On Scrambling: A Reply to Bošković and Takahashi

نویسنده

  • John Frederick Bailyn
چکیده

In this article I argue against Bošković and Takahashi’s (1998) analysis of scrambling as base generation (with lowering for Ā-cases). I present evidence from Russian of scope and antireconstruction effects and scrambling/wh-movement parallels, all implicating a ‘‘classical’’ overt movement account of Ā-scrambling. I then discuss theoretical issues unresolved by the base generation/lowering account. Having shown that Ā-scrambling is (upward) movement, I argue that the account of A-scrambled arguments as base-generated also loses its force. In conclusion I suggest an alternative way to eliminate the apparent optionality associated with scrambling, while maintaining the classical analysis of scrambling as upward movement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the ‘‘Undoing’’ Property of Scrambling: A Response to Bo'ković

Bo'ković (2004) argues that what defines scrambling in languages such as Japanese is its ‘‘undoing’’ property (Saito 1989). Bo'ković (2004) and Bo'ković and Takahashi (1998) argue that this ‘‘undoing’’ property shows the way for scrambling to count as a last-resort operation, instead of being purely optional as is widely believed. In this article, I give empirical evidence that ‘‘undoing’’ does...

متن کامل

Multinuclear Variable Temperature NMR Studies on Cyanide, Water and Hydroxyl Group Scrambling on Halogenation of K2[Pt(CN)4] and Related Reactions

195Pt and 1H NMR has been used to show that addition of chlorine and bromine to [Pt(CN)4]2_ in presence of perchloric acid in water results in cyanide and water scrambling with formation of eleven complexes of the type [Pt(CN)4-nCl(H2O)n+1](n-1)+ (n=0, 1, 2, 3, 4). Addition of NBu4OH ...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001