COMPSCI 230 — Homework 7 Due on March 24, 2015

Total Page:16

File Type:pdf, Size:1020Kb

COMPSCI 230 — Homework 7 Due on March 24, 2015 COMPSCI 230 — Homework 7 Due on March 24, 2015 You may talk about this assignment with others, but do not write down anything while you talk. After that, do the assignment alone. What you hand in must be your work only. See Mechanics!Homework on the class web page for details on the homework policy. WHAT TO DO. Follow these instructions accurately. There will be penalties for improperly formatted answers. This assignment comes with auxiliary files template.tex and mystery.rkt. Rename the file template.tex as usual before starting to work with it. For each of the problems below, write a clear description of your solution under the proper heading in your .tex file. The file mystery.rkt is for reading only, so you will not need to modify it or hand it in. An extra-credit question in this assignment asks you to write a Racket program. If you choose to do that, place your solution into an appropriately-named .rkt file. Starting with this assignment, you will learn to write well-formed proofs. A sloppy proof is useless (and gets little credit, by the way), so pay close attention to the formatting instructions. Good style matters also in proofs, not only in programming. 1. A formula of propositional logic is said to be a tautology if it is true regardless of the truth values of its elementary propositions. For instance, the truth of P ! Q depends on the truth values of P and Q, but the formula P ^ Q ! P is true regardless of the truth values of P and Q. A mechanical way to show that a formula of propositional logic is a tautology is to first build its truth table, which for the last formula above is as follows: PQ ((P ^ Q) ! P ) TT T T TF F T FT F T FF F T 1 2 (more about truth-table format below). The formula is a tautology iff1 the column corresponding to the full formula (that is, column 2, which is under the highest-level operator in the formula) contains only the ’T’ symbol, as is the case in the example. A conditional formula that is also a tautology is rewritten with the symbol ‘)’ instead of the symbol ‘!’. So the formula above can be rewritten as P ^ Q ) P to emphasize that it is a tautology, and reads “P ^ Q implies P .” So an implication is a conditional that is always true because of its structure. Similarly, a biconditional ($) that is always true because of its structure is called an equivalence and is denoted by the symbol ‘,’. Determine which of the following conditionals or biconditionals are tautologies by building full truth tables in the format specified below. Show your truth tables and state your conclusion for each formula explicitly. (a) (((P !Q)!Q)!((Q!P )!P )) (b) (((P ^Q)!R)!((P !R)_(Q!R))) TRUTH-TABLE FORMAT. The format described here is slightly different from that used in FDM, and and example follows. In a full truth table, every simple proposition (P , Q, ...) and every operator (∼, ^, _, !, $) in the formula gets its own column, as done in the example above. Simple propositions go into the leftmost columns of the table, listed in alphabetical order, just as shown in FDM. Rows are in the standard order: If T represents zero and F represents 1, then the truth-value entries for the simple propositions read like binary numbers in increasing order if you read the table top-down. Parenthesize formulas fully, with exactly one pair of parentheses for each operator. This includes the top-level operator, so the entire formula is enclosed in parentheses, as done above. Parentheses do not get their own columns in the table. Open parentheses are inserted just before the first simple proposition they precede. Closed parentheses are inserted just after the last simple proposition they follow. Truth values for simple propositions are only given once in the first column in which they appear. Do not repeat truth values for subsequent columns associated with simple propositions. 1The abbreviation iff stands for “if and only if.” COMPSCI 230 — Duke — March 16, 2015 An additional row at the bottom of the table contains one integer in each operator column. This integer is analogous to the one used in FDM, and shows the order in which you computed each column of the truth table. This ordering is not unique, and different people may legitimately come up with different orderings. Of course, not all orderings are valid. The smallest order integer is 1. There is no need to include a vertical arrow (as is done in FDM). Instead, separate this last row from the others with a horizontal line. There is one horizontal line separating the column headers from the other rows, one horizontal line separating the truth table from the bottom row of order numbers, and no other horizontal line. There is one vertical line separating the simple propositions from the other formulas, and no other vertical line. As an example, the truth table for the formula (((P ^(∼ Q))_((∼ P )^R))!