resistance to proactive interference”, i.e. the ability to limit
the activation of no longer relevant items and thus resistmemory intrusions.
These three functions are akin to those previously defined by
Hasher and Zacks (1988), as restraint, access, and deletion, respectively.