首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   5篇
  国内免费   2篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2017年   3篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   8篇
  2012年   2篇
  2011年   2篇
  2008年   2篇
  2007年   4篇
  2006年   5篇
  2005年   5篇
  2004年   2篇
  2003年   1篇
  2001年   1篇
  1998年   1篇
  1991年   1篇
排序方式: 共有49条查询结果,搜索用时 15 毫秒
21.
According to the Perceptual Symbols Theory of cognition ( Barsalou, 1999 ), modality-specific simulations underlie the representation of concepts. A strong prediction of this view is that perceptual processing affects conceptual processing. In this study, participants performed a perceptual detection task and a conceptual property-verification task in alternation. Responses on the property-verification task were slower for those trials that were preceded by a perceptual trial in a different modality than for those that were preceded by a perceptual trial in the same modality. This finding of a modality-switch effect across perceptual processing and conceptual processing supports the hypothesis that perceptual and conceptual representations are partially based on the same systems.  相似文献   
22.
We studied how category typicality and out-of-category relatedness affect speeded category verification (vote "yes" if pictured object is clothing) in typically developing 4- to 14-year-olds and adults. Stimuli were typical and atypical category objects (e.g., pants, glove) and related and unrelated out-of-category objects (e.g., necklace, soup). Typical and unrelated out-of-category objects exhibited preferential processing (faster reaction times and fewer errors). Variations in typicality and relatedness disproportionately influenced children's performance, with developmental improvement associated with both verbal and nonverbal factors. Underextension versus overextension errors seemed to be associated with independent factors, namely multifaceted maturational factors versus receptive vocabulary skill, respectively. Errors were infrequent, suggesting spontaneous taxonomic classification by all participants. An experiment with printed words in adults replicated results, indicating that typicality and relatedness effects reflected organizational principles of the semantic system, not picture-related processes. This research establishes the viability of an online approach to assessing automatic components of semantic organization in children.  相似文献   
23.
24.
There are a number of theories that suggest that age of acquisition (AoA) effects are not uniform across different tasks. Catling and Johnston (2006a) found greater AoA effects within an object-naming task than in a semantic classification task. They explained these findings by suggesting that AoA effects might accumulate according to how many levels of representation a task necessitates access to. Brysbaert and Ghyselinck (2006) explain the difference in AoA effects by proposing two distinct types of AoA (frequency dependent and frequency independent), the first accounted for by a connectionist-type mechanism and the latter situated at the interface between semantics and word production. Moreover, Moore, Smith-Spark, and Valentine (2004) and Holmes and Ellis (2006) have suggested that there are two loci of AoA effects: at the phonological level and somewhere within the perceptual level of representation. Again, this could account for the varying degrees of AoA effects. This study sets about testing these ideas by assessing the effect size of AoA across a series of different tasks that necessitate access to various levels of representation. Experiments 1–4 demonstrate significant effects of AoA in a novel picture–picture verification task, an object classification task, a picture verification task, and an object-naming task. Experiment 5 showed no effects of initial phoneme on the naming of the critical objects used within Experiments 1–4. The implication of the varying AoA effect sizes found within Experiments 1–4 in relation to explanations of AoA are discussed.  相似文献   
25.
The aftermath of Caster Semenya’s resounding victory in the women’s 800?m at the 2009 Athletics World Championships in Berlin highlighted the ethical and scientific flaws of gender verification in women’s athletics. It has led the governing international body of professional athletics, the International Association of Athletics Federations (IAAF), to adopt new rules regarding athletes with differences of sexual developments (DSDs) in women’s competitions in 2011 (Regulations on Hyperandrogenism). The International Olympic Committee followed suit and adopted a similar set of rules in 2012. Locating the practice of gender verification in a history of sexist stereotyping of women athletes (in Section 1), I argue (in Section 2), following other critics, that the IAAF’s new rules suffer from the same ethical flaws as their predecessors; and specifically that they still invite and rely on qualitative measuring of an athlete’s femininity and masculinity. In the central section of this paper (Section 3), I relate the practice of gender verification to the vexing question of what constitutes an unfair advantage in sports. I suggest, first, that athletes with a DSD should be at liberty to exploit competitive advantages their conditions might confer on them, just as most athletes in most sports are at liberty to exploit their congenital traits (the only irrelevant difference being that DSDs are construed as gendered advantages). In a second step, I argue that gender segregation in sports and gender verification practices cannot both be defended by an appeal to fairness. If we want to preserve gender segregation, then we ought to give up gender verification; and if we are not prepared to give up regulation of gendered congenital advantages, then we ought to give up gender segregation in favor of a classification system that tracks genetic predisposition rather than gender.  相似文献   
26.
