File Information
File: 05-lr/acl_arc_1_sum/cleansed_text/xml_by_section/metho/02/j02-1001_metho.xml
Size: 36,609 bytes
Last Modified: 2025-10-06 14:07:49
<?xml version="1.0" standalone="yes"?> <Paper uid="J02-1001"> <Title>Binding Machines</Title> <Section position="3" start_page="2" end_page="5" type="metho"> <SectionTitle> 2 The fragment of grammar developed and extensively discussed in Pollard and Sag (1994) is formally </SectionTitle> <Paragraph position="0"> specified in its Appendix with the HPSG unification-based description language. Binding constraints escape such encoding. While noting that these constraints have yet to be accommodated in HPSG grammars, Bredenkamp's (1996) and Backofen et al.'s (1996) subsequent elaboration of this issue implies that some kind of essential limitation of the unification-based formalism might have been reached, a suggestion we seek to contradict here.</Paragraph> <Paragraph position="1"> Branco Binding Machines of the so-called binding theory, the issue of determining whether a given grammatical representation complies with binding constraints has not attracted similar attention. In this section, we briefly review major advances reported in resolving this issue.</Paragraph> <Section position="1" start_page="2" end_page="3" type="sub_section"> <SectionTitle> 2.1 Exhaustive Coindexing for Filtering </SectionTitle> <Paragraph position="0"> The first formulation of a verification procedure, based on exhaustive coindexation, dates back to Chomsky (1980, Appendix; 1981, Section 3.2.3). The basics of this approach can be outlined as follows: After the grammatical parsing of a sentence with n NPs has been completed, for every parse tree t: a. Indexation: Generate a new, annotated tree by assigning indices to the NPs in t.</Paragraph> <Paragraph position="1"> b. Filtering: Store this annotated tree if the indexation of NPs respects binding constraints; otherwise, delete it.</Paragraph> <Paragraph position="2"> c. Iteration: Repeat (a)-(b) until all type-different assignments of n possibly different indices have been exhausted.</Paragraph> <Paragraph position="3"> As discussed in Correa (1988), this procedure is grossly inefficient: its complexity was shown in Fong (1990) to be of exponential order. Moreover, this approach is conceptually awkward, given that a submodule of the grammar, the set of binding constraints, is not operative during grammatical processing, but functions as an extragrammatical add-on.</Paragraph> <Paragraph position="4"> This proposal also disregards the need to interface grammar with systems for reference processing. The input for such systems will not be a grammatical representation to be refined vis-`a-vis the preferences for anaphor resolution, but a forest of differently labeled trees that have to be internally searched and compared with each other by anaphor resolvers.</Paragraph> </Section> <Section position="2" start_page="3" end_page="5" type="sub_section"> <SectionTitle> 2.2 Packing Anaphoric Ambiguity </SectionTitle> <Paragraph position="0"> A first proposal for improving the exhaustive coindexation-driven methodology is due to Correa (1988), whose goal was to enhance the integration of binding constraints into grammar and obtain a tractable verification procedure.</Paragraph> <Paragraph position="1"> Simplifying some details, the proposed algorithm can be outlined as follows: Let t be a constituency tree where every NP has a type-distinct index. Start from the top node of t with two empty stacks, A and B, where indices will be collected, respectively local c-commanding indices and nonlocal c-commanding indices, while descending the tree. When an NP j is found: a. Copy: Leave a copy of A (if NP j is a short-distance reflexive) or B (if it is a pronoun) at the NP j .</Paragraph> <Paragraph position="2"> 3 Correa (1988, page 123) observes that although the integration of binding constraints &quot;into rules which may be used to derive structure that already satisfies the [constraints] is not a straightforward task,&quot; that should be the path to follow, a point also strongly stressed in subsequent elaboration on this issue by Merlo (1993).</Paragraph> <Paragraph position="3"> 4 C-command is a configurational version of the command relation where x c-commands y iff the first branching node that dominates x dominates y (Barker and Pullum 1990). 3 Computational Linguistics Volume 28, Number 1 b. Assign: Take the first index i of the stack copied into the NP j node, and annotate NP j with j = i.</Paragraph> <Paragraph position="4"> c. Collect: Add index j to A in each sister node of NP j .</Paragraph> <Paragraph position="5"> When a local domain border is crossed: d. Reset: Reset B to A [ B.</Paragraph> <Paragraph position="6"> This algorithm has been given two different implementations, one by Correa (1988), the other by Ingria and Stallard (1989). Further elaboration by Giorgi, Pianesi, and Satta (1990) and Pianesi (1991) offers a variant in terms of formal language techniques, where the stack copied into pronouns contains the antecedent candidates excluded by Principle B.