首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   404篇
  免费   40篇
  国内免费   41篇
  2023年   3篇
  2022年   5篇
  2021年   12篇
  2020年   22篇
  2019年   28篇
  2018年   15篇
  2017年   27篇
  2016年   19篇
  2015年   12篇
  2014年   22篇
  2013年   47篇
  2012年   17篇
  2011年   20篇
  2010年   13篇
  2009年   21篇
  2008年   28篇
  2007年   25篇
  2006年   16篇
  2005年   16篇
  2004年   19篇
  2003年   17篇
  2002年   16篇
  2001年   8篇
  2000年   10篇
  1999年   8篇
  1998年   6篇
  1997年   5篇
  1996年   1篇
  1994年   2篇
  1993年   2篇
  1992年   6篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1984年   1篇
  1982年   2篇
  1980年   1篇
  1978年   1篇
  1977年   4篇
排序方式: 共有485条查询结果,搜索用时 15 毫秒
41.
Algorithms for approximate Bayesian inference, such as those based on sampling (i.e., Monte Carlo methods), provide a natural source of models of how people may deal with uncertainty with limited cognitive resources. Here, we consider the idea that individual differences in working memory capacity (WMC) may be usefully modeled in terms of the number of samples, or “particles,” available to perform inference. To test this idea, we focus on two recent experiments that report positive associations between WMC and two distinct aspects of categorization performance: the ability to learn novel categories, and the ability to switch between different categorization strategies (“knowledge restructuring”). In favor of the idea of modeling WMC as a number of particles, we show that a single model can reproduce both experimental results by varying the number of particles—increasing the number of particles leads to both faster category learning and improved strategy‐switching. Furthermore, when we fit the model to individual participants, we found a positive association between WMC and best‐fit number of particles for strategy switching. However, no association between WMC and best‐fit number of particles was found for category learning. These results are discussed in the context of the general challenge of disentangling the contributions of different potential sources of behavioral variability.  相似文献   
42.
Making judgments by relying on beliefs about the causal relationships between events is a fundamental capacity of everyday cognition. In the last decade, Causal Bayesian Networks have been proposed as a framework for modeling causal reasoning. Two experiments were conducted to provide comprehensive data sets with which to evaluate a variety of different types of judgments in comparison to the standard Bayesian networks calculations. Participants were introduced to a fictional system of three events and observed a set of learning trials that instantiated the multivariate distribution relating the three variables. We tested inferences on chains X1  Y  X2, common cause structures X1  Y  X2, and common effect structures X1  Y  X2, on binary and numerical variables, and with high and intermediate causal strengths. We tested transitive inferences, inferences when one variable is irrelevant because it is blocked by an intervening variable (Markov Assumption), inferences from two variables to a middle variable, and inferences about the presence of one cause when the alternative cause was known to have occurred (the normative “explaining away” pattern). Compared to the normative account, in general, when the judgments should change, they change in the normative direction. However, we also discuss a few persistent violations of the standard normative model. In addition, we evaluate the relative success of 12 theoretical explanations for these deviations.  相似文献   
43.
Procedures used for statistical inference are receiving increased scrutiny as the scientific community studies the factors associated with insuring reproducible research. This note addresses recent negative attention directed at p values, the relationship of confidence intervals and tests, and the role of Bayesian inference and Bayes factors, with an eye toward better understanding these different strategies for statistical inference. We argue that researchers and data analysts too often resort to binary decisions (e.g., whether to reject or accept the null hypothesis) in settings where this may not be required.  相似文献   
44.
In multiple‐cue probabilistic inference, people choose between alternatives based on several cues, each of which is differentially associated with an alternative's overall value. Various strategies have been proposed for probabilistic inference (e.g., weighted additive, tally, and take‐the‐best). These strategies differ in how many cue values they require to enact and in how they weight each cue. Do decision makers actually use any of these strategies? Ways to investigate this question include analyzing people's choices and the cues that they reveal. However, different strategies often predict the same decisions, and search behavior says nothing about whether or how people use the information that they acquire. In this research, we attempt to elucidate which strategies participants use in a multiple‐cue probabilistic inference task by examining verbal protocols, a high‐density source of process data. The promise of verbal data is in their utility for testing detailed information processing models. To that end, we apply protocol analysis in conjunction with computational simulations. We find converging evidence across outcome measures, search measures, and verbal reports that most participants use simplifying heuristics, namely take‐the‐best. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
45.
