length instead of ct.
Transhumants move their herds based on strategies simultaneously considering several environmental and socio-economic factors. There is no agreement on the influence of each factor in these strategies. In addition, there is a discussion about the social aspect of transhumance and how to manage pastoral space. In this context, agent-based modeling can analyze herd movements according to the strategy based on factors favored by the transhumant. This article presents a reductionist agent-based model that simulates herd movements based on a single factor. Model simulations based on algorithms to formalize the behavioral dynamics of transhumants through their strategies. The model results establish that vegetation, water outlets and the socio-economic network of transhumants have a significant temporal impact on transhumance. Water outlets and the socio-economic network have a significant spatial impact. The significant impact of the socio-economic factor demonstrates the social dimension of Sahelian transhumance. Veterinarians and markets have an insignificant spatio-temporal impact. To manage pastoral space, water outlets should be at least 15 km
from each other. The construction of veterinary centers, markets and the securitization of transhumance should be carried out close to villages and rangelands.
A discrete-time stochastic model with state-dependent transmission probabilities and multi-agent simulations focusing on possible risks that could materialize in the final phase of the epidemic.
Interactions of players embedded in a closed square lattice are determined by distance and overall gains and they lead to shifts of reward payoff between temptation and punishment. A new winner balancing against threats is ultimately discovered.
NetLogo implementation of Linear Threshold model of influence propagation.
Displaying 10 of 291 results for "Michael D. Slater" clear search