(Q_R)) is as follows PQR (((P ^ (∼ Q)) _ ((∼ P ) ^ R)) ! (Q _ R)) TTT FF FF F T T TTF FF FF F T T TFT TT TF F T T TFF TT TF F F F FTT FF TT T T T FTF FF FT F T T FFT FT TT T T T FFF FT FT F T F 2 1 5 3 4 7 6 Note that the full formula is not a tautology because column 7 contains an ‘F’. The LATEX code used to generate this table (and center it on the page) is as follows: \begin{center} \begin{tabular}{*{3}{c}|*{13}{c}} $P$ & $Q$ & $R$ & $(((P$ & $\logand$ & $(\lognot$ & $Q))$ & $\logor$ & $((\lognot$ & $P)$ & $\logand$ & $R))$ & $\logthen$ & $(Q$ & $\logor$ & $R))$ \\\hline \logT & \logT & \logT & & \logF & \logF & & \logF & \logF & & \logF & & \logT & & \logT & \\ \logT & \logT & \logF & & \logF & \logF & & \logF & \logF & & \logF & & \logT & & \logT & \\ \logT & \logF & \logT & & \logT & \logT & & \logT & \logF & & \logF & & \logT & & \logT & \\ \logT & \logF & \logF & & \logT & \logT & & \logT & \logF & & \logF & & \logF & & \logF & \\ \logF & \logT & \logT & & \logF & \logF & & \logT & \logT & & \logT & & \logT & & \logT & \\ \logF & \logT & \logF & & \logF & \logF & & \logF & \logT & & \logF & & \logT & & \logT & \\ \logF & \logF & \logT & & \logF & \logT & & \logT & \logT & & \logT & & \logT & & \logT & \\ \logF & \logF & \logF & & \logF & \logT & & \logF & \logT & & \logF & & \logT & & \logF & \\\hline & & & & $2$ & $1$ & & $5$ & $3$ & & $4$ & & $7$ & & $6$ & \\ \end{tabular} \end{center} The argument *{3}{c}|*{13}{c} to the tabular environment in the example above means that the table has three centered columns (*{3}{c}), followed by a vertical bar, followed by 13 centered columns. This format repetition style with asterisks is not part of standard LATEX but is provided in the array package, which the .tex file already includes. To avoid confusion with LATEX symbols, the .tex file defines commands \logand, \logor, and so forth for the logical operators, and also rewrites the formulas above for you, so you can see how to write similar formulas in LATEX. The file also defines \logT for ‘T’ and \logF for ‘F’. These and other LATEX commands useful for this assignment are summarized in a table in the Appendix to this assignment. WHAT TO DO. It is easy to get lost in the sea of ampersands needed to write a table like this in LATEX. I can think of four ways of getting the table right: • First draw the table by hand cleanly and in every detail on a sheet of paper, then translate that to LATEX. This procedure works if you are patient, have a good hand at drawing, and are detail oriented. • Use cut-and-paste very judiciously and directly in LATEX. For instance, if you understand the standard row ordering, then you can write the first three columns of the table in the example above by only writing its first line, then cutting, pasting, and making simple edits three times (as opposed to writing eight rows) for the table above. After that, you could put placeholders (perhaps a question mark) in the operator columns of the first row, and run LATEX to make sure the placeholders are where they belong. You can then copy that row eight times to get placeholders in the full table (including the bottom row with numbers). The next logical step is to replace the placeholders in the bottom row with the appropriate numbers. Once this is done, you can fill each column that has placeholders in the given order. At the end, insert \hline commands where needed (there are exactly two in every table). This procedure works if you are good at cut-and-paste, you work systematically, and you keep compiling the LATEX source and check all your intermediate steps are correct. • 10 extra-credit points for this solution approach. Write Racket code to generate the tables automatically. This is by far the most satisfactory way in terms of the reward you get from doing it, but is also difficult to get right, and may not be worth the investment COMPSCI 230 — Duke — March 16, 2015 given the small number of problems over which you would amortize your effort. If you follow this path, please submit your code (see instructions at the bottom of the assignment) and make a note before your first truth table, so we know to look for your code. Warning. The extra-credit solution approach is not for the faint of heart. Only do it if you enjoy programming in Racket. You will get full extra credit only for a clean, functional implementation. You can use a different language if you like, but you will get no extra credit in that case.