This paper distinguishes five key interpretations of the argument presented by Wittgenstein in Philosophical Investigations I, §258. I also argue that on none of these five interpretations is the argument cogent. The paper is primarily concerned with the most popular interpretation of the argument: that which that makes it rest upon the principle that one can be said to follow a rule only if there exists a ‘useable criterion of successful performance’ (Pears) or ‘operational standard of correctness’ (Glock) for its correct application. This principle, I suggest, is untrue. The private language argument upon which it rests therefore fails.  相似文献   
27.
To investigate the effects of color–digit synesthesia on numerical representation, we presented a synesthete, called SE, in the present study, and controls with mathematical equations for verification. In Experiment 1, SE verified addition equations made up of digits that either matched or mismatched her color–digit photisms or were in black. In Experiment 2A, the addends were presented in the different color conditions and the solution was presented in black, whereas in Experiment 2B the addends were presented in black and the solutions were presented in the different color conditions. In Experiment 3, multiplication and division equations were presented in the same color conditions as in Experiment 1. SE responded significantly faster to equations that matched her photisms than to those that did not; controls did not show this effect. These results suggest that photisms influence the processing of digits in arithmetic verification, replicating and extending previous findings.  相似文献   
28.
相比独自经历情绪事件,在群体中与他人共享情绪事件会放大个体的情绪体验,该效应被称之为群体共享情绪的放大效应。以往研究为群体共享情绪放大效应提供了部分间接的实验证据,但以往的理论,如群体共同关注理论和情绪传染理论,并不能对该效应做出很好的解释。基于社会评估理论和共享现实理论提出的评估–证实–放大模型可较好地解释群体共享情绪的放大效应。未来研究可在真实互动的群体情境中检验群体共享情绪放大效应及评估–证实–放大模型。  相似文献   
29.
三种意义理论的特点与困难   总被引:1,自引:0,他引:1  
梁彪 《现代哲学》2005,(2):122-128
本文讨论了现代意义理论其中的三种,指出三种意义理论各自的长处,并对各种理论存在的困难进行了分析。本文最后认为,这些意义理论存在的困难,与理论家们片面追求精确性有关。  相似文献   
30.
Security of multi-agent systems: A case study on comparison shopping   总被引:1,自引:0,他引:1  
The multi-agent-systems paradigm is becoming more and more popular as a basis for realizing net-based solutions. This development is accompanied by an increasing relevance of security issues. For instance, the potential loss of privacy and other assets is a major concern for, both merchants and customers, in Internet-based commerce and, without being properly addressed, such very legitimate concerns hamper the growth of e-commerce.This article uses a comparison-shopping scenario to introduce a general methodology for formally verifying the security of multi-agent systems. Following the approach of possibilistic information flow security, the flow of information between and within agents is restricted in order to ensure that secrets will not be disclosed to unauthorized meddlers. The security requirements for the overall system are then decomposed into requirements for the individual agents that can be verified independently from each other. Exploiting the modular structure of a multi-agent system considerably reduces the complexity of the overall security analysis. The techniques for decomposing security requirements, for verifying individual agents, and for deriving global security guarantees for the entire system from locally verified properties are all generic in the sense that they apply also to many other systems and security requirements than the ones that appear in the example scenario.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号