File Information
File: 05-lr/acl_arc_1_sum/cleansed_text/xml_by_section/abstr/82/c82-2062_abstr.xml
Size: 6,102 bytes
Last Modified: 2025-10-06 13:46:02
<?xml version="1.0" standalone="yes"?> <Paper uid="C82-2062"> <Title>RECURSIVE FUNCTIONS P0R COMPUTATION OF NATURAL SECRET LANGUAGES</Title> <Section position="1" start_page="0" end_page="0" type="abstr"> <SectionTitle> RECURSIVE FUNCTIONS P0R COMPUTATION OF NATURAL SECRET LANGUAGES </SectionTitle> <Paragraph position="0"> The paper describes a system called RENTTU, a collection of functions for computation of transformations from natural languages into several types of natural secret languages such as Pig Latin etc. By a natural secret language, sometimes called cant in English or children's play language we mean s natural language transformation, which preserves important morpho- and phonological qualities of the underlying source language. Such languages seem to make up a rich culture, which is a mixture of lore, linguistics, cryptology, and - if you wish - of computing.</Paragraph> <Paragraph position="1"> Today the phenomenon lies probably nearest to folklore and children's culture, but in earlier times they have, and perhaps still do constitute important skills of the lower and underground world. In the Middle Ages they were widely used among ~ beggars, tramps, pedlars, vagabonds, thieves etc. To Europe they seem to have come through the Bysantitun from the East, where they still today continue to live an active life.</Paragraph> <Paragraph position="2"> As a linguistic phenomenon they seem to be universal and appear in some form and extent practically in all languages and cultures. Yet it seems that they have attracted little attention from the part of linguistics or cryptology. Most of the treatments seem to fall within SOCtOlln~Aistics or folklore. As cryptological methods the natural secret l~age - 251 transformations are fairly simple and their value barely extends beyond the children's playground. Though interestingly enough they seem to well meet five out of the six so called Kerckhoff's criteria often used to assess usability of cryptographio methods and systems.</Paragraph> <Paragraph position="3"> A~Vhow, they work well and fulfill their purpose in situations for which they are aimed for: exchange of oral messages in real time in a situation, where the unintended are present, Since the message does not leave permanent trace, it is not possible to examine it afterwards.</Paragraph> <Paragraph position="4"> For linguistic research they can be valuable in that they exhibit some phenomena and processes on the morpho- and phonologlcal levels that can serve as a framework for extra-linguistic experimentation, From computing and programming point of view the sub-Ject is of definite 'interest, since it involves nontrIvial morpho- and phonological recognition, context conditions and transformations, which offer an instructive excercise in linguistic progrsmming.</Paragraph> <Paragraph position="5"> Several types of families of secret languages, or rather classes of language transformations, are identified. The typology can be categorized as follows: I. Syllabic transformations, which may involve deletions, replications, insertions or substitutions of syllables or phonemic elements under certain contextual conditions.</Paragraph> <Paragraph position="6"> 2. Transformations that involve syllable permutations, possibly intermixed with transformations of the above type. 3e Types of transformations, which involve nonsyllabic splitt- null ing of words into segments that ere interchanged with segments of a given key word or with those of the next word.</Paragraph> <Paragraph position="7"> Finally some hybrid types occur, which combine features of various types in one language.</Paragraph> <Paragraph position="9"> As an example a detailed analysis is given of the Kontti language, which is widely known in Finland and belongs to the third category. In Kontti the split point is determined by a number of rules, ~hich are conditioned by some metric and prosodic features together with the vowel consonant structure of the two words. The transformations involve both durational and harmonic accommodations to preserve the metric qualities and to meet the vowel harmony laws in Pinnish.</Paragraph> <Paragraph position="10"> Most delicate rules and conditions are found in splitting criteria concerning various kinds of diphtong, vowel pair and long vowel combinations, in which the Finnish language is fairly rich. Some cases take real ear for the l~age to be correctly resolved, but all rules and conditions can, as soon as they have become clearly established, be programned. Thus a full competence of the Konnti language can be implemented on the computer.</Paragraph> <Paragraph position="11"> Prom the linguistic point of view the transformations are interesting in the sense that they fully preserve the phono- and morphological weli-formedness of the underlying language, i.e. the resulting words and word forms could well be real substance of the source language.</Paragraph> <Paragraph position="12"> Another notable feature is that the reverse transformation based on the same set and order of rules restores the original words and word forms except for certain degenerate cases, which involve neutral vowels that are incapable of * receiving information about harmonic quality when it is char~ed.</Paragraph> <Paragraph position="13"> Presently the RENTTU system accounts for some 20 languages known in Finland including some based on Swedish. It consists of a collection of some 50 neat LISP functions written in a purely functional style. The functional style of programming is not only well suited or applicable to the problem, but also clearly reflects the nature of both the - 253 linguPSstie and the computational aspects of the processes involved. It also results in elegant and concise function definitions. The author would be grateful of any material or observations concerning such languages in other countries.</Paragraph> <Paragraph position="14"> The system has been implemented in INTERLIEP on the TeKoLa DECSystem-20 and is available as a listing from the author on request.</Paragraph> </Section> class="xml-element"></Paper>