<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Verification &amp;Validation of Agent Based Simulations using the VOMAS (Virtual Overlay Multi-agent System) approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Muaz A. Niazi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amir Hussain</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mario Kolberg</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>M. A. Niazi, A. Hussain and M. Kolberg are with the Department of Computing Science and Mathematics, University of Stirling</institution>
          ,
          <addr-line>Scotland</addr-line>
          ,
          <country>UK. (Tel:</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-Agent Based Models are very popular in a number of different areas. For example, they have been used in a range of domains ranging from modeling of tumor growth, immune systems, molecules to models of social networks, crowds and computer and mobile self-organizing networks. One reason for their success is their intuitiveness and similarity to human cognition. However, with this power of abstraction, in spite of being easily applicable to such a wide number of domains, it is hard to validate agent-based models. In addition, building valid and credible simulations is not just a challenging task but also a crucial exercise to ensure that what we are modeling is, at some level of abstraction, a model of our conceptual system; the system that we have in mind. In this paper, we address this important area of validation of agent based models by presenting a novel technique which has broad applicability and can be applied to all kinds of agent-based models. We present a framework, where a virtual overlay multi-agent system can be used to validate simulation models. In addition, since agent-based models have been typically growing, in parallel, in multiple domains, to cater for all of these, we present a new single validation technique applicable to all agent based models. Our technique, which allows for the validation of agent based simulations uses VOMAS: a Virtual Overlay Multi-agent System. This overlay multi-agent system can comprise various types of agents, which form an overlay on top of the agent based simulation model that needs to be validated. Other than being able to watch and log, each of these agents contains clearly defined constraints, which, if violated, can be logged in real time. To demonstrate its effectiveness, we show its broad applicability in a wide variety of simulation models ranging from social sciences to computer networks in spatial and non-spatial conceptual models.</p>
      </abstract>
      <kwd-group>
        <kwd>Agent-based Modeling and Simulation</kwd>
        <kwd>Multiagent System</kwd>
        <kwd>Verification</kwd>
        <kwd>Validation</kwd>
        <kwd>Agent Oriented Software Engineering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>V2]. Simulations, however well-designed, are always only
ALIDATION of any simulation model is a crucial task[1,
an approximation of the system and if it was so easy to
build the actual system, the simulation approach would never
have been used [3]. Of all the simulation models, agent-based
modeling and simulation paradigm has recently gained a lot of
popularity by being applied to a very wide range of domains
such as [4-9]. Validation of models typically requires experts
to look at data or animation as errors and un-wanted artifacts
can appear in the development of agent-based models [10].
However, because of the complex nature of agent-based
models comprising of multiple interacting entities and the
strong dynamics and frequent emergence patterns in the
system, it can be hard to validate agent-based models in the
same way as traditional simulation models.</p>
      <p>In the case of agent-based simulations, it is even easier to
fall into the trap of tweaking the variables, especially since
occasionally, the inputs can tend to be quite numerous [11].
Because of the complex nature of agent based models and
resulting emergence as shown in [12-14], coupled with an
enormous variation possibility of the variables, the results of
the simulation study can vary considerably by changing the
range or even the step size of just one or two variables. Thus,
it is vitally important to be able to validate the agent-based
simulation. The problem however, comes from the grounds up
since validation is not to be an after-thought; it needs to be
initiated alongside at the start of the simulation study. Now,
validation of agent based models can be quite a challenging
task [15, 16]. One problem lies in the fact that validation
typically requires SME (Subject Matter Experts) to analyze
[3] the simulation data or animation for comparison with
another system or model. However, because of appearance of
complex phenomenon such as emergence of behavior, where
one plus one is not necessarily two as it depends more on the
two “ones” and the behavior of the addition operation as is the
norm in complex systems as compared to complicated systems
[17]. Thus it can be very difficult to be sure if the behavior
that we are observing is truly representative of the actual
system[18]. Also, it is important to note here that even
models, which cannot be validated might have merit and use
such as bookkeeping devices or as an aid in selling ideas or as
a training aid or even as part of an automatic management
system. In the social sciences literature and ACE (Agents in
Computation Economics), empirical validation of agent-based
models has been described in [19]. Alternate approaches to
empirical validation are discussed in [20]. Replication of
agent-based models has been considered very important by
some authors and has been discussed in [21]. An approach of
validation based on philosophical truth theories in simulations
has been discussed in [22]. Another approach called
"companion modeling" is an iterative participatory approach
where multidisciplinary researchers and stakeholders work
together continuously throughout a four-stage cycle: field
study and data analysis; role-playing games; agent-based
model design and implementation; and intensive
computational experiments [23]. Agent-based social
simulation has also been used for validation and calibration
[24].</p>
      <p>In the past, although agent-based simulation has been
shown to be useful in the validation of multi-agent
systems[25, 26], multi-agent systems have not been used to
validate agent-based models. On the other hand, simulations
have been used in conjunction with software engineering for a
long time[27]. Our work can be considered as pertaining to
the last two stages of “Companion Modeling” i.e.
