Verification of multiplication facts: an investigation using retrospective protocols.

نویسندگان

  • Stephen G Romero
  • Timothy C Rickard
  • Lyle E Bourne
چکیده

Retrospective verbal protocols collected throughout participants' performance of a multiplication verification task (e.g., "7 x 3 = 28, true or false?") documented a number of different strategies and changes in strategy use across different problem categories used for this common experimental task. Correct answer retrieval and comparison to the candidate answer was the modal but not the only strategy reported. Experiment 1 results supported the use of a calculation algorithm on some trials and the use of the difference between the candidate and correct answers (i.e., split) on others. Experiment 2 clearly demonstrated that participants sometimes bypassed retrieval by relying on the split information. Implications for mental arithmetic theories and the general efficacy of retrospective protocols are discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

An Investigation of Cognitive Processes of Interpretation from Persian to English

This study examined the cognitive processes in interpretation through employing Think-aloud Protocols (TAPs) among Iranian translators. The participants included 10 professional and nonprofessional translators selected through Nelson Proficiency Test. TAP and retrospective interview were used as the major instruments in order to collect the data from self-reports protocols. In order to assess t...

متن کامل

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

Preprocessing Based Verification of Multiparty Protocols with Honest Majority

This paper presents a generic method for turning passively secure protocols into protocols secure against covert attacks, adding an offline preprocessing and a cheap post-execution verification phase. The execution phase, after which the computed result is already available to the parties, has only negligible overhead. Our method uses shared verification based on precomputed multiplication trip...

متن کامل

Tailored Protocol Development Using ESTEREL

The rapid evolution of networking and the multiplication of new applications re-emphasizes the importance of the efficient communication supports. Implementations must be able to take maximal advantage of the details of applicationspecific semantics and of specific networking environments. In other words, the application needs to have more control over data transmission. Such control can be obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • The American journal of psychology

دوره 119 1  شماره 

صفحات  -

تاریخ انتشار 2006