{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T17:10:16Z","timestamp":1729962616744,"version":"3.28.0"},"reference-count":12,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Cognitive Science"],"published-print":{"date-parts":[[2008,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Griffiths, Christian, and Kalish (this issue) present an iterative\u2010learning paradigm applying a Bayesian model to understand inductive biases in categorization. The authors argue that the paradigm is useful as an exploratory tool to understand inductive biases in situations where little is known about the task. It is argued that a theory developed <jats:italic>only<\/jats:italic> at the computational level is much like a single\u2010bladed knife that is only useful in highly idealized situations. To be useful as a general tool that cuts through the complex fabric of cognition, we need at least two\u2010bladed scissors that combine both computational and psychological constraints to characterize human behavior. To temper its sometimes expansive claims, it is time to show what a Bayesian model <jats:italic>cannot<\/jats:italic> explain. Insight as to how human reality may differ from the Bayesian predictions may shed more light on human cognition than the simpler focus on what the Bayesian approach <jats:italic>can<\/jats:italic> explain. There remains much to be done in terms of integrating Bayesian approaches and other approaches in modeling human cognition.<\/jats:p>","DOI":"10.1080\/03640210701802113","type":"journal-article","created":{"date-parts":[[2008,2,13]],"date-time":"2008-02-13T01:20:07Z","timestamp":1202865607000},"page":"155-161","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Is a Single\u2010Bladed Knife Enough to Dissect Human Cognition? Commentary on Griffiths et al."],"prefix":"10.1111","volume":"32","author":[{"given":"Wai\u2010Tat","family":"Fu","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,1]]},"reference":[{"volume-title":"The adaptive character of thought","year":"1990","author":"Anderson J. R.","key":"e_1_2_7_2_1"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/35036586"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogpsych.2005.08.002"},{"key":"e_1_2_7_5_1","first-page":"355","article-title":"SNIF\u2010ACT: A cognitive model of user navigation on the World Wide Web","volume":"22","author":"Fu W.\u2010T.","year":"2007","journal-title":"Human\u2013Computer Interaction"},{"volume-title":"Simple heuristics that make us smart","year":"1999","author":"Gigerenzer G.","key":"e_1_2_7_6_1"},{"key":"e_1_2_7_7_1","first-page":"672","volume-title":"Proceedings of the 26th Annual Conference of the Cognitive Science Society","author":"Kemp C.","year":"2004"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(85)90009-X"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(90)90014-U"},{"volume-title":"Vision","year":"1982","author":"Marr D.","key":"e_1_2_7_10_1"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.3629243"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0042769"},{"volume-title":"The sciences of the artificial","year":"1996","author":"Simon H. A.","key":"e_1_2_7_13_1"}],"container-title":["Cognitive Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1080%2F03640210701802113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1080%2F03640210701802113","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1080\/03640210701802113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T16:44:46Z","timestamp":1729961086000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1080\/03640210701802113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1,2]]}},"alternative-id":["10.1080\/03640210701802113"],"URL":"https:\/\/doi.org\/10.1080\/03640210701802113","archive":["Portico"],"relation":{},"ISSN":["0364-0213","1551-6709"],"issn-type":[{"type":"print","value":"0364-0213"},{"type":"electronic","value":"1551-6709"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2008-01-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}