Computational Model Library

Displaying 10 of 159 results for "Russell Toth" clear search

Peer reviewed Mission Cattle

Isaac Ullah | Published Monday, December 15, 2025

The model examines cattle herd dynamics on a patchy grassland subject to two exogenous pressures: periodic raiding events that remove animals and scheduled management culling that can target males and/or females. It is intended for comparative experiments on how raiding frequency, culling schedules, vegetation dynamics, and life-history parameters interact to shape herd persistence. The model was specifically designed to test the scenario of cattle herding in the arid grasslands of southern Arizona and northern Sonora during the mission period (late 17th through late 18th centuries, CE). In this period, herds were locally managed by Spanish mission personnel and local O’odham groups. Herds were culled mostly for local consumption of meat, hides, and tallow, but the mission herds were often targets for raiding by neighboring groups. The main purpose of the model is to examine herd dynamics in a seasonally variable, arid environment where herds are subject to both intentional internal harvest (culling) and external harvest (raiding).

Village Ecodynamics Project

ipem | Published Friday, May 13, 2011 | Last modified Saturday, April 27, 2013

The Village Project is designed to help archaeologists understand the factors influencing settlement patterns of small-scale agrarian peoples. Although such societies are becoming increasingly rare, they represent the norm throughout most of the Neolithic period the world over.

Will it spread or not? The effects of social influences and network topology on innovation diffusion

Sebastiano Delre | Published Monday, October 24, 2011 | Last modified Saturday, April 27, 2013

This models simulates innovation diffusion curves and it tests the effects of the degree and the direction of social influences. This model replicates, extends and departs from classical percolation models.

Modeling financial networks based on interpersonal trust

Michael Roos Anna Klabunde | Published Wednesday, May 29, 2013 | Last modified Thursday, November 28, 2013

We build a stylized model of a network of business angel investors and start-up entrepreneurs. Decisions are based on trust as a decision making tool under true uncertainty.

Peer reviewed Lithic Raw Material Procurement and Provisioning

Jonathan Paige | Published Friday, March 06, 2015 | Last modified Thursday, March 12, 2015

This model simulates the lithic raw material use and provisioning behavior of a group that inhabits a permanent base camp, and uses stone tools.

This agent-based model represents a stylized inter-organizational innovation network where firms collaborate with each other in order to generate novel organizational knowledge.

Peer reviewed BAMERS: Macroeconomic effect of extortion

Alejandro Platas López Alejandro Guerra-Hernández | Published Monday, March 23, 2020 | Last modified Sunday, July 26, 2020

Inspired by the European project called GLODERS that thoroughly analyzed the dynamics of extortive systems, Bottom-up Adaptive Macroeconomics with Extortion (BAMERS) is a model to study the effect of extortion on macroeconomic aggregates through simulation. This methodology is adequate to cope with the scarce data associated to the hidden nature of extortion, which difficults analytical approaches. As a first approximation, a generic economy with healthy macroeconomics signals is modeled and validated, i.e., moderate inflation, as well as a reasonable unemployment rate are warranteed. Such economy is used to study the effect of extortion in such signals. It is worth mentioning that, as far as is known, there is no work that analyzes the effects of extortion on macroeconomic indicators from an agent-based perspective. Our results show that there is significant effects on some macroeconomics indicators, in particular, propensity to consume has a direct linear relationship with extortion, indicating that people become poorer, which impacts both the Gini Index and inflation. The GDP shows a marked contraction with the slightest presence of extortion in the economic system.

In recent years we have seen multiple incidents with a large number of people injured and killed by one or more armed attackers. Since this type of violence is difficult to predict, detecting threats as early as possible allows to generate early warnings and reduce response time. In this context, any tool to check and compare different action protocols can be a further step in the direction of saving lives. Our proposal combines features from continuous and discrete models to obtain the best of both worlds in order to simulate large and crowded spaces where complex behavior individuals interact. With this proposal we aim to provide a tool for testing different security protocols under several emergency scenarios, where spaces, hazards, and population can be customized. Finally, we use a proof of concept implementation of this model to test specific security protocols under emergency situations for real spaces. Specifically, we test how providing some users of a university college with an app that informs about the type and characteristics of the ongoing hazard, affects in the safety performance.

The three-day participatory workshop organized by the TISSS Lab had 20 participants who were academics in different career stages ranging from university student to professor. For each of the five games, the participants had to move between tables according to some pre-specified rules. After the workshop both the participant’s perception of the games’ complexities and the participants’ satisfaction with the games were recorded.

In order to obtain additional objective measures for the games’ complexities, these games were also simulated using this simulation model here. Therefore, the simulation model is an as-accurate-as-possible reproduction of the workshop games: it has 20 participants moving between 5 different tables. The rules that specify who moves when vary from game to game. Just to get an idea, Game 3 has the rule: “move if you’re sitting next to someone who is waring white or no socks”.

An exact description of the workshop games and the associated simulation models can be found in the paper “The relation between perceived complexity and happiness with decision situations: searching for objective measures in social simulation games”.

This is a simulation of an insurance market where the premium moves according to the balance between supply and demand. In this model, insurers set their supply with the aim of maximising their expected utility gain while operating under imperfect information about both customer demand and underlying risk distributions.

There are seven types of insurer strategies. One type follows a rational strategy within the bounds of imperfect information. The other six types also seek to maximise their utility gain, but base their market expectations on a chartist strategy. Under this strategy, market premium is extrapolated from trends based on past insurance prices. This is subdivided according to whether the insurer is trend following or a contrarian (counter-trend), and further depending on whether the trend is estimated from short-term, medium-term, or long-term data.

Customers are modelled as a whole and allocated between insurers according to available supply. Customer demand is calculated according to a logit choice model based on the expected utility gain of purchasing insurance for an average customer versus the expected utility gain of non-purchase.

Displaying 10 of 159 results for "Russell Toth" clear search

This website uses cookies and Google Analytics to help us track user engagement and improve our site. If you'd like to know more information about what data we collect and why, please see our data privacy policy. If you continue to use this site, you consent to our use of cookies.
Accept