1. [1] G. Santos, and B.E. Aguirre, "A critical review of emergency evacuation simulation models", in Proceeding of Conference BuildingOccupant Movement During Fire Emergencies, Gaithersburg, 2004. 2. [2] V. Karbovskii, D. Voloshin, A. Karsakov, A. Bezgodov and A. Zagarskikh, "Multiscale agent-based simulation in large city areas: emergency evacuation use case", Procedia Computer Science, 51: p. 2367-2376, 2015. [ DOI:10.1016/j.procs.2015.05.407] 3. [3] L. Chen, "Agent-based modeling in urban and architectural research: A brief literature review", Frontiers of Architectural Research, 1(2): p. 166-177, 2012. [ DOI:10.1016/j.foar.2012.03.003] 4. [4] G. Papadimitrioul , B. Sadoun, and C. Papazoglou, "Fundamentals of System Simulation, in Applied System Simulation", Springer. p. 9-39, 2003. [ DOI:10.1007/978-1-4419-9218-5_2] 5. [5] S. Russell, and P. Norvig, Ai a modern approach. England: Learning, 2(3): p. 4, 2005. 6. [6] M. Wooldridge, An introduction to multiagent systems. England: John Wiley & Sons,2009. 7. [7] M. Genkin, and A. Gutfraind, "How Do Terrorist Cells Self-Assemble? Insights from an Agent-Based Model", Social Science Research Network, 2008. 8. [8] L. Chalmet, R. Francis, and P. Saunders, "Network models for building evacuation" Management science, 28(1): p. 86-105, 1982. [ DOI:10.1287/mnsc.28.1.86] 9. [9] W. Choi, R.L. Francis, H.W. Hamacher, S. Tufekci, "Network models of building evacuation problems with flow-dependent exit capacities", Operational Research, 84: p. 1047-1059, 1984. 10. [10] W. Choi, H.W. Hamacher, and S. Tufekci, "Modeling of building evacuation problems by network flows with side constraints, European Journal of Operational Research, 35(1): p. 98-110, 1988. [ DOI:10.1016/0377-2217(88)90382-7] 11. [11] G.G. Lovas, "On the importance of building evacuation system components", IEEE Transactions on Engineering Management, 45(2): p. 181-191, 1998. [ DOI:10.1109/17.669766] 12. [12] C. Ren, C. Yang, and S. Jin, "Agent-based modeling and simulation on emergency evacuation", Complex Sciences, p.1451-1461, 2009. [ DOI:10.1007/978-3-642-02469-6_25] 13. [13] P. Mehlitz, N. Rungta, and W. Visser, "A hands-on java pathfinder tutorial", in Proceedings of the 2013 International Conference on Software Engineering, San Francisco, 2013. [ DOI:10.1109/ICSE.2013.6606756] 14. [14] R. Weaver, B. G. Silverman, H. Shin, and R. Dubois, "Modeling and simulating terrorist decision-making: A'Performance Moderator Function'approach to generating virtual opponent", Center for Human Modeling and Simulation, p. 22, 2001 15. [15] T.H. Ko, and N.M. Berry, "Agent-based modeling with social networks for terrorist recruitment", AAAI, 2004. 16. [16] K.A. Bertsche, and G. Schwarz, "Agent based simulation of terrorist attacks "protection of potential targets", Cornwallis Group IX: Analysis For Stabilization And Counter-Terrorist Operations, 9: p. 439-456, 2005. 17. [17] Makarov, V.L. and A.R. Bakhtizin, "Agent-based model for simulation of terrorism in Russia's Caucasus", wcss2010, Germany, 2010. 18. [18] W.M. Bulleit, and M.W. Drewek, "An agent-based model of terrorist activity", Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS 2005), Arizona State, 2005. 19. [19] A. Saltelli, M. Ratto, T. Andres, F. Campolongo, J. Cariboni, D. Gatelli, M. Saisana, Stefano Tarantola, Global sensitivity analysis: the primer. England:John Wiley & Sons, 2008. [ DOI:10.1002/9780470725184] 20. [20] S.J. Russell, and P. Norvig, Artificial intelligence: a modern approach. Malaysia: Pearson Education Limited, 2016. 21. [21] S. Tisue, and U. Wilensky, "Netlogo: A simple environment for modeling complexity", International conference on complex systems", Boston, MA, 2004.
|