Recommended publications
  • UEB Guidelines for Technical Material
    Guidelines for Technical Material Unified English Braille Guidelines for Technical Material This version updated October 2008 ii Last updated October 2008 iii About this Document This document has been produced by the Maths Focus Group, a subgroup of the UEB Rules Committee within the International Council on English Braille (ICEB). At the ICEB General Assembly in April 2008 it was agreed that the document should be released for use internationally, and that feedback should be gathered with a view to a producing a new edition prior to the 2012 General Assembly. The purpose of this document is to give transcribers enough information and examples to produce Maths, Science and Computer notation in Unified English Braille. This document is available in the following file formats: pdf, doc or brf. These files can be sourced through the ICEB representatives on your local Braille Authorities. Please send feedback on this document to ICEB, again through the Braille Authority in your own country. Last updated October 2008 iv Guidelines for Technical Material 1 General Principles..............................................................................................1 1.1 Spacing .......................................................................................................1 1.2 Underlying rules for numbers and letters.....................................................2 1.3 Print Symbols ..............................................................................................3 1.4 Format.........................................................................................................3
    [Show full text]
  • Introduction to Logic and Critical Thinking
    Introduction to Logic and Critical Thinking Version 1.4 Matthew J. Van Cleave Lansing Community College Introduction to Logic and Critical Thinking by Matthew J. Van Cleave is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. Table of contents Preface Chapter 1: Reconstructing and analyzing arguments 1.1 What is an argument? 1.2 Identifying arguments 1.3 Arguments vs. explanations 1.4 More complex argument structures 1.5 Using your own paraphrases of premises and conclusions to reconstruct arguments in standard form 1.6 Validity 1.7 Soundness 1.8 Deductive vs. inductive arguments 1.9 Arguments with missing premises 1.10 Assuring, guarding, and discounting 1.11 Evaluative language 1.12 Evaluating a real-life argument Chapter 2: Formal methods of evaluating arguments 2.1 What is a formal method of evaluation and why do we need them? 2.2 Propositional logic and the four basic truth functional connectives 2.3 Negation and disjunction 2.4 Using parentheses to translate complex sentences 2.5 “Not both” and “neither nor” 2.6 The truth table test of validity 2.7 Conditionals 2.8 “Unless” 2.9 Material equivalence 2.10 Tautologies, contradictions, and contingent statements 2.11 Proofs and the 8 valid forms of inference 2.12 How to construct proofs 2.13 Short review of propositional logic 2.14 Categorical logic 2.15 The Venn test of validity for immediate categorical inferences 2.16 Universal statements and existential commitment 2.17 Venn validity for categorical syllogisms Chapter 3: Evaluating inductive arguments and probabilistic and statistical fallacies 3.1 Inductive arguments and statistical generalizations 3.2 Inference to the best explanation and the seven explanatory virtues 3.3 Analogical arguments 3.4 Causal arguments 3.5 Probability 3.6 The conjunction fallacy 3.7 The base rate fallacy 3.8 The small numbers fallacy 3.9 Regression to the mean fallacy 3.10 Gambler’s fallacy Chapter 4: Informal fallacies 4.1 Formal vs.
    [Show full text]
  • Unified English Braille Training Manual – Advanced
    2 Unified English Braille Training Manual: Advanced Mathematics Revision 6 © 2019 North Rocks Press NextSense 361-365 North Rocks Road North Rocks NSW 2151 Australia https://www.nextsense.org.au/ This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International Licence. • Attribution: You must give appropriate credit to the author • Non-Commercial: You must not use the material for commercial purposes • No derivatives: If you remix, transform or build upon the material, you may not distribute the modified material. To view a copy of this licence, visit https://creativecommons.org/licenses/by-nc- nd/4.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California 94105 USA ISBN 978-0-949050-06-9 NextSense Institute is Australia’s leading centre for research and professional studies in the field of education for children with sensory disabilities; offering webinars, short courses, and degree programs for parents, carers, educators, and health professionals. NextSense Institute is committed to providing high-quality teaching and learning opportunities. Our programs are conducted by leading national and international experts for education and health professionals who support people who are deaf, hard of hearing, blind or have low vision. 3 Table of Contents Foreword ..................................................................................................................... 5 Contributors ................................................................................................................