46.
谐音型歇后语是汉语特殊的语汇表达形式, 对其加工常常需要通达后一语节的同音线索来完成语音、语义隐喻映射。本研究通过2个实验探讨相对熟悉度和同音线索类型对谐音型歇后语加工的作用。实验1结果表明, 在高熟悉度条件下, 被试对语汇的加工策略取决于歇后语的同音线索类型。当后一语节为同音字时, 加工较为快速; 当后一语节为谐音字时, 通达歇后语隐喻意义的路径受阻。对熟悉度较高的谐音型歇后语进行加工, 语义通达表现出预存性; 在缺乏同音线索的条件下, 语料加工时间较长, 反应准确率较低, 支持概念隐喻模型和概念合成假说。而对熟悉度较低的歇后语进行加工, 被试更倾向于采用即时(on-line)策略, 支持概念合成理论和基于心理模型的语用推理假说。实验2结果表明, 呈现“错误同音”线索对歇后语的加工形成干扰, 不支持概念合成理论和基于心理模型的语用推理理论。总的结果表明, 相对熟悉度和同音线索类型影响谐音型歇后语的通达, 谐音歇后语加工需要同时激活语音和语义两条通道。  相似文献   
47.
The study of cognitive processes is built on a close mapping between three components: overt gaze behavior, overt choice, and covert processes. To validate this overt–covert mapping in the domain of decision‐making, we collected eye‐movement data during decisions between risky gamble problems. Applying a forward inference paradigm, participants were instructed to use specific decision strategies to solve those gamble problems (maximizing expected values or applying different choice heuristics) during which gaze behavior was recorded. We revealed differences between overt behavior, as indicated by eye movements, and covert decision processes, instructed by the experimenter. However, our results show that the overt–covert mapping is for some eye‐movement measures not as close as expected by current decision theory, and hence question reverse inference as being prone to fallacies due to a violation of its prerequisite, that is, a close overt–covert mapping. We propose a framework to rehabilitate reverse inference.  相似文献   
48.
In this paper I review, from the perspective of experimental research, studies that have examined how brands acquire cultural meaning, and suggest future research directions. McCracken's (Journal of Consumer Research, 13 , 1986 and 71) model of the meaning transfer process gained influence about thirty years ago, but experimental studies of the processes it posited have been limited in their scope. The review is organized around three questions. First, what should be the dependent variables: the types of meanings that can adhere to brands? Second, what have we learned from studies on the types of visual, sensory, and human cues that are the sources of particular types of brand meaning—our independent variables? Third, what do we know, and need to know, about the inferential and other processes through which consumers “take possession” of these brand meanings from these cues? The review concludes with a research agenda.  相似文献   
49.
50.
Existing antivirus programs detect malicious code based on fixed signatures; therefore, they have limitations in detecting metamorphic malicious code that lacks signature information or possesses circumventing code inserted into it. Research on the methods for detecting this type of metamorphic malicious code primarily focuses on techniques that can detect code based on behavioral similarity to known malicious code. However, these techniques measure the degree of similarity with existing malicious code using API function call patterns. Therefore, they have certain disadvantages, such as low accuracy and large detection times. In this paper, we propose a method which can overcome the limitations of existing methods by using the FP-Growth algorithm, a data mining technique, and the Markov Logic Networks algorithm, a probabilistic inference method. To perform a comparative evaluation of the proposed method's malicious code behavior detection, we performed inference experiments using malicious code with an inserted code for random malicious behavior. We performed experiments to select optimal weights for each inference rule to improve our malicious code behavior inferences’ accuracy. The results of experiments, in which we performed a comparative evaluation with the General Bayesian Network, showed that the proposed method had an 8% higher classification performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号