Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "W19-0121",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T06:27:51.183243Z"
},
"title": "C-command dependencies as TSL string constraints",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Stony Brook University",
"location": {}
},
"email": ""
},
{
"first": "Nazila",
"middle": [],
"last": "Shafiei",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Stony Brook University",
"location": {}
},
"email": "[email protected]"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "We provide a general formal framework for analyzing c-command based dependencies in syntax, e.g. binding and NPI licensing, from a subregular perspective. C-command relations are represented as strings computed from Minimalist derivation trees, and syntactic dependencies are shown to be input-output tierbased strictly local over such strings. The complexity of many syntactic phenomena thus is comparable to dependencies in phonology and morphology.",
"pdf_parse": {
"paper_id": "W19-0121",
"_pdf_hash": "",
"abstract": [
{
"text": "We provide a general formal framework for analyzing c-command based dependencies in syntax, e.g. binding and NPI licensing, from a subregular perspective. C-command relations are represented as strings computed from Minimalist derivation trees, and syntactic dependencies are shown to be input-output tierbased strictly local over such strings. The complexity of many syntactic phenomena thus is comparable to dependencies in phonology and morphology.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "The last decade has seen tremendous progress in the subregular analysis of phonology and morphology (see Chandlee 2017, Heinz 2018 and references therein) . The subregular program is concerned with identifying proper subclasses of the regular languages that are sufficiently powerful for natural language, and to convert these tighter complexity bounds into typological predictions and new learning algorithms.",
"cite_spans": [
{
"start": 105,
"end": 134,
"text": "Chandlee 2017, Heinz 2018 and",
"ref_id": null
},
{
"start": 135,
"end": 154,
"text": "references therein)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Extending the subregular approach to syntax has proven more challenging because syntactic dependencies are not regular over strings, let alone subregular (Chomsky, 1957; Huybregts, 1984; Shieber, 1985; Michaelis and Kracht, 1997; Kobele, 2006) . But syntactic dependencies seem to be subregular over tree structures (Graf, 2012) . More recently, a series of arguments (Graf, 2018a,b; has been presented that dependencies in phonology, morphology, and syntax are all of comparable subregular complexity once one picks a suitable data structure (string-like vs. trees). More precisely, all dependencies are conjectured to belong to natural extensions of the class tier-based strictly local (TSL; Heinz et al., 2011; Graf and Mayer, 2018) .",
"cite_spans": [
{
"start": 154,
"end": 169,
"text": "(Chomsky, 1957;",
"ref_id": "BIBREF6"
},
{
"start": 170,
"end": 186,
"text": "Huybregts, 1984;",
"ref_id": "BIBREF21"
},
{
"start": 187,
"end": 201,
"text": "Shieber, 1985;",
"ref_id": "BIBREF31"
},
{
"start": 202,
"end": 229,
"text": "Michaelis and Kracht, 1997;",
"ref_id": "BIBREF29"
},
{
"start": 230,
"end": 243,
"text": "Kobele, 2006)",
"ref_id": "BIBREF24"
},
{
"start": 316,
"end": 328,
"text": "(Graf, 2012)",
"ref_id": "BIBREF11"
},
{
"start": 368,
"end": 383,
"text": "(Graf, 2018a,b;",
"ref_id": null
},
{
"start": 694,
"end": 713,
"text": "Heinz et al., 2011;",
"ref_id": "BIBREF20"
},
{
"start": 714,
"end": 735,
"text": "Graf and Mayer, 2018)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "While this claim is well-supported for phonology and morphology, it is on shakier ground for syntax. It seems to hold for subcategorization and displacement (Merge and Move in Chomskyan terms) and some kinds of NPI-licensing (Vu, 2018) . But it may fail for constraints based on c-command, which are numerous in syntax. This paper argues that these dependencies are also TSL given the right kind of representation.",
"cite_spans": [
{
"start": 225,
"end": 235,
"text": "(Vu, 2018)",
"ref_id": "BIBREF34"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We define a general procedure for converting ccommand dependencies to string languages. Intuitively, our procedure amounts to little more than making c-command a basic relation in syntactic representations (cf. Frank and Vijay-Shanker, 1999) . Formally, we represent Minimalist grammar derivations (Stabler, 1997) as dependency trees (cf. Brody, 2000; Kobele, 2002) and then associate each node with a string of nodes that ccommand it. Principle A of binding theory, for example, then requires that a string that ends in a reflexive must contain a potential binder somewhere between the reflexive and the head of its binding domain. Based on a preliminary analysis of c-command dependencies in the literature, we contend that they all fit into extensions of TSL that have been proposed for phonology and morphology.",
"cite_spans": [
{
"start": 211,
"end": 241,
"text": "Frank and Vijay-Shanker, 1999)",
"ref_id": "BIBREF10"
},
{
"start": 298,
"end": 313,
"text": "(Stabler, 1997)",
"ref_id": "BIBREF32"
},
{
"start": 339,
"end": 351,
"text": "Brody, 2000;",
"ref_id": "BIBREF2"
},
{
"start": 352,
"end": 365,
"text": "Kobele, 2002)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The paper proceeds as follows. We first discuss some general preliminaries ( \u00a72), including MGs, dependency trees, and subregular syntax. After that, c-strings are introduced as a string-based representation of c-command relations ( \u00a73.1), and various syntactic phenomena are characterized in these terms ( \u00a73.2). We then show that the dependencies of these phenomena are input-output tierbased strictly local (Graf and Mayer, 2018) over cstrings ( \u00a74), and we explain why this likely holds for all c-command dependencies in syntax. Some final complications introduced by movement are discussed in \u00a75.",
"cite_spans": [
{
"start": 410,
"end": 432,
"text": "(Graf and Mayer, 2018)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "While the ideas presented in this paper are fairly intuitive, a sufficiently rigorous description requires a broad formal background. We first introduce some basic notation ( \u00a72.1) and then discuss Minimalist grammars as a formal model of syntax ( \u00a72.2). We also explain how their derivation can be encoded as dependency trees, which will be used in \u00a73 to easily compute the c-commanders for any given node. After that, \u00a72.3 surveys some recent developments on subregular syntax and why this paper pursues a different route.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We follow the standard notation for strings: \u2303 by default denotes a fixed alphabet, \" is the empty string, S \u21e4 is the Kleene closure of set S, S + is S \u21e4 {\"}, S is \u2303 S, and instead of {a} we may simply write a.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Formal language theory",
"sec_num": "2.1"
},
{
"text": "In order to assess the complexity of syntactic dependencies, we need a formal model of syntax. We choose Minimalist grammars (MGs; Stabler, 1997 Stabler, , 2011 . MGs are inspired by Chomsky (1995) but can incorporate a wide range of ideas from the syntactic literature (see Graf 2013 and references therein). This makes them an ideal testing ground for c-command dependencies.",
"cite_spans": [
{
"start": 125,
"end": 130,
"text": "(MGs;",
"ref_id": null
},
{
"start": 131,
"end": 144,
"text": "Stabler, 1997",
"ref_id": "BIBREF32"
},
{
"start": 145,
"end": 160,
"text": "Stabler, , 2011",
"ref_id": "BIBREF33"
},
{
"start": 183,
"end": 197,
"text": "Chomsky (1995)",
"ref_id": "BIBREF7"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Minimalist grammars",
"sec_num": "2.2"
},
{
"text": "Every MG is a finite set of lexical items that are annotated with strings of features to drive the structure-building operations Merge and Move.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimalist grammars",
"sec_num": "2.2"
},
{
"text": "Example 1 (Merge). The noun car only carries the category feature N . The determiner the carries a matching selector feature N + . The full feature string for the is N + D . This indicates that the first selects a noun and then acts as DP that can be selected by anything with the matching selector feature D + . The possessive marker 's, on the other hand, must select both a noun as its complement and a DP as its specifier. Hence its feature string is N + D + D .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimalist grammars",
"sec_num": "2.2"
},
{
