Staff View
The morphology and phonology of infixation

Descriptive

Genre (authority = marcgt)
thesis
Language
LanguageTerm (authority = ISO639-2); (type = code)
eng
PhysicalDescription
InternetMediaType
application/pdf
Extent
165 p.
TypeOfResource
Text
Note (type = degree)
Ph.D.
TitleInfo
Title
The morphology and phonology of infixation
Identifier (type = ROA)
627
Subject (authority = RUETD)
Topic
Linguistics
Subject (authority = optimality_area)
Topic
Morphology
Subject (authority = optimality_area)
Topic
Phonology
Subject (authority = optimality_area)
Topic
Historical linguistics
Subject (authority = local)
Topic
Infixation
Subject (authority = local)
Topic
morphological change
Subject (authority = LCSH)
Topic
Typology (Linguistics)
Subject (authority = LCSH)
Topic
Washo language
Subject (authority = LCSH)
Topic
English language
Subject (authority = LCSH)
Topic
Atayal language
Abstract (type = abstract)
The subject matter of this study is the formal properties of infixes. This study begins with a catalogue of the placement properties of infixation in Chapter 1, showing that there is a bias for infixes to target edge constituents. This edge bias is explained in Chapter 4 in terms of the Exogenesis Theory of Infixation, which advocates the view that edge infixes originate from historical prefixes and suffixes; an infix’s original peripheral position is reflected in its edge profile today. A synchronic theory of infixation, Generalized Phonological Subcategorization (GPS), which allows non-prosodic units to enter into subcategorization relations, is proposed in Chapter 2 to encode the subcategorization requirement of an infix. Past theories of infixation are reviewed also in Chapter 2, with particular attention focused on the Hybrid Models which account for the prominence-driven infixes in terms of Prosodic Subcategorization while promoting Displacement Theory (DT) as a mean to explain the distribution of the edge-oriented infixes. Arguments on both theoretical and empirical grounds are summoned against DT’s view that edge infixes result from the movement of an underlying prefix or suffix acquiescing to certain phonological or morphological constraints. I advance the Subcategorization Non-violability Hypothesis, epitomized in the universal constraint ranking schema, M-ALIGN >> P, in Chapter 3 to supplement GPS by restricting the way morphological subcategorization requirement interacts with phonological constraints in the grammar; coerced affix movement (i.e. DT) is ruled out by virtue of the fact that constraints on morphological subcategorization must outrank all phonological constraints. Other typological aspects of infixation are reviewed in Chapter 5.
Name (type = personal)
NamePart (type = family)
Yu
NamePart (type = given)
Alan Chi Lun
Role
RoleTerm (authority = marcrelator); (type = text)
Author
Name (type = corporate)
NamePart
University of California, Berkeley
Role
RoleTerm (authority = marcrelator); (type = text)
Degree grantor
OriginInfo
DateCreated (encoding = w3cdtf); (keyDate = yes); (qualifier = exact)
2003
Subject (authority = LCSH)
Topic
Grammar, Comparative and general--Infixes
Subject (authority = LCSH)
Topic
Grammar, Comparative and general--Morphology
Subject (authority = LCSH)
Topic
Reduplication (Linguistics)
Identifier (type = hdl)
http://hdl.rutgers.edu/1782.1/rucore00000002165.ETD.000064915
RelatedItem (type = host)
TitleInfo
Title
Rutgers Optimality Archive
Identifier (type = local)
rucore00000002165
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T35T3J9Q
Back to the top

Rights

RightsDeclaration (AUTHORITY = GS); (ID = rulibRdec0006)
The author owns the copyright to this work
Copyright
Status
Copyright protected
Availability
Status
Open
RightsHolder (type = personal)
Name
FamilyName
Yu
GivenName
Alan Chi Lun
Role
Copyright holder
Back to the top

Technical

ContentModel
ETD
MimeType (TYPE = file)
application/pdf
MimeType (TYPE = container)
application/x-tar
FileSize (UNIT = bytes)
839680
Checksum (METHOD = SHA1)
c4640e17703338cb72d710db102c3b3aa38f59fd
Back to the top
Version 8.5.5
Rutgers University Libraries - Copyright ©2024