</Paragraph> <Paragraph position="7"> The &quot;do-it-while-parsing&quot; approach of Correa's implementation has the advantage of discarding a special-purpose postgrammatical module for binding. Nevertheless, this solution turns out to be dependent on a top-down parsing strategy. On the other hand, while Ingria and Stallard's implementation is independent of the parsing strategy adopted, its independence comes at the cost of still requiring a special-purpose postgrammatical parsing module for binding.</Paragraph> <Paragraph position="8"> Besides incorporating binding theory into grammar, Correa's development inside the coindexation-driven methodology presents other significant improvements. If one disregards step (b)--a disguised recency preference mixed with binding constraints-and considers the result of verifying these constraints to be the assignment to an NP of the set of indices of its grammatically admissible antecedents, then it is possible to discard the proliferation of indexed trees as a way to express anaphoric ambiguity. Moreover, this packing of anaphoric ambiguity provides for a neat interface with anaphor resolvers, whose preferences will then pick the most likely antecedent candidate from the relevant stack of indices.</Paragraph> <Paragraph position="9"> These advances permit a verification procedure of tractable complexity (Correa 1988, page 127; Giorgi, Pianesi, and Satta 1990, page 5). This results crucially from the move toward the lexicalization of the constraining effect of binding principles, a solution also adopted in subsequent proposals by other authors, as we will discuss below. The binding constraint of each anaphor is now enforced independently of how the surrounding anaphors happen to be resolved. This implies that there is no need to anticipate all the different resolutions for every relevant anaphor with a process of exhaustive coindexation. It also implies that cases of undesired transitive anaphoricity are handled by other filters during the anaphor resolution process. However, these positive results regarding the verification task seem to be obtained at the cost of some negative consequences regarding the specification task and empirical adequacy. The above algorithm is acknowledged not to be able to cope with</Paragraph> </Section> </Section> <Section position="4" start_page="5" end_page="6" type="metho"> <SectionTitle> 5 Consider the sentence John said that he shaved him. Ignoring how other anaphors are resolved, in the light </SectionTitle> <Paragraph position="0"> of Binding Constraint B, he can take John as its antecedent, as empirically replicated in other minimally different examples such as John i said that he shaved Peter; likewise, him can take John as its antecedent. A point worth noting is that, if he actually ends up resolved against John, the latter cannot be the antecedent of him, and vice versa. This specific resolution of he and him, out of the many possible resolutions, blocks two anaphoric links that would otherwise have been admissible. It induces a contingent violation of binding constraint B due to an accidental, transitive anaphoric relationship between he and him.</Paragraph> <Paragraph position="1"> This issue is not discussed in Correa (1988), since this paper is strictly focused on syntax and binding. See footnote 13 below for a suggestion on how this issue may be handled in a grammatical framework integrating syntactic and semantic representations.</Paragraph> <Paragraph position="2"> Branco Binding Machines constraints involving nonlocal dependencies. It does not account for Principle C, and it only partially accommodates the anaphoric potential of anaphors complying with Principle B. As Stack B only contains indices of the nonlocal c-commanders--rather than all indices except those of the local c-commanders--the algorithm does not correctly account for the constraining effect of Principle B. Also this approach does not account for backward anaphora or crossover cases (Correa 1988, page 127; Ingria and Stallard 1989, page 268).</Paragraph> <Section position="1" start_page="6" end_page="6" type="sub_section"> <SectionTitle> 2.3 Packing Nonlocality </SectionTitle> <Paragraph position="0"> Other improvements in the task of verifying binding constraints are due to Dalrymple (1993) and Johnson (1995). Instead of being concerned with packing ambiguity, they are concerned with packing nonlocality.</Paragraph> <Paragraph position="1"> 2.3.1 Trees in Nodes of Trees. Johnson's (1995) algorithm is embodied in Prolog code. Abstracting away from details associated with that format, it can be outlined as follows: null Let t be a constituency tree where every NP has a type-distinct index. For</Paragraph> <Paragraph position="3"> upward until the top node is reached.</Paragraph> <Paragraph position="4"> When a locally c-commanding NP</Paragraph> <Paragraph position="6"> is a nonpronoun.</Paragraph> <Paragraph position="7"> Although this outline renders the algorithm in a bottom-up fashion, Johnson ingeniously develops an implementation of it that is independent of the parsing strategy by resorting to delaying mechanisms. Consequently, despite its postgrammatical flavor, this implementation does not require postgrammatical processing, thus incorporating the task of binding constraint verification into grammar processing.