Formal models of "resource depletion".

نویسندگان

  • Hilde M Huizenga
  • Maurits W van der Molen
  • Anika Bexkens
  • Wery P M van den Wildenberg
چکیده

The opportunity cost model (OCM) aims to explain various phenomena, among which the finding that performance degrades if executive functions are used repeatedly ("resource depletion"). We argue that an OCM account of resource depletion requires two unlikely assumptions, and we discuss an alternative that does not require these assumptions. This alternative model describes the interplay between executive function and motivation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Overlay Networks to Resist Denial-of-Service Attacks

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

متن کامل

Using Overlay Networks to Resist Denial-of-Service Attacks

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

متن کامل

An Analysis of Using Overlay Networks to Resist Distributed Denial-of-Service Attacks

Proxy networks based on overlays have been proposed as an architecture to protect Internet applications against denial-of-service attacks, however we know of no formal analysis of such schemes' effectiveness. We describe a framework to analyze a class of these proxy network architectures. Based on an attack model and a system model, we analytically characterize how attacks affect two key factor...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Numerical Analysis and Simulation of Resource-Exploration Models

In this paper, we examine models for exploration and consumption of resources. The fundamental feature of the models is the jumpprocess nature of the exploration for and discovery of the resource. Several models have been proposed and analyzed in the literature. Here we provide numerical schemes, convergence properties, and some new models that provide risk-averse policies to avoid depletion of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • The Behavioral and brain sciences

دوره 36 6  شماره 

صفحات  -

تاریخ انتشار 2013