    [Show full text]
  • Elementary Logic: a Brief Introduction
    ELECTRONIC TEXT Elementary Logic: A Brief Introduction, Fourth Edition By Michael Pendlebury Published online by the Department of Philosophy, University of the Witwatersrand, Johannesburg in December 2013.1 Pp. vi, 151 © 1997–2013 Michael Pendlebury The copyright of this text is the property of the author. Without the written permission of the author, the text may not be used for commercial or fundraising purposes, or altered or edited in any way. Until further notice, the text may be used freely and without the author’s permission as follows: 1. Individuals may use, print, and copy the text for personal information, education, or entertainment. 2. Instructors in nonprofit educational and organizations and institutions may prescribe or recommend part or all of the text to their students. 3. Individuals and nonprofit organizations may supply printed copies of all or part of the text to anyone subject to the condition that they do not charge them more than the reasonable cost of printing it. 4. The text may be cited or quoted in other publications subject to the condition that it is clearly identified and attributed to the author. The Author Michael Pendlebury is Professor of Philosophy Head of the Department of Philosophy and Religious Studies at North Carolina State University. He studied at the University of the Witwatersrand, Johannesburg (BAHons, MA in Philosophy) and at Indiana University, Bloomington (MA, PhD in Philosophy, MA in Linguistics). He has taught philosophy at Illinois State University, the University of Natal, Pietermaritzburg, and for twenty years at the University of the Witwatersrand, where he was Professor and Head of Philosophy when he left to take up his current position at North Carolina State University in January 2004.
    [Show full text]
  • Group Theory
    Group Theory J.S. Milne S3 Â1 2 3Ã r D 2 3 1 Â1 2 3Ã f D 1 3 2 Version 4.00 June 23, 2021 The first version of these notes was written for a first-year graduate algebra course.Asin most such courses, the notes concentrated on abstract groups and, in particular, on finite groups. However, it is not as abstract groups that most mathematicians encounter groups, but rather as algebraic groups, topological groups, or Lie groups, and it is not just the groups themselves that are of interest, but also their linear representations. It is my intention (one day) to expand the notes to take account of this, and to produce a volume that, while still modest in size (c200 pages), will provide a more comprehensive introduction to group theory for beginning graduate students in mathematics, physics, and related fields. BibTeX information @misc{milneGT, author={Milne, James S.}, title={Group Theory (v4.00)}, year={2021}, note={Available at www.jmilne.org/math/}, pages={139} } Please send comments and corrections to me at jmilne at umich dot edu. v2.01 (August 21, 1996). First version on the web; 57 pages. v2.11 (August 29, 2003). Revised and expanded; numbering; unchanged; 85 pages. v3.00 (September 1, 2007). Revised and expanded; 121 pages. v3.16 (July 16, 2020). Revised and expanded; 137 pages. v4.00 (June 23, 2021). Made document (including source code) available under Creative Commons licence. The multiplication table of S3 on the front page was produced by Group Explorer. Version 4.0 is published under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International licence (CC BY-NC-SA 4.0).
    [Show full text]
  • Arxiv:2010.09692V2 [Cs.CL] 9 Jul 2021
    Summary-Oriented Question Generation for Informational Queries Xusen Yin∗ Li Zhou USC/ISI Amazon [email protected] [email protected] Kevin Small Jonathan May Amazon USC/ISI [email protected] [email protected] Abstract not changing these expectations, and users simply not possessing sufficient knowledge of the subject Users frequently ask simple factoid questions of interest to ask more challenging questions. Ir- for question answering (QA) systems, attenu- respective of the reason, one potential solution to ating the impact of myriad recent works that support more complex questions. Prompting this dilemma is to provide users with automatically users with automatically generated suggested generated suggested questions (SQs) to help users questions (SQs) can improve user understand- better understand QA system capabilities. ing of QA system capabilities and thus facil- Generating SQs is a specific form of question itate more effective use. We aim to produce generation (QG), a long-studied task with many ap- self-explanatory questions that focus on main plied use cases – the most frequent purpose being document topics and are answerable with vari- data augmentation for mitigating the high sample able length passages as appropriate. We sat- complexity of neural QA models (Alberti et al., isfy these requirements by using a BERT-based Pointer-Generator Network trained on the Nat- 2019a). However, the objective of such existing ural Questions (NQ) dataset. Our model shows QG systems is to produce large quantities of ques- SOTA performance of SQ generation on the tion/answer pairs for training, which is contrary to NQ dataset (20.1 BLEU-4). We further ap- that of SQs.
