نتایج جستجو برای: covert index
تعداد نتایج: 400911 فیلتر نتایج به سال:
An analogue study was conducted to test the clinical efficacy of covert reinforcement (Cautela, 1970) and to assess the role of behavioral .rehearsal in covert reinforcement. A secondary purpose was to determine the effects of image clarity, subject anxiety level and rate of extra session imagery on the therapeutic effect of covert reinforcement. Forty introductory psychology students who score...
The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed probability. This permits more efficient protocols than the malicious setting while still giving meaningful security guarantees. However, one drawback is that cheating cannot be proven to a third party, which preven...
Past literature has suggested a dual nature of trait based narcissism, comprising overt and covert forms. While several studies have examined the two subtypes in relation to self-esteem, very few studies have examined narcissistic subtypes and self-efficacy. 115 Psychology undergraduates filled in self-report measures of overt narcissism, covert narcissism, self-esteem and self-efficacy. Result...
In this viewpoint, we discuss the new evidence on covert face recognition in prosopagnosia presented by Bobes et al. (2003, this issue) and by Sperber and Spinnler (2003, this issue). Contrary to earlier hypotheses, both papers agree that covert and overt face recognition are based on the same mechanism. In line with this suggestion, an analysis of reported cases with prosopagnosia indicates th...
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...
The pupillary light reflex (PLR) was used to track covert shifts of attention to items maintained in visual working memory (VWM). In three experiments, participants performed a change detection task in which rectangles appeared on either side of fixation and at test participants indicated if the cued rectangle changed its orientation. Prior to presentation or during the delay, participants were...
It has become commonplace in semantic theorizing to argue that the semantic representation of certain linguistic expressions contains covert elements in addition to what is contributed by the overt linguistic material. Theorists have pursued this strategy with respect to a wide range of constructions in a wide range of languages. A small sample of such expression types in English would include ...
To improve understanding about genetic and environmental influences on antisocial behavior (ASB), we tested the association of the 44-base pair polymorphism of the serotonin transporter gene (5-HTTLPR) and maltreatment using latent class analysis in 2,488 boys and girls from Wave 1 of the National Longitudinal Study of Adolescent Health. In boys, ASB was defined by three classes (Exclusive Cove...
The psychological literature to date has identified more than one form of narcissism: the more well-known grandiose form, and the less familiar and recognized covert form. Although the distinction between these two narcissistic types has been identified with regard to better conceptualizing client dynamics, there has been much less written about how covert narcissistic tendencies and traits may...
Von Ahn, Hopper, and Langford [vAHL05] introduced the notion of two-party steganographic a.k.a. covert computation, which assures that neither party can distinguish its counterparty from a random noise generator, except for what is revealed by the final output of the securely computed function. The flagship motivation for covert computation is covert authentication, where two parties want to au...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید