Our mission is to help computational modelers develop, document, and share their computational models in accordance with community standards and good open science and software engineering practices. Model authors can publish their model source code in the Computational Model Library with narrative documentation as well as metadata that supports open science and emerging norms that facilitate software citation, computational reproducibility / frictionless reuse, and interoperability. Model authors can also request private peer review of their computational models. Models that pass peer review receive a DOI once published.
All users of models published in the library must cite model authors when they use and benefit from their code.
Please check out our model publishing tutorial and feel free to contact us if you have any questions or concerns about publishing your model(s) in the Computational Model Library.
We also maintain a curated database of over 7500 publications of agent-based and individual based models with detailed metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
Displaying 10 of 442 results for "Therese Lindahl" clear search
This model played a small part in the UK government’s review of the working of local authority implementation of the Domestic Abuse legislation. The model explicitly represents victim-survivor families as they: (a) try to contact the local DA support system, (b) are triaged by the system and (if there is space) allocated to safe temporary accomodation (c) recieve support services from this position and (d) eventually move on to more permenant accomodation. The purpose of the model was to understand some possible ways in which the implementation of DA Duty, might be frustrated in practice, the identification of gaps in the evidence base and to inform the developing Theory of Change. The key measures used for assessing outcomes in the model were the number of families helped and the services that were delivered to them. The exploration was grounded for in two archetypal cases: that of a relatively immature system for the delivery of DA services and a more mature one (based on actual local authority cases, but not based on any single one). See the official report under associated publications for a summary of results.
This is an empirical model described in http://dx.doi.org/10.1016/j.landurbplan.2010.05.001. The objective of the model is to simulate how the decision-making of farmers/agents with different strategies can affect the landscape structure in a region in the Netherlands.
We provide an agent-based model of collective action, informed by Granovetter (1978) and its replication model by Siegel (2009). We use the model to examine the role of ICTs in collective action under different cultural and political contexts.
Designed to capture the evolutionary forces of global society.
A logging agent builds roads based on the location of high-value hotspots, and cuts trees based on road access. A forest monitor sanctions the logger on observed infractions, reshaping the pattern of road development.
An agent-based model which explores Creativity and Urban Development
A model to show the effects of flood risk on a housing market; the role of flood protection for risk reduction; the working of the existing public-private flood insurance partnership in the UK, and the proposed scheme ‘Flood Re’.
The aim of the model is to define when researcher’s assumptions of dependence or independence of cases in multiple case study research affect the results — hence, the understanding of these cases.
The purpose of this model is to better understand the dynamics of a multihost pathogen in two host system comprising of high densities of domestic hosts and sympatric wildlife hosts susceptible to the pathogen.
Our aim is to show effects of group living when only low-level cognition is assumed, such as pattern recognition needed for normal functioning, without assuming individuals have knowledge about others around them or warn them actively.
The model is of a group of vigilant foragers staying within a patch, under attack by a predator. The foragers use attentional scanning for predator detection, and flee after detection. This fleeing action constitutes a visual cue to danger, and can be received non-attentionally by others if it occurs within their limited visual field. The focus of this model is on the effectiveness of this non-attentional visual information reception.
A blind angle obstructing cue reception caused by behaviour can exist in front, morphology causes a blind angle in the back. These limitations are represented by two visual field shapes. The scan for predators is all-around, with distance-dependent detection; reception of flight cues is limited by visual field shape.
Initial parameters for instance: group sizes, movement, vision characteristics for predator detection and for cue reception. Captures (failure), number of times the information reached all individuals at the same time (All-fled, success), and several other effects of the visual settings are recorded.
Displaying 10 of 442 results for "Therese Lindahl" clear search