Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 6 of 26 results security clear search
This model was design to test parameters that affects the number of people shot during mass shooting. This basic formulation places a gunman in a crowd and allows the users to manipulate parameters of the gunman.
The purpose of this model is to enhance a basic ABM through a simple set of rules identified using the activity-driven models in order to produce more realistic patterns of pedestrian movement.
This model examines the potential impact of market collapse on the economy and demography of fishing households in the Logone Floodplain, Cameroon.
A NetLogo ABM developed to explore unarmed resistance to an active shooter. The landscape is a generalized open outdoor area. Parameters enable the user to set shooter armament and control for assumptions with regard to shooter accuracy.
An empirical ABM of smallholder decisions in times of drought stress.
Must tax-benefit policy making be limited to the ‘experts’?
Displaying 6 of 26 results security clear search