    [Show full text]
  • Here One of the Students Remarked to Me: "You Know, This Whole Book-Particularly Parts Three and Four-Has Much the Flavor of a Mathematical Novel
    ALSO BY RAYMOND SMULLYAN Theory of Formal Systems First Order Logic The Tao Is Silent What Is the Name of This Book? This Book Needs No Title The Chess Mysteries of Sherlock Holmes The Chess Mysteries of the Arabian Knights The Devil, Cantor and Infinity THE LADY OR THE TIGER? THE LADY OR THE TIGER? and Other Logic Puzzles INCLUDING A MATHEMATICAL NOVEL THAT FEATURES GODEL'S GREAT DISCOVERY BY Raymond Smullyan Copyright © 1982 by Raymond Smullyan All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Times Books, a division of Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. This work was originally published in hardcover by Alfred A. Knopf, Inc., New York in 1982. The problems in Chapter 3, "The Asylum of Doctor Tarr and Professor Fether," originally appeared in The Two-Year College Mathematics Journal. Library of Congress Cataloging-in-Publication Data Smullyan, Raymond M. The lady or the tiger? : and other logic puzzles, including a mathematical novel that features Coders great discovery / by Raymond Smullyan. - 1st ed. p. cm. Originally published: New York : Knopf, 1982. ISBN 0-8129-2117-8 (pbk.) 1. Puzzles. 2. Mathematical recreations 3. Philosophical recreations. I. Title. [CV1493·S626 1992] 793· 73-dc20 Manufactured in the United States of America 9 8 7 6 5 4 3 2 First Times Books Paperback Edition Contents Preface vii PART I .. THE LADY OR THE TIGER? 1 1 Chestnuts-Old and New 3 2 Ladies or Tigers? 14 3 The Asylum of Doctor Tau and Professor Fether 29 4 Inspector Craig Visits Transylvania 45 PAR T II.
    [Show full text]
  • Cryptography: an Introduction (3Rd Edition) Nigel Smart
    Cryptography: An Introduction (3rd Edition) Nigel Smart Preface To Third Edition The third edition contains a number of new chapters, and various material has been moved around. The chapter on Stream Ciphers has been split into two. One chapter now deals with • the general background and historical matters, the second chapter deals with modern constructions based on LFSR’s. The reason for this is to accomodate a major new section on the Lorenz cipher and how it was broken. This compliments the earlier section on the breaking of the Enigma machine. I have also added a brief discussion of the A5/1 cipher, and added some more diagrams to the discussion on modern stream ciphers. IhaveaddedCTRmodeintothediscussiononmodesofoperationforblockciphers.This • is because CTR mode is becoming more used, both by itself and as part of more complex modes which perform full authenticated encryption. Thus it is important that students are exposed to this mode. Ihavereorderedvariouschaptersandintroducedanewpartonprotocols,inwhichwe • cover secret sharing, oblvious transfer and multi-party computation. This compliments the topics from the previous edition of commitment schemes and zero-knowledge protocols, which are retained a moved around a bit. Thus the second edition’s Part 3 has now been split into two parts, the material on zero-knowledge proofs has now been moved to Part 5 and this has been extended to include other topics, such as oblivious transfer and secure multi-party computation. The new chapter on secret sharing contains a complete description of how to recombine • shares in the Shamir secret-sharing method in the presence of malicious adversaries. To our knowledge this is not presented in any other elementary textbook, although it does occur in some lecture notes available on the internet.
    [Show full text]
  • Logic Teaching in the 21 Century.Cdr
    Logic teaching in the 21st century JOHN CORCORAN Philosophy, University at Buffalo Buffalo, NY 14260-4150, USA E-mail: [email protected] If you by your rules would measure what with your rules doth not agree, forgetting all your learning, seek ye first what its rules may be. —Richard Wagner, Die Meistersinger. Abstract Today we are much better equipped to let the facts reveal themselves to us instead of blinding ourselves to them or stubbornly trying to force them into preconceived molds. We no longer embarrass ourselves in front of our students, for example, by insisting that “Some Xs are Y” means the same as “Some X is Y”, and lamely adding “for purposes of logic” whenever there is pushback. Logic teaching in this century can exploit the new spirit of objectivity, humility, clarity, observationalism, contextualism, tolerance, and pluralism. Accordingly, logic teaching in this century can hasten the decline or at least slow the growth of the recurring spirit of subjectivity, intolerance, obfuscation, and relativism. Besides the new spirit there have been quiet developments in logic and its history and philosophy that could radically improve logic teaching. One rather conspicuous example is that the process of refining logical terminology has been productive. Future logic students will no longer be burdened by obscure terminology and they will be able to read, think, talk, and write about logic in a more careful and more rewarding manner. Closely related is increased use and study of variable-enhanced natural language as in “Every proposition x that implies some proposition y that is false also implies some proposition z that is true”.
