{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:05:11Z","timestamp":1761807911567,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"George Michael Fellowship"},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1011769"],"award-info":[{"award-number":["CNS-1011769"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-0904844","OCI-1032677"],"award-info":[{"award-number":["OCI-0904844","OCI-1032677"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006227","name":"Lawrence Livermore National Laboratory, Office of Science","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006227","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["HDTRA1-11-D-0016-0001","HDTRA1-11-1-0016"],"award-info":[{"award-number":["HDTRA1-11-D-0016-0001","HDTRA1-11-1-0016"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000057","name":"National Institute of General Medical Sciences","doi-asserted-by":"publisher","award":["2U01GM070694-09","3U01FM070694-09S1"],"award-info":[{"award-number":["2U01GM070694-09","3U01FM070694-09S1"]}],"id":[{"id":"10.13039\/100000057","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2014,7]]},"abstract":"<jats:p>We present an integrated interactive modeling environment to support public health epidemiology. The environment combines a high resolution individual-based model with a user-friendly Web-based interface that allows analysts to access the models and the analytics backend remotely from a desktop or a mobile device. The environment is based on a loosely coupled service-oriented-architecture that allows analysts to explore various counterfactual scenarios. As the modeling tools for public health epidemiology are getting more sophisticated, it is becoming increasingly difficult for noncomputational scientists to effectively use the systems that incorporate such models. Thus an important design consideration for an integrated modeling environment is to improve ease of use such that experimental simulations can be driven by the users. This is achieved by designing intuitive and user-friendly interfaces that allow users to design and analyze a computational experiment and steer the experiment based on the state of the system.<\/jats:p><jats:p>A key feature of a system that supports this design goal is the ability to start, stop, pause, and roll back the disease propagation and intervention application process interactively. An analyst can access the state of the system at any point in time and formulate dynamic interventions based on additional information obtained through state assessment. In addition, the environment provides automated services for experiment set-up and management, thus reducing the overall time for conducting end-to-end experimental studies.<\/jats:p><jats:p>We illustrate the applicability of the system by describing computational experiments based on realistic pandemic planning scenarios. The experiments are designed to demonstrate the system\u2019s capability and enhanced user productivity.<\/jats:p>","DOI":"10.1145\/2629692","type":"journal-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:24Z","timestamp":1406924004000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["An Interactive, Web-Based High Performance Modeling Environment for Computational Epidemiology"],"prefix":"10.1145","volume":"5","author":[{"given":"Suruchi","family":"Deodhar","sequence":"first","affiliation":[{"name":"NDSSL, Virginia Bioinformatics Institute, Virginia Tech"}]},{"given":"Keith R.","family":"Bisset","sequence":"additional","affiliation":[{"name":"NDSSL, Virginia Bioinformatics Institute, Virginia Tech"}]},{"given":"Jiangzhuo","family":"Chen","sequence":"additional","affiliation":[{"name":"NDSSL, Virginia Bioinformatics Institute, Virginia Tech"}]},{"given":"Yifei","family":"Ma","sequence":"additional","affiliation":[{"name":"NDSSL, Virginia Bioinformatics Institute, Virginia Tech"}]},{"given":"Madhav V.","family":"Marathe","sequence":"additional","affiliation":[{"name":"NDSSL, Virginia Bioinformatics Institute, Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2014,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.293"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Barrat A. Barthelemy M. and Vespignani A. 2008. Dynamical Processes in Complex Networks. Cambridge University Press. Barrat A. Barthelemy M. and Vespignani A. 2008. Dynamical Processes in Complex Networks . Cambridge University Press.","DOI":"10.1017\/CBO9780511791383"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.04.026"},{"volume-title":"Proceedings of the ACM\/IEEE Conference on Supercomputing.","author":"Barrett C. L.","key":"e_1_2_1_4_1","unstructured":"Barrett , C. L. , Bisset , K. R. , Eubank , S. G. , Feng , X. , and Marathe , M. V . 2008. EpiSimdemics: An efficient algorithm for simulating the spread of infectious disease over large realistic social networks . In Proceedings of the ACM\/IEEE Conference on Supercomputing. Barrett, C. L., Bisset, K. R., Eubank, S. G., Feng, X., and Marathe, M. V. 2008. EpiSimdemics: An efficient algorithm for simulating the spread of infectious disease over large realistic social networks. In Proceedings of the ACM\/IEEE Conference on Supercomputing."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2006.03.006"},{"volume-title":"Proceedings of the AAAI Conference.","author":"Bastian M.","key":"e_1_2_1_6_1","unstructured":"Bastian , M. , Heymann , S. , and Jacomy , M . 2009. Gephi: An open source software for exploring and manipulating networks . In Proceedings of the AAAI Conference. Bastian, M., Heymann, S., and Jacomy, M. 2009. Gephi: An open source software for exploring and manipulating networks. In Proceedings of the AAAI Conference."