{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:43Z","timestamp":1725567403156},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166259"},{"type":"electronic","value":"9783642166266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16626-6_2","type":"book-chapter","created":{"date-parts":[[2010,10,7]],"date-time":"2010-10-07T09:06:51Z","timestamp":1286442411000},"page":"13-23","source":"Crossref","is-referenced-by-count":1,"title":["BSDT ROC and Cognitive Learning Hypothesis"],"prefix":"10.1007","author":[{"given":"Petro","family":"Gopych","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivan","family":"Gopych","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Signal Detection Theory and Psychophysics","author":"D. Green","year":"1966","unstructured":"Green, D., Swets, J.: Signal Detection Theory and Psychophysics. Wiley, NY (1966)"},{"key":"2_CR2","volume-title":"Detection Theory: A User\u2019s Guide","author":"N.A. Macmillan","year":"2005","unstructured":"Macmillan, N.A., Creelman, C.D.: Detection Theory: A User\u2019s Guide, 2nd edn. Lawrence Erlbaum Associates, Mahwah (2005)","edition":"2"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1037\/0278-7393.28.6.1095","volume":"28","author":"H.E.R. Morrell","year":"2002","unstructured":"Morrell, H.E.R., Gaitan, S., Wixted, J.T.: On the Nature of the Decision Axis in Signal-detection-based Models of Recognition Memory. J. Exp. Psychol. Learn. Mem. Cogn.\u00a028, 1095\u20131110 (2002)","journal-title":"J. Exp. Psychol. Learn. Mem. Cogn."},{"key":"2_CR4","doi-asserted-by":"crossref","first-page":"616","DOI":"10.3758\/BF03196616","volume":"11","author":"J.T. Wixted","year":"2004","unstructured":"Wixted, J.T., Stretch, V.: In Defense of the Signal Detection Interpretation of Remember\/know Judgments. Psychon. Bull. Rev.\u00a011, 616\u2013641 (2004)","journal-title":"Psychon. Bull. Rev."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.neuron.2005.12.020","volume":"49","author":"P.E. Wais","year":"2006","unstructured":"Wais, P.E., Wixted, J.T., Hopkins, R.O., Squire, L.R.: The Hippocampus Supports both the Recollection and the Familiarity Components of Recognition Memory. Neuron\u00a049, 459\u2013466 (2006)","journal-title":"Neuron"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1038\/nn961","volume":"5","author":"A.P. Yonelinas","year":"2002","unstructured":"Yonelinas, A.P., Kroll, N.E., Quamme, J.R., Lazzara, M.M., Sauve, M.J., Widaman, K.F., Knight, R.T.: Effects of Extensive Temporal Lobe Damage or Mild Hypoxia on Recollection and Familiarity. Nat. Neurosci.\u00a05, 1236\u20131241 (2002)","journal-title":"Nat. Neurosci."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1016\/j.neuropsychologia.2005.01.019","volume":"43","author":"J.P. Aggleton","year":"2005","unstructured":"Aggleton, J.P., Vann, S.D., Denby, C., Dix, S., Mayes, A.R., Roberts, N., Yonelinas, A.P.: Sparing of the Familiarity Component of Recognition Memory in a Patient with Hippocampal Pathology. Neuropsychologia\u00a043, 1810\u20131823 (2005)","journal-title":"Neuropsychologia"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature02853","volume":"431","author":"N.J. Fortin","year":"2004","unstructured":"Fortin, N.J., Wright, S.P., Eichenbaum, H.: Recollection-like Memory Retrieval in Rats is Dependent on the Hippocampus. Nature\u00a0431, 188\u2013191 (2004)","journal-title":"Nature"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1038\/nrn2154","volume":"8","author":"L.R. Squire","year":"2007","unstructured":"Squire, L.R., Wixted, J.T., Clark, R.E.: Recognition Memory and the Medial Temporal Lobe: A New Perspective. Nat. Rev. Neurosci.\u00a08, 872\u2013883 (2007)","journal-title":"Nat. Rev. Neurosci."