Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 922 results for "Chantal van Esch" clear search
We develop an agent-based model for collective behavior of routine medical check-ups, and specifically dental visits, in a social network.
Merger and acquisition (M&A) activity has many strategic and operational objectives. One operational objective is to develop common and efficient information systems that maybe the source of creating
We propose an agent-based model leading to a decrease or an increase of hostility between agents after a major cultural threat such as a terrorist attack. The model is inspired from the Terror Management Theory and the Social Judgement Theory. An agent has a cultural identity defined through its acceptance segments about each of three different cultural worldviews (i.e., Atheist, Muslim, Christian) of the considered society. An agent’s acceptance segment is composed from its acceptable positions toward a cultural worldview, including its most acceptable position. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity point of view tend to decrease the width of their acceptance segments in order to differentiate themselves more from the threatening cultural identity
We demonstrate how Repast Simphony statecharts can efficiently encapsulate the deep classification hierarchy of the U.S. Air Force for manpower life cycle costing.
The model analyzes the economic and ecological effects of a provision of livestock drought insurance for dryland pastoralists. More precisely, it yields qualitative insights into how long-term herd and pasture dynamics change through insurance.
The model aims at simulating the car traffic. It allows to use either a macro or a micro sub-model for the simulation of the flow on the roads.
The model aims to mimic the observed behavior of participants in spatially explicit dynamic commons experiments.
This model is designed to investigate the impact of alternative policy approaches and changing land tenure dynamics on farmer adoption of conservation practices intended to increase the water quality.
This is a modification of a model published previous by Barton and Riel-Salvatore (2012). In this model, we simulate six regional populations within Last Glacial Maximum western Europe. Agents interact through reproduction and genetic markers attached to each of six regions mix through subsequent generations as a way to track population dynamics, mobility, and gene flow. In addition, the landscape is heterogeneous and affects agent mobility and, under certain scenarios, their odds of survival.
This model is intended to study the way information is collectively managed (i.e. shared, collected, processed, and stored) in a system and how it performs during a crisis or disaster. Performance is assessed in terms of the system’s ability to provide the information needed to the actors who need it when they need it. There are two main types of actors in the simulation, namely communities and professional responders. Their ability to exchange information is crucial to improve the system’s performance as each of them has direct access to only part of the information they need.
In a nutshell, the following occurs during a simulation. Due to a disaster, a series of randomly occurring disruptive events takes place. The actors in the simulation need to keep track of such events. Specifically, each event generates information needs for the different actors, which increases the information gaps (i.e. the “piles” of unaddressed information needs). In order to reduce the information gaps, the actors need to “discover” the pieces of information they need. The desired behavior or performance of the system is to keep the information gaps as low as possible, which is to address as many information needs as possible as they occur.
Displaying 10 of 922 results for "Chantal van Esch" clear search