This item is only available electronically.A recently developed within-subject measure of latent inhibition has found an association between highly schizotypal individuals and abnormal learning of pre-exposed stimuli, suggesting that these individuals do not down-regulate their attention to irrelevant stimuli. Subsequent studies that have replicated the design have reported varying results – this may be a result of failing to consider potential mediators. In the present study, we explored the role of working memory, schizotypy and latent inhibition using the aforementioned within-subject design. Notably, the design was corrected for potentially confounding instructions. Participants (N = 62) completed a latent inhibition task in which react...
During daily operation, workers are assigned to jobs on an assembly line. This assignment requires t...
This item is only available electronically.The ability to efficiently attend to multiple objects in ...
A botnet, a set of compromised machines controlled distantly by an attacker, is the basis of numerou...
Hemianopic patients suffer for a loss of conscious vision in part of the visual field. The present w...
Aim Clear near vision would seem vital for education. Existing literature has suggested an associat...
Many therapies exist to help people combat stress. However, they typically require substantial time ...
This item is only available electronically.It is widely known that visuospatial attention is critica...
Many therapies exist to help people combat stress. However, they typically require substantial time ...
Algorithms are increasingly present in everyday life. These tools have moved beyond their traditiona...
Within a given conversation, children appear to think of labels as mutually exclusive. For instance,...
The overall aim of the modelling works within this thesis is to lend theoretical evidence to empiric...
A central aspect of daily life is decision making, often under uncertain and ill-defined conditions....
This item is only available electronically.In recent years there has been a shift towards more sophi...
At the heart of today’s malware problem lies theoretically infinite diversity created by metamorphis...
Brain morphometry is a technique to study and analyse parameters such as the volume, orientation, p...
During daily operation, workers are assigned to jobs on an assembly line. This assignment requires t...
This item is only available electronically.The ability to efficiently attend to multiple objects in ...
A botnet, a set of compromised machines controlled distantly by an attacker, is the basis of numerou...
Hemianopic patients suffer for a loss of conscious vision in part of the visual field. The present w...
Aim Clear near vision would seem vital for education. Existing literature has suggested an associat...
Many therapies exist to help people combat stress. However, they typically require substantial time ...
This item is only available electronically.It is widely known that visuospatial attention is critica...
Many therapies exist to help people combat stress. However, they typically require substantial time ...
Algorithms are increasingly present in everyday life. These tools have moved beyond their traditiona...
Within a given conversation, children appear to think of labels as mutually exclusive. For instance,...
The overall aim of the modelling works within this thesis is to lend theoretical evidence to empiric...
A central aspect of daily life is decision making, often under uncertain and ill-defined conditions....
This item is only available electronically.In recent years there has been a shift towards more sophi...
At the heart of today’s malware problem lies theoretically infinite diversity created by metamorphis...
Brain morphometry is a technique to study and analyse parameters such as the volume, orientation, p...
During daily operation, workers are assigned to jobs on an assembly line. This assignment requires t...
This item is only available electronically.The ability to efficiently attend to multiple objects in ...
A botnet, a set of compromised machines controlled distantly by an attacker, is the basis of numerou...