排序方式: 共有49条查询结果,搜索用时 15 毫秒
21.
According to the Perceptual Symbols Theory of cognition ( Barsalou, 1999 ), modality-specific simulations underlie the representation of concepts. A strong prediction of this view is that perceptual processing affects conceptual processing. In this study, participants performed a perceptual detection task and a conceptual property-verification task in alternation. Responses on the property-verification task were slower for those trials that were preceded by a perceptual trial in a different modality than for those that were preceded by a perceptual trial in the same modality. This finding of a modality-switch effect across perceptual processing and conceptual processing supports the hypothesis that perceptual and conceptual representations are partially based on the same systems. 相似文献
22.
We studied how category typicality and out-of-category relatedness affect speeded category verification (vote "yes" if pictured object is clothing) in typically developing 4- to 14-year-olds and adults. Stimuli were typical and atypical category objects (e.g., pants, glove) and related and unrelated out-of-category objects (e.g., necklace, soup). Typical and unrelated out-of-category objects exhibited preferential processing (faster reaction times and fewer errors). Variations in typicality and relatedness disproportionately influenced children's performance, with developmental improvement associated with both verbal and nonverbal factors. Underextension versus overextension errors seemed to be associated with independent factors, namely multifaceted maturational factors versus receptive vocabulary skill, respectively. Errors were infrequent, suggesting spontaneous taxonomic classification by all participants. An experiment with printed words in adults replicated results, indicating that typicality and relatedness effects reflected organizational principles of the semantic system, not picture-related processes. This research establishes the viability of an online approach to assessing automatic components of semantic organization in children. 相似文献
23.
24.
《Quarterly journal of experimental psychology (2006)》2013,66(1):50-62
There are a number of theories that suggest that age of acquisition (AoA) effects are not uniform across different tasks. Catling and Johnston (2006a) found greater AoA effects within an object-naming task than in a semantic classification task. They explained these findings by suggesting that AoA effects might accumulate according to how many levels of representation a task necessitates access to. Brysbaert and Ghyselinck (2006) explain the difference in AoA effects by proposing two distinct types of AoA (frequency dependent and frequency independent), the first accounted for by a connectionist-type mechanism and the latter situated at the interface between semantics and word production. Moreover, Moore, Smith-Spark, and Valentine (2004) and Holmes and Ellis (2006) have suggested that there are two loci of AoA effects: at the phonological level and somewhere within the perceptual level of representation. Again, this could account for the varying degrees of AoA effects. This study sets about testing these ideas by assessing the effect size of AoA across a series of different tasks that necessitate access to various levels of representation. Experiments 1–4 demonstrate significant effects of AoA in a novel picture–picture verification task, an object classification task, a picture verification task, and an object-naming task. Experiment 5 showed no effects of initial phoneme on the naming of the critical objects used within Experiments 1–4. The implication of the varying AoA effect sizes found within Experiments 1–4 in relation to explanations of AoA are discussed. 相似文献
25.
《Sport, Ethics and Philosophy》2013,7(4):450-466
The aftermath of Caster Semenya’s resounding victory in the women’s 800?m at the 2009 Athletics World Championships in Berlin highlighted the ethical and scientific flaws of gender verification in women’s athletics. It has led the governing international body of professional athletics, the International Association of Athletics Federations (IAAF), to adopt new rules regarding athletes with differences of sexual developments (DSDs) in women’s competitions in 2011 (Regulations on Hyperandrogenism). The International Olympic Committee followed suit and adopted a similar set of rules in 2012. Locating the practice of gender verification in a history of sexist stereotyping of women athletes (in Section 1), I argue (in Section 2), following other critics, that the IAAF’s new rules suffer from the same ethical flaws as their predecessors; and specifically that they still invite and rely on qualitative measuring of an athlete’s femininity and masculinity. In the central section of this paper (Section 3), I relate the practice of gender verification to the vexing question of what constitutes an unfair advantage in sports. I suggest, first, that athletes with a DSD should be at liberty to exploit competitive advantages their conditions might confer on them, just as most athletes in most sports are at liberty to exploit their congenital traits (the only irrelevant difference being that DSDs are construed as gendered advantages). In a second step, I argue that gender segregation in sports and gender verification practices cannot both be defended by an appeal to fairness. If we want to preserve gender segregation, then we ought to give up gender verification; and if we are not prepared to give up regulation of gendered congenital advantages, then we ought to give up gender segregation in favor of a classification system that tracks genetic predisposition rather than gender. 相似文献
26.
Stephen Law 《International Journal of Philosophical Studies》2013,21(2):159-176
This paper distinguishes five key interpretations of the argument presented by Wittgenstein in Philosophical Investigations I, §258. I also argue that on none of these five interpretations is the argument cogent. The paper is primarily concerned with the most popular interpretation of the argument: that which that makes it rest upon the principle that one can be said to follow a rule only if there exists a ‘useable criterion of successful performance’ (Pears) or ‘operational standard of correctness’ (Glock) for its correct application. This principle, I suggest, is untrue. The private language argument upon which it rests therefore fails. 相似文献
27.
Thomas G. Ghirardelli Carol Bergfeld Mills Monica K. C. Zilioli Leah P. Bailey Paige K. Kretschmar 《The Journal of general psychology》2013,140(2):175-189
To investigate the effects of color–digit synesthesia on numerical representation, we presented a synesthete, called SE, in the present study, and controls with mathematical equations for verification. In Experiment 1, SE verified addition equations made up of digits that either matched or mismatched her color–digit photisms or were in black. In Experiment 2A, the addends were presented in the different color conditions and the solution was presented in black, whereas in Experiment 2B the addends were presented in black and the solutions were presented in the different color conditions. In Experiment 3, multiplication and division equations were presented in the same color conditions as in Experiment 1. SE responded significantly faster to equations that matched her photisms than to those that did not; controls did not show this effect. These results suggest that photisms influence the processing of digits in arithmetic verification, replicating and extending previous findings. 相似文献
28.
29.
三种意义理论的特点与困难 总被引:1,自引:0,他引:1
本文讨论了现代意义理论其中的三种,指出三种意义理论各自的长处,并对各种理论存在的困难进行了分析。本文最后认为,这些意义理论存在的困难,与理论家们片面追求精确性有关。 相似文献
30.
The multi-agent-systems paradigm is becoming more and more popular as a basis for realizing net-based solutions. This development is accompanied by an increasing relevance of security issues. For instance, the potential loss of privacy and other assets is a major concern for, both merchants and customers, in Internet-based commerce and, without being properly addressed, such very legitimate concerns hamper the growth of e-commerce.This article uses a comparison-shopping scenario to introduce a general methodology for formally verifying the security of multi-agent systems. Following the approach of possibilistic information flow security, the flow of information between and within agents is restricted in order to ensure that secrets will not be disclosed to unauthorized meddlers. The security requirements for the overall system are then decomposed into requirements for the individual agents that can be verified independently from each other. Exploiting the modular structure of a multi-agent system considerably reduces the complexity of the overall security analysis. The techniques for decomposing security requirements, for verifying individual agents, and for deriving global security guarantees for the entire system from locally verified properties are all generic in the sense that they apply also to many other systems and security requirements than the ones that appear in the example scenario. 相似文献