Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1178 results for "Lee-Ann Sutherland" clear search
This model incorporates three mechanisms shaping the dynamics of opinion formation, which mimics the dynamics of the virus spreading in the population. There are three methods of getting infected (or convinced) - direct contact, indirect contact, and contact with ``contaminated’’ elements.
This model takes concepts from a JASSS paper this is accepted for the October, 2023 edition and applies the concepts to empirical data from counties surrounding and including Cleveland Ohio. The agent-based model has a proportional number of agents in each of the counties to represent the correct proportions of adults in these counties. The adoption decision probability uses the equations from Bass (1969) as adapted by Rand & Rust (2011). It also includes the Outgroup aversion factor from Smaldino, who initially had used a different imitation model on line grid. This model uses preferential attachment network as a metaphor for social networks influencing adoption. The preferential network can be adjusted in the model to be created based on both nodes preferred due to higher rank as well as a mild preference for nodes of a like group.
Motivated by the emergence of new Peer-to-Peer insurance organizations that rethink how insurance is organized, we propose a theoretical model of decision-making in risk-sharing arrangements with risk heterogeneity and incomplete information about the risk distribution as core features. For these new, informal organisations, the available institutional solutions to heterogeneity (e.g., mandatory participation or price differentiation) are either impossible or undesirable. Hence, we need to understand the scope conditions under which individuals are motivated to participate in a bottom-up risk-sharing setting. The model puts forward participation as a utility maximizing alternative for agents with higher risk levels, who are more risk averse, are driven more by solidarity motives, and less susceptible to cost fluctuations. This basic micro-level model is used to simulate decision-making for agent populations in a dynamic, interdependent setting. Simulation results show that successful risk-sharing arrangements may work if participants are driven by motivations of solidarity or risk aversion, but this is less likely in populations more heterogeneous in risk, as the individual motivations can less often make up for the larger cost deficiencies. At the same time, more heterogeneous groups deal better with uncertainty and temporary cost fluctuations than more homogeneous populations do. In the latter, cascades following temporary peaks in support requests more often result in complete failure, while under full information about the risk distribution this would not have happened.
The model constructs a complex network of traffic based on the main urban area of Zhengzhou, China, and simulates the urban rainfall process using the ABM model to analyse the real-time risk of flooding hazards in the nodes of the complex network.
This model represents informal information transmission networks among medieval Genoese investors used to inform each other about cheating merchants they employed as part of long-distance trade operations.
This is a model of the diffusion of alternative fuel vehicles based on manufacturer designs and consumer choices of those designs. It is written in Netlogo 4.0.3. Because it requires data to upload
This model demonstrates how to illustrate a cluster pattern by counting turtles within i moving circle with a specified radius. The procedure is common in archaeological spatial analysis.
The purpose of the model is to examine the strength of network connections in a ceremonial exchange network in a non-hierarchical society.
In this model, the spread of a virus disease in a network consisting of school pupils, employed, and umemployed people is simulated. The special feature in this model is the distinction between different types of links: family-, friends-, school-, or work-links. In this way, different governmental measures can be implemented in order to decelerate or stop the transmission.
A replication in Netlogo 5.2 of the classic model, Sugarscape (Epstein & Axtell, 1996).
Displaying 10 of 1178 results for "Lee-Ann Sutherland" clear search