Chapter
Licensed
Unlicensed
Requires Authentication
2. A Review of Response Tokens
-
Rod Gardner
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Prelim pages i
- Table of contents v
- Acknowledgements ix
- Transcription Notation xi
- 1. Introduction 1
- 2. A Review of Response Tokens 13
- 3. Five types of Mm : The non-response tokens 65
- 4. From continuer to acknowledgement token: Mm as a token between Mm hm and Yeah 99
- 5. The Weakness of Mm : Topic disalignment and zero projection 133
- 6. Intonation contour and the use of Mm 187
- 7. Summary and future directions 251
- Notes 257
- Bibliography 269
Chapters in this book
- Prelim pages i
- Table of contents v
- Acknowledgements ix
- Transcription Notation xi
- 1. Introduction 1
- 2. A Review of Response Tokens 13
- 3. Five types of Mm : The non-response tokens 65
- 4. From continuer to acknowledgement token: Mm as a token between Mm hm and Yeah 99
- 5. The Weakness of Mm : Topic disalignment and zero projection 133
- 6. Intonation contour and the use of Mm 187
- 7. Summary and future directions 251
- Notes 257
- Bibliography 269