"text": "Example 2 (Move). The determiner which is similar to the, except that it also undergoes whmovement after it has been selected. Therefore its feature string must include a licensee feature wh at the very end: N + D wh . At least in some cases the landing site of the wh-mover is an empty CP-specifier. In order to allow for this, the grammar must contain a lexical item whose phonetic exponent is \" and whose feature string is T + wh + C . Here wh + is a licensor feature that marks the empty C-head as a landing site for whmovement.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimalist grammars",
"sec_num": "2.2"
},
{
"text": "As every MG builds a phrase structure tree via a sequence of Merge and Move steps, every syntactic tree can be fully specified by its derivation. The derivation, in turn, can be represented as a tree, which may take the form of a dependency tree as shown in Fig. 1 (cf. Brody, 2000; Kobele, 2002) . In an MG dependency tree, a node d is the daughter of node n iff n selects d. For MGs, this means that X on d and a matching X + of n were checked as part of the same Merge operation. We assume that the linear order of siblings is the reverse of the order of selection, so that the first argument of a head is its rightmost daughter. Movement is not indicated in dependency trees as it can be inferred from the distribution of licensor and licensee features.",
"cite_spans": [
{
"start": 270,
"end": 282,
"text": "Brody, 2000;",
"ref_id": "BIBREF2"
},
{
"start": 283,
"end": 296,
"text": "Kobele, 2002)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [
{
"start": 258,
"end": 264,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Minimalist grammars",
"sec_num": "2.2"
},
{
"text": "It has been known for a long time that every MG's set of well-formed derivation trees forms a regular tree language (Michaelis, 2001; Kobele et al., 2007) . While these results build on a different derivation tree format, they also hold for the dependency tree format in this paper because the latter can be obtained from the former by a regularity-preserving tree transduction.",
"cite_spans": [
{
"start": 116,
"end": 133,
"text": "(Michaelis, 2001;",
"ref_id": "BIBREF28"
},
{
"start": 134,
"end": 154,
"text": "Kobele et al., 2007)",
"ref_id": "BIBREF25"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "It has also become clear, though, that MG derivation tree languages are not just regular, but subregular (Graf, 2012) . Most recently, Graf (2018b) showed that they belong to the formal class TSL. This class was first defined for strings to handle some phenomena in phonology (Heinz et al., 2011) . Graf lifts TSL from strings to trees. Intuitively, TSL masks out parts of the tree that are irrelevant for a given dependency and then puts locally bounded constraints on the remainder. Graf limits his attention to Merge and Move, but follow-up work has since argued that NPIlicensing and morphological case also fit into this class (Vu, 2018; Vu et al., 2019) . If correct, this would not only suggest a new kind of computational parallelism between language modules, but might also prove useful for parsing and learning algorithms.",
"cite_spans": [
{
"start": 105,
"end": 117,
"text": "(Graf, 2012)",
"ref_id": "BIBREF11"
},
{
"start": 276,
"end": 296,
"text": "(Heinz et al., 2011)",
"ref_id": "BIBREF20"
},
{
"start": 632,
"end": 642,
"text": "(Vu, 2018;",
"ref_id": "BIBREF34"
},
{
"start": 643,
"end": 659,
"text": "Vu et al., 2019)",
"ref_id": "BIBREF35"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "Although we believe this work to be very promising, it is still based on detailed case studies and has not yielded any general properties that guarantee that TSL is a safe upper complexity 's mother",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "\" :: T + top + C \" :: V + nom + T likes :: D + D + V 's :: N + D + D nom",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "T 0 T VP t V 0",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "likes t Figure 1 : A dependency tree representation of an MG derivation, with its corresponding phrase structure tree to the right. Movement is indicated by arrows for the reader's convenience, it is not part of the tree. Crucially, moving phrases remain in their base position in the dependency tree.",
"cite_spans": [],
"ref_spans": [
{
"start": 8,
"end": 16,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "bound for all attested syntactic dependencies. In addition, the step from strings to trees complicates the comparison to phonology and morphology. Several subregular classes besides TSL have been argued to play a central role in these domains, e.g. SP (Rogers et al., 2010) and IBSP (Graf, , 2018a . The latter is difficult to lift from strings to trees, whereas the former seems ill-suited for syntactic dependencies based on preliminary work of ours. For these reasons, a string-based view of syntactic dependencies is a welcome alternative that makes it easier to compare phonology and syntax. As we argue in this paper ( \u00a74.2), it also provides some general insights that make it very likely that all c-command dependencies fall within a subregular region that is also occupied by dependencies in phonology and morphology.",
"cite_spans": [
{
"start": 252,
"end": 273,
"text": "(Rogers et al., 2010)",
"ref_id": "BIBREF30"
},
{
"start": 283,
"end": 297,
"text": "(Graf, , 2018a",
"ref_id": "BIBREF14"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "MGs as subregular tree languages",
"sec_num": "2.3"
},
{
"text": "We are finally in a position to demonstrate how c-command dependencies reduce to constraints on strings. We first present the general idea in \u00a73.1 and then apply it to several examples in \u00a73.2. We only describe the relevant string languages and wait until \u00a74 to show that they fit into (extensions of) TSL.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "C-command relations as strings",
"sec_num": "3"
},
{
"text": "The dependency graphs make it very easy to enforce c-command requirements for any given node -at least if one puts aside movement, as we will do until \u00a75. Until then, \"c-command\" only means \"c-command between base positions before movement\". If u is a left sibling of v in an MG dependency tree t, then (the phrase headed by) u c-commands (the phrase headed by) v. This is illustrated by John and mother in Fig. 1 . In addition, v is ccommanded by almost every node that dominates it. Looking again at Fig. 1 , we see that the Thead and the C-head dominate John in the dependency tree and c-command John in the phrase structure tree (at the position marked by the trace in Spec,VP).",
"cite_spans": [],
"ref_spans": [
{
"start": 407,
"end": 413,
"text": "Fig. 1",
"ref_id": null
},
{
"start": 502,
"end": 508,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "One minor wrinkle is the relation between heads and their specifiers. The former do not ccommand the latter, but they do so according to our definition. Hence our notion of command is actually a hybrid of c-command and m-command (Aoun and Sportiche, 1983) . One may call it d[erivational]-command to emphasize this difference: a node d-commands all its right siblings, all its daughters, and everything that is d-commanded by its siblings or daughters. As far as we can tell, the minor differences between c-command and d-command are immaterial for all syntactic dependencies that have been argued to involve ccommand, and we will continue to use c-command as the general term instead of d-command whenever this does not cause any confusion.",
"cite_spans": [
{
"start": 229,
"end": 255,
"text": "(Aoun and Sportiche, 1983)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "Note that d-command is a highly natural relation over derivation trees as it encodes prominence with respect to feature checking. Based on the definition above, x d-commands y iff x had one of its Merge features checked more recently than y. A specifier s of head h d-commands a complement c of h because s has been selected more recently than c. And h d-commands s because h is selected by some other head after s has been selected. C-command as a basic relation of syntax is difficult to motivate (but see Epstein et al. 1998 and Chametzky 2000 , 2011 . D-command, on the other hand, falls out naturally from the MG feature calculus and thus is a plausible primitive for syntactic dependencies. 1 One can automatically calculate for every node a string representation of the relevant command relations. Let T be a tree such that node m has the daughters d 1 , . . . ,",
"cite_spans": [
{
"start": 508,
"end": 527,
"text": "Epstein et al. 1998",
"ref_id": "BIBREF9"
},
{
"start": 528,
"end": 546,
"text": "and Chametzky 2000",
"ref_id": "BIBREF3"
},
{
"start": 547,
"end": 553,
"text": ", 2011",
"ref_id": "BIBREF33"
},
{
"start": 697,
"end": 698,
