Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1251 results
This model converts cleaned up versions of .pgn files (records of real chess games) and conversts them into files that record all of the events and “possible” events within a game of chess. This is intended to be a way to create sets of data that capture event sequences within the relatively complex but finite context of chess games as a proxy or “toy” data set. Although not a perfect correlation, these toy data sets are a first step in analysing complex and dynamic systems of events and possible events that happen in the real world.
We model interpersonal dynamics and study behavior in the classroom in the hypothetical case of a single teacher who defines students’ seating arrangements. The model incorporates the mechanisms of peer influence on study behavior, on attitude formation, and homophilous selection in order to depict the interrelated dynamics of networks, behavior, and attitudes. We compare various seating arrangement scenarios and observe how GPA distribution and level of prejudice changes over time.
we extend the basic simulation model of March by incorporating forgetting and three knowledge management strategies—personalization, codification, and mixed—to explore the impacts of different knowledge management strategies and forgetting on organizational knowledge level.
This is a conceptual model of underlying forces creating industrial clusters. There are two contradictory forces - attraction and repulsion. Firms within the same Industry are attracted to each other and on the other hand, firms with the same Activity are repulsed from each other. In each round firm with the lowest fitness is selected to change its profile of Industries and Activities. Based on these simple rules interesting patterns emerge.
SWIM is a simulation of water management, designed to study interactions among water managers and customers in Phoenix and Tucson, Arizona. The simulation can be used to study manager interaction in Phoenix, manager and customer messaging and water conservation in Tucson, and when coupled to the Water Balance Model (U New Hampshire), impacts of management and consumer choices on regional hydrology.
Publications:
Murphy, John T., Jonathan Ozik, Nicholson T. Collier, Mark Altaweel, Richard B. Lammers, Alexander A. Prusevich, Andrew Kliskey, and Lilian Alessa. “Simulating Regional Hydrology and Water Management: An Integrated Agent-Based Approach.” Winter Simulation Conference, Huntington Beach, CA, 2015.
This is a series of simulations of binary group decisions and the outcomes applied to a generalized version of Price’s Equation for system fitness.
A model for simulating the evolution of individual’s preferences, incliding adaptive agents “falsifying” -as public opinions- their own preferences. It was builded to describe, explore, experiment and understand how simple heuristics can modulate global opinion dynamics. So far two mechanisms are implemented: a version of Festiguer’s reduction of cognitive disonance, and a version of Goffman’s impression management. In certain social contexts -minority, social rank presure- some models agents can “fake” its public opinion while keeping internally the oposite preference, but after a number of rounds following this falsifying behaviour pattern, a coherence principle can change the real or internal preferences close to that expressed in public.
Agent-Based Computational Model of the cryptocurrency Bitcoin with a realistic market and transaction system. Bitcoin’s transaction limit (i.e. block size) and Bitcoin generation can be calibrated and optimized for wealth and network’s hashing power by the Non-Dominated Sorted Genetic Algorithm - II.
The model is an agent-based artificial stock market where investors connect in a dynamic network. The network is dynamic in the sense that the investors, at specified intervals, decide whether to keep their current adviser (those investors they receive trading advise from). The investors also gain information from a private source and share public information about the risky asset. Investors have different tendencies to follow the different information sources, consider differing amounts of history, and have different thresholds for investing.
We develop an IBM that predicts how interactions between elephants, poachers, and law enforcement affect poaching levels within a virtual protected area. The model is theoretical at this stage and is not meant to provide a realistic depiction of poaching, but instead to demonstrate how IBMs can expand upon the existing modelling work done in this field, and to provide a framework for future research. The model could be further developed into a useful management support tool to predict the outcomes of various poaching mitigation strategies at real-world locations. The model was implemented in NetLogo version 6.1.0.
We first compared a scenario in which poachers have prescribed, non-adaptive decision-making and move randomly across the landscape, to one in which poachers adaptively respond to their memories of elephant locations and where other poachers have been caught by law enforcement. We then compare a situation in which ranger effort is distributed unevenly across the protected area to one in which rangers patrol by adaptively following elephant matriarchal herds.
Displaying 10 of 1251 results