Our mission is to help computational modelers at all levels engage in the establishment and adoption of community standards and good practices for developing and sharing computational models. Model authors can freely publish their model source code in the Computational Model Library alongside narrative documentation, open science metadata, and other emerging open science norms that facilitate software citation, reproducibility, interoperability, and reuse. Model authors can also request peer review of their computational models to receive a DOI.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with additional detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 1135 results for "Ian M Hamilton" clear search
Criminal organizations operate in complex changing environments. Being flexible and dynamic allows criminal networks not only to exploit new illicit opportunities but also to react to law enforcement attempts at disruption, enhancing the persistence of these networks over time. Most studies investigating network disruption have examined organizational structures before and after the arrests of some actors but have disregarded groups’ adaptation strategies.
MADTOR simulates drug trafficking and dealing activities by organized criminal groups and their reactions to law enforcement attempts at disruption. The simulation relied on information retrieved from a detailed court order against a large-scale Italian drug trafficking organization (DTO) and from the literature.
The results showed that the higher the proportion of members arrested, the greater the challenges for DTOs, with higher rates of disrupted organizations and long-term consequences for surviving DTOs. Second, targeting members performing specific tasks had different impacts on DTO resilience: targeting traffickers resulted in the highest rates of DTO disruption, while targeting actors in charge of more redundant tasks (e.g., retailers) had smaller but significant impacts. Third, the model examined the resistance and resilience of DTOs adopting different strategies in the security/efficiency trade-off. Efficient DTOs were more resilient, outperforming secure DTOs in terms of reactions to a single, equal attempt at disruption. Conversely, secure DTOs were more resistant, displaying higher survival rates than efficient DTOs when considering the differentiated frequency and effectiveness of law enforcement interventions on DTOs having different focuses in the security/efficiency trade-off.
Overall, the model demonstrated that law enforcement interventions are often critical events for DTOs, with high rates of both first intention (i.e., DTOs directly disrupted by the intervention) and second intention (i.e., DTOs terminating their activities due to the unsustainability of the intervention’s short-term consequences) culminating in dismantlement. However, surviving DTOs always displayed a high level of resilience, with effective strategies in place to react to threatening events and to continue drug trafficking and dealing.
MHCABM is an agent-based, multi-hazard risk interaction model with an integrated applied dynamic adaptive pathways planning component. It is designed to explore the impacts of climate change adaptation decisions on the form and function of a coastal human-environment system, using as a case study an idealised patch based representation of the Mount North-Omanu area of Tauranga city, New Zealand. The interacting hazards represented are erosion, inundation, groundwater intrusion driven by intermittent heavy rainfall / inundations (storm) impacts, and sea level rise.
This model describes the tranmission of HIV by means of unprotected anal intercourse in a population of men-who-have-sex-with-men.
The model is parameterized based on field data from a cohort study conducted in Atlanta Georgia.
This model demonstrates the spread of collapse through a network. The model is abstract but has many applications in various fields.
This is a set of threshold public goods games models. Set consists of baseline model, endogenous shared punishment model, endogenous shared punishment model with activists and cooperation model. In each round, all agents are granted a budget of size set in GUI. Then they decide on how much they contribute to public goods and how much they keep. Public goods are provided only if the sum of contributions meets or exceeds the threshold defined in the GUI. After each round agents evaluate their strategy and payoff from this strategy.
Replication of the well known Artificial Anasazi model that simulates the population dynamics between 800 and 1350 in the Long House Valley in Arizona.
This is the replication of the experiment performed by Eerkens and Lipo (2005) to look at the effect of copying errors when specific traits are transferred from an individual to another.
The network-based trust game is a hybridization of both the repeated trust games and the network games.
This is a simplified version of a Complex Model of Voter Turnout by Edmonds et al.(2014). It was developed to better understand the mechanisms at play on that complex model.
The purpose of the model is to examine the strength of network connections in a ceremonial exchange network in a non-hierarchical society.
Displaying 10 of 1135 results for "Ian M Hamilton" clear search