Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 190 results network clear search
This model describes the tranmission of HIV by means of unprotected anal intercourse in a population of men-who-have-sex-with-men.
The model is parameterized based on field data from a cohort study conducted in Atlanta Georgia.
The model answers the question how homophily and number of close-links in small-world network influences behavior of consumats. The results show that the more close-links the more probable the consumat follows the major behavior, but homophilly blocks the major behavior and supports survival of the minor behavior.
This is code repository for the paper “Homophily as a process generating social networks: insights from Social Distance Attachment model”.
It provides all information, code and data necessary to replicate all the simulations and analyses presented in the paper.
This document contains the overall instruction as well as description of the content of the repository.
Details regarding particular stages are documented within source files as comments.
We establish a double-layer network for China’s financial system, consisting of an interbank lending network and a cross-shareholding network. The loss of diffusion in an interbank lending channel independently, a cross-shareholding channel independently and a double-layer contagion channel after one of the financial institutions goes bankrupt with an initial shock are simulated to explore the nonlinear evolution mechanism of financial risk and impact factors of financial systemic risk in China.
The model is an agent-based artificial stock market where investors connect in a dynamic network. The network is dynamic in the sense that the investors, at specified intervals, decide whether to keep their current adviser (those investors they receive trading advise from). The investors also gain information from a private source and share public information about the risky asset. Investors have different tendencies to follow the different information sources, consider differing amounts of history, and have different thresholds for investing.
This model is an extended version of the original MERCURY model (https://www.comses.net/codebases/4347/releases/1.1.0/ ) . It allows for experiments to be performed in which empirically informed population sizes of sites are included, that allow for the scaling of the number of tableware traders with the population of settlements, and for hypothesised production centres of four tablewares to be used in experiments.
Experiments performed with this population extension and substantive interpretations derived from them are published in:
Hanson, J.W. & T. Brughmans. In press. Settlement scale and economic networks in the Roman Empire, in T. Brughmans & A.I. Wilson (ed.) Simulating Roman Economies. Theories, Methods and Computational Models. Oxford: Oxford University Press.
…
This Bicycle encounter model builds on the Salzburg Bicycle model (Wallentin & Loidl, 2015). It simulates cyclist flows and encounters, which are locations of potential accidents between cyclists.
Agents are linked in a social-network and make decisions on which of 2 types of behavior to adopt. We explore consequences of different information feedback and providing targeted feedback to individuals.
We use a threshold model to drive our simulated network analysis testing public support for candidates in invisible primaries. We assign voter thresholds for candidates and vary number of voters, attachment to candidates and decay. Results of the algorithm show effects of size of lead, attachment and size of decay.
Studies on word-of-mouth identify two behaviors leading to transmission of information between individuals: proactive transmission of information, and information seeking. Individuals who are aware might be curious of it and start seeking for information; they might find around them the expertise held by another individual. Field studies indicate individuals do not adopt an innovation if they don’t hold the corresponding expertise. This model describes this information seeking behavior, and enables the exploration of the dynamics which emerges out of it.
Displaying 10 of 190 results network clear search