},{"key":"2_CR10","first-page":"55","volume-title":"New Research in Neural Networks","author":"P.M. Gopych","year":"2008","unstructured":"Gopych, P.M.: Elements of the Binary Signal Detection Theory, BSDT. In: Yoshida, M., Sato, H. (eds.) New Research in Neural Networks, pp. 55\u201363. Nova Science, NY (2008)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1142\/S0129065708001762","volume":"18","author":"P. Gopych","year":"2008","unstructured":"Gopych, P.: Biologically Plausible BSDT Recognition of Complex Images: The Case of Human Faces. Int. J. Neural Systems\u00a018, 527\u2013545 (2008)","journal-title":"Int. J. Neural Systems"},{"key":"2_CR12","series-title":"Advances in Soft Computing","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-88181-0_33","volume-title":"CISIS 2008","author":"P. Gopych","year":"2009","unstructured":"Gopych, P.: BSDT Multi-valued Coding in Discrete Spaces. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, \u00c1. (eds.) CISIS 2008. Advances in Soft Computing, vol.\u00a053, pp. 258\u2013265. Springer, Heidelberg (2009)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/11875581_24","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006","author":"P. Gopych","year":"2006","unstructured":"Gopych, P.: Performance of BSDT Decoding Algorithms Based on Locally Damaged Neural Networks. In: Corchado, E., Yin, H., Botti, V., Fyfe, C. (eds.) IDEAL 2006. LNCS, vol.\u00a04224, pp. 199\u2013206. Springer, Heidelberg (2006)"},{"key":"2_CR14","volume-title":"Statistical Learning Theory","author":"V.N. Vapnik","year":"1998","unstructured":"Vapnik, V.N.: Statistical Learning Theory. Wiley, NY (1998)"},{"key":"2_CR15","first-page":"446","volume":"35","author":"P.M. Gopych","year":"1992","unstructured":"Gopych, P.M., Sorokin, V.I., Sotnikov, V.V.: Human Operator Performance when Identifying Peaks in a Line Spectrum. Instr. Exp. Tech.\u00a035, 446\u2013449 (1992)","journal-title":"Instr. Exp. Tech."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-04277-5_6","volume-title":"Artificial Neural Networks \u2013 ICANN 2009","author":"P. Gopych","year":"2009","unstructured":"Gopych, P.: BSDT Atom of Consciousness Model, AOCM: The Unity and Modularity of Consciousness. In: Alippi, C., Polycarpou, M., Panayiotou, C., Ellinas, G. (eds.) ICANN 2009. LNCS, vol.\u00a05769, pp. 54\u201364. Springer, Heidelberg (2009)"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.neuron.2008.08.004","volume":"59","author":"R.D. Burwell","year":"2008","unstructured":"Burwell, R.D., Furtak, S.C.: Recognition Memory: Can You Teach an Old Dogma New Tricks? Neuron.\u00a059, 523\u2013525 (2008)","journal-title":"Neuron."},{"key":"2_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-1740-8","volume-title":"Regularization of Inverse Problems","author":"H. Engle","year":"1996","unstructured":"Engle, H., Hanke, M., Neubauer, A.: Regularization of Inverse Problems. Kluwer Academic, Dordrecht (1996)"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1038\/nature04610","volume":"440","author":"B. Naundorf","year":"2006","unstructured":"Naundorf, B., Wolf, F., Volgushev, M.: Unique Features of Action Potential Initiation in Cortical Neurons. Nature\u00a0440, 1060\u20131063 (2006)","journal-title":"Nature"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"5520","DOI":"10.1073\/pnas.0931349100","volume":"100","author":"G.M. Edelman","year":"2003","unstructured":"Edelman, G.M.: Naturalizing Consciousness: A Theoretical Framework. Proc. Natl. Acad. Sci. USA\u00a0100, 5520\u20135524 (2003)","journal-title":"Proc. Natl. Acad. Sci. USA"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16626-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:29:39Z","timestamp":1619771379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16626-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166259","9783642166266"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16626-6_2","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2010]]}}}