Using a variant of the hide-and-seek game, we show in three studies that self-enhancement can help or hinder strategic thinking. In this guessing game, one player chooses a number while another ...player tries to guess it. Each player does this either in a random fashion (throwing a mental die) or by active thinking. The structure of the game implies that guessers benefit from thinking about a number, whereas choosers are disadvantaged. Yet, regardless of their role, respondents prefer to actively think about a number. For choosers, the belief they can outthink the opponent amounts to self-enhancement, whereas for guessers, the same belief can be rationally justified. We discuss the implications of the findings for theories of strategic cognition and applications to real-world contexts.
Full text
Available for:
BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
The purpose of this study was to determine the effect on learning of incorporating the traditional game of Hide and Seek. This type of research employs a mixed-methods. This study used several ...variables as research categories, including response, peace-loving character, and patriotism, and enrolled a total of 44 students. Descriptive and inferential statistics were used in the data analysis. The integration took place at an Elementary School and a Madrasah Ibtidaiyah in Batang Hari, as evidenced by the response, which reflected the peace-loving nature of patriotism. The result is that each response variable, peace, love, and patriotism, has a significant effect, with a value of sig 0.05, and that each variable is dominant in the good category.
Semi-supervised video object segmentation (VOS) is to predict the segment of a target object in a video when a ground truth segmentation mask for the target is given in the first frame. Recently, ...space-time memory networks (STM) have received significant attention as a promising approach for semi-supervised VOS. However, an important point has been overlooked in applying STM to VOS: The solution (=STM) is non-local, but the problem (=VOS) is predominantly local. To solve this mismatch between STM and VOS, we propose new VOS networks called kernelized memory network (KMN) and KMN with multiple kernels (KMN<inline-formula><tex-math notation="LaTeX">^{M}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href="kim-ieq1-3163375.gif"/> </inline-formula>). Our networks conduct not only Query-to-Memory matching but also Memory-to-Query matching. In Memory-to-Query matching, a kernel is employed to reduce the degree of non-localness of the STM. In addition, we present a Hide-and-Seek strategy in pre-training to handle occlusions effectively. The proposed networks surpass the state-of-the-art results on standard benchmarks by a significant margin (+4% in <inline-formula><tex-math notation="LaTeX">\mathcal {J_{M}}</tex-math> <mml:math><mml:msub><mml:mi mathvariant="script">J</mml:mi><mml:mi mathvariant="script">M</mml:mi></mml:msub></mml:math><inline-graphic xlink:href="kim-ieq2-3163375.gif"/> </inline-formula> on DAVIS 2017 test-dev set). The runtimes of our proposed KMN and KMN<inline-formula><tex-math notation="LaTeX">^{M}</tex-math> <mml:math><mml:msup><mml:mrow/><mml:mi>M</mml:mi></mml:msup></mml:math><inline-graphic xlink:href="kim-ieq3-3163375.gif"/> </inline-formula> on DAVIS 2016 validation set are 0.12 and 0.13 seconds per frame, respectively, and the two networks have similar computation times to STM.
HIDE AND SEEK Nappi, Carla
History and theory :Studies in the philosophy of history,
01/2019, Volume:
57, Issue:
S1
Journal Article
Peer reviewed
This response takes up the final question offered by David Lurie's essay: “In the end, is it ever possible to write a fully nonallegorical history of writing's origins?” by considering the nature of ...allegory, its relationship to hiding and invisibility, and the material quality of its character when invoked to describe an origin.
Full text
Available for:
BFBNIB, DOBA, FZAB, GIS, IJS, INZLJ, IZUM, KILJ, NLZOH, NMLJ, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, SIK, UILJ, UKNU, UL, UM, UPUK, ZRSKP
We consider a variant of the hide-and-seek game in which a seeker inspects multiple hiding locations to find multiple items hidden by a hider. Each hiding location has a maximum hiding capacity and a ...probability of detecting its hidden items when an inspection by the seeker takes place. The objective of the seeker (respectively, hider) is to minimize (respectively, maximize) the expected number of undetected items. This model is motivated by strategic inspection problems, where a security agency is tasked with coordinating multiple inspection resources to detect and seize illegal commodities hidden by a criminal organization. To solve this large-scale zero-sum game, we leverage its structure and show that its mixed-strategy Nash equilibria can be characterized using their unidimensional marginal distributions, which are pure equilibria of a lower dimensional continuous zero-sum game. This leads to a two-step approach for efficiently solving our hide-and-seek game: First, we analytically solve the continuous game and derive closed-form expressions of the equilibrium marginal distributions. Second, we design a combinatorial algorithm to coordinate the players’ resources and compute equilibrium mixed strategies that satisfy the marginal distributions. We show that this solution approach computes a Nash equilibrium of the hide-and-seek game in quadratic time with linear support. Our analysis reveals novel equilibrium behaviors driven by a complex interplay between the game parameters, captured by our closed-form solutions.
