An analysis of signal detection and threshold models of source memory.

نویسندگان

  • S D Slotnick
  • S A Klein
  • C S Dodson
  • A P Shimamura
چکیده

The authors analyzed source memory performance with an unequal-variance signal detection theory model and compared the findings with extant threshold (multinomial and dual-process) models. In 3 experiments, receiver operating characteristic (ROC) analyses of source discrimination revealed curvilinear functions, supporting the relative superiority of a continuous signal detection model when compared with a threshold model. This result has implications for both multinomial and dual-process models, both of which assume linear ROCs in their description of source memory performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

"Remember" source memory ROCs indicate recollection is a continuous process.

The dual process model assumes memory is based on recollection (retrieval with specific detail) or familiarity (retrieval without specific detail). A current debate is whether recollection is a threshold process or, like familiarity, is a continuous process. In the present study two continuous models and two threshold models of recollection were evaluated using receiver operating characteristic...

متن کامل

Improved Knock Detection Method Based on New Time-Frequency Analysis In Spark Ignition Turbocharged Engine

Premature combustion that affects outputs, thermal efficiencies and lifetimes of internal combustion engine is called “knock effect”. However knock signal detection based on acoustic sensor is a challenging task due to existing of noise in the same frequency spectrum. Experimental results revealed that vibration signals, generated from knock, has certain frequencies related to vibration resonan...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

Receiver operating characteristics (ROCs) in recognition memory: a review.

Receiver operating characteristic (ROC) analysis is being used increasingly to examine the memory processes underlying recognition memory. The authors discuss the methodological issues involved in conducting and analyzing ROC results, describe the various models that have been developed to account for these results, review the behavioral empirical literature, and assess the models in light of t...

متن کامل

Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance

We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of experimental psychology. Learning, memory, and cognition

دوره 26 6  شماره 

صفحات  -

تاریخ انتشار 2000