<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Epistle to Cangrande through the Lens of Computational Authorship Veri cation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Italy silvia.corbara@isti.cnr.it</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>The Epistle to Cangrande is one of the most debated documents in the production of the Italian poet Dante Alighieri. For more than a hundred years scholars have been debating over its real paternity, whether it should be considered a work by Dante or a malicious forgery by an unnamed author. In this work, we try to address this philological problem through the methodologies of computational authorship veri cation and machine learning, by training a classi er on a dataset of medieval Latin prose texts and by using a set of authorship-related features. Although the project is still in a preliminary phase, the early results seem to con rm the hypothesis of a forgery.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine Learning Authorship Veri cation Digital Humanities Dante Alighieri Medieval Latin</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        have been written is not a trivial problem. On the other hand, others (like [2, pp.
280-1] [12, pp. 67-8]) note that there is a lexical coherence spreading through the
entire EpXIII, and an inner cohesive logic. Additionally, [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] observes that a forger
would have followed more closely Dante Alighieri's prose, and thus the dissimilar
style should be seen paradoxically as a further proof of paternity. Many also note
that the author of EpXIII o ers some non-traditional and potentially controversial
explanations for some exegetical and linguistic issues, which could be the proof of
a prominent author, since a common forger would have probably stayed on more
ordinary, \safer" grounds. For a more comprehensive outline over this authorship
debate, see the analysis by [
        <xref ref-type="bibr" rid="ref2 ref21">2, 21</xref>
        ].
      </p>
      <p>Given this debated and yet unsolved problem, and in order to gain a fresh
perspective over it and thus o er the scholars yet another useful tool for investigation,
this project was set to apply the methodologies and technologies of Computational
Authorship Veri cation to the mystery of EpXIII.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Computational Authorship Veri cation: An Overview</title>
      <p>Generally speaking, Authorship Analysis (AA) can be de ned broadly as \any
attempt to infer the characteristics of the creator of a piece of linguistic data" [13,
p. 238], which includes the author's biographical information (age, gender, mother
tongue, etc.) and writing style (use of pronouns, vocabulary richness, etc.), as well
as his or her identity. The core of this practice, also known as \stylometry", relies
on the idea to identify a certain author not by the artistic value of her/his work,
or the meaning of the concepts proposed within it, but via a measure of her/his
style. Here, \style" is intended as a summary statistic emerging from one or more
numerical features that describe linguistic events present in the written texts, which
are believed to remain more or less constant in one's production and conversely vary
in noticeable fashion across di erent authors [13, p. 241].</p>
      <p>
        These unique stylistic features are also known as \style markers". This de nition
embraces every kind of textual event, as long as it can be counted (hopefully: easily
counted). It is the researcher's task to identify and extract the most discriminative
features for the type of research s/he is dealing with. In particular, scholars started
experimenting with this practice (well before the age of computers) by employing
a single set of features comparable to the linguistic elements studied in classical
philology, such as the frequencies of certain terms or of word and sentence lengths
[
        <xref ref-type="bibr" rid="ref18 ref24">18, 24</xref>
        ]. However, in the late 20th century, starting from the work of Mosteller and
Wallace on the Federalist Papers [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], the practice veered towards employing
several sets of high-frequency features in parallel. Even though this approach captures
textual components of apparently minimal signi cance, this practice has proven
effective in a variety of tasks, since the phenomena involved tend to be out of the
conscious control of the author, hence di cult to modify or imitate. The noted
historian Carlo Ginzburg describes this change in the cultural paradigm in his essay
Clues, calling it the Evidential Paradigm [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>The values of these stylistic features are collectively used as a simpli ed
representations of the respective text, and employed for analyzing its authorship. This
may be done via various methods; usually, these methodologies are classi ed as
similarity-based or machine learning -based. In particular, in the latter class, a
classi er is trained from a number of labelled training examples, using vectors of the