Funding:
This work was supported by the Georgia Tech Stewart Fellowship and the Georgia Tech New Faculty Start Up Grant.
Supplemental Material:
The online appendix is available at
https://doi.org/10.1287/deca.2023.0012
.
In classical neuroscience experiments, neural activity is measured across many identical trials of animals performing simple tasks and is then analyzed, associating neural responses to pre-defined ...experimental parameters. This type of analysis is not suitable for patterns of behavior that unfold freely, such as play behavior. Here, we attempt an alternative approach for exploratory data analysis on a single-trial level, applicable in more complex and naturalistic behavioral settings in which no two trials are identical. We analyze neural population activity in the prefrontal cortex (PFC) of rats playing hide-and-seek and show that it is possible to discover what aspects of the task are reflected in the recorded activity with a limited number of simultaneously recorded cells (≤ 31). Using hidden Markov models, we cluster population activity in the PFC into a set of neural states, each associated with a pattern of neural activity. Despite high variability in behavior, relating the inferred states to the events of the hide-and-seek game reveals neural states that consistently appear at the same phases of the game. Furthermore, we show that by applying the segmentation inferred from neural data to the animals’ behavior, we can explore and discover novel correlations between neural activity and behavior. Finally, we replicate the results in a second dataset and show that population activity in the PFC displays distinct sets of states during playing hide-and-seek and observing others play the game. Overall, our results reveal robust, state-like representations in the rat PFC during unrestrained playful behavior and showcase the applicability of population analyses in naturalistic neuroscience.
Display omitted
•We used hidden Markov models to cluster neural activity of rats playing hide-and-seek•Inferred latent states follow the phases of the hide-and-seek game•Reverse physiology of latent states allows discovery of neurally relevant behaviors•Rat prefrontal cortex is in distinct sets of states while playing and observing play
Bagi et al. use hidden Markov models to study PFC activity of rats playing hide-and-seek with humans. Such models, while naive and unsupervised, segment neural activity into meaningful states. States found in PFC activity alone correlate with hide-and-seek behaviors and allow for the discovery of previously undetected behaviors.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
Reversable age Simkute, Lidija
Social alternatives,
12/2021, Volume:
40, Issue:
4
Journal Article
Peer reviewed
Plays demons in heat...
Full text
Available for:
DOBA, IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Abstract This paper uses the universe of mortgage contracts to estimate the response of high-interest lenders to borrower protection regulations aimed at simplifying and making loan terms more ...transparent. Using a quasi-experimental design, I find that lenders substantially reduce interest rates—by an average of 10%—in order to avoid being subject to borrower protection, without reducing amounts loaned or the number of loans approved. This finding is consistent with high-interest lenders preferring to issue obfuscatory mortgage contracts with lower interest rates rather than more transparent and regulated mortgages with higher interest rates.
Learning from others allows young children to acquire vast amounts of information quickly, but doing so effectively also requires epistemic vigilance. Although preschool-age children have some ...capacity to engage in such processes, they often have trouble resisting information from misleading informants. The present research takes a novel strategic deception training approach to addressing this limitation. The approach is grounded in theoretical work on children's recognition of self-other equivalences (Meltzoff, 2007) and in the default tendency to view communication as helpful (Mascaro et al., 2017). Eighty 3-year-old Singaporean children (Mage = 39.36 months, 37 girls, 90.0% Chinese) were randomly assigned to either an experimental condition, in which they were trained on strategic deception, or to a conservation training control condition. Findings showed that the strategic deception training was effective in promoting epistemic vigilance on a semantic task that involved object naming and no pointing, although the effect did not extend to performance on an episodic task that involved pointing to object locations. These findings provide the first evidence of a causal link between young children's reasoning about how to deceive others and their resistance to being misled by others. In doing so, they shed light on the mechanisms that come into play when children learn epistemic vigilance.
Full text
Available for:
CEKLJ, FFLJ, NUK, ODKLJ, PEFLJ, UPUK