منابع مشابه
Masking redux. I: An optimized masking method.
This is the first in a series of two papers on masking. The objective of these papers is to develop a masking protocol that provides valid measures of threshold and is, in general, faster than the plateau method. In this paper, a masking method is developed that can replace the traditional plateau method in most masking situations. This new method is optimized to require fewer masking levels th...
متن کاملMasking redux. II: A recommended masking protocol.
This is the second in a series of two papers on masking. The objective of these papers is to develop a masking protocol that provides valid measures of threshold and is, in general, faster than the plateau method. In the first paper, a masking method was presented that can replace the traditional plateau method in most masking situations. This new method is optimized to require fewer masking le...
متن کاملMatrix Masking
where A is a matrix that operates on the n cases, B is a matrix that operates on the p variables, and C is a matrix that adds perturbations or noise. Matrix masking includes a wide variety of standard approaches to SDL: (i) adding noise, i.e., theC in matrix masking transformation of equation [1]; (ii) releasing a subset of observations (delete rows from Z), i.e., sampling; (iii) cell suppressi...
متن کاملMasking by object substitution: dissociation of masking and cuing effects.
In a newly discovered form of visual masking, a target stimulus is masked by 4 flanking dots if their offset is delayed relative to the target (V. Di Lollo, J. T. Enns, & R. A. Rensink, 2000). In Di Lollo et al. (2000), the dot pattern also cued the relevant target and therefore required deliberate attention. In the present Experiments 2-6, a central arrow cued 1 of 2 letters for an E/F discrim...
متن کاملPublic-key Encryption with Masking Public-key Encryption with Masking
Timed-release encryption, first mentioned by May [12] and discussed by Rivest, Shamir, and Wanger [15], is a cryptographic primitive which enables us to “send a message into the future.” We take a simple approach, called public-key encryption with masking, in order to realize this requirement. In our model, the sender first encrypts a plaintext and “masks” the ciphertext, then send it the recei...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1971
ISSN: 0028-0836,1476-4687
DOI: 10.1038/230194a0