</Paragraph> <Paragraph position="8"> These results are obtained with some auxiliary devices. Each node in the tree is &quot;conceptualized as a pair consisting of a tree and a vertex in that tree&quot; (Johnson 1995, page 62). Consequently, the whole tree where a given NP appears is locally accessible to be &quot;walked up&quot; since its replica is present at the pair (Category, Tree), which is the NP node itself.</Paragraph> <Paragraph position="9"> This algorithm makes the verification of binding constraints more efficient because it does not resort to exhaustive indexation. However, it does so at the cost of highly complicating the grammatical representation, since the tree is replicated at each one of its nodes.</Paragraph> <Paragraph position="10"> While avoiding exhaustive indexation, this approach does not fully eliminate the proliferation of trees. For a given ambiguous reflexive, with more than one admissible</Paragraph> </Section> </Section> <Section position="5" start_page="6" end_page="7" type="metho"> <SectionTitle> 6 See the Appendix for the notion of locality and local domain and other auxiliary notions in the </SectionTitle> <Paragraph position="0"> definition of binding constraints.</Paragraph> <Paragraph position="1"> Backward anaphora occurs in cases where the anaphor is resolved against an antecedent that occurs linearly after the anaphor, as in If he</Paragraph> <Paragraph position="3"> will do it.</Paragraph> <Paragraph position="4"> An example of so-called crossover cases is the ungrammatical construction *Who</Paragraph> <Paragraph position="6"> said you like, where the fronted phrase is meant to be the antecedent of some pronoun c-commanding the position from which this phrase is displaced.</Paragraph> <Paragraph position="7"> Computational Linguistics Volume 28, Number 1 antecedent, each antecedent candidate corresponds to a different coindexation and, consequently, to a different tree. That is what generally happens with long-distance reflexives, whose antecedents can be found in any of the binding domains induced by the local or by the upward predicators, but it may also happen with short-distance ones, as in (2) below.</Paragraph> <Paragraph position="8"> As to the interface with reference processing, problems arise with reflexives and nonreflexives, though of different nature. Reflexives, if ambiguous, give rise to proliferation of trees, thus requiring comparison between trees during subsequent anaphor resolution.</Paragraph> <Paragraph position="9"> As to nonreflexives--pronouns and nonpronouns--their analysis does not give rise to proliferation of trees, but the representation of their ambiguity is not fully made explicit in the grammatical representation of the sentence being parsed. This is so because they end up associated with negative information, that is, information about what NPs cannot be their antecedents. The index of a pronoun is made unequal with the indices of its local c-commanders; it is not made equal with the indices of its grammatically admissible antecedents. The same holds for nonpronouns with respect to their c-commanders. Consequently, in this case, the task of determining the antecedent candidates that satisfy the relevant binding constraint of nonreflexives remains to be completed after grammatical processing is finished. This will involve some postgrammatical rescanning of the parse tree generated for extracting the indices that do not enter in the inequalities obtained during the parsing.</Paragraph> <Paragraph position="10"> Finally, like Correa's approach, Johnson's does not account for backward anaphora, as only surface c-commanders are visible to the tree-climbing procedure.</Paragraph> <Paragraph position="11"> forth by Dalrymple (1993), adopts a different approach to generalize over the possible nonlocality of intrasentential anaphoric dependencies. This approach makes crucial use of a special-purpose extension of the LFG description formalism, the so-called binding equations, which are lexically associated with anaphors. Building on Kaplan and Maxwell's (1988) proposal concerning functional uncertainty, binding equations are designed to encode the uncertainty concerning the long-distance path between the positions of the anaphor and its permissible antecedent in the grammatical structure. Given that uncertainty concerning long-distance dependencies involves a (possibly infinite) disjunction of possibilities, the basic idea is to encode such a disjunction in finite terms by the use of regular expressions over feature structures. An example of a binding equation encoding functional uncertainty is given in (1), preceded by an example with the corresponding long-distance subject-oriented reflexive, Chinese ziji.</Paragraph> <Paragraph position="13"> The right-hand side of the equation stands for the semantic representation (&quot; &quot;) of the anaphor (&quot;&quot;&quot;), while the left-hand side stands for the semantic representation of the antecedent. The description of the antecedent indicates that the long-distance reflexive is an object and that this object is constrained to be part of a feature structure where 7 Koenig (1999) introduces a device in HPSG description language for stating inside-out constraints. This would help in developing an HPSG emulation of the LFG approach for the verification of binding constraints.