Literature DB >> 33232315

Developing political-ecological theory: The need for many-task computing.

Timothy Haas1.   

Abstract

Models of political-ecological systems can inform policies for managing ecosystems that contain endangered species. To increase the credibility of these models, massive computation is needed to statistically estimate the model's parameters, compute confidence intervals for these parameters, determine the model's prediction error rate, and assess its sensitivity to parameter misspecification. To meet this statistical and computational challenge, this article delivers statistical algorithms and a method for constructing ecosystem management plans that are coded as distributed computing applications. These applications can run on cluster computers, the cloud, or a collection of in-house workstations. This downloadable code is used to address the challenge of conserving the East African cheetah (Acinonyx jubatus). This demonstration means that the new standard of credibility that any political-ecological model needs to meet is the one given herein.

Entities:  

Mesh:

Year:  2020        PMID: 33232315      PMCID: PMC7685461          DOI: 10.1371/journal.pone.0226861

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

There is a need to acknowledge the complexity of political-ecological systems and the significant challenges to building theories of them [1-3]. Such systems lie at the interface between social/political science and ecology. The complexity of each of these fields coupled with an additional layer of complexity introduced by the interactions between sociological/political systems and natural systems can result in highly complex system dynamics, i.e., ones that are stiff, nonlinear, and possess feedback loops. For example, Schoon and Van der Leeuw [4] note that systems composed of interacting sociological and ecological subsystems are quick to change and rarely stay in equilibrium for long. Further, many state variables are needed to describe both the decision making processes of the relevant social groups, and the functioning of the involved ecosystem. A political-ecological system is also referred to as a socio-ecological system or social-ecological system (e.g., see [5]). The former term is emphasized herein because those political actions and processes that drive social movements are often initiated by groups seeking to gain increased political power [6]. The decline in the planet’s biodiversity [7], creates a need for credible political-ecological theory to guide the development of sustainable biodiversity conservation policies. In addition to the challenge of building political-ecological theory, there is a deeper problem with using such models to guide ecosystem management policy: Unless such a model is shown to be credible, any policy recommendations based on output from the model may receive only mixed acceptance by those affected. As argued in [8], there is a need for a common model credibility standard to be met before the output of a model of a political-ecological system is deemed to be policy-relevant. This is because there may be skepticism towards models that have not had their parameters statistically estimated nor their parameter sensitivities assessed [9, 10]. These skeptics may be unwilling to cooperate with efforts to implement ecosystem management policies that are based in-part on output from these unassessed models. But what is a credible model? Patterson and Whelan [11] state that “Model credibility is about the willingness of people to make decisions based on the predictions from the model.” In other words, a model is credible when a decision maker places enough trust in its predictions to use those predictions to select management actions. Call the model’s behavior, functioning, relationships, and systems of equations, its collective mechanism. Patterson and Whelan [11] believe the decision maker’s trust is won if (a) the model’s mechanism is based on known principles that govern the phenomenon being modeled; (b) all aspects of the model’s mechanism are testable, i.e., there are observable variables in the model on which data may be collected and used to conduct statistical hypothesis tests of the presence of these behaviors in the real world; and (c) the out-of-sample prediction error of the model’s predictions is below the decision maker’s threshold. To make the assessment of a political-ecological model’s credibility easier to perform, this article develops and demonstrates an integrated suite of statistical methods for assessing model credibility components (b) and (c), above. Some of the hypotheses of component (b) may concern the sensitivity of the model to perturbations to its parameters. The testing of such hypotheses is typically referred to as performing a sensitivity analysis. For the remainder of this article, the term “model validation” will not be used because in this author’s opinion, it is too ambiguous a term to support a consensus about whether a valid model can be established at all, let alone how it might be quantitatively assessed (see [12] and [13]). An agent-based model consists of a collection of entities that make a sequence of decisions through time based on their goals and inputs from other agents. An ABM is often built to model a social system that is too complex to represent using mathematical models [14]. In ecology, the word “agent” is often replaced with the word “individual” to emphasize that the entities are individual flora or fauna whose behavior is more genetically defined rather than being based on a belief system such as utility maximization. As the authors of [15] state, individual-based models (IBMs) “explicitly represent discrete individuals within an (ecological) population and their individual life cycles.” One approach to modeling a political-ecological system is with a combination of an ABM to capture the system’s anthropogenic actions, and an IBM to capture the dynamics of the affected ecosystem. These two submodels interact with each other in order to capture the effects of actions taken by groups of humans that affect the ecosystem—and the feedback effects from the ecosystem back to those groups. For example, Haas and Ferreira [16] build an economic-ecological model of the rhinoceros (Ceratotherium simum) horn trafficking system. This model contains submodels (agents) of rhino horn consumers, rhino poachers, and those antipoaching units attempting to stop the poachers. These latter two submodels interact with an IBM of the rhino population being illegally harvested. Haas and Ferreira [17] extend the poachers group submodel of this ABM-IBM model by adding a mechanism that explains how these individuals weigh the risk of being prosecuted for poaching against its profit potential. These authors then use this submodel to evaluate the practicality of policies aimed at providing employment opportunities for rhino poachers versus policies that intensify the enforcement of anti-poaching laws. This ABM-IBM model contains several hundred parameters.

Simulating a political-ecological system

Definition: A political-ecological system simulator (hereafter simulator) is an executable computer program capable of approximating the outputs of a stochastic model of a political-ecological system. Such a simulator is part of an ecosystem management tool (EMT) developed by Haas [8]. An EMT is used to find politically feasible and effective policies for managing at-risk ecosystems. In this simulator, influence diagrams (IDs) (see [18]) are used to implement submodels for group decision making, and ecosystem functioning. For instance, the political-ecological system models of Haas and Ferreira [16, 17, 19] are computationally implemented through their attendant simulators. This article’s central argument is that for simulators to effectively contribute to the development of political-ecological theory and ecosystem management policies, the following three activities need to be performed in sequence: (1) statistically fitting the simulator’s parameters to data sets of political-ecological actions [20], (2) assessing the credibility of this fitted simulator, and (3) running computations on this (now) credible simulator to find politically feasible and sustainable ecosystem management policies.

Addressing the computational challenge

Call one execution of a command to statistically estimate the parameters of a model, a job (see [21] and [22]). Generalizing this idea, let a simulator job refer to one execution of the computations needed to either (1) statistically estimate the parameters of a political-ecological system simulator; (2) compute parameter confidence intervals; (3) compute a measure of a simulator’s prediction error rate; (4) perform a sensitivity analysis; or (5) find, using the simulator, an ecosystem management policy. These five simulator jobs are integrated in that the first two jobs share the same estimator, the fourth job needs the confidence intervals found in the second job, and the fifth job uses the fitted model that was found by the first job. Simulator jobs can require large amounts of computer time. From now on, however, the use of policy-relevant statistical and optimization methods will be possible only if the attendant computational challenges are met. Hence, any discussion or evaluation of such methods is inseparable from a consideration of their computational implementations. But the need for large amounts of computer time can become a challenge for those scientists, government agencies, and NGOs needing to run such computations. Hereafter, call these groups and individuals who are involved in biodiversity protection, ecosystem managers. The handicap these managers face is that funding to support the active management of ecosystems can be uneven. For example, circa 2017-2020, the United States Environmental Protection Agency (USEPA) is being down-sized by President Trump’s administration [23]. But managing an ecosystem with the goal of conserving its biodiversity requires an on-going analysis of monitoring data as it arrives in order to guide the development of management actions that, when implemented, result in successful biodiversity outcomes. This means that ecosystem managers need to have alternative computing options should they be temporarily unable to afford supercomputer time from an external high performance computing (HPC) provider. This article argues that a practical way to meet this computational challenge is to implement these jobs as many-task computing (MTC) applications. The authors of [24] describe such jobs as being made up of a collection of within-job computations, called tasks that are loosely coupled, communication-intensive, and heterogeneous. Several application program interfaces (APIs) that can be used to implement such jobs are described below, and one, JavaSpaces™ (see [25]) is demonstrated through a case study.

Article contributions

This article makes three contributions to the development of political-ecological theory and the use of such theory in the formation of ecosystem management policies: the first integrated suite of statistical measures for performing parameter estimation and credibility assessment of a political-ecological model and its attendant simulator, a new method for constructing politically feasible and sustainable ecosystem management policies, and downloadable software for implementing these methods as MTC applications via the JavaSpaces API.