"text": "1",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "d i , d, d i+1 , . . . , d n , with n 0. The immediate c[ommand]-string ics(d) of d is the string d d i \u2022 \u2022 \u2022 d 1 . For every node n of T , its c[ommand]-string cs(n) is recursively defined as shown below, where \u2022 indicates string concatena- tion: 2 cs(n) := ( ics(n) if n is the root of T ics(n) \u2022 cs(m) if m is n's mother",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "Note that c-strings sort d-commanders in a bottom-up fashion, which usually yields the reverse of their linear order in the string. For improved readability, we omit all features and replace empty heads by their category. Example 3. Consider once more the dependency graph in Fig. 1 . While the immediate command string of car is just car, its c-string is car this 's likes T C.",
"cite_spans": [],
"ref_spans": [
{
"start": 276,
"end": 282,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "The next subsection illustrates how a number of syntactic phenomena can be reinterpreted as constraints on c-strings. Even more strikingly, these constraints are fairly intuitive, and as we will see in \u00a74, their subregular complexity is largely in line with what has been found in phonology and morphology.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Idea and definition",
"sec_num": "3.1"
},
{
"text": "It is beyond the purview of this paper to exhaustively analyze every syntactic dependency that has been claimed to involve c-command. Consequently, we limit ourselves to a representative sample of NPI-licensing ( \u00a73.2.1) and binding effects ( \u00a73.2.2- \u00a73.2.4). Due to space restrictions, we are also limited to high-level discussions that illustrate the general ideas but do not account for all details and potential complications (cf. \u00a73.2.5).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Examples of syntactic constraints",
"sec_num": "3.2"
},
{
"text": "NPIs can occur in a variety of contexts, but the central syntactic licensing condition is c-command by a downward-entailing operator. We can capture this in terms of conditions on string languages. If a c-string ends in an NPI, then it must also contain a licensor such as no or nobody. So the required string language is NPI",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "\u2022 \u2022 \u2022 {no, nobody} \u2022 \u2022 \u2022 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "This ensures that no NPI can ever occur without a ccommanding licensor.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "Example 4. Consider the ill-formed \u21e4 Every student said that the train ever arrives on time. Assuming that ever is a functional head between V and T, its c-string is ever T that every said T C. Since this string is not a member of the NPIlicensing language, ever is not licensed and the sentence is illicit.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "As is witnessed by Have you ever been to Russia, NPIs are also licensed in questions. We can readily accommodate this by adding interrogative C-heads to the set of licensors. Overall, then, the c-string pattern for NPI-licensing is NPI",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "\u2022 \u2022 \u2022 Lic \u2022 \u2022 \u2022 ,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "where Lic is a downward entailing quantifier or an interrogative C-head.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "NPI licensing",
"sec_num": "3.2.1"
},
{
"text": "Principle A requires that reflexives must be bound within their binding domain, usually a TP containing an abstract subject. When construed as a distributional constraint, this reduces to the presence of a DP in the binding domain that c-commands the reflexive and matches its -features (person, number, and gender).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Locally bound reflexives",
"sec_num": "3.2.2"
},
{
"text": "In MGs, every TP with an abstract subject is headed by a lexical item with category feature T and licensor feature nom + . Let T be the shorthand for any such LI, R[ ] a reflexive, and D[ ] a matching determiner. Since MGs have finite lexicons, one can list for each reflexive which determiners match its -features. Then Principle A corresponds to the string language",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Locally bound reflexives",
"sec_num": "3.2.2"
},
{
"text": "R[ ] T \u21e4 D[ ] \u2022 \u2022 \u2022 , where T",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Locally bound reflexives",
"sec_num": "3.2.2"
},
{
"text": "\u21e4 is a (possibly empty) string that contains no instances of T .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Locally bound reflexives",
"sec_num": "3.2.2"
},
{
"text": "Example 5. Contrast the well-formed John said that Mary likes herself with the ill-formed \u21e4 John said that Mary likes himself. The former has the c-string herself Mary likes T that John said T C. Since Mary is -feature compatible with herself and occurs between the reflexive and the T-head, Principle A is satisfied. In the ill-formed sentence, herself is replaced by himself. The closest com-patible D-head is John, but since a finite T-head occurs between John and the reflexive, Principle A is violated.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Locally bound reflexives",
"sec_num": "3.2.2"
},
{
"text": "The reflexive sig in Swedish only partially obeys Principle A. It still requires a syntactic binder, but said binder must not be part of the same binding domain (Kiparsky, 2002) . The corresponding cstring",
"cite_spans": [
{
"start": 161,
"end": 177,
"text": "(Kiparsky, 2002)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Non-locally bound reflexives",
"sec_num": "3.2.3"
},
{
"text": "language is R[ ] \u2022 \u2022 \u2022 T \u2022 \u2022 \u2022 D[ ] \u2022 \u2022 \u2022 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Non-locally bound reflexives",
"sec_num": "3.2.3"
},
{
"text": "Example 6. Suppose for the sake of argument that English himself behaves like Swedish sig, and consider again John said that Mary likes himself/ herself. Then the sentence with herself would be ill-formed, but not the one with himself. And as the reader may verify for themselves, only the cstring of himself fits the pattern above.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Non-locally bound reflexives",
"sec_num": "3.2.3"
},
{
"text": "Principle B regulates the distribution of syntactically bound pronouns. Pronouns in English can always be discourse-bound, so their distribution is unproblematic. Marathi, on the other hand, has pronouns that must be syntactically bound (Kiparsky, 2002) . Like standard pronouns, they I) must be non-locally bound, and II) cannot have the same referent as a local c-commander. Condition II) makes the distribution of Marathi pronouns much harder than that of Swedish sig-reflexives.",
"cite_spans": [
{
"start": 237,
"end": 253,
"text": "(Kiparsky, 2002)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Principle B",
"sec_num": "3.2.4"
},
{
"text": "From a distributional perspective, Principle B enforces a counting condition: if a pronoun is c-commanded by n pronouns in the same binding domain, then at least n potential antecedents must c-command the binding domain in order to furnish at least one grammatical reading. Temporarily putting aside -features, this yields the string template \u21b5T such that \u21b5, 2 \u2303 \u21e4 , \u21b5 starts with a pronoun, and the total number of Rexpressions (i.e. D-heads) in exceeds the number of pronouns in \u21b5; pronouns are counted as Rexpressions in because they can bind pronouns in \u21b5. Without further assumptions, this pattern is context-free and thus much more complicated than any of the previous c-string languages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Principle B",
"sec_num": "3.2.4"
},
{
"text": "But Graf and Abner (2012) show that even though a binding domain may contain an unbounded number of pronouns, most of them can share the same referent. Pronouns within distinct adjuncts can pick out the same referent, and other constructions such as coordination are very limited in how they interact with bound pronouns. As a result, there is an upper bound n on the number of distinct antecedents that are needed to license all pronouns in a binding domain. This guarantees regularity and, as we will see in \u00a74.3, subregularity by virtue of being definable in IO-TSL.",
"cite_spans": [
{
"start": 4,
"end": 25,
"text": "Graf and Abner (2012)",
"ref_id": "BIBREF16"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Principle B",
"sec_num": "3.2.4"
},
{
