Token Identity Vs. Type Identity

ثبت نشده
چکیده

Idsardi and Raimy 2000 (I&R) propose that the representations posited by a learner are constrained by economy considerations. If a child hears a string like the Temiar continuative [sglOg], two possibilities are available while building the underlying representation of the string. Either the two segments [g] perceived in the string correspond to different tokens of the same type, or they correspond to the same token in the input representation. The analysis of Temiar proposed by I&R leads to the conclusion that repetition of the same token could be the answer in this case, assuming that the child receives no contradictory input—there would be just one underlying /g/ in this form. They further propose that if this type of hypothesis is available, then it must be possible for the learner to represent words with a common sub-sequence as instances of reduplication, even in a language that does not make use of reduplication for morphological purposes. The English word banana is given as an example where its possible underlying representation is as in (1). Here the link from the last instance of <a> corresponds to a loop of the type used for reduplication. I&R suggest that other considerations such as metrical information (stress assignment in the given example) would influence the learner in his learning strategy. Such a proposal makes predictions about languages that show overapplication and underapplication of phonological processes in reduplicated forms. Take for instance the following hypothetical surface forms: [imat], [itat]. The representation of the first poses no problem to the learner in regards to the identity of the segments. In the case of the second, the form [itat] could contain two instantiations of the same token or two different tokens of the same type [t]. If a form like this undergoes full reduplication, then the output either instantiates four tokens of a single underlying /t/, or else two pairs of tokens, each of two different underlying /t/s. This distinction will be relevant in cases of overapplication, since full economy of representation predicts that all four surface [t]s could be affected by the same rule, even if only one of them appears in the correct environment. Suppose a language L has total reduplication as well as an overapplying rule that assibilates t > t before i ; then the reduplicated form /itatitat/ would be predicted to surface in L as [itatitat], if the two root /t/s are different, but as [itatitat] if the four surface [t]s are underlyingly the same segment (token identical). Our reading of the literature is that overapplication is understood to affect only correspondent segments in the base and reduplicant, and thus L could have only the form [itatitat]. This interpretation, as well as our preliminary survey of the literature, suggests that full economy of representation is not utilized in setting up representations. Furthermore, notice that the form [itatitat] derived from an underlying representation that contains a single token of /t/ would not actually surface as such according to the completeness principle (Fitzpatrick 2006b) , but as [ititat] as can be seen in (2). We adduce a further argument against economy of representation based on problems that arise in linearizing reduplicated forms with regards to the completeness principle and the formalization of the procedure. Some empirical arguments in favour of economy of representation could be found in Fitzpatrick (to appear). If the evidence turns out right, the impact on the linearization procedures is non-negligeable. We tackle problems of this type and discuss their impact on the linearization algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Personal Identity and Uploading

Objections to uploading may be parsed into substrate issues, dealing with the computer platform of upload and personal identity. This paper argues that the personal identity issues of uploading are no more or less challenging than those of bodily transfer often discussed in the philosophical literature. It is argued that what is important in personal identity involves both token and type identi...

متن کامل

Sensor-Enhanced Authentication Token for Dynamic Identity Management

sensor, authentication, identity management, security communication protocol Identity management as a component in applications is increasing in importance. Many applications need to manage user identities in a dynamic way because threats or conditions under which the application is to be used can change rapidly. We describe a new system for dynamic identity management that can accommodate chan...

متن کامل

User-Centric Identity Using ePassports

The worldwide introduction of ePassports presents a unique opportunity for the online identity community to implement trustworthy identity providers. The ePassport provides citizens with a strong authentication token within a global Public Key Infrastructure backed by government administrations. This paper studies the possibilities for leveraging the ePassport for usercentric identity and repor...

متن کامل

Current Issues in the Mind / Body Problem

I discuss what I take to be the strongest recent arguments for and against mind/body identity. On the pro side I discuss Lewis' views, and on the con Kripkels. The discuss10n of Kr1pke takes the form of an examination of the major objections which have been made against his ·views. ~ne conclusion of my discussion of Lewis 1s that he has not adequately defended his claims of type/type identity. ...

متن کامل

Solving identity delegation problem environment

At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on nondynamic offline processes that do not enable quick ...

متن کامل

Federated Identity Management - We Built It; Why Won't They Come?

M any companies take advantage of single-sign-on (SSO) technologies. After a successful login, the authentication service sends the computer a security token, which is subsequently forwarded as proof of authentication each time that computer accesses a protected service. Examples of services linked through SSO include access to network drives, email services, a corporate intranet, project porta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006