Related work

Models, estimation, and sensitivity analysis

In a highly cited article, Macy and Willer [26] discuss how ABMs can advance sociological theory. Conte and Paolucci [27] note the potential that ABMs have for social science theory construction. Methods exist for the statistical estimation of a socio-ecological model’s parameters [17, 28]—and for the estimation of a deterministic ecological model [29-31]. Minimum simulated distance estimators (MSDEs) are one family of parameter estimators that can be used to estimate the parameters of a stochastic ecosystem model. And one way to define the needed distance function is with the Hellinger distance [32, 33]. For example, in [28], a Hellinger distance-based MSDE is used to estimate the parameters of a stochastic, dynamic model of a political-ecological system. A model is sensitive to a set of parameters if small perturbations to their values significantly affect the model’s outputs. For instance, the authors of [34] perform a probabilistic sensitivity analysis [35] of a salmon population dynamics model. And in [36], a probabilistic sensitivity analysis of an agricultural model is performed.

Integrated statistical assessment of a socio-ecological model’s credibility

A literature search uncovered no articles describing an integrated statistical assessment of a socio-ecological model’s credibility. In [37], however, a specific suite of activities is given for statistically assessing an ecosystem model’s credibility. These authors believe the evaluation of an ecosystem model should include (1) an interrogation of the model’s logic to determine whether it is parsimonious and biologically realistic; (2) a statistical estimate of its parameters; (3) estimates of its prediction accuracy; (4) computation of statistical goodness-of-fit tests; and (5) a probabilistic sensitivity analysis. These authors, however, do not apply their recommendations to a case study. Yarkoni and Westfall [38] call for a shift in focus from building models that pass in-sample goodness-of-fit (GOF) tests towards the building of models that have low prediction error rates (out-of-sample performance). This is particularly true for models that are used to guide decisions aimed at changing the future behavior of a system (out-of-sample). A political-ecological system is, in-part, a model of how humans behave and hence, the focus on prediction for psychological models as advocated by Yarkoni and Westfall applies to political-ecological models.

Materials and methods

First, the procedure for using the EMT is given. This is followed by the statistical theory underpinning each simulator job. The section concludes with algorithms and runtime issues particular to the casting of simulator jobs as MTC applications.

EMT procedure

The three activities of statistically fitting a simulator, assessing its credibility, and using it to find politically feasible and ecologically effective policies form part of a step-by-step procedure given in [8, pp. 77-78] for using the EMT. A new version of this procedure follows. Identify the spatial boundaries of the ecosystem to be managed. Typically, this ecosystem will host one or more endangered species. Identify those political groups that directly or indirectly affect this ecosystem. Construct submodels of these groups by casting them as IDs and expressing them in the id language. This language is part of the id software system (see [39]). Use theories of cognitive processing to assign hypothesis values to the parameters of these submodels. Load these values into hypothesis parameter files—one file for each group. Construct a population dynamics submodel of all species identified in Step 1. Cast this submodel as an ID and express it in the id language. Use ecological theory to identify hypothesis values for the parameters of this submodel. Load these values into a hypothesis parameter file. Using all of the above files, create a master file that defines the political-ecological system simulator. Acquire a data set of political-ecological actions made by some of the groups modeled in Step 2, and the ecosystem modeled in Step 3. The ecological component of this data set might consist of observations on the spatio-temporal abundance of several species. Use id to statistically fit some subset of the simulator’s parameters to this data set using consistency analysis (see [28], and [8, pp. 46-52]). Use id to compute jackknife confidence intervals for the parameters estimated in Step 6. Conduct an analysis of the simulator’s credibility (see [8, pp. 179-198]) by using id to perform the two separate jobs of (a) estimating the simulator’s prediction error rate through computation of its one-step-ahead prediction error rates; and (b) performing a deterministic sensitivity analysis using thresholds defined by the parameter confidence intervals found in Step 7. If the simulator displays error rates that are no better than blind guessing (all options in each group submodel are equally likely), or it displays unacceptable sensitivity to some of its parameters, re-formulate one or more of the simulator’s submodels and go back to Step 6. Continue in this manner until the simulator is credible. Use id to run a job with this (now) credible simulator to construct the most practical ecosystem management plan (MPEMP) (see [8, pp. 52-53]). Implement this MPEMP in the real world. As new data becomes available, repeat Steps 6 through 10.

Statistical estimation of simulator parameters

The consistency analysis statistical estimator delivers parameter estimates that result in the simulator’s probability distributions on its output variables being as similar as possible to empirical distributions derived from data while at the same time being as close as possible to those derived from political-ecological theory. Consistency analysis is a parameter estimator that is related to MSDE.

Hellinger distance

Following [28, Appendix], and [17, S3 Appendix], one way to define the distance between two multivariate probability distributions is as follows. Partition a vector of p random variables, U into U(, and U(—the vectors of discrete and absolutely continuous random variables, respectively. Say there are d discrete members of U, and c continuous members. Hence, p ≡ d + c. Let the probability density probability function (PDPF) be Let U| notate the random vector whose PDPF is parameterized by the components of . For example, an ID might be composed of U1 ∼ Bernoulli(β1) and U2 ∼ Normal(β2 + u1 β3, β4). The graph of this ID appears in Fig 1, and its parameter vector, = (β1, β2, β3, β4).
Fig 1

The graph of the ID wherein U1 influences U2 and both of these nodes are stochastic (indicated by circles).

In terms of the PDPF, the Hellinger distance between two probability distributions is and is bounded between 0 and 1 [40].

Consistency analysis

Haas and Ferreira [17] give a description of consistency analysis before applying it to a model of the political-ecological system of rhino horn trafficking. An abbreviated version of this description appears here. Let m be the number of interacting IDs in a political-ecological simulator. Let U be the vector that contains all of the chance nodes that make up the i ID (either one of the group submodels or the ecosystem submodel). Let U|( be the i ID’s probability distribution parameterized by the entries in ( under the j set of conditioning (input) node values. Each parameter in the ID is assigned a point value a-priori that is derived from either expert opinion, subject matter theory, or the results of a previous consistency analysis. Collect all of these hypothesis values into the hypothesis parameter vector, . This vector holds the ecosystem manager’s prior beliefs about the true values of the model’s parameters. Let l be the number of belief networks formed by conditioning the ith ID on all possible combinations of its input nodes. There are m − 1 group submodels, and one ecosystem submodel. Define i.e., those parameters that identify all of the group submodels, those that identify the ecosystem submodel, and the collection of all of the model’s parameters, respectively. As in [8, pp. 17-18], for group submodels, let an in-combination be a set of values on the input nodes {time, input action, actor, subject}. Let an out-combination be a set of values on the input nodes {output action, target (of that action)}. A group ID selects an out-combination by computing the expected value of its terminal node, Overall Goal Attainment under the received (given) in-combination—and each possible combination of values on the two input nodes of Out-Action and Target. The out-combination that maximizes this expected value is selected for output. Let an in-out pair consist of an in-combination—out-combination pair. Let T be the number of time points at which out-combinations are observed, and (m ≤ m) be the set of indices of those group submodels for which at least one out-combination is observed over the observation time interval: [t1, t]. Each of the e output nodes of the ecosystem submodel is stochastic and corresponds to an observable ecosystem metric. A run of the simulator produces a set of simulated values on each output node at each time point. The mean of these values is an estimate of that node’s expected value at that time point. Let be a goodness-of-fit statistic that measures the agreement of a sequence of out-combinations and/or mean values of ecosystem metrics produced by a simulator and those of a political-ecological actions data set, S of observed output actions and/or observations on the ecosystem submodel’s metrics. Larger values of indicate better agreement. Let be a measure of agreement between the probability distribution on the model’s vector of output nodes that is identified by , and the one identified by . Again, larger values of indicate better agreement. Note that is the agreement between a sample and a stochastic model, while is the agreement between two stochastic models. A consistency analysis is executed with the following four steps. Specify the values for . Initialize the model’s parameter values by modifying to form . Maximize the agreement function, by modifying the values of to form the vector of consistent parameter values, . Analyze the differences in parameter values between those in , and those in . The estimator’s name comes from this final step: analyze the model’s parameters by scrutinizing areas of the subject matter theory that had been used to justify those hypothesis parameter values that, surprisingly, have been found to be very different from their consistent values. The Maximize step of consistency analysis consists of solving where , and c ∈ (0, 1) is the ecosystem manager’s priority of having the estimated distribution agree with the hypothesis distribution as opposed to agreeing with the empirical distribution. Setting c to zero turns consistency analysis into an MSDE. The subjective assignment of c in consistency analysis coupled with its role in the solution of (3) is how consistency analysis represents the reliability of the new data. The agreement between the simulator’s hypothesis distributions and the distributions defined by is where and the estimated Hellinger distance between U| and U| is In this estimator, values of the PDPF under an ID’s hypothesis distribution, U| and its U| distribution are approximated by first drawing a size-n sample of design points from a multivariate uniform distribution on the ID’s chance nodes: u1,…,u; and then computing , i = 1, …, n with a nonparametric density estimator. The agreement between observed output actions and those generated by the simulator is where y is the observed action of group i at time j, and d is the submodel-computed action of group i at time j. Let S ≡ {z, …, z} be the T observations on the ith ecosystem metric. The agreement between observed outputs of the ecosystem and those generated by the ecosystem submodel is where R ≡ max(S) − min(S). These latter two agreement functions form the overall data agreement function: .

