Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1113 results for "Bin-Tzong Chi" clear search
RefugeePathSIM is an agent-based model to simulate the movement behavior of refugees in order to identify pathways of forced migration under crisis. The model generates migrants and lets them leave conflict areas for a destination that they choose based on their characteristics and desires. RefugeePathSIM has been developed and applied in a study of the Syrian war, using monthly data in years 2011-2015.
The provided source code is the result of our efforts in replicating Epstein’s Demographic Prisoner’s Dilemma. The simulation model is written in Repast/J 3.1.
This simulation model is associated with the journal paper “A First Approach on Modelling Staff Proactiveness in Retail Simulation Models” to appear in the Journal of Artificial Societies and Social Simulation 14 (2) 2. The authors are Peer-Olaf Siebers ([email protected]) and Uwe Aickelin ([email protected]).
Using nodes from the 2002 General Social Survey sample, the code establishes a network of ties with a given homophily bias, and simulates Internet adoption rates in that network under three conditions: (i) no network externalities, (ii) general network externalities, where an individual’s reservation price is a function of the overall adoption rate in the network, (iii) specific network externalities, where reservation price is a function of the adoption rate in individual’s personal […]
This model simulates the dynamics of eighteenth-century infantry battle tactics. The goal is to explore the effect of different tactics and individual traits in the dynamics of the combat.
The Regional Security Game is a iterated public goods game with punishement based on based on life sciences work by Boyd et al. (2003 ) and Hintze & Adami (2015 ), with modifications appropriate for an international relations setting. The game models a closed regional system in which states compete over the distribution of common security benefits. Drawing on recent work applying cultural evolutionary paradigms in the social sciences, states learn through imitation of successful strategies rather than making instrumentally rational choices. The model includes the option to fit empirical data to the model, with two case studies included: Europe in 1933 on the verge of war and south-east Asia in 2013.
Micro-targeted vs stochastic political campaigning agent-based model simulation. Written by Toby D. Pilditch (University of Oxford, University College London), in collaboration with Jens K. Madsen (University of Oxford, London School of Economics)
The purpose of the model is to explore the various impacts on voting intention among a population sample, when both stochastic (traditional) and Micto-targeted campaigns (MTCs) are in play. There are several stages of the model: initialization (setup), campaigning (active running protocols) and vote-casting (end of simulation). The campaigning stage consists of update cycles in which “voters” are targeted and “persuaded” - updating their beliefs in the campaign candidate / policies.
How can a strictly egalitarian social system give way to a stratified society if all of its members punish each other for any type of selfish behavior? This model examines the role of prestige bias in constant and variable environments on the development of hierarchies of wealth.
This model builds on another model in this library (“diffusion of culture”).
This agent-based model investigates group longevity in a population in a foundational way, using theory on social relations and culture. It is the first application of the GRASP meta-model for social agents, containing elements of Groups, Rituals, Affiliation, Status, and Power. It can be considered an exercise in artificial sociality: a culture-general, content-free base-line trust model from which to engage in more specific studies. Depending on cultural settings for individualism and power distance, as well as settings for xenophobia and for the increase of trust over group life, the GRASP world model generates a variety of patters. Number of groups ranges from one to many, composition from random to segregated, and pattern genesis from rapid to many hundreds of time steps. This makes GRASP world an instrument that plausibly models some basic elements of social structure in different societies.
Displaying 10 of 1113 results for "Bin-Tzong Chi" clear search