Exploratory Modeling for Policy Analysis

Exploratory modeling is using computational experiments to assist in reasoning about systems where there is significant uncertainty. While frequently confused with the use of models to consolidate knowledge into a package that is used to predict system behavior, exploratory modeling is a very different kind of use, requiring a different methodology for model development. This paper distinguishes these two broad classes of model use describes some of the approaches used in exploratory modeling, and suggests some technological innovations needed to facilitate it.

[1]  David J. C. MacKay,et al.  A Practical Bayesian Framework for Backpropagation Networks , 1992, Neural Computation.

[2]  Edward Barrett Text, ConText, and HyperText: Writing with and for the Computer , 1991 .

[3]  James S. Hodges,et al.  Six (Or So) Things You Can Do with a Bad Model , 1991, Oper. Res..

[4]  Richard Saul Wurman,et al.  Information Anxiety 2 , 1989 .

[5]  T. G. Marr,et al.  Computational approaches to discovering semantics in molecular biology , 1989 .

[6]  J. D. Ryan Handbook of Systems Analysis — Craft Issues and Procedural Choices , 1988 .

[7]  R. Suri,et al.  Perturbation analysis: the state of the art and research issues explained via the GI/G/1 queue , 1989, Proc. IEEE.

[8]  Murray Stewart Groping in the dark , 1991, Nature.

[9]  Gerhart Bruckmann,et al.  Groping in the dark; the first decade of global modelling. , 1982 .

[10]  Mark D. Uncles,et al.  Handbook of Systems Analysis: Overview of Uses, Procedures, Applications and Practice , 1986 .

[11]  David Freedman,et al.  Some Pitfalls in Large Econometric Models: A Case Study , 1981 .

[12]  B. Efron The jackknife, the bootstrap, and other resampling plans , 1987 .

[13]  C. M. Strauss Computer-encouraged serendipity in pure mathematics , 1974 .

[14]  Y. Ronen Uncertainty Analysis , 1988 .

[15]  Rajan Suri,et al.  Infinitesimal perturbation analysis for general discrete event systems , 1987, JACM.

[16]  Elie Bienenstock,et al.  Neural Networks and the Bias/Variance Dilemma , 1992, Neural Computation.

[17]  B. Efron,et al.  A Leisurely Look at the Bootstrap, the Jackknife, and , 1983 .

[18]  Steven C. Bankes Exploratory Modeling and the use of Simulation for Policy Analysis , 1992 .

[19]  Edward E. Leamer,et al.  Specification Searches: Ad Hoc Inference with Nonexperimental Data , 1980 .

[20]  Donella Meadows The electronic oracle , 1985 .

[21]  Jeff Rothenberg,et al.  A 'propagative' approach to sensitivity analysis , 1990, Proceedings [1990]. AI, Simulation and Planning in High Autonomy Systems.

[22]  Robert H. Anderson,et al.  The RAND-ABEL programming language : reference manual , 1985 .

[23]  Alun Anderson Learning from a computer cat , 1988, Nature.

[24]  Robert H. Anderson,et al.  The Rand-Abel Programming Language: History, Rationale, and Design , 1985 .

[25]  R. S. Stainton,et al.  Handbook of systems analysis: H.J. MISER and E.S. QUADE (eds.) Wiley, 1985, xviii + 346 pages, £34.95 , 1986 .

[26]  Patrick D. Allen,et al.  Modeling qualitative issues in military simulations with the RAND-ABEL language , 1988, WSC '88.

[27]  J. A. Stockfisch,et al.  Models, Data, and War: A Critique of the Study of Conventional Forces , 1975 .