AgentBased Model Design/Implementation as well as Intensive
Computational Experiments. Specifically, in this paper, we
present the following innovations:
• We show how to develop a VOMAS (Virtual Overlay
Multi-Agent System), which can be used for the
validation of agent based simulation models.
• We thus further develop social science based
validation techniques that can be applicable to both
social science as well as other relevant domains.
• We present an object-oriented software engineering
based methodology for validation of agent-base
models, which provides for both logging as well as
animation based validation approaches in addition to
test-case/invariant based approaches.</p>
      <p>The rest of the paper is structured as following: First we
give an overview of the terms “Verification”, “Validation”
and “Credibility” as discussed in the literature. We also
discuss how these terms have been considered traditionally in
simulation models. Next, we give an overview of performing
Validation using VOMAS. We show the design of VO
(Virtual Overlay) and Logger agents. Next, we show an
example of developing a VOMAS for an existing model from
Agent-Based Modeling literature, and demonstrate its
usefulness, and ease in validation. Finally we conclude the
paper.
else interact with each other. These computational entities,
which are typically, simplifications of real-world
counterparts, need to have some meaningful semantics which can
include anywhere from simple behaviors as well as variables
for storing different items, such as states, to complex
representations such as artificial neural networks, artificial
immune systems, cognitive models etc.</p>
      <sec id="sec-1-1">
        <title>B. Definitions of the terms:</title>
        <p>Validation is the process by which we can determine if the
model is a representation of the system.[3]. This is always
performed while keeping the specific abstraction by the
designer in mind. Verification is basically the debugging of
the system where we ensure that the model that we build is
working correctly. Credibility is achieved when the
decisionmakers and other key project personnel accept the model as
well as its results as “correct”.</p>
      </sec>
      <sec id="sec-1-2">
        <title>C. Correlation with VOMAS?</title>
        <p>VOMAS approach has been designed to cater for all kind of
agent-based models. As such, it has capability to monitor
spatial as well as non-spatial concepts in agent-based models.
II. VERIFICATION, VALIDATION AND CREDIBILITY
Researchers transform real-world systems to models by
applying abstraction. This transformation requires propagating
concepts from the real world to useful computational models.
These, in turn, are used to develop simulations. Simulation
models, in essence end up giving back results which can be
useful for the real world. As such, the more effective the
abstraction mechanism, the better would be the expected real
world benefits.</p>
      </sec>
      <sec id="sec-1-3">
        <title>A. Peculiarities of Agent-Based Models</title>
        <p>In case of agent-based models, the simulation comprises of
one or more agents. These agents can work independently or</p>
      </sec>
      <sec id="sec-1-4">
        <title>D. Verification &amp; Validation of agent-based models</title>
        <p>One sure way to establish the validity of agent-based model is
to have Subject Matter Experts, who give the specification as
well as examine the results and logs of simulation runs.
VOMAS approach allows experts to be involved in the design
of the agent-based model as well as the custom-built VOMAS
from scratch. By involving SMEs from the start of the project,
which are essentially equivalent to clients in the software
engineering domain, VOMAS approach allows the simulation
study to be a stronger candidate for success.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>III. VALIDATION USING VOMAS</title>
      <sec id="sec-2-1">
        <title>A. Validation in agent based simulations</title>
        <p>To understand VOMAS, let us examine figure 1. The Virtual
Overlay Multi-agent System is created for each simulation
model separately by a discussion between the simulation
specialist as well as the SMEs (Subject Matter Expert). When
the actual simulation is executed, the VOMAS agents perform
monitoring as well as logging tasks and can even validate
constraints given by the system designer at design time.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. A Taxonomy of Agent-Based Validation techniques using VOMAS</title>
        <p>Now, let us examine how agent-based models are structured.