chosen features (the style markers) as representations of the texts of interest; this
enables the machine to leverage the values of the features in the training examples in
order to classify new unlabelled documents into the proper class. These techniques
come from the eld of text classi cation and may be tuned to a variety of subtasks:
the classes may be literary genres, topics, languages, and so on, depending on the
goal of the research. In fact, this is the principle behind many modern applications,
from email-spam detecting to authorship identi cation for forensic cases.</p>
      <p>
        In computational AA, the most popular methods still make use of
similaritybased measures or \classical" machine learning algorithms, such as support vector
machines (SVMs) and logistic regression (LR), even if deep learning algorithms
have sometimes proved more accurate. This trend was also con rmed in the PAN
2018 Author Identi cation shared task [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], where the majority of the systems
presented was based on SVMs. This is due to two di erent reasons: on the one
hand, in some application domains there is a systematic scarcity of annotated data,
which clashes with the fact that deep learning methods typically require very large
training sets; on the other hand, deep learning methodologies notoriously lack on
the explainability side, which could be daunting when the investigation concerns a
case of genuine controversy, and it is indeed desirable that the factors supporting the
conclusion drawn by the system can be properly exhibited [13, p. 307]. These issues
are especially true in the humanities, where the documents available are usually
rather limited in number (as in the case of medieval Latin), and the main objective
of the computational studies is certainly not to replace the professional philologist,
but to support her/his research with supplementary evidence and tools, which then
need to be as explicit as possible. Some examples of AA in the humanities can be
found in [
        <xref ref-type="bibr" rid="ref14 ref23 ref4">4, 14, 23</xref>
        ].
      </p>
      <p>
        Within this eclectic landscape, the problem of EpXIII is an instance of
Authorship Veri cation (AV), a subtask of AA that aims to design methods and techniques
to determine whether a document of unknown or disputed paternity has been
written by a given candidate author. It is thus di erent from Authorship Attribution,
where the goal is to infer, for a document of unknown or disputed paternity, the
most likely author among a nite set of candidate authors [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The veri cation
problem itself is often formulated as a binary classi cation task, where the works
from authors di erent from the candidate are used as negative training examples.
3
      </p>
      <p>AV</p>
    </sec>
    <sec id="sec-3">
      <title>Methods Applied to the Dantean Case</title>
      <p>We approach the problem of the authorship of EpXIII as a supervised binary
classi cation task implemented via linear classi er. In Section 3.1, we give the details
of the system employed for the task, while in Section 3.2 we show the training
corpus we have assembled; nally, in Section 3.3 we list the results of the related
experimentation.
3.1</p>
      <sec id="sec-3-1">
        <title>Classi er and authorial features</title>
        <p>After a few initial tests with LR and SVMs, we decided to employ the former,
since the preliminary experiments on our data had indicated that the two have a
similar level of accuracy, and, unlike SVMs, the output of LR admits a probabilistic
interpretation, i.e., it can be interpreted as the (\posterior") probability that the
document belongs to the class. In particular, after the training phase, the algorithm
takes the independent variables (the feature values for the anonymous document)
as an input, and computes a value within the logistic function - thus in the interval
(0; 1) - as an output. The output is the probability, given the variables, for a certain
outcome (belonging to a class, in this case to the Dante class) to happen. See [5,
pp. 205-6] for a more complete description of LR.</p>
        <p>
          As already detailed in Section 2, computational methods for AV represent the
textual document as a vector of variables representing some linguistic
phenomena. To this aim, we have selected a combination of various feature types, since
this approach usually assures better performances while dealing with multivariate
methods [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Each feature type has been shown to be e ective to some extent in
similar authorship-related tasks. The resulting set of features is composed as follows:
{ Character n-grams (n 2 f3; 4; 5g)
{ Word n-grams (n 2 f1; 2g)
{ Function words (from a list of 74 Latin function words)
{ Verbal endings (from a list of 245 regular Latin verbal endings)
{ Word lengths (from 1 up to 23 characters)
{ Sentence lengths (from 3 up to 70 words)
We subject the features resulting in a sparse distribution to feature selection (via
Chi-square) and feature weighting (via TF-IDF).
