Abstract

Click to increase image sizeClick to decrease image size Notes 1. Technically speaking, a protocol should enable the reader, for example ODD (Overview, Design concepts, and Details; Polhill, Parker, Brown, & Grimm, 2008 Polhill , J.G. , Parker , D. , Brown , D. , & Grimm , V. 2008 . Using the ODD protocol for describing three agent-based social simulation models of land-use change . Journal of Artificial Societies and Social Simulation , 11 2 . Retrieved from http://jasss.soc.surrey.ac.uk/11/2/3.html [Web of Science ®] , [Google Scholar]), to compare empirical evidence with the model. 2. Note that often temporal scales are not properly dealt with in the article, e.g., Figures 4, 5, and 6. 3. See, in this regard, the critical report by Danzig (2011 Danzig, R. 2011. Driving in the dark: Ten propositions about prediction and national security, Washington, DC: Center for a New American Security. [Google Scholar]).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call