Since agent based models have one or more agents, what these
agents really mean in the real-world is entirely up to the
designer of the simulation. These elements can be spatial in
nature, where distance between agents in the simulation is
important or else non-spatial, where there is no concept of
distance in the simulation as shown in Fig. 2. In case of spatial
models, it is also entirely possible that the exact distance may
not be important, but the links between agents could be
important. An example of this is HIV based models, where
interaction between agents can be shown as links.</p>
        <p>A detailed description of each of these follows.
SME can examine the animation to see if the
behavior appears to be similar to that expected in the
actual domain.
2. Validation using VOMAS:</p>
        <p>In case of VOMAS, we can validate both spatially as
well as non-spatially.
3. Spatial Validation:</p>
        <p>In spatial validation, the placement of agents in the
simulation is important. This includes the placement
of some of the VOMAS agents, which interact with
the actual agent based simulation.
4. Non-Spatial Validation:</p>
        <p>In non-spatial validation, the actual distance is not
important. These could be used to validate for
aggregate data and constraints/invariants etc.
5. Networked or Link-Based Validation</p>
        <p>In spatial validation, it is possible that the actual
placement is less important than the links between
them. In case of social simulation, the example could
be links to show social network friendships. In case
of computer science based networks, these could
represent e.g. Connectivity of Peer-to-Peer overlay
networks.
6. Proximity Based Validation</p>
        <p>In this case, the actual proximity of agents to each
other and especially to VOMAS agents is important.
An example of this is pred-prey models where</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>1. Visual Validation:</title>
      <p>Visual validation is a face validation technique based
on an animation based validation technique where the
VOMAS agents can verify certain characteristics of
agents passing by them at a certain time.
7. Log based validation:
In log based validation, the SME can specify what
things to be watched and logged so that they can be
examined after the fact and see how e.g. the
populations evolved over time, or else how wireless
sensor networks lost their power over time etc.
8. Constraint-based validation or Invariant Based
Validation:
It is entirely possible that the SME says that there
are certain constraints, which should never be
violated in a certain simulation experiment. If these
were ever to be violated, then the simulation system
should notify the user via some console or else log
the event as a</p>
      <sec id="sec-3-1">
        <title>1) Verify the Model</title>
        <p>The SME verifies the model by means of execution
of the simulations by the Simulation Specialist. The
detailed verification (debugging) is checked by the
simulation specialist but in case of any ambiguity, the
SME can be referred.</p>
      </sec>
      <sec id="sec-3-2">
        <title>2) Validate the Model</title>
        <p>This validation is done in three ways
a. Validation using animations:</p>
        <p>This validation is face validation by the</p>
        <p>SME by means of analyzing the animations.
b. Validation using Logs</p>
        <p>In this case, logs are generated based on
watches specified by the SME. These logs
special case. E.g. Wolves must never all die in a wolf-sheep
predation. If all of the wolves die, then the simulation needs
to be stopped etc. as further data collection exercise might
not be useful.</p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Analysis of VOMAS</title>
        <p>The analysis of VOMAS has been conducted based on a
scenario-modeling approach. In figure 3, we see the use cases,
some of which are described below. The rest should be
selfexplanatory and we are not listing them for shortage of space:</p>
        <p>show after the fact, the entire scenarios like
black boxes from airplanes.</p>
        <p>Validation using Invariants
These can be cases where the SME wants
either immediate feedback even while
running large scale parameter sweeps. So, if
the invariants or constraints are ever
violated, the user can be notified. Or at least,
this is definitely logged in the simulation
log.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3) Design and Develop Models</title>
        <p>b)</p>
        <sec id="sec-3-4-1">
          <title>Virtual Console</title>
          <p>This use case is to be conducted by the simulation
specialist in conjunction with the SME.</p>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>D. Design of VOMAS</title>
      </sec>
      <sec id="sec-3-6">
        <title>1) Motivation</title>
        <p>
          One of the most popular approaches in Validation is the three
step approach given in [
          <xref ref-type="bibr" rid="ref25">28</xref>
          ] . The approach has the following
steps:
a)
b)
c)
        </p>
        <sec id="sec-3-6-1">
          <title>Build a model that has high face validity.</title>
        </sec>
        <sec id="sec-3-6-2">
          <title>Validate model assumptions</title>
        </sec>
        <sec id="sec-3-6-3">
          <title>Compare the model input-out transformations to corresponding input-output transformations for the real system.</title>
          <p>VOMAS has been designed to cater for both face validity as
well as model assumptions and io-transformations. Model
assumptions are ensured by the use of invariants. Face
validation is ensured by means of various techniques based on
spatial and non-spatial validation and animation-based
validation. IO-transformations are ensured by means of
essential logging components. Thus, in other words VOMAS
provides the complete validation package.</p>
        </sec>
      </sec>
      <sec id="sec-3-7">
        <title>2) Description of Class Diagram</title>
        <p>In figure 4, we see the class diagram of the VOMAS agents
and how they interact with the agents in the simulation. The
description of each of these agents is given below:
a)</p>
        <sec id="sec-3-7-1">
          <title>VO Manager</title>
          <p>VO manager agent is the key agent handling the interaction of
all of the other agents.</p>
          <p>Virtual Console agent is an agent, which can be used to
dynamically display various messages at run-time.