"text": "Example 7. Suppose for the sake of argument that English pronouns always require syntactic antecedents. Then the sentence John thinks that he likes him is ungrammatical, whereas John told Bill that he likes him is well-formed. This immediately follows from the c-string of the second pronoun in each sentence. One is him he likes T that John thinks T C and thus does not furnish enough antecedents for him and he. The other c-string provides the required minimum of two antecedents, namely John and Bill: him he likes T that Bill John told T C.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Principle B",
"sec_num": "3.2.4"
},
{
"text": "Each one of the phenomena above has several complications. What counts as an NPI licensor depends on the position of the NPI. For example, every can license an NPI if it occurs in a relative clause modifying the argument of every. Similarly, many reflexives are exempt from Principle A when they occur inside certain adjuncts, and some languages like Icelandic allow for long-distance binding only under specific circumstances. These are serious complications. A careful analysis of any one of these phenomena arguably requires a full-length journal paper. Nonetheless we believe that these complications would render the string patterns more complicated, but not more complex. The reason for this is explained at the end of the next section, which analyzes the subregular complexity of syntactic dependencies over c-strings.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Caveats",
"sec_num": "3.2.5"
},
{
"text": "We have successfully reduced c-command dependencies to regular string languages. But regularity is a loose upper bound. As we explain next, the c-string languages from the previous section all fit into IO-TSL, the class of input-output tier-based strictly local string languages. This class has recently been proposed as an upper bound on phonotactic complexity (Graf and Mayer, 2018) . We first present the defintion IO-TSL ( \u00a74.1) and provide a general IO-TSL strategy for capturing dependencies over c-strings ( \u00a74.2). This strategy is then exemplified with IO-TSL grammars for each one of the templates from the previous section ( \u00a74.3). In \u00a74.4, we explain why IO-TSL is a meaningful upper bound that makes testable predictions about the shape of syntactic dependencies.",
"cite_spans": [
{
"start": 362,
"end": 384,
"text": "(Graf and Mayer, 2018)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Subregular complexity",
"sec_num": "4"
},
{
"text": "IO-TSL is an extension of the strictly local (SL) languages. A language is SL iff it can be described by a list of finitely many forbidden substrings. IO-TSL enhances this with a local tier projection mechanism: whether a symbol is projected on a tier depends on the symbol itself, its local context in the string (i.e. up to m symbols before and/or after it), and up to n previous symbols on the tier.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "Example 8. Unbounded tone plateauing forbids any instances of the low tone L to occur between two high tones H. So HLLL and LLLH are wellformed, but HLLLH is not. One can capture this by projecting L iff it occurs immediately to the right of H, and projecting H iff the previous symbol on the tier is L. The strings above would get the tiers L, empty, and LH, respectively. If one forbids the substring LH on tiers, HLLLH is ruled out as desired while HLLL and LLLH are still generated.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "The rest of this subsection formalizes this intuitive idea. Let \u2303 be some fixed alphabet and s 2 \u2303 \u21e4 . The set f k (s) of k-factors of s consists of all the length-k substrings of o k 1 sn k 1 , where o, n / 2 \u2303 and k 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "Definition 1. A stringset L \u2713 \u2303 \u21e4 is strictly k- local (SL-k) iff there is some G \u2713 (\u2303 [ {o, n}) k such that L = {s 2 \u2303 \u21e4 | f k (s) \\ G = ;}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "Intuitively, G defines a grammar of forbidden substrings that no well-formed string may contain. The class SL of strictly local stringsets is S k 0 SL-k. Example 9. The string language (ab) + is generated by the grammar G := {on, ob, aa, bb, an} and thus is SL-2. For instance, aba is illicit because f 2 (aba) \\ G = {an} 6 = ;, whereas f 2 (abab) \\ G = ;. Example 10. The finite language of all strings of length 3 is SL-4. It is generated by the grammar",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "{abcd | a, b, c, d 2 \u2303} [ {abcd | a = o, d = n, b, c 2 \u2303 [ {o, n}}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "The tier projection mechanism of IO-TSL is defined in terms of contexts that specify when a given symbol should be added to the tier. An (i, j)-context c is a 4-tuple h , b, a, ti with 2 \u2303, t a string over \u2303 [ {o} of length j 1, and a and b strings over \u2303 [ {o, n} of combined length i 1. The basic idea is that c specifies that should be projected whenever both of the following hold: it occurs between the substrings b (look-back) and a (look-ahead), and the tier constructed so far ends in t. Given a set of contexts c 1 , c 2 , . . . , c n , we call it an (i, j)-context set iff for every c m (1 \uf8ff m \uf8ff n) there are i m \uf8ff i and j m \uf8ff j such that c m is an (i m , j m )-context. Definition 2. Let C be an (i, j)-context set. Then the input-output strictly (i, j)-local (IOSL-",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "(i, j)) tier projection \u21e1 C maps every s 2 \u2303 \u21e4 to \u21e1 0 C (o i , sn i , o j ), where for 2 \u2303 and a, b, t, u, v, w 2 (\u2303 [ {o, n}) \u21e4 , it holds that \u21e1 0 C (ub, av, wt) is \" if av = \", \u21e1 0 C (ub , av, wt ) if h , b, a, ti 2 C, \u21e1 0 C (ub , av, wt) otherwise.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "Example 11. Let \u2303 := {a, b, c} and consider the tier projection that always projects the first and last symbol of the string, always projects a, never projects c, and projects b only if the previous symbol on the tier is a. This projection is IOSL-(2,2). The context set contains all the contexts below, and only those:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "\u2022 h , o, \", \"i for all 2 \u2303,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "\u2022 h , \", n, \"i for all 2 \u2303,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "\u2022 ha, \", \", \"i,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "\u2022 hb, \", \", ai.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "Definition 3. A stringset L \u2713 \u2303 \u21e4 is inputoutput tier-based strictly (i, j, k)-local (IO-TSL-(i, j, k)) iff there exists an IOSL-(i, j) tier projection \u21e1 C and an SL-k language K such that",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "L := {s 2 \u2303 \u21e4 | \u21e1 C (s) 2 K}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "It is IO-TSL iff it is IO-TSL-(i, j, k) for some i, j, and k.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "The class TSL-k defined in Heinz et al. (2011) is identical to IO-TSL- (1, 1, k) . This shows that IO-TSL is indeed a generalization of TSL. In fact, I-TSL and O-TSL have been independently proposed in computational phonology (Baek, 2017; De Santo and Graf, 2017; Mayer and Major, 2018; Yang, 2018) , and Graf and Mayer (2018) show that the combination of the two into IO-TSL furnishes the additional power that is required for Sanskrit n-retroflexion. Under the assumption that dependencies in phonology and syntax are of comparable complexity, IO-TSL is a natural candidate for a tighter upper bound on the complexity of constraints on c-strings.",
"cite_spans": [
{
"start": 27,
"end": 46,
"text": "Heinz et al. (2011)",
"ref_id": "BIBREF20"
},
{
"start": 226,
"end": 238,
"text": "(Baek, 2017;",
"ref_id": "BIBREF1"
},
{
"start": 239,
"end": 263,
"text": "De Santo and Graf, 2017;",
"ref_id": "BIBREF8"
},
{
"start": 264,
"end": 286,
"text": "Mayer and Major, 2018;",
"ref_id": "BIBREF27"
},
{
"start": 287,
"end": 298,
"text": "Yang, 2018)",
"ref_id": "BIBREF36"
},
{
"start": 305,
"end": 326,
"text": "Graf and Mayer (2018)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [
{
"start": 71,
"end": 80,
"text": "(1, 1, k)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Defining IO-TSL",
"sec_num": "4.1"
},
{
