NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Starns, Jeffrey J.; Ma, Qiuli – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2018
The two-high-threshold (2HT) model of recognition memory assumes that people make memory errors because they fail to retrieve information from memory and make a guess, whereas the continuous unequal-variance (UV) model and the low-threshold (LT) model assume that people make memory errors because they retrieve misleading information from memory.…
Descriptors: Guessing (Tests), Recognition (Psychology), Memory, Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Bader, Markus; Meng, Michael – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2018
Most current models of sentence comprehension assume that the human parsing mechanism (HPM) algorithmically computes detailed syntactic representations as basis for extracting sentence meaning. These models share the assumption that the representations computed by the HPM accurately reflect the linguistic input. This assumption has been challenged…
Descriptors: Sentences, Misconceptions, Comprehension, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Denby, Thomas; Schecter, Jeffrey; Arn, Sean; Dimov, Svetlin; Goldrick, Matthew – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2018
Phonotactics--constraints on the position and combination of speech sounds within syllables--are subject to statistical differences that gradiently affect speaker and listener behavior (e.g., Vitevitch & Luce, 1999). What statistical properties drive the acquisition of such constraints? Because they are naturally highly correlated, previous…
Descriptors: Phonology, Probability, Learning Processes, Syllables
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Riviere, James; Falaise, Aurelie – Developmental Psychology, 2011
An intriguing error has been observed in toddlers presented with a 3-location search task involving invisible displacements of an object, namely, the C-not-B task. In 3 experiments, the authors investigated the dynamics of the attentional focus process that is suspected to be involved in this task. In Experiment 1, 2.5-year-old children were…
Descriptors: Response Style (Tests), Disabilities, Toddlers, Toys
Peer reviewed Peer reviewed
Direct linkDirect link
Maus, Gerrit W.; Nijhawan, Romi – Journal of Experimental Psychology: Human Perception and Performance, 2009
When a moving object abruptly disappears, this profoundly influences its localization by the visual system. In Experiment 1, 2 aligned objects moved across the screen, and 1 of them abruptly disappeared. Observers reported seeing the objects misaligned at the time of the offset, with the continuing object leading. Experiment 2 showed that the…
Descriptors: Adults, Visual Perception, Experiments, Experimental Psychology