</Paragraph> <Paragraph position="14"> Branco Binding Machines its antecedent may be one of the possibly many upward subjects. The Kleene operator &quot;*&quot; allows abbreviation of the set of paths consisting of zero or more occurrences of COMP--corresponding to possible successive clausal embeddings--followed by one occurrence of OBJ.</Paragraph> <Paragraph position="15"> While regular expressions may be used in binding equations, such expressions are not necessary if the grammatical relation between the anaphor and its admissible antecedents does not involve a long-distance dependency. That is the case in (2), which displays the binding equation for the short-distance reflexive himself. Given that both the subject and the object are admissible antecedents for the reflexive, in the binding equation the use of the attribute GF, which stands for any grammatical function, underspecifies the grammatical functions of the admissible antecedents (Dalrymple 1993, Section 4.4.2).</Paragraph> <Paragraph position="16"> As noted in Dalrymple (1993, Section 3.3), a few aspects of this approach for binding need to be fully worked out. For instance, the positive equations for reflexives do not require identity of indices of anaphorically related expressions, but instead impose identity of semantic representations. Without further elaboration, this will incorrectly enforce any type of anaphoric link (coreference, bound, bridging, e-type, etc.) to the sole mode of coreference. Another important issue is the account of nonlexical anaphoric NPs: it is not clear how this type of NP (e.g., anaphoric definite descriptions, ruled by Principle C) may be assigned the corresponding binding equation.</Paragraph> <Paragraph position="17"> However these difficulties turn out to be resolved, the LFG approach for binding, though building on a different strategy for handling nonlocality, presents the same sort of problems as Johnson's proposal.</Paragraph> <Paragraph position="18"> The interfacing of grammar with reference-processing systems is problematic since the proliferation of representations is not avoided. Constructions with reflexives, if these are ambiguous, end up associated with several grammatical representations. In the case of long-distance reflexives, as exemplified in (1), these representations result from the possibly many solutions for the functional uncertainty encoded by the regular expression in the binding equation. In the case of short-distance reflexives, as exemplified in (2), they result from the different solutions for the unification of the different grammatical functions of the admissible antecedents with the attribute GF in the binding equation.</Paragraph> <Paragraph position="19"> Likewise, the anaphoric capacity of pronouns and nonpronouns, typically ambiguous, is not explicitly captured in the final grammatical representation. These anaphors are lexically associated with negative equations, and for this type of equation there is only one possible solution, namely, the grammatical structure where the semantic representation of the anaphor is not identical to the semantic representations of any of the phrases complying with the description of the antecedent in the left-hand side Computational Linguistics Volume 28, Number 1 of the equation (Dalrymple 1993, Section 4.1.5). Therefore, for these anaphors the final grammatical representation provides no information about what their admissible antecedents are according to the relevant binding constraints.</Paragraph> </Section> <Section position="6" start_page="7" end_page="12" type="metho"> <SectionTitle> 3. A Semantics-Driven Approach </SectionTitle> <Paragraph position="0"> The contributions assessed above share a common point of departure with regard to the verification algorithm first proposed by Chomsky (1981), each addressing and solving some of its more significant drawbacks. The common move toward the lexicalization of binding constraints represents an important shift in the verification strategy: verifying binding constraints is not a matter of inspecting final grammatical representations, but instead a matter of some local operation triggered by information lexically associated with anaphors about their anaphoric class. This move has allowed binding constraint verification to be incorporated into grammar processing and permitted tractable verification procedures.</Paragraph> <Paragraph position="1"> From the discussion in the previous section, it follows also that these contributions have been partially successful in overcoming other problems of the verification methodology based on exhaustive coindexation. Though partially successful, they have brought to the fore important dimensions of binding that have to be concomitantly accounted for. Accordingly, an alternative method for the verification of binding constraints has to find a way to harmonize all those different dimensions--lexicalization, anaphoric ambiguity packing, and nonlocal context packing--while providing adequate empirical coverage and neatly interfacing grammar with reference processing.