"text": "The dependencies in \u00a73.2 -and syntactic dependencies in general -all share the common property that even though there is no upper bound on the length of c-strings, only a finitely bounded number of elements actually matter. Which elements matter depends only on the local context and which symbols are already on the tier. This allows for a very general IO-TSL strategy: construct tiers such that they only contain the relevant elements. Then there are only finitely many distinct tier configurations, and hence the set of well-formed tiers is finite. As every finite string language is SL-k for some k (cf. Ex. 10), separating the well-formed tiers from the ill-formed ones becomes trivial. So the central challenge for an IO-TSL treatment of c-command dependencies lies in the construction of tiers, not the constraints on those tiers. The tier construction process also follows a general template. We project tiers from left to right, and the very first element is always projectedthis is an input-sensitive projection step. We then use an output-sensitive projection strategy to only project relevant elements.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "General IO-TSL strategy",
"sec_num": "4.2"
},
{
"text": "Example 12. Suppose the first symbol to be projected is an NPI. Then only an NPI-licensor can be projected next. After the first NPI-licensor has been projected, no more symbols are put on the tier. Since a single NPI-licensor is enough, we never project more than one. So the tier either has the form NPI NPI-licensor or just NPI. The former is well-formed, the latter is not.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "General IO-TSL strategy",
"sec_num": "4.2"
},
{
"text": "Example 13. If the first element is a reflexive that is subject to Principle A, only T-heads and matching D-heads need to be projected. Again nothing is projected after this second projection step as Principle A is already satisfied or violated depending on whether the second symbol is T or D[ ]. The tier then has one of the following three forms: reflexive D, reflexive T, or just reflexive. The first one is well-formed, the other two ill-formed.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "General IO-TSL strategy",
"sec_num": "4.2"
},
{
"text": "If the first symbol on the tier is not subject to any constraints, then nothing else is projected. Proceeding in this fashion, we can define a single IO-TSL grammar that generates every well-formed c-string while forbidding those that violate one of our string patterns from \u00a73. This shows that the whole system of syntactic dependencies is IO-TSL, not just each individual dependency.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "General IO-TSL strategy",
"sec_num": "4.2"
},
{
"text": "Let us now apply this idea to the c-string templates from \u00a73, repeated here for the readers convenience:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "NPI \u2022 \u2022 \u2022 Lic \u2022 \u2022 \u2022 R[ ] T \u21e4 D[ ] \u2022 \u2022 \u2022 R[ ] \u2022 \u2022 \u2022 T \u2022 \u2022 \u2022 D[ ] \u2022 \u2022 \u2022",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "\u21b5T (\u21b5 starts with pronoun, has more R-expressions than \u21b5 has pronouns) Now consider the corresponding projection contexts for any arbitrary MG G. We first include h , \", n, \"i for all 2 G so that the first symbol is always projected. Next we add hl, \", \", ti for all l 2 G and t 2 G \u21e4 such that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "NPI t is an NPI and l an NPI licensor, or",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "Reflexive t is a reflexive, and l is either a T-head carrying nom + or a D-head with matchingfeatures, or sig either t is a sig-reflexive and l is a T-head carrying nom + , or t = uv with u a sig-reflexive and v a T-head carrying nom + and l is a Dhead with matching -features.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "The definition for sig is convoluted because it accounts for both projection of T after sig and projection of D[ ] after T and sig. Next we forbid all bigrams of the form lp such that either l is an NPI and p is not an NPI-licensor, or l is a reflexive and p is not a matching D-head. Note that this includes cases where p is no LI at all, but rather the start/end of a tier. We also forbid all trigrams that start with a sig-reflexive but do not continue with a suitable T-head and a matching Dhead.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "Example 14. Consider once more the illicit NPI in example 4. Given the c-string ever T that every said T C, the constructed tier is just ever, which is forbidden. If every is replaced with no, the tier becomes ever no and thus is well-formed. If ever were always instead, the tier would just be always, which is never illicit because no special licensing is needed. Note that the tier never grows past ever no, even for sentences like No student told no professor that no train ever arrives on time.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "Example 15. Suppose as in example 6 that English reflexives behaved like Swedish sig and thus require a non-local binder. The c-string herself Mary likes T that John said T C results in the illicit tier herself T. But if herself is replaced by himself, one obtains the well-formed tier himself T John instead. This is also the tier for much longer sentences such as Bill thinks Peter doubts that John said that Mary likes him.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "For Principle B, the projection strategy is very similar.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "\u2022 Project the first element, which is a pronoun that must be syntactically bound.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "\u2022 Also project such pronouns if the tier so far contains i such pronouns and nothing else, where i is less than some fixed bound n.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "\u2022 Project a T-head carrying nom + if the tier only contains pronouns so far.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "\u2022 Project an R-expression if the tier already contains a T-head and at most n 1 Rexpressions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "With this projection strategy, the longest possible tier is of the form pro n T R n , and all illicit tiers can be filtered out by (2n + 1)-grams.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "As pointed out earlier, this analysis ignores complicating factors such as additional licensing configurations for NPIs, or -feature matching in Principle B. But this does not affect the core property that guarantees the IO-TSL nature of c-command dependencies: Each dependency requires only a finite number of elements on the tier, and by considering the entire tier built so far one can ensure that no extraneous material is projected. In addition, each LI can only be subject to finitely many licensing conditions. These two facts jointly entail that the length of tiers can always be finitely bounded, which makes it trivial to provide an SL grammar that rules out all illicit tiers. It is because of this fixed bound on the number of elements that matter for any given ccommand dependency that IO-TSL is a safe upper bound on the complexity of syntactic dependencies over c-strings. This is also the reason why we contend that IO-TSL could accommodate empirically more adequate characterizations of the phenomena in \u00a73 -the number of relevant lexical items would still be finitely bounded within any given c-string.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "Admittedly, this strategy comes at the potential cost of large contexts. Fairly small contexts seem to suffice for realistic examples, though, and a smarter, less brute-force strategy may be able to reduce their size even further. We would not be surprised if most c-command dependencies turn out to belong to IO-TSL- (3, 3, 3) or perhaps even IO-TSL-(2, 2, 2).",
"cite_spans": [],
"ref_spans": [
{
"start": 318,
"end": 327,
"text": "(3, 3, 3)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example grammars for dependencies",
"sec_num": "4.3"
},
{