Delete-d jackknife confidence intervals

The deterministic sensitivity analysis described in the next section assumes that confidence intervals for each parameter in are available. One way to find these is to compute delete-d jackknife confidence intervals (see [41]). Haas [42] gives an algorithm for computing a delete-d jackknife confidence interval. This algorithm proceeds as follows. Resample r = n0.97 observations from the observed size-n sample. In other words, temporarily delete d ≡ n − r observations from the observed sample. With this size-r subsample, compute , the consistency analysis estimate of the parameter, β. Repeat Steps 1 and 2 n times to obtain . Form a 100(1 − α)% confidence interval for β by finding the shortest interval that contains (1 − α)n of these values. Confidence intervals based on delete-d subsamples are consistent if, as r → ∞, r/n → 0 [43]. One way to meet this condition is to have r = n where τ ∈ (0, Â 1).

Prediction error rates

The simulator’s group submodels produce nominally-valued output in the form of out-combinations. The ecosystem submodel on the other hand, can produce continuously-valued output, e.g. wildlife abundance values. Two different measures of prediction error rate then, are needed. Here, these are the predicted actions error rate (ζ) for action-target output, and the root mean squared prediction error rate (ϵ) for the i continuously-valued ecosystem metric [8, pp. 186-188].

Predicted actions error rate

Consider a finite number of sequential time points, t1, …, t. At each of these time points, one or more of the simulator’s group submodels posts one or more out-combinations. Let where is the number of simulator-predicted out-combinations at time point t that match observed out-combinations at that time point, and is the number of these observed out-combinations. It is assumed that the simulator’s parameters have been refitted to the political-ecological actions data set using data observed earlier than time point t. The justification for this assumption is that an ecosystem manager would want to refit the simulator as new actions and/or values on ecosystem metrics are observed before using the simulator to predict future group actions and/or future values of ecosystem metrics. Say that a group submodel has K possible out-combinations. In the worst case, one of these out-combinations has a high probability of being chosen at each time point no matter what the input action is. Blind guessing would predict this out-combination with probability 1/K at each time point resulting in an error rate of about 1 − 1/K. An ecosystem manager would prefer the simulator’s predictions over predictions based on blind guessing whenever ζ < 1 − 1/K.

Root mean squared prediction error rate

Let where is the observed value of the ith continuously-valued ecosystem metric at time point t, and is the simulator’s predicted value of this metric at time point t where the ecosystem submodel has been fitted to data earlier than time point t. Define an alternative predictor, namely the naive forecast to be . Let δ be the RMSE of these naive forecasts.

Error rate estimation

To estimate these error rates, begin at time point t, s > 0. Then, perform the following two computations at each of the time points where v > 0 is the refit interval, n ≡ ⌊(T − 1 − s)/v⌋ + 1, , and T is the most recent time point in the data set. Re-fit the simulator with consistency analysis using all observed out-combinations up through time t. Run this refitted simulator from the first time point in the data set up through time point t to compute predicted values of all output nodes. With these predictions in-hand, compute an estimate of ζ with Estimate ϵ, and δ with and respectively. Note that the simulator is refitted every v time units. Typically, time is measured in years. An ecosystem manager would be constrained by analyst time, computer availability, and data acquisition frequency. A typical refit time interval is quarterly, i.e., v = (4 × 3)/52 = 0.2308. If is greater than , the naive forecast is preferred over the model’s predictions. In this case, the ecosystem manager would be advised to work on refining and/or modifying the model until is less than .

Deterministic sensitivity analysis

Deterministic sensitivity analysis assesses the sensitivity of a model’s outputs to externally-generated values of the model’s inputs (see [44]). Haas [8, pp. 182-183] gives an algorithm for studying a simulator’s deterministic sensitivity. A new version of this algorithm follows.

Conditions and responses

Input for this algorithm consists of a set of DSA conditions, c, and a set of DSA responses, r. Each of these sets contains values on simulator submodel output nodes. These values can be those of nominally-valued output action nodes, or of continuously-valued ecosystem submodel nodes. Refer to any actions in either of these sets that are to not happen as complement actions. A particular pair of these sets embodies a counter-example to the types of simulator outputs that the ecosystem manager is hoping to achieve. Typically, a critic or skeptic of the simulator would specify these sets. Update to the most recent value of . Specify c, and r and set the simulator’s time interval accordingly. Place all actions contained in either c or r into a file of “observed” actions, and all ecosystem responses contained in r into a file of “observed” ecosystem outputs. Initialize so that the simulator produces all actions contained in c and r but does not produce any complement actions contained in these sets. After setting c to 0.1, solve for by performing the consistency analysis Maximize step (see (3)) using the two files formed in Step 3. Compute .

Interpretation

The parameter β( is the most sensitive parameter, and the difference, is the accuracy to which this parameter needs to be known. If is inside the 95% confidence interval for β( (see the EMT procedure, Step 7), or is a scientifically plausible value for β(, conclude that this analysis supports the skeptic’s concerns about the simulator’s sensitivity to parameter misspecification. The idea of this algorithm is to search for a set of parameter values that is as close to as possible but causes the simulator’s outputs to change by an amount that is scientifically significant. If the values in are not statistically different from their consistent counterparts or, are scientifically plausible, then the model’s outputs are excessively sensitive to parameter misspecification. This sensitivity in-turn, reduces the credibility of policy recommendations derived from the model’s outputs.

Ecosystem management policymaking

Computing the MPEMP is one way to construct an ecosystem management policy. The algorithm described herein is new. Its development was motivated by earlier algorithms given in [8, pp. 52-53], and [17, S5 Appendix]. The idea is to find a set of minimal changes in the beliefs held by ecosystem-affecting groups (relative to their values) so that these groups change their behaviors enough to cause the ecosystem to respond in a desired manner. In other words, the MPEMP is the ecosystem management policy that emerges by finding group submodel parameter values that bring the predicted ecosystem state close to the desired ecosystem state while deviating minimally from .

Definitions

Let be a random vector composed of a number of the simulator’s ecosystem metrics. For example, might consist of cheetah abundance, and herbivore abundance in the year 2030. Assume that an ecosystem manager desires the ecosystem to be in a particular state at a designated future time point. This manager expresses this desired state by specifying the value of . For example, say that it is desired to have 10,000 herbivores and 1,000 cheetah in East Africa in the year 2030. Then Next, identify those actions that, if taken, would contribute the most towards the ecosystem submodel producing the values in q. And, identify those actions that, if ceased, would raise the likelihood of the ecosystem submodel producing the values in q. Collect all of these desirable and undesirable actions into a set called c. For example, to achieve these desired values, it is believed that more land should be set aside for wildlife reserves, and poaching should cease. In this case, where kep, and krr are the Kenya environmental protection agency, and Kenya rural residents groups, respectively. Update to the most recent . Compute . Specify q and c. Compute initial values for with the Initialize algorithm of consistency analysis (see Materials and methods: Consistency analysis). Compute under the set of constraints specified by c.

MPEMP algorithm

This algorithm implements one way to quantify the concept of a practical ecosystem management policy: Associate political feasibility with the value of where contains the parameters of the decision making submodels whose values have been modified from those in in such a way that now, the sequence of output actions taken by different groups cause a desired ecosystem state at a designated future time point. A measure of a plan’s political feasibility can be defined as A plan having a value of ψ close to 0.0 will face significant political resistance to its implementation because significant changes to the belief systems of one or more groups needs to happen, while one with a value close to 1.0 should not face such stiff resistance.