</Paragraph> <Paragraph position="2"> Against this background, a breakthrough depends, in our view, on reconsidering some primitives underlying the conception of binding constraints. In the previous section, we made a clear distinction between specification and verification of binding constraints, so that the latter task could be isolated and better assessed. We will argue now that further progress on the verification task depends on bridging this distinction and possibly changing the way the specification of binding constraints is understood.</Paragraph> <Section position="1" start_page="7" end_page="10" type="sub_section"> <SectionTitle> 3.1 Patterns in the Semantics of Anaphors </SectionTitle> <Paragraph position="0"> Binding constraints have generally been viewed as well-formedness conditions on syntactic representations, thus belonging to the realm of syntax. In line with Gawron and Peters (1990), however, we think these constraints should rather be understood as conditions on semantic representations, since they primarily delimit (nonlocal) aspects of semantic composition, rather than aspects of syntactic composition.</Paragraph> <Paragraph position="1"> Like other types of constraints on semantic composition, binding constraints impose conditions on the interpretation of certain expressions--anaphors, in the present case--based on syntactic geometry. However, this cannot be viewed as implying that they express grammaticality requirements. By replacing a pronoun with a reflexive in a given sentence, for instance, we do not turn a grammatical construction into an ungrammatical one, even if we assign to the reflexive the antecedent appropriately se8 As implied by the title of this section, and as will become clear in the following discussion, this does not mean that we are claiming that binding theory can be built without any reference to syntactic constructs.</Paragraph> <Paragraph position="2"> In the argument in the following paragraphs, we are assuming a notion of semantic composition not in its strict sense, as used for example in Montague Grammar, but in the broader sense that the intermediate semantic representations of the expressions are composed from other representations, as used in Discourse Representation Theory (DRT). Note that reformulations of frameworks like DRT can be worked out that result in a semantic system adhering to strict compositionality; see Janssen (1997, Section 4.4) for references and a thorough discussion of this issue.</Paragraph> <Paragraph position="3"> Branco Binding Machines lected for the pronoun. In that case, we are simply asking the hearer to try to assign to that sentence a meaning it cannot express--just as if we were to ask whether someone could interpret The red book is on the white table as describing a situation where a white book is on a red table.</Paragraph> <Paragraph position="4"> In this example, given how they happen to be syntactically related, the semantic values of red and table cannot be composed in such a way that the sentence could be used to describe a situation concerning a red table, rather than a white table. Likewise, in the sentence John thinks Peter shaved him, given how they happen to be syntactically related, the semantic values of Peter and him cannot be composed in such a way that this sentence could be used to describe a situation where John thinks that Peter shaved himself (i.e., Peter), rather than a situation where John thinks that Peter shaved other people (e.g., Paul, Bill, or John himself). The difference between these two cases is that in the former, the composition of the semantic contributions of white and table (for the interpretation of the NP white table) is constrained by local syntactic geometry, while in the latter, the composition of the semantic contributions of John and him (for the interpretation of the NP him) is constrained by nonlocal syntactic geometry.</Paragraph> <Paragraph position="5"> This discussion leads us to consider that, semantically, an anaphor should be specified in the lexicon as a function whose argument is a suitable representation of the context--providing a semantic representation of the NPs available in the discourse vicinity--and its value is the set of the grammatically admissible antecedents for that anaphor. This rationale is in line with other approaches to the meaning of anaphors that, building in other sorts of arguments or research concerns, understand it also as a projection from some relevant representation of contexts to entities.</Paragraph> <Paragraph position="6"> But given the specific focus of the present study, what should be noted is that, all in all, there will be four such functions available to be lexically associated with anaphors, each corresponding to one of the four different classes of anaphors, in accordance with the four binding constraints A, B, C, and Z.</Paragraph> </Section> <Section position="2" start_page="10" end_page="12" type="sub_section"> <SectionTitle> 3.2 Binding Machines </SectionTitle> <Paragraph position="0"> Given these considerations, we can show that this conceptual shift to a semantics-driven approach for the verification of binding constraints provides an adequate basis for harmonizing the advances put forward in the literature and discussed above.