Subject Islands, Reconstruction, and the Flow of the Computation

2014 ◽  
Vol 45 (4) ◽  
pp. 525-569 ◽  
Author(s):  
Valentina Bianchi ◽  
Cristiano Chesi

Recent research has highlighted a remarkable variability in subject island effects. Focusing on intransitive verbs and adjectives, we argue that islandhood is determined at the syntax-semantics interface: subjects qualify as islands when they are interpreted outside the predicative nucleus of the clause, in a categorical LF structure ( Ladusaw 1994 ); they are transparent for extraction when they undergo total reconstruction into the predicative nucleus, giving rise to a thetic structure. The thetic/categorical interpretation depends on various factors (most notably the stage-level versus individual-level nature of the predicate), whose interaction accounts for the observed variability of island effects, as shown by our experimental evidence. The relevance of subject reconstruction need not be stipulated; rather, it follows from a top-down-oriented computation, in which movement dependencies are implemented by a storage-and-retrieval mechanism.

2019 ◽  
Author(s):  
Chris Robert Harrison Brown

Attention has long been characterised within prominent models as reflecting a competition between goal-driven and stimulus-driven processes. It remains unclear, however, how involuntary attentional capture by affective stimuli, such as threat-laden content, fits into such models. While such effects were traditionally held to reflect stimulus-driven processes, recent research has increasingly implicated a critical role of goal-driven processes. Here we test an alternative goal-driven account of involuntary attentional capture by threat, using an experimental manipulation of goal-driven attention. To this end we combined the classic ‘contingent capture’ and ‘emotion-induced blink’ (EIB) paradigms in an RSVP task with both positive or threatening target search goals. Across six experiments, positive and threat distractors were presented in peripheral, parafoveal, and central locations. Across all distractor locations, we found that involuntary attentional capture by irrelevant threatening distractors could be induced via the adoption of a search goal for a threatening category; adopting a goal for a positive category conversely led to capture only by positive stimuli. Our findings provide direct experimental evidence for a causal role of voluntary goals in involuntary capture by irrelevant threat stimuli, and hence demonstrate the plausibility of a top-down account of this phenomenon. We discuss the implications of these findings in relation to current cognitive models of attention and clinical disorders.


2019 ◽  
Vol 5 ◽  
pp. 237802311987979 ◽  
Author(s):  
George Wood ◽  
Daria Roithmayr ◽  
Andrew V. Papachristos

Conventional explanations of police misconduct generally adopt a microlevel focus on deviant officers or a macrolevel focus on the top-down organization of police departments. Between these levels are social networks of misconduct. This study recreates these networks using data on 16,503 complaints and 15,811 police officers over a six-year period in Chicago. We examine individual-level factors associated with receiving a complaint, the basic properties of these misconduct networks, and factors related to officer co-naming in complaints. We find that the incidence of police misconduct is associated with attributes including race, age, and tenure and that almost half of police officers are connected in misconduct ties in broader networks of misconduct. We also find that certain dyadic factors, especially seniority and race, strongly predict network ties and the incidence of group misconduct. Our results provide actionable information regarding possible ways to leverage the co-complaint network structure to reduce misconduct.


2019 ◽  
Vol 5 (12) ◽  
pp. eaay1610 ◽  
Author(s):  
Jens Hainmueller ◽  
Dominik Hangartner ◽  
Dalston Ward

We provide evidence that citizenship catalyzes the long-term economic integration of immigrants. Despite the relevance of citizenship policy to immigrant integration, we lack a reliable understanding of the economic consequences of acquiring citizenship. To overcome nonrandom selection into naturalization, we exploit the quasi-random assignment of citizenship in Swiss municipalities that held referendums to decide the outcome of individual naturalization applications. Our data combine individual-level referendum results with detailed social security records from the Swiss authorities. This approach allows us to compare the long-term earnings of otherwise similar immigrants who barely won or lost their referendum. We find that winning Swiss citizenship in the referendum increased annual earnings by an average of approximately 5000 U.S. dollars over the subsequent 15 years. This effect is concentrated among more marginalized immigrants.


2021 ◽  
Vol 11 ◽  
Author(s):  
Ziyi Wang ◽  
Guibing He

One of the interesting research questions in multi-attribute decision-making is what affects the consideration of shared information (i.e., common features) between two alternatives. Previous studies have suggested two approaches (bottom-up and top-down) in finding what characteristics of common features affect their consideration. Two bottom-up factors (salience and interdependence) were found, but no top-down factors were discovered. In the current study, we followed the top-down approach and investigated how subjective importance (SI) of a common feature affects its consideration. In two studies, we consistently found that, on both the general and individual level, the level of consideration increased with the SI of the common feature. This result provided a new explanation for the effect of common feature consideration and its individual difference; it also provided insights in explaining the underlying process of multi-attribute decision making.


Author(s):  
Ar Arunarani ◽  
D Manjula Perkinian

Cloud databases have been used in a spate of web-based applications in recent years owing to their capacity to store big data efficiently. In such a scenario, access control techniques implemented in relational databases are so modified as to suit cloud databases. The querying features of cloud databases are designed with facilities to retrieve encrypted data. The performance with respect to retrieval and security needs further improvements to ensure a secured retrieval process. In order to provide an efficient secured retrieval mechanism, a rule- and agent-based intelligent secured retrieval model has been proposed in this paper that analyzes the user, query and contents to be retrieved so as to effect rapid retrieval with decryption from the cloud databases. The major advantage of this retrieval model is in terms of its improved query response time and enhanced security of the storage and retrieval system. From the experiments conducted in this work, proposed model increased storage and access time and, in addition, intensified the security of the data stored in cloud databases.


2019 ◽  
pp. 278-294
Author(s):  
Ar Arunarani ◽  
D Manjula Perkinian

Cloud databases have been used in a spate of web-based applications in recent years owing to their capacity to store big data efficiently. In such a scenario, access control techniques implemented in relational databases are so modified as to suit cloud databases. The querying features of cloud databases are designed with facilities to retrieve encrypted data. The performance with respect to retrieval and security needs further improvements to ensure a secured retrieval process. In order to provide an efficient secured retrieval mechanism, a rule- and agent-based intelligent secured retrieval model has been proposed in this paper that analyzes the user, query and contents to be retrieved so as to effect rapid retrieval with decryption from the cloud databases. The major advantage of this retrieval model is in terms of its improved query response time and enhanced security of the storage and retrieval system. From the experiments conducted in this work, proposed model increased storage and access time and, in addition, intensified the security of the data stored in cloud databases.


Sign in / Sign up

Export Citation Format

Share Document