Coding simulator jobs as MTC applications

These five simulator jobs can be computationally expensive. These jobs can, however, be partially parallelized by breaking each of them into sets of dependent tasks that engage in various amounts of data transfer between themselves. Such a set of complex, inter-dependent tasks fits the definition of an MTC application. One way to execute MTC applications is to run them on cluster computers [24, 45]. A cluster computer consists of a number of personal computers called compute nodes (hereafter, nodes) that are connected through high speed interconnects. Translating the mathematical expressions of Materials and methods: Statistical estimation of simulator parameters into a programming language is performed by writing code within an API that supports the development of task-based parallel programs. A runtime system is invoked to execute such programs on hardware. The authors of [46] review APIs and runtime systems that are designed to support MTC applications. These authors refer to a particular combination of an API and a runtime system as a task-based parallelism technology. As identified in [46], an ideal API should be able to direct the runtime system to partition, synchronize, and cancel tasks; specify nodes for workers to run on; start/stop workers; receive task or process fault information; checkpoint a job should a nonrecoverable fault occur; and automatically distribute data and code to workers. In addition, the present author believes that in order to bring many-task computing within reach of ecosystem managers possessing only minimal programming skill, the API should be easy to learn, and use operators whose syntax and semantics are independent of specific runtime systems and hardware configurations. Therefore, to enable ecosystem managers with different backgrounds to use the five simulator jobs advocated in this article, a task-based parallelism technology needs to possess the following characteristics: Exhibit a high level of abstraction. Be easy to learn. Support the asynchronous, high-level coordination of simultaneous tasks. Separate the communication protocol from the application code. Be internet-aware. Be fault-tolerant: Processor failure is almost certain during a job that employs thousands of processors [47]. Such tolerance implies the ability to automatically checkpoint a job. Be scalable: Only one code need be written and maintained to run jobs on hardware ranging from laptop computers to cluster computers. Be computationally fast. Possess a strong theoretical foundation in computer science. Currently, several technologies possess some number of these desired characteristics including Java with JavaSpaces, Python with Parsl, Python with Ray, various languages with Docker Swarm, and julia with Docker and Kubernetes. The five simulator jobs could be coded and run in any of these technologies. In what follows, these five technolgies are described and compared.

Java with JavaSpaces

The JavaSpaces API can support the master-worker architecture wherein a master program runs on one node having a unique Internet Protocol address along with n workers who run on other, internet-accessible nodes and busy themselves by executing tasks that have been posted by the master on a JavaSpace bulletin board [48]. One coordination protocol for task posting and collection is the bag of tasks scheme wherein the master posts a batch of tasks and then waits until all of these tasks have been completed before posting another batch. This approach results in a program that is naturally balanced and naturally scalable [49]. Noble and Zlateva [50] find that “The simplicity and clean semantics of tuplespaces allow natural expressions of problems awkward or difficult to parallelize in other models [51].” A JavaSpaces program is also fault tolerant and decouples the semantics of distributed computing from those of the problem domain [49]. The runtime system Gigaspaces™ that supports the JavaSpaces API exhibits low inter-node communication latency [52]. The primary operations on a Gigaspaces space are write, read, change, take, and aggregation [53, 54]. Appendix A of S1 Appendix contains shell scripts that start and run a JavaSpaces program on a cluster computer. Appendix B of S1 Appendix contains guidance for running a JavaSpaces program on a shared cluster computer.

Python with Parsl

The Parsl package allows distributed Python programs to access thousands of nodes [55] either on cluster computers or in the cloud. The distributed application is created using the API operators Config, @python_app, and @bash_app.

Python with Ray

The Python package, Ray [56] provides the API operators @ray.remote, ray.wait, ray.get, and ray.put. Ray contains it own runtime system to manage the starting, reading, deleting, and recovery of tasks [57].

Various languages with Docker and Docker Swarm

Docker is a program that takes application language source code and creates a portable and executable version called a container. Docker Swarm Mode is a runtime system that orchestrates the execution of these containers across nodes on a cluster computer or in the cloud. Docker Swarm Mode can be used to manage a task-based, multi-language distributed program [58]. The steps needed to do this are 1) write the application modules in various application languages, 2) start support programs on each node, 3) start a Docker Swarm cluster by executing commands on each node, 4) create a Docker registry, 5) create images and from them, containers, 6) register the images, 7) create a stack file, and 8) run the application by deploying this stack.

julia with Docker and Kubernetes

The julia language [59] contains an API that provides the @spawn, and fetch() operators needed to run a bag-of-tasks application [59]. To do this, one needs to first use Docker to containerize the julia-written executables. Then, these containers are run on a Kubernetes cluster [60].

Comparisons

All five technologies are known to coordinate tasks, be internet-aware, and be computationally fast. Table 1 summarizes the strengths and weaknesses of these five technologies. Two notes are in order. JavaSpaces has a theoretical foundation in computer science [51, 52] that the other four technologies lack. Developing an MTC application with Docker Swarm Mode appears to require more user involvement with the runtime system than the other four technologies. On the other hand, container-based software development and distribution is quickly becoming the industry standard.
Table 1

Comparison of task-based technologies on desirable characteristics for building and running MTC applications.

CharacteristicJavaSpacesParslRayDocker Swarmjulia
AbstractionknownknownknownNAknown
Easy to learnknownknownknownNCknown
Communication hidingknownknownknownNAknown
Scalableknownknownknownknownknown
Fault-tolerantknownknownknownknownNC
PortableknownNCNCknownNC
Strong theoretical foundationknownNCNCNCNC

Not Clear (NC) indicates a document verifying the characteristic could not be found. Known means the technology is known to possess the characteristic either from publication or computational experience. Because Docker Swarm is a runtime system, Abstraction and Communication hiding are not applicable (NA) to it.

Not Clear (NC) indicates a document verifying the characteristic could not be found. Known means the technology is known to possess the characteristic either from publication or computational experience. Because Docker Swarm is a runtime system, Abstraction and Communication hiding are not applicable (NA) to it. This author chose the JavaSpaces API to develop the MTC applications exercised in the next section rather than any of the other four technologies because it is the only technology known to possess all of the desirable characteristics listed in Table 1.

Optimization as an MTC application

Optimization of stochastic functions under nonlinear constraints can be performed with the multiple dimensions ahead search (MDAS) algorithm of Haas [8, pp. 219-225]. This algorithm is a parallel version of the Hooke and Jeeves coordinate search algorithm [61]. MDAS executes by having the master assign each worker a vector of parameter values at which to compute the value of the objective function. These vectors are chosen such that the next M parameters are searched simultaneously for a maximum. Each worker computes the objective function value at its assigned set of parameter values. Once all of the workers have returned their function values, the master checks them for a new maximum (called an improvement). If found, the master stores this new best solution. This parallel search is repeated on these dimensions until no improvements are found. Then, the algorithm moves on to the next M dimensions. This algorithm was benchmarked against the classic Bukin F4 function [62]: for x ∈ [−15, −5], and y ∈ [−3, 3]. Starting at (−6, 2), MDAS found the global minimum of zero at the point (−10, 0) after 1081 function evaluations.

Simulator job-specific algorithms and runtime issues

Algorithmic details for how each simulator job is converted to an MTC application follow. Consistency analysis is run as an MTC application by performing its Maximize step with the MDAS algorithm wherein each worker runs on its own node. In order to both speedup evaluation of the objective function and to improve the optimization run’s convergence behavior, smooth objective functions are employed in-lieu of those based on the approximate negative Hellinger distance for , and (see (4)). These functions are the negative of the Euclidean distance between the parameters at their hypothesis values and those at a particular trial point in the optimization run. Call these Euclidean agreement measures , and , respectively.

Credibility assessment and the MPEMP

Jackknifing involves executing consistency analysis on each of n separate delete-d subsamples. It can be implemented as an MTC application by performing all of these n consistency analysis tasks simultaneously. Converting the prediction error rate job to an MTC application involves running a consistency analysis task on each of n subsamples (see Materials and methods: Prediction error rates). This is accomplished the same way that the jackknife subsamples are processed. The computational demands of a deterministic sensitivity analysis accrue from the consistency analysis performed in its Step 3 (see Materials and methods: Deterministic sensitivity analysis). The computational demands of the MPEMP job accrue from the optimization problem solved in the MPEMP algorithm’s Step 5 (see Materials and methods: Ecosystem management policymaking). This job is implemented in a way similar to consistency analysis.

