The Magical Number 4 in Short-Term Memory: a Reconsideration of Mental Storage Capacity

Total Page:16

File Type:pdf, Size:1020Kb

The Magical Number 4 in Short-Term Memory: a Reconsideration of Mental Storage Capacity BEHAVIORAL AND BRAIN SCIENCES (2000) 24, 87–185 Printed in the United States of America The magical number 4 in short-term memory: A reconsideration of mental storage capacity Nelson Cowan Department of Psychological Sciences, University of Missouri, Columbia, MO 65211 [email protected] www.missouri.edu/~psycowan Abstract: Miller (1956) summarized evidence that people can remember about seven chunks in short-term memory (STM) tasks. How- ever, that number was meant more as a rough estimate and a rhetorical device than as a real capacity limit. Others have since suggested that there is a more precise capacity limit, but that it is only three to five chunks. The present target article brings together a wide vari- ety of data on capacity limits suggesting that the smaller capacity limit is real. Capacity limits will be useful in analyses of information processing only if the boundary conditions for observing them can be carefully described. Four basic conditions in which chunks can be identified and capacity limits can accordingly be observed are: (1) when information overload limits chunks to individual stimulus items, (2) when other steps are taken specifically to block the recoding of stimulus items into larger chunks, (3) in performance discontinuities caused by the capacity limit, and (4) in various indirect effects of the capacity limit. Under these conditions, rehearsal and long-term memory cannot be used to combine stimulus items into chunks of an unknown size; nor can storage mechanisms that are not capacity- limited, such as sensory memory, allow the capacity-limited storage mechanism to be refilled during recall. A single, central capacity limit averaging about four chunks is implicated along with other, noncapacity-limited sources. The pure STM capacity limit expressed in chunks is distinguished from compound STM limits obtained when the number of separately held chunks is unclear. Reasons why pure capacity estimates fall within a narrow range are discussed and a capacity limit for the focus of attention is proposed. Keywords: attention; enumeration; information chunks; memory capacity; processing capacity; processing channels; serial recall; short- term memory; storage capacity; verbal recall; working memory capacity 1. Introduction to the problem of mental Hulme 1995). One possible resolution is that the focus of storage capacity attention is capacity-limited, whereas various supplemen- tary storage mechanisms, which can persist temporarily One of the central contributions of cognitive psychology has without attention, are time-limited rather than capacity- been to explore limitations in the human capacity to store limited (Cowan 1988; 1995). Other investigators, however, and process information. Although the distinction between have long questioned whether temporary storage concepts a limited-capacity primary memory and an unlimited- are necessary at all, and have suggested that the rules of capacity secondary memory was described by James (1890), learning and memory could be identical in both the short Miller’s (1956) theoretical review of a “magical number and long term (Crowder 1993; McGeoch 1932; Melton seven, plus or minus two” is probably the most seminal pa- 1963; Nairne 1992; Neath 1998). per in the literature for investigations of limits in short-term At present, the basis for believing that there is a time memory (STM) storage capacity. It was, in fact, heralded as one of the most influential Psychological Review papers ever, in a 1994 centennial issue of the journal. Miller’s ref- Nelson Cowan (Ph.D. 1980, University of Wiscon- erence to a magical number, however, was probably a sin–Madison) is Professor in the Department of Psy- rhetorical device. A more central focus of his article was the chological Sciences at the University of Missouri– ability to increase the effective storage capacity through the Columbia. He has written one book (Cowan, N. 1995. use of intelligent grouping or “chunking” of items. He ulti- Attention and memory: An integrated framework. Ox- mately suggested that the specific limit of seven probably ford University Press) and edited another (1997. The emerged as a coincidence. development of memory in childhood. Psychology Press), Over 40 years later, we are still uncertain as to the nature and has 100 other publications on working memory, and of storage capacity limits. According to some current theo- its relation to attention. He is former Associate Editor of the Journal of Experimental Psychology: Learning, ries there is no limit in storage capacity per se, but a limit Memory, and Cognition (1995–1999) and current As- in the duration for which an item can remain active in STM sociate Editor of the Quarterly Journal of Experimental without rehearsal (e.g., Baddeley 1986; Richman et al. Psychology (section A). He won the 1998 University of 1995). This has led to a debate about whether the limitation Missouri Chancellor’s Award for Research and Creative is a “magic number or magic spell” (Schweickert & Boruff Activities. 1986) or whether rehearsal really plays a role (Brown & © 2000 Cambridge University Press 0140-525X/00 $12.50 87 Cowan: The magical number 4 limit to STM is controversial and unsettled (Cowan et al. pacity limits but they are in line with Miller’s 7 6 2 (e.g., 1997a; 1997b; Crowder 1993; Neath & Nairne 1995; Ser- still taken at face value by Lisman & Idiart 1995). (View 2) vice 1998). The question is nearly intractable because any Short-term memory is limited by the amount of time that putative effect of the passage of time on memory for a par- has elapsed rather than by the number of items that can be ticular stimulus could instead be explained by a combination held simultaneously (e.g., Baddeley 1986). (View 3) There of various types of proactive and retroactive interference is no special short-term memory faculty at all; all memory from other stimuli. In any particular situation, what looks results obey the same rules of mutual interference, distinc- like decay could instead be displacement of items from a tiveness, and so on (e.g., Crowder 1993). (View 4) There limited-capacity store over time. If the general question of may be no capacity limits per se but only constraints such whether there is a specialized STM mechanism is to be an- as scheduling conflicts in performance and strategies for swered in the near future then, given the apparent unre- dealing with them (e.g., Meyer & Kieras 1997). (View 5) solvability of the decay issue, general STM questions seem There are multiple, separate capacity limits for different more likely to hinge on evidence for or against a chunk- types of material (e.g., Wickens 1984). (View 6) There are based capacity limit. separate capacity limits for storage versus processing The evidence regarding this capacity limit also has been (Daneman & Carpenter 1980; Halford et al. 1998). (View controversial. According to one view (Wickens 1984) there 7) Capacity limits exist, but they are completely task-spe- is not a single capacity limit, but several specialized capac- cific, with no way to extract a general estimate. (This may ity limits. Meyer and Kieras (1997) questioned the need for be the “default” view today.) Even among those who agree capacity limits to explain cognitive task performance; they with the 4-chunk thesis, moreover, a remaining possible instead proposed that performance scheduling concerns ground of contention concerns whether all of the various (and the need to carry out tasks in the required order) ac- phenomena that I will discuss are legitimate examples of count for apparent capacity limits. The goal of this target ar- this capacity limit. ticle is to provide a coherent account of the evidence to date These seven competing views will be re-evaluated in sec- on storage capacity limits . tion 4 (sects. 4.3.1–4.3.7). The importance of identifying One reason why a resolution may be needed is that, as the chunk limit in capacity is not only to know what that mentioned above, the theoretical manifesto announcing limit is, but more fundamentally to know whether there is the existence of a capacity limit (Miller 1956) did so with such a limit at all. Without evidence that a consistent limit considerable ambivalence toward the hypothesis. Although exists, the concepts of chunking and capacity limits are Miller’s ambivalence was, at the time, a sophisticated and themselves open to question. cautious response to available evidence, a wealth of subse- quent information suggests that there is a relatively con- 1.1. Pure capacity-based and compound STM estimates stant limit in the number of items that can be stored in a wide variety of tasks; but that limit is only three to five I will call the maximum number of chunks that can be re- items as the population average. Henderson (1972, p. 486) called in a particular situation the memory storage capac- cited various studies on the recall of spatial locations or of ity, and valid, empirically obtained estimates of this num- items in those locations, conducted by Sperling (1960), ber of chunks will be called estimates of capacity-based Sanders (1968), Posner (1969), and Scarborough (1971), to STM. Although that chunk limit presumably always exists, make the point that there is a “new magic number 4 6 1.” it is sometimes not feasible to identify the chunks inasmuch Broadbent (1975) proposed a similar limit of three items on as long-term memory information can be used to create the basis of more varied sources of information including, larger chunks out of smaller ones (Miller 1956), and inas- for example, studies showing that people form clusters of much as time- and interference-limited sources of infor- no more than three or four items in recall. A similar limit in mation that are not strictly capacity-limited may be used capacity was discussed, with various theoretical interpreta- along with capacity-limited storage to recall information.
Recommended publications
  • LS-09EN. OS Permissions. SUID/SGID/Sticky. Extended Attributes
    Operating Systems LS-09. OS Permissions. SUID/SGID/Sticky. Extended Attributes. Operating System Concepts 1.1 ys©2019 Linux/UNIX Security Basics Agenda ! UID ! GID ! Superuser ! File Permissions ! Umask ! RUID/EUID, RGID/EGID ! SUID, SGID, Sticky bits ! File Extended Attributes ! Mount/umount ! Windows Permissions ! File Systems Restriction Operating System Concepts 1.2 ys©2019 Domain Implementation in Linux/UNIX ! Two types domain (subjects) groups ! User Domains = User ID (UID>0) or User Group ID (GID>0) ! Superuser Domains = Root ID (UID=0) or Root Group ID (root can do everything, GID=0) ! Domain switch accomplished via file system. ! Each file has associated with it a domain bit (SetUID bit = SUID bit). ! When file is executed and SUID=on, then Effective UID is set to Owner of the file being executed. When execution completes Efective UID is reset to Real UID. ! Each subject (process) and object (file, socket,etc) has a 16-bit UID. ! Each object also has a 16-bit GID and each subject has one or more GIDs. ! Objects have access control lists that specify read, write, and execute permissions for user, group, and world. Operating System Concepts 1.3 ys©2019 Subjects and Objects Subjects = processes Objects = files (regular, directory, (Effective UID, EGID) devices /dev, ram /proc) RUID (EUID) Owner permissions (UID) RGID-main (EGID) Group Owner permissions (GID) +RGID-list Others RUID, RGID Others ID permissions Operating System Concepts 1.4 ys©2019 The Superuser (root) • Almost every Unix system comes with a special user in the /etc/passwd file with a UID=0. This user is known as the superuser and is normally given the username root.
    [Show full text]
  • Linux Filesystem Hierarchy Chapter 1
    Linux Filesystem Hierarchy Chapter 1. Linux Filesystem Hierarchy 1.1. Foreward When migrating from another operating system such as Microsoft Windows to another; one thing that will profoundly affect the end user greatly will be the differences between the filesystems. What are filesystems? A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk. The word is also used to refer to a partition or disk that is used to store the files or the type of the filesystem. Thus, one might say I have two filesystems meaning one has two partitions on which one stores files, or that one is using the extended filesystem, meaning the type of the filesystem. The difference between a disk or partition and the filesystem it contains is important. A few programs (including, reasonably enough, programs that create filesystems) operate directly on the raw sectors of a disk or partition; if there is an existing file system there it will be destroyed or seriously corrupted. Most programs operate on a filesystem, and therefore won't work on a partition that doesn't contain one (or that contains one of the wrong type). Before a partition or disk can be used as a filesystem, it needs to be initialized, and the bookkeeping data structures need to be written to the disk. This process is called making a filesystem. Most UNIX filesystem types have a similar general structure, although the exact details vary quite a bit.
    [Show full text]
  • Testing Working Memory: an Experimental and Analytical Approach
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Supervised Undergraduate Student Research Chancellor’s Honors Program Projects and Creative Work Spring 5-2005 Testing Working Memory: An Experimental and Analytical Approach Nicholas Duane Bennett University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_chanhonoproj Recommended Citation Bennett, Nicholas Duane, "Testing Working Memory: An Experimental and Analytical Approach" (2005). Chancellor’s Honors Program Projects. https://trace.tennessee.edu/utk_chanhonoproj/820 This is brought to you for free and open access by the Supervised Undergraduate Student Research and Creative Work at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Chancellor’s Honors Program Projects by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. Running head: TESTING WORKING MEMORY Testing Working Memory: An Experimental and Analytical Approach 2005 Senior Honors Project Nicholas D. Bennett Mentor: Dr. Srinivasan Mahadevan The University of Tennessee Knoxville Abstract The following paper is basically a brief review of my studies in the concentration of cognition under the guidance of Dr. Mahadevan. In addition to demonstrating laboratory procedures, Dr. Mahadevan recommended many of the subsequent references to literature pertaining to various memory constructs. Having acquired a broad taste (but admitted novice skill) for many interpretations, clarifications by and conversations with Dr. Mahadevan have enabled me to document some conclusions here. My hope is to convey some understanding of the history, methods, theories and models I have found to be instrumental to the present-day empirical study of memory.
    [Show full text]
  • Estimating Working Memory Capacity for Lists of Nonverbal Sounds
    ESTIMATING WORKING MEMORY CAPACITY FOR LISTS OF NONVERBAL SOUNDS __________________________________________________________________ A Thesis presented to the Faculty of the Graduate School at the University of Missouri __________________________________________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts __________________________________________________________________ by Dawei Li Dr. Nelson Cowan, Thesis Supervisor May 2011 The undersigned, appointed by the dean of the Graduate School, have examined the thesis entitled ESTIMATING WORKING MEMORY CAPACITY FOR LISTS OF NONVERBAL SOUNDS presented by Dawei Li, a candidate for the degree of master of arts, and hereby certify that, in their opinion, it is worthy of acceptance. Professor Nelson Cowan Professor Shawn Christ Professor Judith Goodman ACKNOWLEDGEMENTS I would like to thank my advisor Dr. Nelson Cowan, who has been supporting me on my research ever since the start of my graduate study. I would also like to thank Dr. Scott Saults for his valuable help to create the various auditory stimuli, and to add the detailed information to the method section. Finally, I would like to thank Dr. Shawn Christ and Dr. Judith Goodman for their comments on my draft. ii TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................... iv ABSTRACT .........................................................................................................................v Chapter
    [Show full text]
  • Filesystem Hierarchy Standard
    Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Version 3.0 Publication date March 19, 2015 Copyright © 2015 The Linux Foundation Copyright © 1994-2004 Daniel Quinlan Copyright © 2001-2004 Paul 'Rusty' Russell Copyright © 2003-2004 Christopher Yeoh Abstract This standard consists of a set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The guidelines are intended to support interoperability of applications, system administration tools, development tools, and scripts as well as greater uniformity of documentation for these systems. All trademarks and copyrights are owned by their owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark. Permission is granted to make and distribute verbatim copies of this standard provided the copyright and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this standard under the conditions for verbatim copying, provided also that the title page is labeled as modified including a reference to the original standard, provided that information on retrieving the original standard is included, and provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this standard into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the copyright holder. Dedication This release is dedicated to the memory of Christopher Yeoh, a long-time friend and colleague, and one of the original editors of the FHS.
    [Show full text]
  • Autodesk Alias 2016 Hardware Qualification
    Autodesk Alias 2016 Hardware Qualification Updated June 1, 2015 Windows Mac OSX Build Information Products Platform Version Software Date Build Number • Autodesk AutoStudio • Autodesk Alias Surface 64-bit 2016 March 6, 2015 201503061129-441529 • Autodesk Alias Design Supported Operating Systems and CPU Platforms Operating System CPU Platform Windows 7 SP1 Intel Xeon (Enterprise, Ultimate or Professional) 64-bit Intel Core AMD Opteron Windows 8.0 or 8.1 Intel Xeon (Enterprise or Professional) 64-bit Intel Core AMD Opteron Important Notes • Alias AutoStudio, Automotive, Surface and Design fully support 64-bit environments. Running the 64-bit native version requires Windows 8 or 8.1 64-bit or Windows 7 64-bit operating system. • Certain 3rd party software may alter the processor affinity settings, affecting multi-cpu systems running Alias.exe and its spawned processes. To check the affinity setting, right-click on the Alias.exe process inside the Windows Task Manager and select Set Affinity... ensure that all available CPUs are enabled. • Alias or its component programs may not launch successfully depending on your Windows security settings. If this occurs, you may either unblock the program via the Windows Firewall Security Alert dialog, or add it as an Exception in the Exceptions Tab in the Windows Firewall dialog box. For more information, please see the Microsoft Update. Similar configurations are necessary for any third party firewall software, Please Read • It may be possible to successfully use Alias for Windows with a non-qualified configuration, however, Support and Maintenance programs will be subject to the Autodesk Support services guidelines. • The configurations shown are subject to change, and additional qualified configurations may be added after qualification testing has been carried out.
    [Show full text]
  • Filesystem Hierarchy Standard
    Filesystem Hierarchy Standard Filesystem Hierarchy Standard Group Edited by Rusty Russell Daniel Quinlan Filesystem Hierarchy Standard by Filesystem Hierarchy Standard Group Edited by Rusty Russell and Daniel Quinlan Published November 4 2003 Copyright © 1994-2003 Daniel Quinlan Copyright © 2001-2003 Paul ’Rusty’ Russell Copyright © 2003 Christopher Yeoh This standard consists of a set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The guidelines are intended to support interoperability of applications, system administration tools, development tools, and scripts as well as greater uniformity of documentation for these systems. All trademarks and copyrights are owned by their owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark. Permission is granted to make and distribute verbatim copies of this standard provided the copyright and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this standard under the conditions for verbatim copying, provided also that the title page is labeled as modified including a reference to the original standard, provided that information on retrieving the original standard is included, and provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this standard into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the copyright holder. Table of Contents 1. Introduction........................................................................................................................................................1 1.1.
    [Show full text]
  • Open Directory Administration for Version 10.5 Leopard Second Edition
    Mac OS X Server Open Directory Administration For Version 10.5 Leopard Second Edition Apple Inc. © 2008 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to use such software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling copies of this publication or for providing paid-for support services. Every effort has been made to make sure that the information in this manual is correct. Apple Inc., is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino CA 95014-2084 www.apple.com The Apple logo is a trademark of Apple Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, iCal, iChat, Leopard, Mac, Macintosh, QuickTime, Xgrid, and Xserve are trademarks of Apple Inc., registered in the U.S. and other countries. Finder is a trademark of Apple Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. UNIX is a registered trademark of The Open Group. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products.
    [Show full text]
  • Rehabilitation Information Pack a Range of Products from Pearson Assessment for Professionals Working in the Area of Rehabilitation
    Rehabilitation Information Pack A range of products from Pearson Assessment for professionals working in the area of rehabilitation The Functional UK Administration and Scoring Manual TFL S Living Scale UK Edition Examiner’s Manual C. Munro Cullum Myron F. Weiner Kathleen C. Saine www.pearsonclinical.co.uk Welcome... Introducing our 2013 Rehabilitation Information Pack Dear Colleague, Pearson (Assessment) is one of the UK’s leading publishers of standardised assessments. Our tests are used by a number of professionals in both health and education settings and we strive to develop and distribute tools that are timely and in line with good practice guidelines. For example, we are mindful of targets set by the Department of Health, for the early recognition of debilitating neurological and cognitive disorders including dementia and the aim for ‘two-thirds of people with dementia [to be] identified and given appropriate support by 2015’. In this pack you will find a range of products that can aid you inidentifying cognitive impairments and assist you in the evaluation of your clients; helping you to plan intervention strategies and enhance your evidence- based practice. Among these assessments is the new Brief Cognitive Status Exam (BCSE) which is designed to assess a client’s cognitive ability quickly and reliably, and the RBANS™ - Update which can be used as a stand-alone “core” battery for the detection and characterization of dementia in the elderly. Together with early diagnosis, assessment of activities of daily living can be vital in assisting service users maintain independence or return to everyday life. The UK-normed Rivermead Behavioural Memory Test- Third Edition, Rookwood Driving Battery and The Functional Living Scales – UK Version all have excellent ecological validity which places assessment in real life context; making the results more meaningful to you as a professional, and your clients.
    [Show full text]
  • Mennyi? Szamok a Termeszetben 2 A
    Author Title 1 ? Mennyi? Szamok a termeszetben 2 A. DAVID REDISH. BEYOND THE COGNITIVE MAP : FROM PLACE CELLS TO EPISODIC MEMORY 3 Aaron C.T.Smith Cognitive mechanisms of belief change 4 Aaron L.Berkowitz The improvising mind: cognition and creativity in the musical moment 5 AARON L.BERKOWITZ. THE IMPROVISING MIND : COGNITION AND CREATIVITY IN THE MUSICAL MOMENT 6 AARON T. BECK. COGNITIVE THERAPY AND THE EMOTIONAL DISORDERS 7 Aaron Williamon Musical excellence: strategies and techniques to enhance performance 8 Adger David Language unlimited: the science behind our most creative power 9 AIDAN FEENEY, EVAN HEIT. INDUCTIVE REASONING : EXPERIMENTAL, DEVELOPMENTAL, AND COMPUTATIONAL APPROACHES 10 Alain F. Zuur, Elena N. Ieno, Erik H.W.G.Meesters A beginner`s guide to R 11 Alain F. Zuur, Elena N. Ieno, Erik H.W.G.Meesters A beginner`s guide to R 12 ALAN BADDELEY, Michael W. EYSENCK, AND Michael MEMORYC. ANDERSON. 13 Alan C Love Beyond the meme: development and structure in cultural evolution 14 ALAN GILCHRIST. SEEING BLACK AND WHITE 15 Alan Merriam The anthropology of music RYTHMES ET CHAOS DANS LES SYSTEMES BIOCHIMIQUES ET CELLULAIRES. ENGLISH. BIOCHEMICAL OSCILLATIONS 16 ALBERT GOLDBETER AND CELLULAR RHYTHMS : THE MOLECULAR BASES OF PERIODIC AND CHAOTIC BEHAVIOUR 17 Albert S Bregman Auditory scene analysis: the perceptual organization of sound 18 Albert-Laszlo Barabasi Network Science 19 Alda Mari, Claire Beyssade, Fabio del Prete Genericity 20 Alex Mesoudi Cultural Evolution: how Darwinian theory can explain human culture and synthesize the social sciences 21 Alexander Easton The cognitive neuroscience of social behaviour. 22 ALEXANDER TODOROV Face Value the irresistible influence of first impression 23 ALEXANDER TODOROV, Susan T.
    [Show full text]
  • Benchmarks for Models of Short-Term and Working Memory
    Psychological Bulletin © 2018 American Psychological Association 2018, Vol. 144, No. 9, 885–958 0033-2909/18/$12.00 http://dx.doi.org/10.1037/bul0000153 Benchmarks for Models of Short-Term and Working Memory Klaus Oberauer Stephan Lewandowsky University of Zurich University of Bristol and University of Western Australia Edward Awh Gordon D. A. Brown University of Chicago University of Warwick Andrew Conway Nelson Cowan Claremont Graduate University University of Missouri Christopher Donkin Simon Farrell University of New South Wales University of Western Australia Graham J. Hitch Mark J. Hurlstone University of York University of Western Australia Wei Ji Ma Candice C. Morey New York University Cardiff University Derek Evan Nee Judith Schweppe Florida State University University of Erfurt Evie Vergauwe Geoff Ward University of Geneva University of Essex Any mature field of research in psychology—such as short-term/working memory—is characterized by a wealth of empirical findings. It is currently unrealistic to expect a theory to explain them all; theorists must satisfice with explaining a subset of findings. The aim of the present article is to make the choice of that subset less arbitrary and idiosyncratic than is current practice. We propose criteria for identifying benchmark findings that every theory in a field should be able to explain: Benchmarks should be reproducible, generalize across materials and methodological variations, and be theoretically informative. We propose a set of benchmarks for theories and computational models of short-term and working memory. The benchmarks are described in as theory-neutral a way as possible, so that they can serve as empirical common ground for competing theoretical approaches.
    [Show full text]
  • 9-11Th July 2014
    INTERNATIONAL CONFERENCE ON WORKING MEMORY th 9-11 July 2014 PROGRAMME Presentations, posters, lunches: University Arms Hotel, Regent Street, Cambridge, CB2 1AD Evening reception (9th July): MRC Cognition and Brain Sciences Unit, 15 Chaucer Road, Cambridge, CB2 7EF Conference Dinner (10th July, pre-booked places only): Trinity Hall, Trinity Lane, Cambridge, CB2 1TJ ICWM2014 DRAFT PROGRAMME Page 1 Wednesday 9th July – Afternoon and reception 12pm Registration at the University Arms Hotel 12-2pm Poster session I and Lunch, Mezzanine Presentations, Session I, Main room: 2.00pm Susan Gathercole (Cognition and Brain Sciences Unit) Introduction to ICWM 2.05pm Alan Baddeley (University of York) Working memory at 40 2.50pm Pierre Barrouillet (University of Geneva) Loss of information from working memory 3.10pm Valerie Camos (University of Fribourg) The mechanisms of reconstruction in working memory 3.30pm Andrew Conway (Princeton University) Process Overlap Theory: A new interpretation of working memory capacity 3.50pm Refreshments 4.20pm Michael Kane (University of North Carolina at Greensboro) Convergent and discriminant validity of working memory capacity (or, how null results can be the theorist’s friend 4.40pm Klaus Oberauer (University of Zurich) Removal of distractors in complex working memory span tasks 5.00pm John Towse (Lancaster University) The development of working memory capacity: exactly which problems are we trying to solve? 5.20pm Nelson Cowan (University of Missouri) Working memory for the amount of change in an array 6-8pm
    [Show full text]