c)</p>
        </sec>
        <sec id="sec-3-7-2">
          <title>Invariant</title>
          <p>Invariant is any condition, which the designer of the VOMAS
and the agent-based simulation, feels that must not be violated
during the execution of the simulation. If the Invariant is
violated, the violation is logged.</p>
          <p>The logging capability is provided by the Logger Agent.
If the designer of the system wants some value to be observed,
it can be made a watch.</p>
          <p>d)
e)
f)
g)
h)
i)</p>
        </sec>
        <sec id="sec-3-7-3">
          <title>Logger Agent</title>
        </sec>
        <sec id="sec-3-7-4">
          <title>Watch</title>
        </sec>
        <sec id="sec-3-7-5">
          <title>Watch Log Entry</title>
        </sec>
        <sec id="sec-3-7-6">
          <title>Invariant Violation</title>
        </sec>
        <sec id="sec-3-7-7">
          <title>Log Entry</title>
        </sec>
        <sec id="sec-3-7-8">
          <title>Sim Agent</title>
          <p>Each watch can also be logged as a logged entry.
Invariant violations can be logged at run-time to the Console
Virtual agent or else the log as a log entry.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The base class of all log entries.</title>
      <p>This is an agent which is part of the agent based simulation
model.</p>
      <sec id="sec-4-1">
        <title>VO Agent</title>
        <p>These are agents which can be located spatially or
nonspatially to monitor the entire simulation.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>IV. CASE STUDY</title>
      <p>Here, we present application of a VOMAS to an agent-based
simulation mode of the “Simulation of the research process”.
Recently an agent-based simulation model of researchers
attempting to present research in International publication
venues was presented in [5]. We demonstrate how to develop
and use the associated VOMAS on this model.</p>
      <sec id="sec-5-1">
        <title>A. The Publishing Researchers’ model</title>
        <p>In the publishing researcher model, the abstraction is that
researchers are modeled as agents in the simulation. The
higher the publications of an agent, the higher the agent goes.