Case study description

The following Results section contains a case study that applies the five simulator jobs to the estimation, credibility assessment, and MPEMP computation of an EMT for the conservation of cheetah in East Africa. All input files for this simulator are available at [63]. Hereafter, this simulator is referred to as the cheetah EMT simulator.

Overview of the cheetah EMT simulator

Haas [8] builds a simulator of the interactions between cheetah and humans in the East African countries of Kenya, Tanzania, and Uganda. The model consists of group submodels for each country’s presidential office (kpr, tpr, upr), environmental/wildlife protection agency (kep, tep, uep), non-pastoralist, rural residents (krr, trr, urr), and pastoralists (kpa, tpa, upa). In addition, a submodel is built to represent the group of conservation NGOs who have operations in at least one of these countries (ngo). All of these group submodels can interact with each other. And, each country’s environmental protection agency, rural residents, and pastoralists submodels can directly interact with a submodel of the ecosystem that spans these three countries (ecosys). This ecosystem hosts populations of cheetah and their herbivore prey. This model is formally documented in Appendix C of (S1 Appendix). An automatic data acquisition system has been gathering data since January, 2007 on this political-ecological system (see [20]). This data set contains 1555 actions observed from the year 2002 to 2019. S1 Data contains this data set. A portion of this data reveals a complex pattern of group actions followed by reactions from other groups (Fig 2). Cheetah abundance data is taken from [64, 65], and [66].
Fig 2

Observed actions history from East African online news stories for the period from January 2007 through June 2019.

The symbol “p” indicates an action taken by a presidential office, “a” an action taken by an EPA, “r” an action taken by rural residents, “s” an action taken by pastoralists, and “n” an action taken by an NGO. Selected out-combinations only are labeled. The bottom plot is observed cheetah abundance.

Observed actions history from East African online news stories for the period from January 2007 through June 2019.

The symbol “p” indicates an action taken by a presidential office, “a” an action taken by an EPA, “r” an action taken by rural residents, “s” an action taken by pastoralists, and “n” an action taken by an NGO. Selected out-combinations only are labeled. The bottom plot is observed cheetah abundance.

Results

Consistency analysis

Consistency analysis was used to estimate the parameters of the node: scenario imminent interaction with police within the Kenyan rural residents group submodel. A time step of 13 days results in each time interval containing about five actions. The Initialize step of consistency analysis was run to produce a set of initial parameter values. The initial match fraction (the ratio of the number of observed actions matched by the simulator’s output to the number of observed actions) is 0.646. The fraction of actions matched regardless of whether the target was matched, is 0.772, and the corresponding target match fraction is 0.870. See Table 2 for individual submodel match fractions.
Table 2

Match fractions from the initialize step of consistency analysis for the cheetah EMT simulator.

SubmodelnobsnmatchMatch fractionnactmatchAction match fractionntrgtmatchTarget match fraction
kpr 1000000
kep 142900.633900.6331410.992
krr 1000011.000
kpa 0000000
tpr 0000000
tep 27150.555150.555271.000
trr 0000000
tpa 0000000
upr 0000000
uep 24150.625150.625241.000
urr 0000000
upa 0000000
ngo 131900.6871311.000900.687
ecosys 0000000
Next, the Maximize step of consistency analysis was run on the Triton Shared Computing Cluster (TSCC) at the San Diego Supercomputer Center [67]. For this run, c was set to 0.99, and each belief network was simulated with 1000 Monte Carlo realizations. Nine nodes were employed and the maximum number of function evaluations was set to 1200. Only those parameters having an initial value different from their hypothesis value were modified. This resulted in only 40 of the 459 parameters being active during the optimization run—a significant reduction in the problem’s dimensionality. Initial and final values under the stochastic agreement measure for g(.) (4) were computed using 5000 Monte Carlo realizations for each belief network. Under this configuration, the simulator job’s wall clock time was 4.42 hours. The solution achieved a 25.5% increase in (Table 3).
Table 3

Consistency analysis agreement measures for the cheetah EMT simulator.

Agreement MeasureInitial ValueFinal Value
gS(Grp)(B) 0.63080.6000
eH(Grp)(B) -41.6800-29.4314
gH(Grp)(B) 0.84680.8888
gCA(B) -1.1394-0.8483
Jackknife confidence intervals were computed for the parameters that define the scenario imminent interaction with police node in the Kenya rural residents submodel of the cheetah EMT simulator. The jackknife subsample size is r = 5460.97 = 451, and n = 5. These five subsamples were used to compute 50% confidence intervals. Nine nodes ran for 4.85 wall clock hours to complete the job. All parameters are significantly different than zero. The five widest confidence intervals (Table 4) indicate that estimates of the group’s beliefs about being prosecuted for actions they might take are not excessively affected by sampling variability.
Table 4

The five widest confidence intervals of parameters defining the node Scenario Imminent Interaction With Police (SIIWP) in the Kenya rural residents submodel.

ECON conditioning valueIIWP conditioning valueLower boundaryUpper boundaryWidth
negligiblewill be evicted0.1100.3620.252
negligiblewill be arrested0.1610.4120.251
negligibleno interaction0.2110.4620.251
inadequatewill be arrested0.1110.2620.151
adequatewill be arrested0.1110.2620.151

These parameters are conditional probability values. The conditioning nodes are scenario action (ACTN), situation economic goal (ECON), and situation imminent interaction with police (IIWP). For all five of these intervals, the conditioning value for ACTN is poach for cash, and the SIIWP node’s value is no interaction with police.

These parameters are conditional probability values. The conditioning nodes are scenario action (ACTN), situation economic goal (ECON), and situation imminent interaction with police (IIWP). For all five of these intervals, the conditioning value for ACTN is poach for cash, and the SIIWP node’s value is no interaction with police. Prediction error rate was estimated by computing one-step-ahead predictions of actions, and cheetah abundance from 2016.9 through 2018. This run required 3.25 wall clock hours on the TSCC running nine nodes. The run produced 57 predictions resulting in , and for the cheetah abundance metric. The simulator was refitted to data five times. Say that the ecosystem manager wishes to use the simulator’s outputs to justify his/her position that reducing poaching would slow or reverse the decline in cheetah abundance. A skeptic, however, believes that scientifically plausible parameter values in the cheetah submodel can be found such that when the model is run from 2019 through 2025 under the restriction of no poaching actions, cheetah abundance in the year 2025 will be insignificantly different than that produced by the simulator when run under the assumption that current poaching rates continue into the future. If such parameter values can be found, the skeptic would argue that the model is unable to inform management action selection because the model can be calibrated to either recommend increased antipoaching effort or not recommend increased antipoaching effort. To represent this skeptic’s belief, c consists of the single constraint: no poaching actions occur from the present through the year 2025, i.e., And, r is populated with predictions of expected cheetah abundance in the year 2025 across several regions in Kenya (Table 5). These predicted values are found by running the simulator out to the year 2025 under the consistent parameter values found in Results: Consistency analysis. It is the use of these consistent values that forces poaching rates from 2019 through 2025 to be equal to current poaching rates.
Table 5

Cheetah abundance predictions in five regions of Kenya for the year 2025 computed under consistent parameter values.

RegionAbundance
Laikipia200
Samburu200
Tsavo145
Marsabit200
Turkana40

These values make up the set r.

These values make up the set r. The mathematical programming problem (3) with variables consisting of the ecosystem submodel’s parameters was solved over the interval 2019 through 2025 and required one hour of wall clock time on the TSCC utilizing eight worker nodes. Initial parameter values were set to with the exception that values in ( were adjusted as necessary so that any contemplated poaching action produced a small value of E[Overall Goal Attainment]. Doing so caused the Kenya rural residents group to avoid poaching actions during the optimization. If a solution to (3) were found such that all values in were scientifically plausible, then the skeptic’s position would be supported. As Table 6 indicates, however, the skeptic’s position is not supported because the value for the initial death rate, r0 (see Appendix C of S1 Appendix) needed to respect the conditions in c and the responses in r, is unrealistically high (0.510) under minor poaching pressure.
Table 6

Results for the deterministic sensitivity analysis of the ecosystem submodel.