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Assembling the corpus</title>
        <p>As already explained in Section 1, EpXIII consists of two sections that are very
distinct for purpose and style; moreover, many scholars theorize a di erent hand
for each of them. Hence, it seemed imperative to follow the traditional division
and split the AV problem into two sub-problems, training a speci c classi er for
the paragraphs 1-13 (from now on: EpXIII(I)) and another one for the remaining
paragraphs 14-90 (from now on: EpXIII(II)).</p>
        <p>In order to o er to the classi er an adequate representation of the two authorial
classes (Dante and NotDante), we created two corpora of medieval Latin texts by
collecting documents which can be considered, linguistically and stylistically speaking,
close to the related portion of EpXIII. Understandably, the positive class (Dante)
is represented by the works unquestionably ascribed to Dante: the other 12 letters
for EpXIII(I), De Vulgari Eloquentia and Monarchia for EpXIII(II). Conversely, for
the negative class (NotDante), two sets of texts of coeval Latin authors have been
assembled: a number of epistles from various authors (EpXIII(I)) and a collection
of di erent textual works, mostly literary comments and treatises (EpXIII(II)). All
the documents are dated between the 13th and the 15th century. Additionally, we
subject the training documents to a segmentation policy in order to further increase
the number of training samples. Using a large number of training segments for each
author when only few long texts are available is a common practice in the eld [17,
p. 514]. The nal result of this procedure is shown in Table 1.
In order to determine the degree of reliability of the classi er, and hence establish
the trustworthiness of the classi cation hypotheses it generates, we subject the
algorithm to a \leave-one-out" validation test; more speci cally, we create an AV
classi er for each author that has more than one positive sample in the corpus,
setting the author as the positive class. In particular, as to recreate the condition
of the actual classi cation of EpXIII(I) and EpXIII(II) and to avoid overlapping
between test and training samples, we only test the full original documents and,
when the document t is used as test, all the segments derived from t are excluded
from the training. The results of the validation test are shown in Table 2; we use
Macro-F1 and Micro-F1 as evaluation measures. As it can be seen, the classi ers
that have been trained, and especially the one for EpXIII(I), obtain a good level of
accuracy, in line with other state-of-the-art methods.
Finally, the classi cation hypotheses are shown in Table 3, along with the F1 values
for the class Dante. As it can be seen, the classi ers consider both portions of EpXIII
written by someone other than Dante, with a slightly lower probability, and thus
higher con dence in the negative attribution, for EpXIII(I). Considering the speci c
accuracy level obtained in the validation, while the value for EpXIII(I) is satisfying,
the same cannot be said about the value for EpXIII(II); the classi er is penalized
for not attributing Monarchia to Dante, while it correctly classi es 26 out of the 28
negative samples.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Hypothesis Pr(Dante) F1(Dante)</title>
      <p>EpXIII(I)
EpXIII(II)</p>
      <p>NotDante
NotDante
Henceforth, the hypotheses computed seem to align with the theory that the
entire EpXIII was the production of a malicious forger. Nevertheless, the evaluation
presented here should not be considered conclusive: in future developments we plan
to de ne some improvements to the system, such as an expansion of the training
corpus and of the feature set exploited, as well as experimenting with some di erent
visualization techniques.
4</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>In this project, we explore a case of AV applied to Latin prose, in order to infer the
real author of the Epistle to Cangrande, a letter of dubious Dantean paternity, via
computational and quantitative methods.</p>
      <p>The classi cation hypotheses we reach seem to con rm the forgery thesis.