Thus space in this simulation model is essentially used to
show the capability of the researcher. A screenshot of the
simulation model is shown in fig 5. For more details, the
interested reader is advised to consult the original article. The
model has been developed using NetLogo [29]. So, let us
formally define some of the entities involved:
SME: An Expert Researcher with experience of publishing in
various venues.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Objective of Simulation Study: To examine how the policies of</title>
        <p>researchers in selection of publication venues impacts an
overall organization.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Example Invariant:</title>
      <p>Basis: In a particular simulation experiment, enough time of
simulation run should be given to ensure that journal
preferring researchers publish at least ten times during the
simulation.</p>
      <p>Invariant: If simulation stops before each journal preferring
researcher is able to publish at least ten times, note an
invariant violation in the console and/or the log.</p>
    </sec>
    <sec id="sec-7">
      <title>Example watches: Measure the total number of researchers with the best policy. Measure the number of researchers above a certain threshold. Measure the number of overall publications.</title>
      <p>Fig. 5 Screenshot of the researchers’ model [5] showing researchers
according to their publication count. (Lime = Conference preferring, Red =
Journal Preferring, Cyan = No Preference)</p>
    </sec>
    <sec id="sec-8">
      <title>V. CONCLUSION AND FUTURE WORK</title>
      <p>In this paper, we have presented a novel framework for the
validation of agent based simulation models. We have given a
description of how VOMAS agents can be constructed for
validation. As a case study, we have shown its application on
an existing published model. In the future, we shall apply
VOMAS on various types of simulation models and
demonstrate how it can be effective in validation. Some of the
models we intend to explore VOMAS application on, include
pred-prey models, tumor growth models, Peer-to-Peer
unstructured overlay network models.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Balci</surname>
          </string-name>
          ,
          <article-title>"Verification, validation, and accreditation,"</article-title>
          <source>in Proceedings of the 30th conference on Winter simulation Washington</source>
          , D.C.,
          <string-name>
            <surname>United</surname>
            <given-names>States</given-names>
          </string-name>
          : IEEE Computer Society Press,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Banks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. S. C.</given-names>
            <surname>II</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. L.</given-names>
            <surname>Nelson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Nicol</surname>
          </string-name>
          ,
          <string-name>
            <surname>Discrete-Event System</surname>
            <given-names>Simulation</given-names>
          </string-name>
          , Fourth ed.:
          <source>Peason Education</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>A. M. Law</surname>
          </string-name>
          ,
          <article-title>"How to build valid and credible simulation models,"</article-title>
          <source>in Simulation Conference</source>
          ,
          <year>2008</year>
          . WSC 2008. Winter,
          <year>2008</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Niazi</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <article-title>" Agent based Tools for Modeling and Simulation of Self-Organization in Peer-to-</article-title>
          <string-name>
            <surname>Peer</surname>
          </string-name>
          ,
          <article-title>Ad-Hoc and other Complex Networks,"</article-title>
          <source>IEEE Communications Magazine</source>
          , vol.
          <volume>47</volume>
          , No.
          <issue>3</issue>
          , pp.
          <fpage>163</fpage>
          -
          <lpage>173</lpage>
          .,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Niazi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Baig</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhatti</surname>
          </string-name>
          ,
          <article-title>"Simulation of the research process,"</article-title>
          <source>in Winter Simulation Conference</source>
          , Miami, FL,
          <year>2008</year>
          , pp.
          <fpage>1326</fpage>
          -
          <lpage>1334</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Niazi</surname>
          </string-name>
          ,
          <article-title>"Self-organized customized content delivery architecture for ambient assisted environments,"</article-title>
          <source>in Proceedings of the third international workshop on Use of P2P</source>
          ,
          <article-title>grid and agents for the development of content networks</article-title>
          , Boston, MA, USA,
          <year>2008</year>
          , pp.
          <fpage>45</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Gilbert</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Troitzsch</surname>
          </string-name>
          ,
          <article-title>Simulation for the social Scientist</article-title>
          , Second ed.:
          <source>McGraw Hill Education</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>C. M. Macal and M. J. North</surname>
          </string-name>
          ,
          <article-title>"Agent-based modeling and simulation: desktop ABMS,"</article-title>
          <source>in Proceedings of the 39th conference on Winter simulation: 40 years!</source>
          The best is yet to come Washington D.C.: IEEE Press,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Siddiqa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Niazi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bokhari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          , Noreen Akram,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shaheen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Iqbal</surname>
          </string-name>
          ,
          <article-title>" A New Hybrid Agent-Based Modeling &amp; Simulation Decision Support System for Breast Cancer Data Analysis "</article-title>
          in ICICT Karachi, Pakistan: IEEE Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Olmo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>López-Paredes</surname>
            , and
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Edmonds</surname>
          </string-name>
          ,
          <article-title>"Errors and Artefacts in Agent-Based Modelling,"</article-title>
          <source>Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>11</issue>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Roginski</surname>
          </string-name>
          ,
          <article-title>"Defense and homeland security applications of multi-agent simulations,"</article-title>
          <source>in Proceedings of the 39th conference on Winter simulation: 40 years!</source>
          The best is yet to come Washington D.C.: IEEE Press,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ilachinski</surname>
          </string-name>
          ,
          <article-title>"Exploring self-organized emergence in an agentbased synthetic warfare lab,"</article-title>
          <source>Kybernetes</source>
          , vol.