ParameterHypothesis valueDSA value
minor poaching pressure
r00.0430.510
αr0.0000.000
βr0.0010.001
moderate poaching pressure
r00.4000.220
αr0.0000.000
βr0.0010.001
severe poaching pressure
r00.6000.600
αr0.0100.010
βr0.0010.001

Credibility assessment of the cheetah EMT simulator

The cheetah EMT model’s mechanism reflects principles of how political-ecological systems function [8, chs. 6-8]. Hence, component (a) of the Patterson and Whelan [11] criteria (see Introduction) is satisfied. Statistical estimation of the model’s parameters is the foundational step for establishing components (b) and (c). The model’s confidence intervals indicate that a selection of the model’s parameters cannot be ignored and can be estimated without excessive uncertainty. The model’s prediction error rates, however, are high. Finally, the model is resistant to a skeptic-created scenario engineered to show the model being unable to inform management action selection.

Finding the MPEMP

Say that it is desired to have 5,000 herbivores and 500 cheetah in East Africa in the year 2030. These target values are expressed by specifying To achieve this ecosystem state, more land needs to be set aside for wildlife reserves, and poaching needs to cease. These conditions are expressed by setting Group beliefs that are to be changed are those of the imminent interaction with police node of the Kenya rural resident group. The simulator job for finding the MPEMP formed a 108-dimensional optimization problem. When run with eight worker nodes on the TSCC, this simulator job required 2.97 wall clock hours to complete. Initial and final values of (4) were computed using 5,000 Monte Carlo realizations for each belief network. The MPEMP actions history (Fig 3) is such that Kenyan rural residents substitute the action verbally protest national park boundaries for poaching actions. In spite of this behavioral change, however, cheetah abundance does not attain the desired level by the year 2030.
Fig 3

The cheetah EMT simulator’s actions history under the MPEMP.

See Fig 2 for symbol legend. Lines connect action-reaction sequences. For example, one frequent action sequence in Tanzania is poaching, followed by a negative ecosystem status report, followed by a land gift to the poor.

The cheetah EMT simulator’s actions history under the MPEMP.

See Fig 2 for symbol legend. Lines connect action-reaction sequences. For example, one frequent action sequence in Tanzania is poaching, followed by a negative ecosystem status report, followed by a land gift to the poor. This plan’s ψ value is 0.845 meaning that this plan is not expected to face severe resistance to its implementation. This result rests on the nearness of the hypothesis distributions to the MPEMP distributions of the rural residents and pastoralists submodels. These hypothesis distributions represent recent efforts to include local people in the management of protected areas. Abukari and Mwalyosi [68] report that local people will find a protected area advantageous to their livelihoods if they are included as equal participants in decisions concerning the management of the protected area and, for nonpastoralists, if there is land outside the protected area where they can grow crops.

Total compute time

In this case study, running the five simulator jobs on a modest number of parameters, required 20 hours of wall clock time using 10 nodes. Due to the “curse of dimensionality,” if a larger number of parameters were assessed, this time could increase by two orders of magnitude. Say that the data set is updated quarterly as suggested in Materials and methods: Prediction error rates. Then, if these jobs were rerun after every update as called for in Step 11 of the EMT procedure, an ecosystem manager would need 20,000 hours of wall clock time every three months were he/she to run them on a single workstation. Clearly some sort of parallel computing alternative is needed.

Discussion

A procedure has been described for developing models of political-ecological systems that characterize the dynamics of an ecosystem being impacted by and impacting several different groups of humans. As part of this procedure, an integrated suite of methods has been presented for assessing a model’s credibility and computing ecosystem management plans with it. Through a case study, downloadable software [39] has been demonstrated that implements these methods as MTC applications. Doing so is a cost-effective way to support the lengthy computations that these methods entail. Further computational evidence on these methods is provided by first, the consistency analysis of a rhino conservation simulator reported in [17]. There, the authors fit 145 parameters of the rhino poacher decision making submodel. Second, a deterministic sensitivity analysis is performed on a different rhino conservation simulator in [19] where it is concluded that the model is not excessively sensitive to 10 key parameters. The data streams used for model estimation need to contain observations on more of the model’s outputs in order to establish the credibility of the group decision making submodels. Because of the massive amount of computation called for in this article, more efficient optimization algorithms also need to be developed. Fault recovery needs to be an integral part of these algorithms. Finally, the EMT procedure given herein needs to be used to develop group decision making submodels that learn. This article provides for the first time, a way for ecosystem managers to develop credible models with which to manage ecosystems that contain endangered species. Given the decline in the earth’s biodiversity, the potential impact of this contribution is difficult to overstate. But the future of ecosystem management lies in finding workable policies that not only address what needs to be done to conserve ecosystems under anthropogenic pressure, but also address the needs and aspirations of those people who interact with such ecosystems. Developing credible models of these political-ecological systems via the EMT procedure described herein can make this happen.

Shell scripts, guidance, and model documentation.

Shell scripts to initiate a Gigaspace, guidance for running on a shared cluster computer, and documentation of the cheetah EMT simulator. (PDF) Click here for additional data file.

Observed actions history for the Cheetah EMT simulator.