"text": "IO-TSL makes some strong predictions about what shape linguistic dependencies can take and how multiple c-command conditions may be interwoven.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "Example 16. Consider an unattested variant of the long-distance Principle A that applies to Swedish sig. In this variant, the reflexive and the antecedent not only have to be separated by a T-head, but each intervening T-head must be c-commanded by some functional head F that is lower than the next higher T-head. So the c-string language is not just",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "\u2022 \u2022 \u2022 D[ ] \u2022 \u2022 \u2022 T \u2022 \u2022 \u2022 R[ ], but rather \u21b5R[ ] such that I) \u21b5 contains at least one D[ ] and, II) F occurs between every two instances of T.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "This string language is not IO-TSL because we can no longer omit projecting all T-heads to the tier. To see this, contrast the well-formed pattern",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "D[ ](F T ) \u21e4 F T (F T ) \u21e4 R[ ] against the ill- formed D[ ](F T ) \u21e4 T (F T ) \u21e4 R[ ].",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "The only difference is the unlicensed T-head in the middle, so this T-head must end up on the tier in order to distinguish well-formed from ill-formed strings. But there is no context that can uniquely identify just this T-head without projecting other T-heads or Fheads. The set of well-formed tiers then would be an infinite subset of {T, F",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "} \u21e4 D[ ] {T, F } \u21e4 R[ ],",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "which is not SL unless the distance between D[ ] and R[ ] is finitely bounded. Since there are no additional factors that guarantee such a bound on the distance between reflexive and licensor, our unattested variant of sig-licensing is not IO-TSL. This example highlights a crucial limitation of IO-TSL: a long-distance dependency cannot apply across an unbounded number of long-distance dependencies that interact with it. The F -licensing of T -heads would be unproblematic if it were an independent constraint that must always be satisfied, rather than just being an extra condition on sig-licensing. For then it would be a condition on all c-strings that start with T-heads and could be omitted in c-strings that start with reflexives. Al-ternatively, F -licensing of T -heads could be captured if the distance between F and T were locally bounded. In this case, one could project F and T only once and skip all other locally licensed T -heads. Similarly, it would suffice to project at most one unlicensed T -head. The result would be tiers of the form D[ ]\u21b5R[ ] where \u21b5 is T F T or F T T. Then the tier language would once again be finite. So a long-distance dependency can interact with other dependencies, but either the number of those dependencies or their locus of application must be finitely bounded.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "It is worth mentioning that this unattested example pattern is easily defined in first-order logic, which so far has been the only safe upper bound on syntactic dependencies (Graf, 2012) . The IO-TSL perspective of c-command dependencies thus improves on previous work by ruling out some linguistically undesirable patterns.",
"cite_spans": [
{
"start": 174,
"end": 186,
"text": "(Graf, 2012)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Limits of IO-TSL dependencies",
"sec_num": "4.4"
},
{
"text": "The discussion so far has largely ignored the effects of movement on c-command relations. Under the standard raising analysis, no does not c-command ever from its base position in [No train] i has ever seemed to me t i to t i arrive on time. The c-command relation is derived by movement. Our current notion of c-strings fails to capture this.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Adding movement",
"sec_num": "5"
},
{
"text": "For most dependencies discussed in this paper, it only matters that a dependent element has at least one licensor in its c-string. In this case, movement effects can be accommodated by modifying the construction of c-strings such that a mover is also copied into its landing sites. The c-string for ever in the previous example would be ever no has C after the mover no is copied into the position corresponding to its landing site.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Adding movement",
"sec_num": "5"
},
{
"text": "But this covers only movement of a licensor. Sometimes, a dependent element is licensed only because it has moved out of a locality domain into a higher position where it is accessible to its licensor. In such cases, the c-string would be truncated by deleting all material between the licensor and the relevant occurrence, effectively pushing the licensee into a higher position.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Adding movement",
"sec_num": "5"
},
{
"text": "This strategy shifts a lot of the burden to the correct construction of c-strings, which may be particularly complicated when both the licensor and the licensee move. The construction of the appropriate c-string from a dependency tree is still de-finable in first-order logic and hence subregular, but this is a very generous upper bound. An indepth exploration of movement from a subregular perspective has to be left for future work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Adding movement",
"sec_num": "5"
},
{
"text": "We have defined a string-based representation format over dependency trees that allows for ccommand dependencies to be easily evaluated for any given node. The dependencies over these strings all fall within the class IO-TSL, which was first defined for phonology (Graf and Mayer, 2018) . This paper marks but a first step towards a subregular theory of syntactic dependencies, and a lot remains to be done.",
"cite_spans": [
{
"start": 264,
"end": 286,
"text": "(Graf and Mayer, 2018)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": null
},
{
"text": "The current approach only measures the complexity of a syntactic dependency with respect to a specific node. To check the whole dependency tree, one has to evaluate the c-string of each node. We do not know whether the TSL-approach of Graf (2018b) provides a method for doing so. As long as all dependencies are IO-TSL, though, the well-formedness of the whole dependency tree can be verified by a deterministic top-down tree automaton with a look-ahead of 1. This implies subregular complexity and may even allow for highly efficient parsing algorithms.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": null
},
{
"text": "Dependencies that go beyond c-command cannot be handled with our approach. This includes binding via sub-command, parasitic gaps, and across-the-board movement as an exception to the coordinate structure constraint. It remains to be seen whether they can be accommodated with tree tiers as proposed in Graf (2018b) , or whether a completely new perspective is needed for these phenomena.",
"cite_spans": [
{
"start": 302,
"end": 314,
"text": "Graf (2018b)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": null
},
{
"text": "Proceedings of the Society for Computation in Linguistics (SCiL) 2019, pages 205-215. New York City, New York, January 3-6, 2019",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "If one wants to include c-command relations created by movement, it suffices to broaden the definition such that any kind of feature checking induces d-command relations, not just those affecting category and selector features.2 C-strings over dependency trees are closely related to the concept of spine languages (cf.Martens et al., 2008;Graf, 2012). In spine languages, ics(n) and cs(m) would be separated by a distinguished symbol, e.g. |. We omit this here for simplicity, but point out that preliminary work of ours suggests that | is needed in some cases to correctly define locality domains.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "On the formal theory of government",
"authors": [
{
"first": "Joseph",
"middle": [],
"last": "Aoun",
"suffix": ""
},
{
"first": "Dominique",
"middle": [],
"last": "Sportiche",
"suffix": ""
}
],
"year": 1983,
"venue": "Linguistic Review",
"volume": "2",
"issue": "",
"pages": "211--236",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Joseph Aoun and Dominique Sportiche. 1983. On the formal theory of government. Linguistic Review, 2:211-236.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Computational representation of unbounded stress: Tiers with structural features",
"authors": [
{
"first": "Hyunah",
"middle": [],
"last": "Baek",
"suffix": ""
}
],
"year": 2017,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hyunah Baek. 2017. Computational representation of unbounded stress: Tiers with structural features. Ms., Stony Brook University; to appear in Proceed- ings of CLS 53.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Mirror theory: Syntactic representation in perfect syntax",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Brody",
"suffix": ""
}
],
"year": 2000,
"venue": "Linguistic Inquiry",
"volume": "31",
"issue": "",
"pages": "29--56",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Michael Brody. 2000. Mirror theory: Syntactic rep- resentation in perfect syntax. Linguistic Inquiry, 31:29-56.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Phrase Structure: From GB to Minimalism",
"authors": [
{
"first": "A",
"middle": [],
"last": "Robert",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Chametzky",
"suffix": ""
}
],
"year": 2000,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Robert A. Chametzky. 2000. Phrase Structure: From GB to Minimalism. Blackwell, Oxford.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "The Oxford Handbook of Linguistic Minimalism",
