Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 171 results for "Stephen J Cowley" clear search
ForagerNet3_Demography is a non-spatial ABM for exploring hunter-gatherer demography. Key methods represent birth, death, and marriage. The dependency ratio is an imporant variable in many economic decisions embedded in the methods.
ForagerNet3_Demography_V2 is a non-spatial ABM for exploring hunter-gatherer demography. This version (developed from FN3D_V1) contains code for calculating the ratio of old to young adults (the “OY ratio”) in the living and dead populations.
The various technologies used inside a Dutch greenhouse interact in combination with an external climate, resulting in an emergent internal climate, which contributes to the final productivity of the greenhouse. This model examines how differing technology development styles affects the overall ability of a community of growers to approach the theoretical maximum yield.
The purpose of this model is to explore the dynamics of residency and eviction for households renting in the greater Phoenix (Arizona) metropolitan area. The model uses a representative population of renters modified from American Community Survey (ACS) data that includes demographic, housing and economic information. Each month, households pay their subsistence, rental and utility bills. If a household is unable to pay their monthly rent or utility bill they apply for financial assistance. This model provides a platform to understand the impact of various economic shock upon households. Also, the model includes conditions that occurred as a result of the Covid-19 pandemic which allows for the study of eviction mitigation strategies that were employed, such as the eviction moratorium and stimulus payments. The model allows us to make preliminary predictions concerning the number of households that may be evicted once the moratorium on evictions ends and the long-term effects on the number of evicted households in the greater Phoenix area going forward.
This model aims to simlulate the dynamic of risk over time and space.
We used our model to test how different combinations of dominance interactions present in H. saltator could result in linear, despotic, or shared hierarchies.
A model for simulating the evolution of individual’s preferences, incliding adaptive agents “falsifying” -as public opinions- their own preferences. It was builded to describe, explore, experiment and understand how simple heuristics can modulate global opinion dynamics. So far two mechanisms are implemented: a version of Festiguer’s reduction of cognitive disonance, and a version of Goffman’s impression management. In certain social contexts -minority, social rank presure- some models agents can “fake” its public opinion while keeping internally the oposite preference, but after a number of rounds following this falsifying behaviour pattern, a coherence principle can change the real or internal preferences close to that expressed in public.
Simulation to replicate and extend an analytical model (Konrad & Skaperdas, 2010) of the provision of security as a collective good. We simulate bandits preying upon peasants in an anarchy condition.
This NetLogo model is an implementation of the mostly verbal (and graphic) model in Jarret Walker’s Human Transit: How Clearer Thinking about Public Transit Can Enrich Our Communities and Our Lives (2011). Walker’s discussion is in the chapter “Connections or Complexity?”. See especially figure 12-2, which is on page 151.
In “Connections or Complexity?”, Walker frames the matter as involving a choice between two conflicting goals. The first goal is to minimize connections, the need to make transfers, in a transit system. People naturally prefer direct routes. The second goal is to minimize complexity. Why? Well, read the chapter, but as a general proposition we want to avoid unnecessary complexity with its attendant operating characteristics (confusing route plans in the case of transit) and management and maintenance challenges. With complexity general comes degraded robustness and resilience.
How do we, how can we, choose between these conflicting goals? The grand suggestion here is that we only choose indirectly, implicitly. In the present example of connections versus complexity we model various alternatives and compare them on measures of performance (MoP) other than complexity or connections per se. The suggestion is that connections and complexity are indicators of, heuristics for, other MoPs that are more fundamental, such as cost, robustness, energy use, etc., and it is these that we at bottom care most about. (Alternatively, and not inconsistently, we can view connections and complexity as two of many MoPs, with the larger issue to be resolve in light of many MoPs, including but not limited to complexity and connections.) We employ modeling to get a handle on these MoPs. Typically, there will be several, taking us thus to a multiple criteria decision making (MCDM) situation. That’s the big picture.
We used a computer simulation to measure how well different network structures (fully connected, small world, lattice, and random) find and exploit resource peaks in a variable environment.
Displaying 10 of 171 results for "Stephen J Cowley" clear search