All data used in the cheetah conservation case study. (TXT) Click here for additional data file. 24 Feb 2020 PONE-D-19-33903 Developing political-ecological theory: The need for Many-Task Computing PLOS ONE Dear Professor Haas, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. We would appreciate receiving your revised manuscript by Apr 09 2020 11:59PM. When you are ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. To enhance the reproducibility of your results, we recommend that if applicable you deposit your laboratory protocols in protocols.io, where a protocol can be assigned its own identifier (DOI) such that it can be cited independently in the future. For instructions see: http://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols Please include the following items when submitting your revised manuscript: A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). This letter should be uploaded as separate file and labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. This file should be uploaded as separate file and labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. This file should be uploaded as separate file and labeled 'Manuscript'. Please note while forming your response, if your article is accepted, you may have the opportunity to make the peer review history publicly available. The record will include editor decision letters (with reviews) and your responses to reviewer comments. If eligible, we will contact you to opt in or out. We look forward to receiving your revised manuscript. Kind regards, Christian Vincenot, Ph.D. Academic Editor PLOS ONE Additional Editor Comments (if provided): The reviewer raises several concerns regarding your study. These should all be possible to address, so I return the manuscript to you with major revisions. FYI, I intend to gather the opinion of a second reviewer from ecology in the second round to also assess the conservation part of your work. Journal Requirements: When submitting your revision, we need you to address these additional requirements: 1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at http://www.plosone.org/attachments/PLOSOne_formatting_sample_main_body.pdf and http://www.plosone.org/attachments/PLOSOne_formatting_sample_title_authors_affiliations.pdf [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #2: Yes ********** 2. Has the statistical analysis been performed appropriately and rigorously? Reviewer #2: Yes ********** 3. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #2: Yes ********** 4. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #2: Yes ********** 5. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #2: The article is focused on developing political-ecological theory. To this purpose, it considers that models should be better analysed in depth in order to increase their credibility. This comes with a huge need of High Computing Performance. Authors thus propose to use Many-Task Computing coded with JavaSpacesTM. The major critics again this article is that it considers many parts (especially in Section 1 and 2), that are related to the subject, but not directly to the contribution of the article. This makes the article too long and a little bit confused on its main objective. As an example all the part about agent-based modeling can be omitted (or reduced a lot). Similarly does the presentation of all the statistical tools really need to be so detailled, as the main question of the paper is on parallelisation of the computation ? In contrarily, the choice of the Many-Task Computing approach and coded with JavaSpacesTM is not supported by a state of the art of the existing alternatives approaches. l31: "There is a need to acknowledge the complexity of political-ecological systems" There is not a need anymore to acknowledge the complexity of political-ecological systems, t l54 : "Unless such a model is shown to be credible using in-part, appropriate statistical methods, any "recommendations based on output from the model may receive only mixed acceptance by those affected." This has been showed that, even if the model is well-calibrated and analysed, it can be not been accepted by decision-makers, in particular due to a lack on involvement (see articles of A. Smagl) or that many models are accepted even if not realistic or calibrated (cf. all the works in participatory approaches and participative simulation). l135: "A literature search uncovered only two articles describing the statistical estimation of a socio-ecological model's parameters, namely, [23], and [17]." What about: "Calibration of simulation platforms including highly interweaved processes: the MAELIA multi-agent platform. June 2014, Conference: 7th Intl. Congress on Env. Modelling and SoftwareAt: San Diego, CA, USA, Romain Lardy et al. " In addition, it would be surprising that in all the models of socio-environmental systems (being agent-based or not), there is no parameter estimation... Finally, the issue of sensitivity analysis, calibration, parameter estimation ... could be tackled more generally than only in the context of SES systems, but also in any other applications (e.g. urban context, cf Denise Pumain & Romain Reuillon. Urban Dynamics and Simulation Models.) p8: "A political-ecological system simulator (hereafter simulator) is an executable computer program capable of approximating the outputs of a stochastic model of a political-ecological system." This definition can be applied in many cases of models. But in the case of agent-based models (that is the kind of models that is presented in this paper), defining it only related to its outputs is limitative, as its main strength relies on its capability to represent and understand inner dynamics. To fit with outputs, modern AI models are often more accurate. l215: this is only a technical point of view that occults all the social acceptability and power game that are important in model adoption. l228: "EMT proceudre" - how is it related to the idea of modeling methodolofy ? - Step 1 : what does the idea of boundaries cover ? is it spatial, temporal ? thematic ? - Do we need to specialize an ecosystems to one with endanger species ? Why does this approach does not aim at more generality ? - the various steps of the procedure have very different level of precision: there are details about files on one side (very low and technical level) and other parts are really higher level (e.g. identify the ecosystem ... ) As parallelisation seems to be the key point of the paper a State of the Art about parallelization technics and MTC would be necessary. In particular, only JavaNameSpace and MTC are presented and no other alternatives. l1000 : The conclusion that taking more land to build a reserve with a low resistance to its implementation seems unrealistic. This would requiers more details. ********** 6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #2: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files to be viewed.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email us at figures@plos.org. Please note that Supporting Information files do not need this step. 27 Mar 2020 Please see my Response to Reviewers file. Submitted filename: rev2r0rspns.pdf Click here for additional data file. 21 Jul 2020 PONE-D-19-33903R1 Developing political-ecological theory: The need for Many-Task Computing PLOS ONE Dear Dr. Haas, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. In two rounds of review now, very similar comments have been made by several reviewers. In summary, it has been repeatedly recommended that the manuscript be significantly reduced in length, providing a clearer, tighter focus on its contribution, and allowing readers to more easily engage with, and make use of, the ideas presented. You are strongly urged to take this advice when addressing the reviewers' comments. The current manuscript, with some appropriate editing, might be suitable for a chapter in a specialist collected volume - it is far too long and discursive for publication in a journal such as PLOS ONE. An appropriate response to this issue will be required for the manuscript to be accepted for publication. In addition, it is recommended that you take note of, and address, comments regarding the computational validation presented, and the need for a broader consideration of possible approaches to achieving parallel implementation. Please submit your revised manuscript by Sep 04 2020 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript: A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: http://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols We look forward to receiving your revised manuscript. Kind regards, Andrew Lewis Academic Editor PLOS ONE [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #3: (No Response) Reviewer #4: (No Response) ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #3: Partly Reviewer #4: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #3: No Reviewer #4: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #3: No Reviewer #4: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #3: Yes Reviewer #4: No ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #3: In its current form, the manuscript is unpublishable. I say this not unkindly, but constructively. The manuscript reads far more like a thesis, but not one that would be passable. The manuscript is far too long and contains a lot of irrelevant material that obscures its contributions (the important bits). I believe that contributions are there, but they are completely obscured. Some points that will turn that manuscript into a journal paper worthy of publication in PLOS ONE are: * The emphasis is all wrong. The manuscript is to much front loaded particularly in the introduction and literature review sections. These need to short and sharp and really drive the motivation of the novel contribution of the work. At the moment they are bloated and contain so much discussion that the reader easily forgets what the paper is about. Similarly, the important back-end is very scant. There needs to be a much richer discussion of results, the summary of the work and particularly what the future work can be. * In terms of the front-end, why do you have all these very large quotes? They add nothing to the paper. Remove them all and just paraphrase if necessary. * Section 1.3: A new algorithm (step-by-step procedure) is added in the literature review section. This would need to go later in the paper. * In general, please make algorithms short with minimal explanation each step, otherwise they become difficult to read. If you need more explanation, provide it in the body of the text. * There is a Figure 2 caption, but no actual figure. * As intimated above, more extensive computational evidence would be good. * Try to read some other PLOS ONE papers to see the form of them. I'm sure you'll find this helpful when you are revising your manuscript. Having said all of that, I'm really looking forward to reviewing a revised version of this manuscript! Reviewer #4: It's important to note that I was not one of the original reviewers. Given they did a good job of identifying issues of concern I have focused on their comments and the responses to them, rather than reanalysing the manuscript from scratch. With this in mind, this task would have been made significantly easier if the track changes version had been produced used latexdiff (https://ctan.org/pkg/latexdiff) instead of manual bolding of content. While the Comment n markers were helpful in linking sometimes modified, typically additional, content to the relevant comments, it was impossible to see if content was deleted or otherwise edited without going through both versions side-by-side. This showed that some of the bolded content has not been modified while some other changes have been made that have not been marked at all. It is clear, from the detail in the manuscript and the responses to the original reviewer's comments, that the author is passionate about the work and about making it technically sound. I appreciate the additions to the work have been made to address some of that reviewer's comments. However, the original reviewer clearly identified that the work was too long, with many details that could have been reduced or omitted (because they are covered elsewhere in the literature) and this revised version is even longer, at the upper end of a typical Honours (2-semester research) thesis. Based on my reading I am compelled to agree. Either the foundational work in Sections 1 and 2 could have been reduced to more tightly focus the paper, or the paper should have been split into two works. If the goal of the work is to provide (and evaluate & justify) a new tool for ecological management, then perhaps it would be better to split the material into (1) a paper that justifies its validity and shows its promise and (2) a suite of technical documents hosted with the open-source software. This would go some way toward dealing with the original reviewer's comments #1 and #11. Re Comments 6/7: The original reviewer's point remains and could be expanded as "Perhaps the search query was too narrow and missed relevant literature". The responses only address the offered example, not the thoroughness of the original search. Re original reviewer comment #12, they have a point. There are now many approaches to achieving parallelism. What they left out was a listing of examples that _do_ support easy deployment of applications across heterogeneous devices, like Docker, which are ignored in this paper. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #3: No Reviewer #4: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. 30 Jul 2020 Please see the uploaded file "r2rspns.pdf. Submitted filename: r2rspns.pdf Click here for additional data file. 16 Sep 2020 PONE-D-19-33903R2 Developing political-ecological theory: The need for Many-Task Computing PLOS ONE Dear Dr. Haas, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. The reviewers have commented on their appreciation of the efforts you have made to respond to their comments and the improvement this has made to the manuscript. There remain, however, some important reservations regarding the revised manuscript, and both reviewers have recommended some further changes. Please carefully consider their comment and suggestions, and try to respond not only to the details of their comments but also the intent behind them. An adequate response to the following points will be required for acceptance. The restructuring to separate the review of related work into a separate section is recommended. This will allow a clearer exposition of the objectives of the work in the introductory section. Both reviewers have recommended revision of the presentation of the algorithm in Section 2.5.2 to make it more concise and easy to follow, with any extensive commentary removed to supporting text. The issue remains regarding the consideration given to alternative technologies. Please present the reasons for choosing JavaSpaces clearly and concisely, with relevant comparison with other methods. This has not been achieved with the brief comments already included. Carefully consider what basic information is really required for a reader interested in this topic. While you have made commendable efforts to make the manuscript more focussed and concise, the response to the reviewers on the length of the manuscript is unpersuasive. There may be papers of a similar length already published in PLOS ONE, but there are equally many that are shorter, concise and clear. It is these last two characteristics that can significantly enhance a paper. Please submit your revised manuscript by Oct 31 2020 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript: A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: http://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols We look forward to receiving your revised manuscript. Kind regards, Andrew Lewis Academic Editor PLOS ONE [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #3: (No Response) Reviewer #4: (No Response) ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #3: Yes Reviewer #4: Partly ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #3: Yes Reviewer #4: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #3: No Reviewer #4: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #3: Yes Reviewer #4: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #3: The manuscript is certainly a large improvement on what was originally submitted. Just a few things to address: * My concern is the emphasis on a particular technology, JavaSpaces. It implies that the contribution of the paper is dependant on this technology. There is no harm saying that JavaSpaces was used as the implementation of the ideas. The discussion of the computational model needs to be cast in more general terms. As such, the current Section 2.7 needs to be recast and rewritten. Also, the very basic discussions of runtime systems and compiling etc does not need to be included. * Section 1 is far too big. The author needs to put the literature review components into a new section (Section 2) and reorganise the remaining components into Section 1. * Remove paragraphs from the Abstract. It is also too long and needs to be compacted. * Section 2.5.2 is not an algorithm. An algorithm is a far more precise set of simple steps that is readily translatable into code. The author needs to a) have a textual description under 2.5.2 explaining what is trying to be achieved, and then say the set of high level steps follow. I would encourage the author to try to cast this is an algorithm (there are plenty of papers out there with good examples). Reviewer #4: Thank you for the changes to the work. Thank you also for using latexdiff to mark up the changes. It has been the task of re-reviewing the work much easier. Regarding the length, the criticism from me and other reviewers has been that the work was overly long _given the message intended to be delivered_, and that the space devoted to background material hindered delivery of the message. The cuts to Sections 1 and 2 are welcome, and do help focus the paper better, although I strongly suspect it could be further targeted: 13000 words is a _long_ paper, and with no description of how you 'selected' those 5 other PLOS ONE papers, nor of why you consider them to be 'typical' (common, near average, near median?) length for the journal, it's unclear how this justifies the current length. The core issue from previous revisions remains: is this paper expounding improved statistical modelling and evaluation techniques for this domain, or proposing a computing approach to make them tractable? Trying to do both makes the work very long, and lessens the impact of both parts. Picking up from another review's comment and the response to it, the algorithm in 2.5.2 is still overly long and, despite the claims to have been made shorter, is actually only one sentence shorter, with several steps consisting of multiple paragraphs. That is not the typical way an algorithm is presented. Steps should be concise and clear, not laden with explanatory text. Consider splitting into an algorithm where, ideally, each step fits on 1-2 lines, with an explanation of the major tasks placed in normal paragraphs nearby. While it's good that some text has been added to discuss alternatives to JavaSpaces, and the response claims that these alternatives are presented in a way that shows they could be used to implement the approach defined in Section 2, that is unfortunately not how the section reads. Its placement, in the middle of the discussion of JavaSpaces, is odd, since the decision of which technology to use has clearly already been made. It offers little comparison between the chosen technology (remember, we're _not_ asking you to change that) and the alternatives, and is dismissive of Docker, incorrectly tying it to MPI (it actually takes extra effort to make Docker work with MPI; it is not its most natural use). I suggest either: moving the discussion of alternatives, including JavaSpaces, to the start of the section; or adding additional critique and comparison that either (1) indicates which of these alternatives could be used with neither benefit nor loss (i.e., JavaSpaces is one, equally valid implementation choice) or (2) demonstrates why JavaSpaces is a superior choice. Relatedly, in 3.1, could an estimate of the wallclock time if parallel computing had not been used be given, as well as an indication of the relative scale of the case study compared to other envisaged uses? This would go a long way to justifying 'the need for many-task computing', because as presented it looks like it would take ~45 hours to evaluate a model that would inform planning on a 5-10 year horizon, which is actually not that long to wait for an answer. In 3.2, what do the parameters in Table 3 represent? It's unclear how the reader is meant to derive much meaning from numbers 168, 165, 171, 174, 183. The 'additional computational evidence [at] lines 805-811' consists entirely of references to the author's own prior work. Could any other _new_ computational evidence beyond the single case study in this paper be included? The moved section 4.1 seems remarkably parochial. Australian and New Zealand (presumably European, too) governments have extensive HPC facilities that are free for researcher use and hence, governmental use. Even amongst the commercial HPC providers, products like Microsoft Azure and Amazon EC2 have been completely ignored, yet they have data centres in many locations around the world. I don't object to the inclusion of the section, but if it's to be included at all it should have some more general advice. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #3: No Reviewer #4: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. 27 Sep 2020 Please see my Response to Reviewers. Submitted filename: r3rspns.pdf Click here for additional data file. 30 Oct 2020 Developing political-ecological theory: The need for Many-Task Computing PONE-D-19-33903R3 Dear Dr. Haas, We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements. Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication. An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org. If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org. Kind regards, Andrew Lewis Academic Editor PLOS ONE Additional Editor Comments (optional): Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #3: (No Response) Reviewer #4: All comments have been addressed ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #3: Yes Reviewer #4: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #3: Yes Reviewer #4: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #3: Yes Reviewer #4: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #3: Yes Reviewer #4: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #3: I have now been through a few iterations of this paper. The author has been addressing my concerns each time. I believe it is at a point where it is acceptable. Reviewer #4: It's clear a lot of careful work has gone in to preparing this revision, and it addresses the majority of my concerns about the paper. The use of JavaSpaces is now much more thoroughly justified and the background work easier to follow. It's time for the work to be available for examination by a wider audience. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #3: No Reviewer #4: No 12 Nov 2020 PONE-D-19-33903R3 Developing political-ecological theory: The need for Many-Task Computing Dear Dr. Haas: I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department. If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org. If we can help with anything else, please email us at plosone@plos.org. Thank you for submitting your work to PLOS ONE and supporting open access. Kind regards, PLOS ONE Editorial Office Staff on behalf of Dr. Andrew Lewis Academic Editor PLOS ONE
  20 in total

