首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   0篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   2篇
  2013年   8篇
  2012年   6篇
  2011年   1篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2002年   2篇
  2001年   1篇
  1984年   1篇
  1978年   1篇
  1977年   1篇
排序方式: 共有35条查询结果,搜索用时 31 毫秒
11.
To enhance the training of sport psychology consultants, it is important to know which learning experiences are useful for which components of professional development. We interviewed 15 novice consultants on their learning experiences related to 13 different topics. Traditional learning experiences (e.g., courses, teachers) were related to the development of practical know-how. Learning from others (e.g., peers, colleagues) was related to professional development (i.e., dealing with issues, challenges, and dilemmas that occur in sport psychology practice). Practical experience and reflective activities were related to both know-how and professional development. These results can be used to shape effective sport psychology education.  相似文献   
12.
In a previous study (R. R. C. Hutter & R. J. Crisp, 2005), the authors suggested that one way in which perceivers resolve the dilemma of shared membership of incongruent category combinations is by generating emergent attributes. However, the authors also found evidence that a corresponding process of reduced constituent facilitation occurs. In the present research, the authors aimed to isolate this phenomenon using a response-time methodology. Participants were exposed to subliminal unsurprising or surprising gender-occupation category-combination primes. The authors observed facilitation in overall response times on a subsequent lexical decision task to constituent attributes when the combination primed was unsurprising compared with surprising, but only for female and not for male combinations. The authors suggest that perceivers reduce their application of constituent attributes when processing surprising versus unsurprising combinations.  相似文献   
13.
14.
15.
Everitt  Tom  Hutter  Marcus  Kumar  Ramana  Krakovna  Victoria 《Synthese》2021,198(27):6435-6467

Can humans get arbitrarily capable reinforcement learning (RL) agents to do their bidding? Or will sufficiently capable RL agents always find ways to bypass their intended objectives by shortcutting their reward signal? This question impacts how far RL can be scaled, and whether alternative paradigms must be developed in order to build safe artificial general intelligence. In this paper, we study when an RL agent has an instrumental goal to tamper with its reward process, and describe design principles that prevent instrumental goals for two different types of reward tampering (reward function tampering and RF-input tampering). Combined, the design principles can prevent reward tampering from being an instrumental goal. The analysis benefits from causal influence diagrams to provide intuitive yet precise formalizations.

  相似文献   
16.
Security of multi-agent systems: A case study on comparison shopping   总被引:1,自引:0,他引:1  
The multi-agent-systems paradigm is becoming more and more popular as a basis for realizing net-based solutions. This development is accompanied by an increasing relevance of security issues. For instance, the potential loss of privacy and other assets is a major concern for, both merchants and customers, in Internet-based commerce and, without being properly addressed, such very legitimate concerns hamper the growth of e-commerce.This article uses a comparison-shopping scenario to introduce a general methodology for formally verifying the security of multi-agent systems. Following the approach of possibilistic information flow security, the flow of information between and within agents is restricted in order to ensure that secrets will not be disclosed to unauthorized meddlers. The security requirements for the overall system are then decomposed into requirements for the individual agents that can be verified independently from each other. Exploiting the modular structure of a multi-agent system considerably reduces the complexity of the overall security analysis. The techniques for decomposing security requirements, for verifying individual agents, and for deriving global security guarantees for the entire system from locally verified properties are all generic in the sense that they apply also to many other systems and security requirements than the ones that appear in the example scenario.  相似文献   
17.
18.
We investigated the effect of age-related decline in executive ability on the application of emergent features to incongruent social category conjunctions (e.g., male midwife). When forming an impression of an incongruent conjunction, older adults used more emergent attributes (attributes associated exclusively with the category conjunction and not the constituents), relative to younger adults. Moreover, this relationship was mediated by a reduction in inhibitory ability (measured using a Stroop task) and processing speed (measured using a Digit Symbol Substitution Test, DSST). These findings are consistent with the notion that executive ability is pivotal in understanding social functioning in older adults. We discuss the implications of these findings for the continuing development of models outlining the processes and stages involved in perceiving social category conjunctions.  相似文献   
19.
20.
Current leadership theories and business models—built around modernist assumptions about winners and losers, power and control, and local rather than global interactions—are decades out of date with what is needed to lead postindustrial and postmodern enterprises. This article calls for a collaborative and socially intelligent theory for leadership development based on Integral Science. This theory incorporates and unifies appropriate elements of current leadership research for a postmodern knowledge economy and seeks answers to questions still unanswered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号