However, the current stage of the research is still preliminary. It is important to underline
that our goal is not to reach some de nitive answer for the philological dilemma;
especially for this kind of problems, where the truth is debated even among
specialists, the hypothesis given by a classi cation algorithm can not, and should not aim
to, be nal. Nevertheless, we are eager to explore other methodological possibilities
that could determine an improvement in the system accuracy, and generally create
a more accessible and solid tool that can aid the study of the researcher, not replace
it.</p>
      <p>
        Acknowledgments. The research described in this paper is part of the work carried
out by the author for her MSc thesis in Digital Humanities at the University of
Pisa (supervisors: Alejandro Moreo, Fabrizio Sebastiani, Mirko Tavoni), discussed
in February 2019 and also reported in [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ascoli</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          :
          <article-title>Access to authority: Dante in the Epistle to Cangrande</article-title>
          . In: Baranski,
          <string-name>
            <surname>Z.G</surname>
          </string-name>
          . (ed.)
          <source>Seminario Dantesco Internazionale / International Dante Seminar 1</source>
          , pp.
          <volume>309</volume>
          {
          <fpage>52</fpage>
          .
          <string-name>
            <surname>Le</surname>
            <given-names>Lettere</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Firenze</surname>
          </string-name>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Azzetta</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Nuova edizione commentata delle opere di Dante</article-title>
          , vol.
          <volume>5</volume>
          , chap.
          <source>Epistola XIII</source>
          , pp.
          <volume>271</volume>
          {
          <fpage>487</fpage>
          .
          <string-name>
            <surname>Salerno</surname>
            <given-names>Editrice</given-names>
          </string-name>
          , Rome, Italy (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Baranski</surname>
            ,
            <given-names>Z.G.</given-names>
          </string-name>
          :
          <article-title>Comed a. Notes on Dante, the Epistle to Cangrande and medieval comedy</article-title>
          .
          <source>Lectura Dantis (8)</source>
          ,
          <volume>26</volume>
          {
          <fpage>55</fpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Binongo</surname>
            ,
            <given-names>J.N.G.</given-names>
          </string-name>
          :
          <article-title>Who wrote the 15th Book of Oz? An application of multivariate analysis to authorship attribution</article-title>
          .
          <source>Chance</source>
          <volume>16</volume>
          (
          <issue>2</issue>
          ),
          <volume>9</volume>
          {
          <fpage>17</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bishop</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          :
          <source>Pattern Recognition and Machine Learning</source>
          . Springer, New York (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Casadei</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Sempre contro l'autenticita dell'Epistola a Cangrande</article-title>
          .
          <source>Studi danteschi LXXXI</source>
          ,
          <volume>215</volume>
          {
          <fpage>46</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Corbara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The Epistle to Cangrande through the Lens of Computational Authorship Veri cation</article-title>
          .
          <source>Master's thesis</source>
          , Department of Philology, Literature, and Linguistics, University of Pisa, Pisa,
          <string-name>
            <surname>IT</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Corbara</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moreo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sebastiani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tavoni</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>L'epistola a Cangrande al vaglio della computational authorship veri cation: Risultati preliminari (con una postilla sulla cosiddetta \XIV Epistola di Dante Alighieri")</article-title>
          . In: Casadei,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (ed.)
          <article-title>Atti del Seminario \Nuove Inchieste sull'Epistola a Cangrande"</article-title>
          . Pisa University Press, Pisa,
          <string-name>
            <surname>IT</surname>
          </string-name>
          (
          <year>2019</year>
          ), forthcoming
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ginzburg</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Clues</surname>
          </string-name>
          ,
          <article-title>Myths and the Historical Method, chap</article-title>
          .
          <source>Clues: Roots of an Evidential Paradigm</source>
          , pp.
          <volume>96</volume>
          {
          <fpage>125</fpage>
          . Johns Hopkins University Press, Baltimore (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Grieve</surname>
          </string-name>
          , J.:
          <article-title>Quantitative authorship attribution: An evaluation of techniques</article-title>
          .
