Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1114 results for "Elena A. Pearce" clear search
A curious aspect of the Covid-19 pandemic is the clustering of outbreaks. Evidence suggests that 80\% of people who contract the virus are infected by only 19% of infected individuals, and that the majority of infected individuals faile to infect another person. Thus, the dispersion of a contagion, $k$, may be of more use in understanding the spread of Covid-19 than the reproduction number, R0.
The Virus Transmission with Super-spreaders model, written in NetLogo, is an adaptation of the canonical Virus Transmission on a Network model and allows the exploration of various mitigation protocols such as testing and quarantines with both homogenous transmission and heterogenous transmission.
The model consists of a population of individuals arranged in a network, where both population and network degree are tunable. At the start of the simulation, a subset of the population is initially infected. As the model runs, infected individuals will infect neighboring susceptible individuals according to either homogenous or heterogenous transmission, where heterogenous transmission models super-spreaders. In this case, k is described as the percentage of super-spreaders in the population and the differing transmission rates for super-spreaders and non super-spreaders. Infected individuals either recover, at which point they become resistant to infection, or die. Testing regimes cause discovered infected individuals to quarantine for a period of time.
What is it?
This model demonstrates a very simple bidding market where buyers try to acquire a desired item at the best price in a competitive environment
…
This is a series of simulations of binary group decisions and the outcomes applied to a generalized version of Price’s Equation for system fitness.
The model attempts to explore the trade-offs between immigration policies and successfully identifying human trafficking victims.
The objective of this study is to create a framework to simulate and analyze the effect of multiple business scenarios on the adoption behavior of a group of technology products.
CRESY-I stands for CREativity from a SYstems perspetive, Model I. This is the base model in a series designed to describe a systems approach to creativity in terms of variation, selection and retention (VSR) subprocesses.
Using nodes from the 2002 General Social Survey sample, the code establishes a network of ties with a given homophily bias, and simulates Internet adoption rates in that network under three conditions: (i) no network externalities, (ii) general network externalities, where an individual’s reservation price is a function of the overall adoption rate in the network, (iii) specific network externalities, where reservation price is a function of the adoption rate in individual’s personal […]
The set of models test how receivers ability to accurately rank signalers under various ecological and behavioral contexts.
The (cultural) evolution of cooperative breeding in harsh environments.
More frequently protests are accompanied by an opposing group performing a counter protest. This phenomenon can increase tension such that police must try to keep the two groups separated. However, what is the best strategy for police? This paper uses a simple agent-based model to determine the best strategy for keeping the two groups separated. The ‘thin blue line’ varies in density (number of police), width and the keenness of police to approach protesters. Three different groups of protesters are modelled to mimic peaceful, average and volatile protests. In most cases, a few police forming a single-file ‘thin blue line’ separating the groups is very effective. However, when the protests are more volatile, it is more effective to have many police occupying a wide ‘thin blue line’, and police being keen to approach protesters. To the authors knowledge, this is the first paper to model protests and counter-protests.
Displaying 10 of 1114 results for "Elena A. Pearce" clear search