    [Show full text]
  • Sign Patterns with a Nest of Positive Principal Minors
    Sign Patterns with a Nest of Positive Principal Minors D. D. Olesky 1 M. J. Tsatsomeros 2 P. van den Driessche 3 March 11, 2011 Abstract T A matrix A 2 Mn (R) has a nest of positive principal minors if P AP has positive leading principal minors for some permutation matrix P . Motivated by the fact that such a matrix A can be positively scaled so all its eigenvalues lie in the open right-half-plane, conditions are investigated so that a square sign pattern either requires or allows a nest of positive principal minors. Keywords: Principal minor; Nested sequence; P-matrix; Q-matrix; Sign- nonsingularity; Positive stability; Potential stability; LU factorization. AMS Subject Classifications: 15B35, 15A18, 05C22. 1Department of Computer Science, University of Victoria, Victoria, British Columbia, Canada V8W 3P6 ([email protected]). 2Mathematics Department, Washington State University, Pullman, Washington 99164-3113, U.S.A. ([email protected]). 3Department of Mathematics and Statistics, University of Victoria, Victoria, British Columbia, Canada V8W 3R4 ([email protected]). 1 1 Introduction Given A = [aij] 2 Mn (R), we consider its sign pattern A, namely, an array with entries αij = sign aij 2 f+; −; 0g. For convenience, we identify A with the sign pattern class of A, that is, the set fB = [bij] 2 Mn (R) : sign bij = sign aij for all i; jg and write A 2 A. Sign pattern A requires property X if every B 2 A has property X , and A allows property X if there exists B 2 A that has property X . A matrix A possesses a leading positive nest if the leading principal minors of A are positive.
    [Show full text]
  • Unified English Braille Training Manual – Extension Mathematics
    Unified English Braille Training Manual: Extension Mathematics Revision 4 © 2020 North Rocks Press NextSense 361-365 North Rocks Road North Rocks NSW 2151 Australia https://www.nextsense.org.au/ This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International Licence. • Attribution: You must give appropriate credit to the author • Non-Commercial: You must not use the material for commercial purposes • No derivatives: If you remix, transform or build upon the material, you may not distribute the modified material. To view a copy of this licence, visit https://creativecommons.org/licenses/by-nc-nd/4.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California 94105 USA ISBN 978-0-949050-07-6 NextSense Institute is Australia’s leading centre for research and professional studies in the field of education for children with sensory disabilities; offering webinars, short courses, and degree programs for parents, carers, educators, and health professionals. NextSense Institute is committed to providing high-quality teaching and learning opportunities. Our programs are conducted by leading national and international experts for education and health professionals who support people who are deaf, hard of hearing, blind or have low vision. 2 Table of Contents Foreword .............................................................................................................................. 6 Contributors ........................................................................................................................
    [Show full text]
  • A COGNITIVE APPROACH to PHONOLOGY: EVIDENCE from SIGNED LANGUAGES Corrine Occhino University of New Mexico
    University of New Mexico UNM Digital Repository Linguistics ETDs Electronic Theses and Dissertations Fall 12-18-2016 A COGNITIVE APPROACH TO PHONOLOGY: EVIDENCE FROM SIGNED LANGUAGES Corrine Occhino University of New Mexico Follow this and additional works at: https://digitalrepository.unm.edu/ling_etds Part of the Linguistics Commons Recommended Citation Occhino, Corrine. "A COGNITIVE APPROACH TO PHONOLOGY: EVIDENCE FROM SIGNED LANGUAGES." (2016). https://digitalrepository.unm.edu/ling_etds/46 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at UNM Digital Repository. It has been accepted for inclusion in Linguistics ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. Corrine Occhino Candidate Department of Linguistics Department This dissertation is approved, and it is acceptable in quality and form for publication: Approved by the Dissertation Committee: Sherman Wilcox, Chairperson Joan Bybee Jill Morford Phyllis Wilcox Teenie Matlock i A COGNITIVE APPROACH TO PHONOLOGY: EVIDENCE FROM SIGNED LANGUAGES by CORRINE OCCHINO B.A., Linguistics, University of Wisconsin-Milwaukee, 2004 M.A., Linguistics, University of Wisconsin-Milwaukee 2006 DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Linguistics The University of New Mexico Albuquerque, New Mexico December, 2016 ii DEDICATION For Ruth Occhino, I think of you every day. iii ACKNOWLEDGMENTS To my advisor, Sherman Wilcox, thank you for throwing me into the deep end of the Cognitive Grammar pool. It was surely through this baptism by fire that I came to understand and appreciate the utility of cognitive approaches to language.
    [Show full text]