1.  Dealing with uncertainty in ecosystem models: lessons from a complex salmon model.

Authors:  Paul McElhany; E Ashley Steel; Karen Avery; Naomi Yoder; Craig Busack; Brad Thompson
Journal:  Ecol Appl       Date:  2010-03       Impact factor: 4.657

2.  Conservation Risks: When Will Rhinos be Extinct?

Authors:  Timothy C Haas; Sam M Ferreira
Journal:  IEEE Trans Cybern       Date:  2015-09-02       Impact factor: 11.448

3.  Verification, validation, and confirmation of numerical models in the Earth sciences.

Authors:  N Oreskes; K Shrader-Frechette; K Belitz
Journal:  Science       Date:  1994-02-04       Impact factor: 47.728

Review 4.  A framework to establish credibility of computational models in biology.

Authors:  Eann A Patterson; Maurice P Whelan
Journal:  Prog Biophys Mol Biol       Date:  2016-10-01       Impact factor: 3.667

Review 5.  Choosing Prediction Over Explanation in Psychology: Lessons From Machine Learning.

Authors:  Tal Yarkoni; Jacob Westfall
Journal:  Perspect Psychol Sci       Date:  2017-08-25

6.  Probabilistic Distances Between Trees.

Authors:  Maryam K Garba; Tom M W Nye; Richard J Boys
Journal:  Syst Biol       Date:  2018-03-01       Impact factor: 15.683

7.  The global decline of cheetah Acinonyx jubatus and what it means for conservation.

Authors:  Sarah M Durant; Nicholas Mitchell; Rosemary Groom; Nathalie Pettorelli; Audrey Ipavec; Andrew P Jacobson; Rosie Woodroffe; Monika Böhm; Luke T B Hunter; Matthew S Becker; Femke Broekhuis; Sultana Bashir; Leah Andresen; Ortwin Aschenborn; Mohammed Beddiaf; Farid Belbachir; Amel Belbachir-Bazi; Ali Berbash; Iracelma Brandao de Matos Machado; Christine Breitenmoser; Monica Chege; Deon Cilliers; Harriet Davies-Mostert; Amy J Dickman; Fabiano Ezekiel; Mohammad S Farhadinia; Paul Funston; Philipp Henschel; Jane Horgan; Hans H de Iongh; Houman Jowkar; Rebecca Klein; Peter Andrew Lindsey; Laurie Marker; Kelly Marnewick; Joerg Melzheimer; Johnathan Merkle; Jassiel M'soka; Maurus Msuha; Helen O'Neill; Megan Parker; Gianetta Purchase; Samaila Sahailou; Yohanna Saidu; Abdoulkarim Samna; Anne Schmidt-Küntzel; Eda Selebatso; Etotépé A Sogbohossou; Alaaeldin Soultan; Emma Stone; Esther van der Meer; Rudie van Vuuren; Mary Wykstra; Kim Young-Overton
Journal:  Proc Natl Acad Sci U S A       Date:  2016-12-27       Impact factor: 11.205

Review 8.  How Power Affects People: Activating, Wanting, and Goal Seeking.

Authors:  Ana Guinote
Journal:  Annu Rev Psychol       Date:  2016-09-21       Impact factor: 24.137

9.  On agent-based modeling and computational social science.

Authors:  Rosaria Conte; Mario Paolucci
Journal:  Front Psychol       Date:  2014-07-14

10.  Making Predictions in a Changing World: The Benefits of Individual-Based Ecology.

Authors:  Richard A Stillman; Steven F Railsback; Jarl Giske; Uta Berger; Volker Grimm
Journal:  Bioscience       Date:  2014-12-12       Impact factor: 8.589

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.