2022
DOI: 10.1075/dia.16035.cat
|View full text |Cite
|
Sign up to set email alerts
|

Areal pressure in grammatical evolution

Abstract: This article investigates the evolutionary and spatial dynamics of typological characters in 117 Indo-European languages. We partition types of change (i.e., gain or loss) for each variant according to whether they bring about a simplification in morphosyntactic patterns that must be learned, whether they are neutral (i.e., neither simplifying nor introducing complexity) or whether they introduce a more complex pattern. We find that changes which introduce complexity show significantly less areal signal (accor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 52 publications
0
16
0
Order By: Relevance
“…This we may identify for a number of combinations of interdependent variants, such as ‘a language cannot have both full and no A agreement’ ( S2 Appendix , 276–277), which can be tested against the data. We tabulate illicit value combinations for these sets of variants ( S3 Appendix , both from [ 61 ]), and find that for a majority of our postulated sets, illicit combinations are found only in 10% of the character mapping simulations. However, in other of our postulated illicit combinations, the results are not compatible with our assumptions, with 50–60% occurrence of dependencies in the data [ 61 ], indicating that (with the exception of case first and case last, S4 Appendix , 12 and S2 Appendix , 260–261), none of our postulated illicit combinations are actually completely absent in our data, and are therefore not logical dependencies in this sense.…”
Section: Methodsmentioning
confidence: 99%
“…This we may identify for a number of combinations of interdependent variants, such as ‘a language cannot have both full and no A agreement’ ( S2 Appendix , 276–277), which can be tested against the data. We tabulate illicit value combinations for these sets of variants ( S3 Appendix , both from [ 61 ]), and find that for a majority of our postulated sets, illicit combinations are found only in 10% of the character mapping simulations. However, in other of our postulated illicit combinations, the results are not compatible with our assumptions, with 50–60% occurrence of dependencies in the data [ 61 ], indicating that (with the exception of case first and case last, S4 Appendix , 12 and S2 Appendix , 260–261), none of our postulated illicit combinations are actually completely absent in our data, and are therefore not logical dependencies in this sense.…”
Section: Methodsmentioning
confidence: 99%
“…1, encoded as in the output for the language family simulation program. 2 Using one and the same phylogeny, we produce 1000 diffusion scenarios. Since these take place in real-life geography they will be sensitive to natural boundaries such as mountains, deserts, and bodies of water.…”
Section: Datamentioning
confidence: 99%
“…That character mapping techniques are not only applicable to wordlists, but also to structural data, is shown in the recent work by Cathcard, Carling, Larson, Johansson, and Round () in which the authors use a Bayesian likelihood framework for character mapping to identify areally transmitted traits from structural data among Indo‐European languages.…”
Section: Computational Approaches To the Study Of Language Contactmentioning
confidence: 99%
“…That character mapping techniques are not only applicable to wordlists, but also to structural data, is shown in the recent work by Cathcard, Carling, Larson, Johansson, and Round (2018) in which the authors use a Bayesian likelihood framework for character mapping to identify areally transmitted traits from structural data among Indo-European languages. Table 1 provides a summary of the four different methods compared so far, including the data to which they were applied, the methods employed, the literature in which they were applied, and information on code availability.…”
Section: Phylogeny-based Approaches To Borrowing Detectionmentioning
confidence: 99%