</Paragraph> <Paragraph position="1"> To make this alternative rationale for binding perspicuous, we suggest envisioning an anaphoric NP as a binding machine, which operates by receiving an input, changing its internal state, and returning an output. More specifically, an anaphoric NP can be 9 See, among others, Gawron and Peters (1990), Lappin and Francez (1994), and the discussion in Jacobson (1999).</Paragraph> <Paragraph position="2"> Adopting L&quot;obner's (1987) duality criterion for quantification in natural language, and the formal tools he developed for the analysis of phase quantification, we showed in Branco (2000) that the four binding constraints can be seen as the effect of four binding quantifiers. These phase quantifiers can be viewed as being expressed by the nominals of the four binding classes, and they quantify over the reference markers organized in the obliqueness order.</Paragraph> <Paragraph position="3"> A full-fledged account of the empirical support and justification for these results, and of their implications, is beyond the scope of this article. For an abridged presentation of the core argument, see Branco (1998).</Paragraph> <Paragraph position="4"> 10 As there are different grammatical frameworks, binding constraints have been specified under different versions. Some differences between versions are due just to this fact that binding constraints are supposed to be accommodated into different grammatical frameworks; some other differences, however, are real differences of specification in the sense that different variants may not have the same empirical coverage or be aimed at predicting the same (un)grammatical constructions. In the Appendix, we present a common and fairly well empirically tested version of binding theory given the current state of the art in this area, a version presently adopted in the HPSG framework. For an alternative, see for example Reinhart and Reuland (1993).</Paragraph> <Paragraph position="5"> Computational Linguistics Volume 28, Number 1 viewed as a binding machine that (1) takes a representation of its context; (2) updates its own semantic value in response both to its context and to its intrinsic anaphoric potential (i.e., in accordance with its binding constraint); and (3) contributes to the makeup of the context, which the other binding machines read as input (i.e., against which the other anaphoric NPs are interpreted).</Paragraph> <Paragraph position="6"> The output of an anaphoric nominal n viewed as a binding machine is simply the incrementing of the context with a copy of its reference marker.</Paragraph> <Paragraph position="7"> The internal state of the machine after its operation is a representation of the contextualized anaphoric capacity of n under the form of the set of reference markers of the grammatically admissible antecedents of n. This internal state results when the binding constraint associated with n is applied to the input, and it is the interface point between grammar and reference processing. This set of reference markers collects the antecedent candidates, and its elements are submitted to other filters and preferences by the anaphor resolvers so that one of them ends up being chosen as the antecedent.</Paragraph> <Paragraph position="8"> The input, in turn, is a representation of the aspects of the context relevant to help circumscribe the anaphoric potential of nominal anaphors. It is coded under the form of three lists of reference markers, A, Z, and U. In list A, the reference markers of the local o-commanders of n are ordered according to their relative grammatical obliqueness; Z includes the o-commanders of n, possibly observing a multiclausal obliqueness hierarchy; and U is the list of all reference markers in the discourse context, including those not linguistically introduced.</Paragraph> <Paragraph position="9"> Given this setup, the contribution of binding constraints in circumscribing the anaphoric potential of nominals is explicitly acknowledged. The particular contextualized instantiation of that potential and the verification of binding constraints coincide and consist of a few simple steps. If n is a short-distance reflexive, its internal state is set Besides adhering to an empirically grounded conception of binding constraints, this approach embodies, and harmonizes, the crucial contributions of previous proposals concerning the verification of these constraints. It assumes the lexicalization of binding constraints. Concomitantly, it builds on specific strategies for the packing of anaphoric ambiguity (viz., list of reference markers) and nonlocal context (viz., set of lists of reference markers). Moreover, it achieves this while avoiding the above-mentioned problems related to the proliferation of grammatical representations and to the interfacing of grammar with reference processing, as well as the problems of ensuring complete empirical coverage.</Paragraph> <Paragraph position="10"> What remains to be discussed is whether, given this new format for the verification of binding constraints, they can still be specified and integrated into grammar processing with currently affordable formal and computational tools.