          <volume>32</volume>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>76</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Chli and P. De Wilde</surname>
          </string-name>
          ,
          <article-title>"The Emergence of Knowledge Exchange: An Agent-Based Model of a Software Market,"</article-title>
          <source>Systems, Man and Cybernetics</source>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>A</given-names>
          </string-name>
          :
          <article-title>Systems and Humans</article-title>
          , IEEE Transactions on, vol.
          <volume>38</volume>
          , pp.
          <fpage>1056</fpage>
          -
          <lpage>1067</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Cartier</surname>
          </string-name>
          ,
          <article-title>"An Agent-Based Model of Innovation Emergence in Organizations: Renault and Ford Through the Lens of Evolutionism,"</article-title>
          <source>Comput. Math. Organ. Theory</source>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>153</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cirillo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gallegati</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Vagliasindi</surname>
          </string-name>
          ,
          <article-title>"Validating and Calibrating Agent-Based Models: A Case Study,"</article-title>
          <source>Comput. Econ.</source>
          , vol.
          <volume>30</volume>
          , pp.
          <fpage>245</fpage>
          -
          <lpage>264</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Miller</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Page</surname>
          </string-name>
          ,
          <source>Complex Adaptive Systems: An</source>
          Introduction to Computational Models of Social Life: Princeton University Press,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Fagiolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Birchenhall</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Windrum</surname>
          </string-name>
          ,
          <article-title>"Empirical Validation in Agent-based Models: Introduction to the Special Issue "</article-title>
          <source>Computational Economics</source>
          , vol.
          <volume>30</volume>
          , pp.
          <fpage>189</fpage>
          -
          <lpage>194</lpage>
          , October,
          <year>2007</year>
          2007.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Moss</surname>
          </string-name>
          ,
          <article-title>"Alternative Approaches to the Empirical Validation of Agent-Based Models,"</article-title>
          <source>Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>15</issue>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>U.</given-names>
            <surname>Wilensky</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Rand</surname>
          </string-name>
          ,
          <article-title>"Making Models Match: Replicating an Agent-Based Model,"</article-title>
          <source>Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>10</volume>
          , p.
          <volume>2</volume>
          ,
          <issue>10</issue>
          /31 2007.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Schmid</surname>
          </string-name>
          ,
          <article-title>"What is the Truth of Simulation?,"</article-title>
          <source>Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>8</volume>
          , p.
          <volume>5</volume>
          ,
          <issue>10</issue>
          /31 2005.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Barreteau</surname>
          </string-name>
          and e. al.,
          <source>"Our Companion Modelling Approach " Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>6</volume>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Makowsky</surname>
          </string-name>
          ,
          <article-title>"An Agent-Based Model of Mortality Shocks, Intergenerational Effects, and Urban Crime,"</article-title>
          <source>Journal of Artificial Societies and Social Simulation</source>
          , vol.
          <volume>9</volume>
          , No.
          <volume>2</volume>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Cossentino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mascillaro</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>"PASSIM; a simulation-based process for the development of multi-agent systems," Int</article-title>
          . J.
          <string-name>
            <surname>Agent-Oriented Softw</surname>
          </string-name>
          . Eng., vol.
          <volume>2</volume>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garro</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>"From Modeling to Simulation of Multi-Agent Systems: An Integrated Approach and a Case Study," in Multiagent System Technologies</article-title>
          , LNAI 3187: Springer-Verlag,
          <year>2004</year>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>227</lpage>
          R. S. Pressman,
          <string-name>
            <given-names>Software</given-names>
            <surname>Engineering</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            <surname>Practitioner's Approach</surname>
          </string-name>
          , Sixth ed.:
          <source>McGraw Hill</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [28] [29]
          <string-name>
            <given-names>T. H.</given-names>
            <surname>Naylor</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Finger</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Verification of Computer Simulation Models," Management Science</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>B92</fpage>
          -
          <lpage>B101</lpage>
          ,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>U.</given-names>
            <surname>Wilensky</surname>
          </string-name>
          ,
          <article-title>"NetLogo,"</article-title>
          <string-name>
            <surname>Evanston</surname>
          </string-name>
          , IL,
          <year>1999</year>
          :
          <article-title>Center for Connected Learning Comp</article-title>
          .-Based
          <string-name>
            <surname>Modeling</surname>
          </string-name>
          , Northwestern University,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>