نتایج جستجو برای: covert repair hypothesis
تعداد نتایج: 355225 فیلتر نتایج به سال:
Ubiquitous cognitive biases hinder optimal decision making. Recent calls to assist decision makers in mitigating these biases—via interventions commonly called “nudges”—have been criticized as infringing upon individual autonomy. We tested the hypothesis that such “decisional enhancement” programs that target overt decision making—i.e., conscious, higher-order cognitive processes—would be more ...
Recently, several studies have started to explore covert visuospatial attention as a control signal for brain-computer interfaces (BCIs). Covert visuospatial attention represents the ability to change the focus of attention from one point in the space without overt eye movements. Nevertheless, the full potential and possible applications of this paradigm remain relatively unexplored. Voluntary ...
Many experiments provide evidence that practicing retrieval benefits retention relative to conditions of no retrieval practice. Nearly all prior research has employed retrieval practice requiring overt responses, but a few experiments have shown that covert retrieval also produces retention advantages relative to control conditions. However, direct comparisons between overt and covert retrieval...
BACKGROUND Overt stroke after non-cardiac surgery has a substantial impact on the duration and quality of life. Covert stroke in the non-surgical setting is much more common than overt stroke and is associated with an increased risk of cognitive decline and dementia. Little is known about covert stroke after non-cardiac, non-carotid artery surgery. METHODS We undertook a prospective, internat...
It has recently been demonstrated that a cortical network of visuospatial and oculomotor control areas is active for covert shifts of spatial attention (shifts of attention without eye movements) as well as for overt shifts of spatial attention (shifts of attention with saccadic eye movements). Studies examining activity in this visuospatial network during attentional shifts at a single rate ha...
Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...
A recent study by Packman, Onslow, Coombes and Goodwin (2001) employed a non-word-reading paradigm to test the contribution of the lexical retrieval process to stuttering. They consider that, with this material, the lexical retrieval process could not contribute to stuttering and that either anxiety and/or the motor demand of reading are the governing factors. This paper will discuss possible p...
Cloud computing relies on hypervisors to isolate virtual machines running on shared hardware. Since perfect isolation is difficult to achieve, sharing hardware induces threats. Covert channels were demonstrated to violate isolation and, typically, allow data exfiltration. Several covert channels have been proposed that rely on the processor’s cache. However, these covert channels are either slo...
Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed. The proposed scheme is based on the empirical distribution function of packet length series of legitimate traffic. Different from the existing schemes, the lengths of packets which are generated by the co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید