نتایج جستجو برای: covert index

تعداد نتایج: 400911  

2015
Vincent Rose VINCENT ROSE

An analogue study was conducted to test the clinical efficacy of covert reinforcement (Cautela, 1970) and to assess the role of behavioral .rehearsal in covert reinforcement. A secondary purpose was to determine the effects of image clarity, subject anxiety level and rate of extra session imagery on the therapeutic effect of covert reinforcement. Forty introductory psychology students who score...

2015
Vladimir Kolesnikov Alex J. Malozemoff

The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed probability. This permits more efficient protocols than the malicious setting while still giving meaningful security guarantees. However, one drawback is that cheating cannot be proven to a third party, which preven...

2015
James Brookes

Past literature has suggested a dual nature of trait based narcissism, comprising overt and covert forms. While several studies have examined the two subtypes in relation to self-esteem, very few studies have examined narcissistic subtypes and self-efficacy. 115 Psychology undergraduates filled in self-report measures of overt narcissism, covert narcissism, self-esteem and self-efficacy. Result...

Journal: :Cortex; a journal devoted to the study of the nervous system and behavior 2003
Stefan R Schweinberger A Mike Burton

In this viewpoint, we discuss the new evidence on covert face recognition in prosopagnosia presented by Bobes et al. (2003, this issue) and by Sperber and Spinnler (2003, this issue). Contrary to earlier hypotheses, both papers agree that covert and overt face recognition are based on the same mechanism. In line with this suggestion, an analysis of reported cases with prosopagnosia indicates th...

2016
G. Yuvaraj

A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...

Journal: :Attention, perception & psychophysics 2017
Nash Unsworth Matthew K Robison

The pupillary light reflex (PLR) was used to track covert shifts of attention to items maintained in visual working memory (VWM). In three experiments, participants performed a change detection task in which rectangles appeared on either side of fixation and at test participants indicated if the cued rectangle changed its orientation. Prior to presentation or during the delay, participants were...

2010
IVANO CAPONIGRO JONATHAN COHEN

It has become commonplace in semantic theorizing to argue that the semantic representation of certain linguistic expressions contains covert elements in addition to what is contributed by the overt linguistic material. Theorists have pursued this strategy with respect to a wide range of constructions in a wide range of languages. A small sample of such expression types in English would include ...

2010
James J. Li Steve S. Lee

To improve understanding about genetic and environmental influences on antisocial behavior (ASB), we tested the association of the 44-base pair polymorphism of the serotonin transporter gene (5-HTTLPR) and maltreatment using latent class analysis in 2,488 boys and girls from Wave 1 of the National Longitudinal Study of Adolescent Health. In boys, ASB was defined by three classes (Exclusive Cove...

Journal: :Psychotherapy 2008
Andrew F Luchner Hamid Mirsalimi Casey J Moser Rebecca A Jones

The psychological literature to date has identified more than one form of narcissism: the more well-known grandiose form, and the less familiar and recognized covert form. Although the distinction between these two narcissistic types has been identified with regard to better conceptualizing client dynamics, there has been much less written about how covert narcissistic tendencies and traits may...

2014
Stanislaw Jarecki

Von Ahn, Hopper, and Langford [vAHL05] introduced the notion of two-party steganographic a.k.a. covert computation, which assures that neither party can distinguish its counterparty from a random noise generator, except for what is revealed by the final output of the securely computed function. The flagship motivation for covert computation is covert authentication, where two parties want to au...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید