Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Purpose: The purpose of this viewpoint is to advocate for increased study of common ground and audience design processes in multiparty communication in traumatic brain injury (TBI).

Method: Building on discussions at the 2024 International Cognitive-Communication Disorders Conference, we review common ground and audience design processes in dyadic and multiparty communication. We discuss how the diffuse profiles of neural and cognitive deficits place individuals with TBI at increased risk for keeping track of who knows what in group settings and using that knowledge to flexibly adapt their communication behaviors.

Results: We routinely engage in social communication in groups of three or more people at work, school, and social functions. While academic, vocational, and interpersonal domains are all areas where individuals with TBI are at risk for negative outcomes, we know very little about the impact of TBI on group, or multiparty, communication.

Conclusions: The empirical study of common ground and audience design in multiparty communication in TBI presents a promising new direction in characterizing the impact of TBI on social communication, uncovering the underlying mechanisms of cognitive-communication disorders, and may lead to new interventions aimed at improving success in navigating group communication at work and school, and in interpersonal relationships.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12381843PMC
http://dx.doi.org/10.1044/2025_AJSLP-24-00151DOI Listing

Publication Analysis

Top Keywords

multiparty communication
16
social communication
12
common ground
12
ground audience
12
audience design
12
direction characterizing
8
characterizing impact
8
traumatic brain
8
brain injury
8
communication
8

Similar Publications

In this paper, two conclusive three-party cyclic assisted cloning protocols in amplitude damping (AD) channel are put forward that, respectively clone three arbitrary unknown single-qubit states and single-qutrit states with the help of a state preparer. Each of our protocols includes three consecutive stages: quantum channel preparation, cyclic quantum teleportation (CQT), and multi-party assisted cloning. The first stage of each protocol proposes the detailed processes of sharing a pure entangled quantum state as a component of a quantum channel in AD channel via entanglement compensation.

View Article and Find Full Text PDF

Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns.

View Article and Find Full Text PDF

Introduction: The integration of artificial intelligence (AI) into medical text generation is transforming public health by enhancing clinical documentation, patient education, and decision support. However, the widespread deployment of AI in this domain introduces significant ethical challenges, including fairness, privacy protection, and accountability. Traditional AI-driven medical text generation models often inherit biases from training data, resulting in disparities in healthcare communication across different demographic groups.

View Article and Find Full Text PDF

To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell states is proposed. A single controlling party is vulnerable to information compromise due to tampering or betrayal; the multi-party controlled mechanism (Charlie to Charlie) in this protocol establishes a distributed trust model. It mandates collective authorization from all controlling parties, significantly enhancing its robust resilience against untrustworthy controllers or collusion attacks.

View Article and Find Full Text PDF

The rapid adoption of Federated Learning (FL) in privacy-sensitive domains such as healthcare, IoT, and smart cities underscores its potential to enable collaborative machine learning without compromising data ownership. However, conventional FL frameworks face several critical challenges: high computational overhead on edge devices, significant communication latency due to frequent model updates, vulnerability to model and data poisoning attacks, and limited privacy-preserving mechanisms that expose systems to inference risks. These issues hinder the scalability, efficiency, and trustworthiness of FL in real-world, large-scale deployments-particularly in domains like Electronic Health Records (EHR) management, where data sensitivity is paramount.

View Article and Find Full Text PDF