},{"key":"e_1_2_1_7_1","first-page":"47","article-title":"Pajek-program for large network analysis","volume":"21","author":"Batagelj V.","year":"1998","unstructured":"Batagelj , V. and Mrvar , A. 1998 . Pajek-program for large network analysis . Connections 21 , 2, 47 -- 57 . Batagelj, V. and Mrvar, A. 1998. Pajek-program for large network analysis. Connections 21, 2, 47--57.","journal-title":"Connections"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623375"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501602"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542336"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810085.1810118"},{"volume-title":"Proceedings of the IEEE International Symposium on Cluster Computing and the Grid. 506--513","author":"Bisset K. R.","key":"e_1_2_1_12_1","unstructured":"Bisset , K. R. , Deodhar , S. , Makkapati , H. , Marathe , M. V. , Stretz , P. , and Barrett , C. L . 2013. Simfrastructure: A flexible and adaptable middleware platform for modeling and analysis of socially coupled systems . In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid. 506--513 . Bisset, K. R., Deodhar, S., Makkapati, H., Marathe, M. V., Stretz, P., and Barrett, C. L. 2013. Simfrastructure: A flexible and adaptable middleware platform for modeling and analysis of socially coupled systems. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid. 506--513."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2334-11-37"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1473-3099(09)70176-8"},{"key":"e_1_2_1_15_1","first-page":"1","article-title":"Flute, a publicly available stochastic influenza epidemic simulation model","volume":"6","author":"Chai D. L.","year":"2010","unstructured":"Chai , D. L. , Halloran , M. E. , Obenchain , V. J. , and Longini Jr ., I. M. 2010 . Flute, a publicly available stochastic influenza epidemic simulation model . PLoS Comput. Biol. 6 , 1 . Chai, D. L., Halloran, M. E., Obenchain, V. J., and Longini Jr., I. M. 2010. Flute, a publicly available stochastic influenza epidemic simulation model. PLoS Comput. Biol. 6, 1.","journal-title":"PLoS Comput. Biol."},{"key":"e_1_2_1_16_1","unstructured":"CNN. 2009. 31 New York schools closed as flu spreads. http:\/\/www.cnn.com\/2009\/HEALTH\/05\/21\/ny.flu.schools\/. CNN. 2009. 31 New York schools closed as flu spreads. http:\/\/www.cnn.com\/2009\/HEALTH\/05\/21\/ny.flu.schools\/."},{"key":"e_1_2_1_17_1","volume-title":"STEM: Spatio-temporal epidemiological modeler","author":"Edlund S.","year":"2012","unstructured":"Edlund , S. and Kaufman , J . 2012 . STEM: Spatio-temporal epidemiological modeler . http:\/\/www.eclipse.org\/stem\/. Edlund, S. and Kaufman, J. 2012. STEM: Spatio-temporal epidemiological modeler. http:\/\/www.eclipse.org\/stem\/."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508819"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02541"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature04795"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02007"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601266103"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-13-940"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0308344101"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2005.0051"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2012.31"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.112"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-06-01148-7"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Meyers L. A. and Dimitrov N. 2010. Mathematical approaches to infectious disease prediction and control. INFORMS Tutor. Oper. Res. Meyers L. A. and Dimitrov N. 2010. Mathematical approaches to infectious disease prediction and control. INFORMS Tutor. Oper. Res .","DOI":"10.1287\/educ.1100.0075"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.021904"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043635.2043637"},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Pastor-Satorras R. and Vespignani A. 2002. Epidemics and immunization in scale-free networks. In Handbook of Graphs and Networks S. Bornholdt and H. G. Schuster Eds. Wiley-VCH Berlin. Pastor-Satorras R. and Vespignani A. 2002. Epidemics and immunization in scale-free networks. In Handbook of Graphs and Networks S. Bornholdt and H. G. Schuster Eds. Wiley-VCH Berlin.","DOI":"10.1002\/3527602755.ch5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0025-5564(85)90064-1"},{"key":"e_1_2_1_34_1","unstructured":"TIME. 2009. CDC says H1N1 outbreak shouldn\u2019t close schools. http:\/\/www.time.com\/time\/health\/article\/0 8599 1915244 00.html. TIME. 2009. CDC says H1N1 outbreak shouldn\u2019t close schools. http:\/\/www.time.com\/time\/health\/article\/0 8599 1915244 00.html."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3201\/eid1603.091216"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0024043"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12079-4_26"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2629692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:30Z","timestamp":1750227210000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["10.1145\/2629692"],"URL":"https:\/\/doi.org\/10.1145\/2629692","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"type":"print","value":"2158-656X"},{"type":"electronic","value":"2158-6578"}],"subject":[],"published":{"date-parts":[[2014,7]]},"assertion":[{"value":"2012-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}