To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter focuses on how motivated cognition – the tendency for people to think in ways that are consistent with their goals – supports relationship maintenance. It starts with an overview of the assortment of strategies that people use to maintain their close relationships, which lay the foundation for this chapter and subsequent chapters. Then, it explicates the specific biases and illusions that people tend to have about their partners (e.g., seeing partners as particularly physically attractive, projecting ideal traits onto one’s partner) and their relationships (e.g., perceiving one’s own relationship as superior to others). This chapter also reviews empirical evidence describing the implications of this motivated inaccuracy for perceivers and their partners’ relationship experiences. This chapter also describes how biased perceptions extend to potential alternatives, leading people to ignore and devalue attractive alternative partners. It concludes with a discussion of contextual factors that shape the extent to which people engage in motivated cognition and the specific consequences of bias and illusion in relationships.
Given the description of a quantum state in terms of Hilbert space vectors, physical magnitudes (Heisenberg’s matrices) correspond to linear operators on the Hilbert space. A linear operator (or simply, operator) is a linear map of a Hilbert space to itself.
This chapter describes positive interpersonal processes: interactions between people that actively enhance their close relationships. It begins by describing the field’s shift toward studying positive processes and highlighting the utility of considering positive phenomena as unique from negative phenomena. Then, it reviews three interpersonal behaviors that have been shown to enhance relationships and describes the evidence supporting their benefits. First, spending time together (particularly spending time on novel and exciting activities) enhances relationships by enabling partners to meet their self-expansion needs in ongoing relationships. A second positive process is co-experiencing positive emotions, such as joy, amusement, and excitement, which augment and sustain positive experiences and facilitate interpersonal synchrony. Finally, this chapter reviews the benefits of communicating affection and the individual differences in how and how often people express affection.
In this chapter, we address so-called “error generic” data poisoning (DP) attacks (hereafter called DP attacks) on classifiers. Unlike backdoor attacks, DP attacks aim to degrade overall classification accuracy. (Previous chapters were concerned with “error specific” DP attacks involving specific backdoor patterns and source and target classes for classification applications.) To effectively mislead classifier training using relatively few poisoned samples, an attacker introduces “feature collision” to the training samples by, for example, flipping the class labels of clean samples. Another possibility is to poison with synthetic data, not typical of any class. The information extracted from the clean and poisoned samples labeled to the same class (as well as from clean samples that originate from the same class as the (mislabeled) poisoned samples) is largely inconsistent, which prevents the learning of an accurate class decision boundary. We develop a BIC based framework for both detection and cleansing of such data poisoning. This method is compared with existing DP defenses for both image data domains and document classification domains.
This chapter introduces the interdisciplinary field of relationship science. It describes the human drive for belonging, including the biological underpinning of sociality and the harmful consequences of social isolation and social exclusion. It also defines romantic relationships and the characteristics that differentiate romantic relationships from other close relationships (high interdependence, high intimate knowledge, high commitment). In addition to emphasizing the core commonalities across romantic relationships, this chapter explores the many ways in which romantic relationships are diverse (e.g., structure, exclusivity, composition, duration, motives). Finally, this chapter highlights the critical importance of close relationships for individual health and well-being as well, as for society more broadly.
This chapter examines how early relationships become established relationships. It reviews varying relationship trajectories (e.g., ascent, peak, and descent) and then describes the three key components of the relationship that develop over time: love, intimacy, and commitment. First, the chapter defines and differentiates the various forms of love (e.g., passionate love, companionate love, compassionate love) and reviews how love develops and changes over time. Second, this chapter explores how interpersonal intimacy develops through repeated instances of self-disclosure and perceived partner responsiveness and how developing intimate relationships change the self. Third, this chapter reviews how people make and communicate their commitment decisions, as well as how social network members shape commitment. Finally, it provides an overview of common major transitions (cohabitation, marriage, parenthood) and some key challenges therein.
This chapter describes how relationship scientists conduct research to answer questions about relationships. It explains all aspects of the research process, including how hypotheses are derived from theory, which study designs (e.g., experiments, cross-sectional studies, experience sampling) best suit specific research questions, how scientists can manipulate variables or measure variables with self-report, implicit, observational, or physiological measures, and what scientists consider when recruiting a sample to participate in their studies. This chapter also discusses how researchers approach questions about boundary conditions (when general trends do not apply) and mechanisms (the processes underlying their findings) and describes best practices for conducting ethical and reproducible research. Finally, this chapter includes a guide for how to read and evaluate empirical research articles.
In this chapter, we introduce the design of statistical anomaly detectors. We discuss types of data – continuous, discrete categorical, and discrete ordinal features – encountered in practice. We then discuss how to model such data, in particular to form a null model for statistical anomaly detection, with emphasis on mixture densities. The EM algorithm is developed for estimating the parameters of a mixture density. K-means is a specialization of EM for Gaussian mixtures. The Bayesian information criterion (BIC) is discussed and developed – widely used for estimating the number of components in a mixture density. We also discuss parsimonious mixtures, which economize on the number of model parameters in a mixture density (by sharing parameters across components). These models allow BIC to obtain accurate model order estimates even when the feature dimensionality is huge and the number of data samples is small (a case where BIC applied to traditional mixtures grossly underestimates the model order). Key performance measures are discussed, including true positive rate, false positive rate, and receiver operating characteristic (ROC) and associated area-under-the-curve (ROC AUC). The density models are used in attack detection defenses in Chapters 4 and 13. The detection performance measures are used throughout the book.
This chapter looks at the mechanics of Agreement, and the role that Agreement plays in Case-marking and A-Movement. It starts (Module 3.1) by characterising Agreement, Case-marking and A-Movement as involving a probe-goal relation, and outlines how agreement and case features are valued in the course of a derivation. Module 3.2 goes on to look at how agreement works in expletive it clauses, and contrasts this with multiple agreement in expletive there clause: it also examines conditions on the use of expletives. Module 3.3 then turns to explore the potential role of abstract agreement in Passive, Raising, Exceptional Case-marking, and Control infinitives. Next Module 3.4 investigates non-standard structures involving agreement across a finite clause boundary (e.g. He seems is very active), and at Copy Raising structures (e.g. He looks like he’s winning). The chapter concludes with a Summary (Module 3.5), Bibliography (Module 3.6), and Workbook (Module 3.7), with some Workbook exercise examples designed for self-study, and others for assignments/seminar discussion.