UCS intensity and eyelid conditioning: Another look

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UCS revaluation and conditioning models of acquired fears.

Recent developments in the study of Pavlovian conditioning in humans have suggested that the strength of a conditioned response (CR) is affected not only by associative processes that link the conditioned stimulus (CS) with the unconditioned stimulus (UCS), but also by processes which lead the individual to revalue the UCS itself. These latter processes can frequently lead to dramatic changes i...

متن کامل

Neonatal eyelid conditioning during sleep.

Using an eyelid conditioning paradigm modeled after that developed by Little, Lipsitt, and Rovee-Collier (1984), Fifer et al. (2010) demonstrated that newborn infants learn during sleep. This study examined the role of sleep state in neonatal learning. We recorded electroencephalogram (EEG), respiratory, and cardiovascular activity from sleeping full term newborn infants during delay eyelid con...

متن کامل

Pentaquark masses: another look

We refine theoretical estimates of the masses of the Θ and other pentaquark states. For the Karliner-Lipkin model, it is noted that for the qqq̄ triquark, proper incorporation of the colour-spin SU(6) symmetry has not been made in the literature. We address this lacuna, make a small generalization in the hyperfine interaction couplings used hitherto, and incorprate flavour symmetry breaking. Aft...

متن کامل

Another look at HMQV

The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...

متن کامل

Another Look at Tightness

We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Psychonomic Science

سال: 1967

ISSN: 0033-3131

DOI: 10.3758/bf03331088