"authors": [
{
"first": "A",
"middle": [],
"last": "Robert",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Chametzky",
"suffix": ""
}
],
"year": 2011,
"venue": "",
"volume": "",
"issue": "",
"pages": "311--326",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Robert A. Chametzky. 2011. No derivation with- out representation. In Cedric Boeckx, editor, The Oxford Handbook of Linguistic Minimalism, pages 311-326. Oxford University Press, Oxford.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Computational locality in morphological maps",
"authors": [
{
"first": "Jane",
"middle": [],
"last": "Chandlee",
"suffix": ""
}
],
"year": 2017,
"venue": "Morphology",
"volume": "27",
"issue": "",
"pages": "599--641",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jane Chandlee. 2017. Computational locality in mor- phological maps. Morphology, 27:599-641.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Syntactic Structures",
"authors": [
{
"first": "Noam",
"middle": [],
"last": "Chomsky",
"suffix": ""
}
],
"year": 1957,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Noam Chomsky. 1957. Syntactic Structures. Mouton, The Hague.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "The Minimalist Program",
"authors": [
{
"first": "Noam",
"middle": [],
"last": "Chomsky",
"suffix": ""
}
],
"year": 1995,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Noam Chomsky. 1995. The Minimalist Program. MIT Press, Cambridge, MA.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Structure sensitive tier projection: Applications and formal properties",
"authors": [
{
"first": "Aniello",
"middle": [],
"last": "De",
"suffix": ""
},
{
"first": "Santo",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2017,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Aniello De Santo and Thomas Graf. 2017. Structure sensitive tier projection: Applications and formal properties. Ms., Stony Brook University.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "A Derivational Approach to Syntactic Relations",
"authors": [
{
"first": "D",
"middle": [],
"last": "Samuel",
"suffix": ""
},
{
"first": "Erich",
"middle": [
"M"
],
"last": "Epstein",
"suffix": ""
},
{
"first": "Ruriko",
"middle": [],
"last": "Groat",
"suffix": ""
},
{
"first": "Hisatsugu",
"middle": [],
"last": "Kawashima",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Kitahara",
"suffix": ""
}
],
"year": 1998,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Samuel D. Epstein, Erich M. Groat, Ruriko Kawashima, and Hisatsugu Kitahara. 1998. A Derivational Approach to Syntactic Relations. Oxford University Press, Oxford.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Primitive ccommand. Ms",
"authors": [
{
"first": "Robert",
"middle": [],
"last": "Frank",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Vijay-Shanker",
"suffix": ""
}
],
"year": 1999,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Robert Frank and K. Vijay-Shanker. 1999. Primitive c- command. Ms., John Hopkins University and Uni- versity of Delaware.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Locality and the complexity of Minimalist derivation tree languages",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2010,
"venue": "Formal Grammar",
"volume": "7395",
"issue": "",
"pages": "208--227",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf. 2012. Locality and the complexity of Minimalist derivation tree languages. In Formal Grammar 2010/2011, volume 7395 of Lecture Notes in Computer Science, pages 208-227, Heidelberg. Springer.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Local and Transderivational Constraints in Syntax and Semantics",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2013,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf. 2013. Local and Transderivational Con- straints in Syntax and Semantics. Ph.D. thesis, UCLA.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "The power of locality domains in phonology",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2017,
"venue": "Phonology",
"volume": "34",
"issue": "",
"pages": "385--405",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf. 2017. The power of locality domains in phonology. Phonology, 34:385-405.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Locality domains and phonological c-command over strings",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2017,
"venue": "To appear in Proceedings of NELS",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf. 2018a. Locality domains and phonolog- ical c-command over strings. To appear in Proceed- ings of NELS 2017.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Why movement comes for free once you have adjunction",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2018,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf. 2018b. Why movement comes for free once you have adjunction. To appear in Proceedings of CLS 53.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Is syntactic binding rational?",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
},
{
"first": "Natasha",
"middle": [],
"last": "Abner",
"suffix": ""
}
],
"year": 2012,
"venue": "Proceedings of the 11th International Workshop on Tree Adjoining Grammars and Related Formalisms (TAG+11)",
"volume": "",
"issue": "",
"pages": "189--197",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf and Natasha Abner. 2012. Is syntactic binding rational? In Proceedings of the 11th In- ternational Workshop on Tree Adjoining Grammars and Related Formalisms (TAG+11), pages 189-197.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Tiers and relativized locality across language modules. Slides of a talk given at the 1-day workshop Parallels Between Phonology and Syntax",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
},
{
"first": "Al\u00ebna",
"middle": [],
"last": "Aks\u00ebnova",
"suffix": ""
},
{
"first": "Hyunah",
"middle": [],
"last": "Baek",
"suffix": ""
},
{
"first": "Aniello",
"middle": [],
"last": "De Santo",
"suffix": ""
},
{
"first": "Hossep",
"middle": [],
"last": "Dolatian",
"suffix": ""
},
{
"first": "Sedigheh",
"middle": [],
"last": "Moradi",
"suffix": ""
},
{
"first": "Jon",
"middle": [],
"last": "Rawski",
"suffix": ""
},
{
"first": "Suji",
"middle": [],
"last": "Yang",
"suffix": ""
},
{
"first": "Jeffrey",
"middle": [],
"last": "Heinz",
"suffix": ""
}
],
"year": 2009,
"venue": "Meertens Instituut",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf, Al\u00ebna Aks\u00ebnova, Hyunah Baek, Aniello De Santo, Hossep Dolatian, Sedigheh Moradi, Jon Rawski, Suji Yang, and Jeffrey Heinz. 2018. Tiers and relativized locality across language modules. Slides of a talk given at the 1-day workshop Parallels Between Phonology and Syntax, July 9, Meertens Instituut, Amsterdam, Netherlands.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Sanskrit nretroflexion is input-output tier-based strictly local",
"authors": [
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
},
{
"first": "Connor",
"middle": [],
"last": "Mayer",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thomas Graf and Connor Mayer. 2018. Sanskrit n- retroflexion is input-output tier-based strictly local. To appear in Proceedings of SIGMORPHON 2018.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "The computational nature of phonological generalizations",
"authors": [
{
"first": "Jeffrey",
"middle": [],
"last": "Heinz",
"suffix": ""
}
],
"year": 2018,
"venue": "Phonological Typology, Phonetics and Phonology",
"volume": "",
"issue": "",
"pages": "126--195",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jeffrey Heinz. 2018. The computational nature of phonological generalizations. In Larry Hyman and Frank Plank, editors, Phonological Typology, Pho- netics and Phonology, chapter 5, pages 126-195. Mouton De Gruyter.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Tier-based strictly local constraints in phonology",
"authors": [
{
"first": "Jeffrey",
"middle": [],
"last": "Heinz",
"suffix": ""
},
{
"first": "Chetan",
"middle": [],
"last": "Rawal",
"suffix": ""
},
{
"first": "Herbert",
"middle": [
"G"
],
"last": "Tanner",
"suffix": ""
}
],
"year": 2011,
"venue": "Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "58--64",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jeffrey Heinz, Chetan Rawal, and Herbert G. Tanner. 2011. Tier-based strictly local constraints in phonol- ogy. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, pages 58-64.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "The weak adequacy of context-free phrase structure grammar",
"authors": [
{
"first": "M",
"middle": [
"A C"
],
"last": "Huybregts",
"suffix": ""
}
],
"year": 1984,
"venue": "",
"volume": "",
"issue": "",
