Adressing the validation problem for social simulations   thumbnail
slide-image
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Adressing the validation problem for social simulations

Published on Sep 26, 20083081 Views

Chapter list

Addressing the validation problem for social simulations: the Adversarial Scheduling Approach00:00
Two sides of the same coin part100:19
Two sides of the same coin part201:01
Two sides of the same coin part301:03
Two sides of the same coin part401:05
Interpreting results part101:26
Interpreting results part201:49
Interpreting results part302:11
Interpreting results part402:19
Verification & Validation part102:49
Verification & Validation part203:15
Verification & Validation part304:18
Verification & Validation part404:36
Verification & Validation part504:39
Verification & Validation part604:57
Context: Mechanism-based explanations part105:01
Context: Mechanism-based explanations part205:33
Context: Mechanism-based explanations part306:45
Context: Mechanism-based explanations part407:27
Context: Mechanism-based explanations part507:29
Adversarial Scheduling part108:01
Adversarial Scheduling part208:44
Adversarial Scheduling part308:46
Adversarial Scheduling part409:35
Adversarial Scheduling part509:40
Adversarial Scheduling part609:50
Base model part109:57
Base model part210:24
Base model part310:42
Base model part411:27
Base model part511:59
Base model part612:22
Base model part712:29
Second version part113:33
Second version part213:50
Second version part313:51
Second version part414:07
Second version part514:17
Second version part615:17
Third version: adding interaction part115:19
Third version: adding interaction part215:32
Peyton-Young’s result part115:49
Peyton-Young’s result part216:00
Peyton-Young’s result part316:03
Peyton-Young’s result part416:27
Peyton-Young under adversarial scheduling part117:03
Peyton-Young under adversarial scheduling part217:17
Peyton-Young under adversarial scheduling part317:27
Peyton-Young under adversarial scheduling part417:55
Peyton-Young under adversarial scheduling part518:09
Peyton-Young under adversarial scheduling part618:10
Proff idea18:19
Proof idea (II) part118:37
Proof idea (II) part218:40
Proof idea (II) part318:45
Proof idea (II) part418:46
Proof idea (III) part119:38
Proof idea (III) part219:40
Proof idea (III) part319:44
Proof idea (III) part419:45
Application: Schelling’s Segregation Model part119:55
Application: Schelling’s Segregation Model part220:09
Application: Schelling’s Segregation Model (II) part120:17
Application: Schelling’s Segregation Model (II) part220:18
Back to Potential Games and Peyton-Young part120:37
Back to Potential Games and Peyton-Young part220:39
Back to Potential Games and Peyton-Young part320:40
Back to Potential Games and Peyton-Young part420:42
Extension: work in progress part120:44
Extension: work in progress part221:10
Extension: work in progress part321:12
Extension: work in progress part421:28
Extension: work in progress part521:29
Can this be done in Social Simulations ? part121:47
Can this be done in Social Simulations ? part221:47
Can this be done in Social Simulations ? part321:48
Can this be done in Social Simulations ? part421:49
Can this be done in Social Simulations ? part521:51
Can this be done in Social Simulations ? part621:52