          <source>Literary and Linguistic Computing (22)</source>
          ,
          <volume>251</volume>
          {
          <fpage>70</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hall</surname>
            ,
            <given-names>R.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sowell</surname>
          </string-name>
          , M.U.:
          <article-title>Cursus in the Can Grande Epistle: A forger shows his hand? Lectura Dantis (5</article-title>
          ),
          <volume>89</volume>
          {
          <fpage>104</fpage>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Jenaro-MacLennan</surname>
          </string-name>
          , L.:
          <article-title>The Trecento commentaries on the Divina Commedia and the Epistle to Cangrande</article-title>
          . Clarendon Press, Oxford (
          <year>1974</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Juola</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Authorship attribution</article-title>
          .
          <source>Foundations and Trends in Information Retrieval</source>
          <volume>1</volume>
          (
          <issue>3</issue>
          ),
          <volume>233</volume>
          {
          <fpage>334</fpage>
          (
          <year>2006</year>
          ). https://doi.org/10.1561/1500000005
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kabala</surname>
          </string-name>
          , J.:
          <article-title>Computational authorship attribution in medieval Latin corpora: The case of the Monk of Lido (ca</article-title>
          .
          <volume>1101</volume>
          {08) and Gallus Anonymous (ca.
          <volume>1113</volume>
          {17).
          <source>Language Resources</source>
          and Evaluation pp.
          <volume>1</volume>
          {
          <issue>32</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kestemont</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tschuggnall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Specht</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potthast</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Overview of the Author Identi cation Task at PAN-2018: Crossdomain authorship attribution and style change detection</article-title>
          .
          <source>Working Notes Papers of the CLEF 2018 Evaluation</source>
          Labs pp.
          <volume>1</volume>
          {
          <issue>25</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Argamon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Computational methods in authorship attribution</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <issue>1</issue>
          ),
          <volume>9</volume>
          {
          <fpage>26</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Luyckx</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Authorship attribution and veri cation with many authors and limited data</article-title>
          .
          <source>In: Proceedings of the 22nd International Conference on Computational Linguistics</source>
          . pp.
          <volume>513</volume>
          {
          <fpage>20</fpage>
          .
          <string-name>
            <surname>Manchester</surname>
          </string-name>
          , UK (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mendenhall</surname>
          </string-name>
          , T.C.:
          <article-title>The Characteristic Curves of Composition</article-title>
          .
          <source>Science (9)</source>
          ,
          <volume>237</volume>
          {
          <fpage>249</fpage>
          (
          <year>1887</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Mosteller</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wallace</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Inference and Disputed Authorship: The Federalist</article-title>
          .
          <source>CSLI Publications</source>
          , Stanford,
          <year>2007</year>
          edn. (
          <year>1964</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Il punto sull'Epistola a Cangrande. In: \Lecturae" e altri studi danteschi</article-title>
          , pp.
          <volume>205</volume>
          {
          <fpage>25</fpage>
          .
          <string-name>
            <surname>Le</surname>
            <given-names>Lettere</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Firenze</surname>
          </string-name>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Sasso</surname>
          </string-name>
          , G.:
          <article-title>Sull'Epistola a Cangrande</article-title>
          .
          <source>La Cultura (3)</source>
          ,
          <volume>359</volume>
          {
          <fpage>446</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Scolari</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Note ad alcuni luoghi delli primi cinque canti della Divina Commedia</article-title>
          . Tip. Picotti,
          <string-name>
            <surname>Venezia</surname>
          </string-name>
          (
          <year>1819</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Tuccinardi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>An application of a pro le-based method for authorship veri cation: Investigating the authenticity of Pliny the Younger's letter to Trajan concerning the Christians</article-title>
          .
          <source>Digital Scholarship in the Humanities</source>
          <volume>32</volume>
          (
          <issue>2</issue>
          ),
          <volume>435</volume>
          {
          <fpage>47</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Yule</surname>
          </string-name>
          , G.U.:
          <article-title>On sentence length as a statistical characteristic of style in prose with application to two cases of disputed authorship</article-title>
          .
          <source>Biometrika (30)</source>
          ,
          <volume>363</volume>
          {
          <fpage>90</fpage>
          (
          <year>1938</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>