"pages": "81--99",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "M. A. C. Huybregts. 1984. The weak adequacy of context-free phrase structure grammar. In Ger J. de Haan, Mieke Trommelen, and Wim Zonneveld, editors, Van Periferie naar Kern, pages 81-99. Foris, Dordrecht.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Disjoint reference and the typology of pronouns",
"authors": [
{
"first": "Paul",
"middle": [],
"last": "Kiparsky",
"suffix": ""
}
],
"year": 2002,
"venue": "More than Words",
"volume": "53",
"issue": "",
"pages": "179--226",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Paul Kiparsky. 2002. Disjoint reference and the typol- ogy of pronouns. In Ingrid Kaufmann and Barbara Stiebels, editors, More than Words, volume 53 of Studia Grammatica, pages 179-226. Akademie Ver- lag, Berlin.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Formalizing mirror theory. Grammars",
"authors": [
{
"first": "Gregory",
"middle": [
"M"
],
"last": "Kobele",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "5",
"issue": "",
"pages": "177--221",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gregory M. Kobele. 2002. Formalizing mirror theory. Grammars, 5:177-221.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Generating Copies: An Investigation into Structural Identity in Language and Grammar",
"authors": [
{
"first": "Gregory",
"middle": [
"M"
],
"last": "Kobele",
"suffix": ""
}
],
"year": 2006,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gregory M. Kobele. 2006. Generating Copies: An In- vestigation into Structural Identity in Language and Grammar. Ph.D. thesis, UCLA.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "An automata-theoretic approach to Minimalism",
"authors": [
{
"first": "Gregory",
"middle": [
"M"
],
"last": "Kobele",
"suffix": ""
},
{
"first": "Christian",
"middle": [],
"last": "Retor\u00e9",
"suffix": ""
},
{
"first": "Sylvain",
"middle": [],
"last": "Salvati",
"suffix": ""
}
],
"year": 2007,
"venue": "Model Theoretic Syntax at 10",
"volume": "",
"issue": "",
"pages": "71--80",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gregory M. Kobele, Christian Retor\u00e9, and Sylvain Sal- vati. 2007. An automata-theoretic approach to Min- imalism. In Model Theoretic Syntax at 10, pages 71-80.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Deterministic top-down tree automata: Past, present, and future",
"authors": [
{
"first": "Wim",
"middle": [],
"last": "Martens",
"suffix": ""
},
{
"first": "Frank",
"middle": [],
"last": "Neven",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Schwentick",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of Logic and Automata",
"volume": "",
"issue": "",
"pages": "505--530",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wim Martens, Frank Neven, and Thomas Schwentick. 2008. Deterministic top-down tree automata: Past, present, and future. In Proceedings of Logic and Automata 2008, pages 505-530.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "A challenge for tier-based strict locality from Uyghur backness harmony",
"authors": [
{
"first": "Connor",
"middle": [],
"last": "Mayer",
"suffix": ""
},
{
"first": "Travis",
"middle": [],
"last": "Major",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of Formal Grammar",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Connor Mayer and Travis Major. 2018. A challenge for tier-based strict locality from Uyghur backness harmony. In Proceedings of Formal Grammar 2018. To appear.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "Transforming linear context-free rewriting systems into Minimalist grammars. Lecture Notes in Artificial Intelligence",
"authors": [
{
"first": "Jens",
"middle": [],
"last": "Michaelis",
"suffix": ""
}
],
"year": 2001,
"venue": "",
"volume": "2099",
"issue": "",
"pages": "228--244",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jens Michaelis. 2001. Transforming linear context-free rewriting systems into Minimalist grammars. Lec- ture Notes in Artificial Intelligence, 2099:228-244.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "Semilinearity as a syntactic invariant",
"authors": [
{
"first": "Jens",
"middle": [],
"last": "Michaelis",
"suffix": ""
},
{
"first": "Marcus",
"middle": [],
"last": "Kracht",
"suffix": ""
}
],
"year": 1997,
"venue": "Logical Aspects of Computational Linguistics",
"volume": "1328",
"issue": "",
"pages": "329--345",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jens Michaelis and Marcus Kracht. 1997. Semilin- earity as a syntactic invariant. In Logical Aspects of Computational Linguistics, volume 1328 of Lec- ture Notes in Artifical Intelligence, pages 329-345. Springer.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "On languages piecewise testable in the strict sense",
"authors": [
{
"first": "James",
"middle": [],
"last": "Rogers",
"suffix": ""
},
{
"first": "Jeffrey",
"middle": [],
"last": "Heinz",
"suffix": ""
},
{
"first": "Gil",
"middle": [],
"last": "Bailey",
"suffix": ""
},
{
"first": "Matt",
"middle": [],
"last": "Edlefsen",
"suffix": ""
},
{
"first": "Molly",
"middle": [],
"last": "Vischer",
"suffix": ""
},
{
"first": "David",
"middle": [],
"last": "Wellcome",
"suffix": ""
},
{
"first": "Sean",
"middle": [],
"last": "Wibel",
"suffix": ""
}
],
"year": 2010,
"venue": "The Mathematics of Language",
"volume": "6149",
"issue": "",
"pages": "255--265",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "James Rogers, Jeffrey Heinz, Gil Bailey, Matt Edlef- sen, Molly Vischer, David Wellcome, and Sean Wibel. 2010. On languages piecewise testable in the strict sense. In Christan Ebert, Gerhard J\u00e4ger, and Jens Michaelis, editors, The Mathematics of Lan- guage, volume 6149 of Lecture Notes in Artificial Intelligence, pages 255-265. Springer, Heidelberg.",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "Evidence against the contextfreeness of natural language",
"authors": [
{
"first": "M",
"middle": [],
"last": "Stuart",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Shieber",
"suffix": ""
}
],
"year": 1985,
"venue": "Linguistics and Philosophy",
"volume": "8",
"issue": "3",
"pages": "333--345",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Stuart M. Shieber. 1985. Evidence against the context- freeness of natural language. Linguistics and Phi- losophy, 8(3):333-345.",
"links": null
},
"BIBREF32": {
"ref_id": "b32",
"title": "Derivational Minimalism",
"authors": [
{
"first": "Edward",
"middle": [
"P"
],
"last": "Stabler",
"suffix": ""
}
],
"year": 1997,
"venue": "Logical Aspects of Computational Linguistics",
"volume": "1328",
"issue": "",
"pages": "68--95",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Edward P. Stabler. 1997. Derivational Minimalism. In Christian Retor\u00e9, editor, Logical Aspects of Compu- tational Linguistics, volume 1328 of Lecture Notes in Computer Science, pages 68-95. Springer, Berlin.",
"links": null
},
"BIBREF33": {
"ref_id": "b33",
"title": "Computational perspectives on Minimalism",
"authors": [
{
"first": "Edward",
"middle": [
"P"
],
"last": "Stabler",
"suffix": ""
}
],
"year": 2011,
"venue": "Oxford Handbook of Linguistic Minimalism",
"volume": "",
"issue": "",
"pages": "617--643",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Edward P. Stabler. 2011. Computational perspectives on Minimalism. In Cedric Boeckx, editor, Oxford Handbook of Linguistic Minimalism, pages 617- 643. Oxford University Press, Oxford.",
"links": null
},
"BIBREF34": {
"ref_id": "b34",
"title": "Towards a formal description of NPI-licensing patterns",
"authors": [
{
"first": "Mai",
"middle": [
"Ha"
],
"last": "Vu",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of the Society for Computation in Linguistics",
"volume": "1",
"issue": "",
"pages": "154--163",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mai Ha Vu. 2018. Towards a formal description of NPI-licensing patterns. In Proceedings of the Soci- ety for Computation in Linguistics, volume 1, pages 154-163.",
"links": null
},
"BIBREF35": {
"ref_id": "b35",
"title": "Case assignment in TSL syntax: A case study",
"authors": [
{
"first": "Mai",
"middle": [
"Ha"
],
"last": "Vu",
"suffix": ""
},
{
"first": "Nazila",
"middle": [],
"last": "Shafiei",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Graf",
"suffix": ""
}
],
"year": 2019,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mai Ha Vu, Nazila Shafiei, and Thomas Graf. 2019. Case assignment in TSL syntax: A case study. To appear in Proceedings of SCiL 2019.",
"links": null
},
"BIBREF36": {
"ref_id": "b36",
"title": "Subregular complexity in Korean phonotactics. Undergraduate honors thesis",
"authors": [
{
"first": "Yang",
"middle": [],
"last": "Su Ji",
"suffix": ""
}
],
"year": 2018,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Su Ji Yang. 2018. Subregular complexity in Korean phonotactics. Undergraduate honors thesis, Stony Brook University.",
"links": null
}
},
"ref_entries": {}
}
}