</Paragraph> </Section> </Section> <Section position="7" start_page="12" end_page="15" type="metho"> <SectionTitle> 4. A Unification-Based Specification Exercise </SectionTitle> <Paragraph position="0"> This new approach to binding constraints can be integrated into grammar easily and in a principled manner. In what follows, we outline how these constraints can be specified and handled in a unification-based grammatical framework such as HPSG.</Paragraph> <Paragraph position="1"> 11 This rationale is in line with the insights of Johnson and Klein (1990) concerning the processing of the semantics of nominals.</Paragraph> <Paragraph position="2"> As a proposal for that integration, we designed an extension to the Underspecified Discourse Representation Theory (UDRT) semantics component for HPSG developed by Frank and Reyle (1995). This component is encoded as the value of the feature CONT(ENT), which is now extended with the feature ANAPH(ORA); see (4). This new feature keeps information about the anaphoric potential of the corresponding nominal n: its subfeature ANTEC(EDENTS) keeps a record of how that potential is updated when the anaphor enters a grammatical construction; and its subfeature R(EFERENCE)-MARK(ER) indicates the reference marker of n, to be contributed to the context.</Paragraph> <Paragraph position="3"> Similarly, and still assuming Pollard and Sag's (1994) feature geometry as a starting point, the NONLOC value is also extended with a new feature, BIND(ING), with subfeatures LIST-A, LIST-Z, and LIST-U. These lists provide a specification of the relevant context and correspond to the lists A, Z, and U above. Subfeature LIST-LU is a fourth, auxiliary list for encoding the contribution of local context to the global, nonlocal context.</Paragraph> <Paragraph position="4"> The SYNSEM value of a pronoun, for instance, can now be designed as shown in (4).</Paragraph> <Paragraph position="5"> Given this feature structure, the binding constraint associated with pronouns is specified as the relational constraint principleB. This relational constraint returns list B as the value of ANTEC. It is defined to take (in the first argument) all markers in the discourse context, given in LIST-U value, and remove from them both the local o-commanders of the pronoun (included in the second argument) and the marker corresponding to the pronoun (in the third argument).</Paragraph> <Paragraph position="6"> The SYNSEMs of other anaphors, ruled by Principles A, C, and Z, are similar to the one above.</Paragraph> <Paragraph position="7"> The only difference lies in the relational constraint in the ANTEC value, which encodes the appropriate binding constraint and returns the updated anaphoric potential under the form of list A</Paragraph> <Paragraph position="9"> , respectively, as discussed in the previous section.</Paragraph> <Paragraph position="10"> Turning to the specification of the context (i.e., the values of LIST-A, LIST-Z, LIST-U, and LIST-LU), this is handled by means of a new HPSG principle, which can be termed the Binding Domains Principle. This principle consists of three clauses constraining 13 Binding constraints for nonlexical anaphoric nominals are lexically stated in the corresponding determiners.</Paragraph> <Paragraph position="11"> A constraint for pronominal anaphoric transitivity may also be introduced at the lexical representation of pronouns, by including in the CONDS value in (4) Discourse Representation Computational Linguistics Volume 28, Number 1 signs and their values with respect to these lists of reference markers. Due to space limitations, we illustrate this principle simply by stating Clause I, which constrains LIST-U and LIST-LU.</Paragraph> <Paragraph position="12"> (5) Binding Domains Principle, Clause I a. In every sign, the LIST-LU value is identical to the concatenation of the LIST-LU values of its daughters.</Paragraph> <Paragraph position="13"> b. In a sign of sort discourse, the LIST-LU and LIST-U values are token identical.</Paragraph> <Paragraph position="14"> c. In a non-NP sign, the LIST-U value is token identical to each LIST-U value of its daughters.</Paragraph> <Paragraph position="15"> d. In an NP sign k, i. In Spec-daughter, the LIST-U value is the result of removing the elements of the LIST-A value of Head-daughter from the LIST-U value of k; ii. In Head-daughter, the LIST-U value is the result of removing the value of R-MARK of Spec-daughter from the LIST-U value of k.</Paragraph> <Paragraph position="16"> LIST-LU collects, up to the outermost sign of sort discourse, all the markers contributed by the different NPs for the context. At this sign, they are passed to LIST-U, by means of which they are propagated to every NP. The HPSG ontology was extended with the sort discourse, which corresponds to sequences of sentential signs and at whose signs reference markers from the nonlinguistic context may be introduced in the semantic representation.</Paragraph> <Paragraph position="17"> Subclause (d) is meant to avoid what is known in the literature as the i-within-i effect.</Paragraph> </Section> class="xml-element"></Paper>