<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparing Unsupervised Algorithms to Construct Argument Graphs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mirko Lenz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lorik Dumani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Premtim Sahitaj</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Trier University</institution>
          ,
          <addr-line>Universitätsring 15, 54296 Trier</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Computational argumentation has gained considerable attention in recent years. Various areas have been addressed, such as extracting arguments from natural language texts into a structured form in order to store them in an argument base, determining stances for arguments with respect to topics, determination of inferences from statements, and much more. After so much progress has been made in the isolated tasks, in this paper we address the next level and aim to advance the automatic generation of argument graphs. To this end, we investigate various unsupervised methods for constructing the graphs and measure the performance with diferent metrics on three diferent datasets. Our implementation is publicly available on GitHub under the permissive MIT license.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;argument mining</kwd>
        <kwd>computational argumentation</kwd>
        <kwd>clustering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In this paper, we explore several unsupervised methods to create argument graphs and
evaluate these on three datasets which are completely diferent in structure as well as in size
and domain. Since our code is publicly available on GitHub under the permissive MIT license,
interested researchers can build upon our work and use these methods as a baseline.1 Each of
them expects a set of ADUs as input to produce a fully connected tree structure where each
node is an ADU. As such, we can ignore the original text of an argument—which may not
always be available anyway—and leave the detection of ADUs to future work. We assume that
each ADU supports/attacks exactly one other ADU and that there exists one ADU acting as the
root of an argument graph—the so-called major claim.</p>
      <p>Our contributions are the following: (i) Seven algorithms for constructing argument graphs
in pseudocode together with a reference implementation in Python. (ii) A set of metrics
for evaluating our argument graphs each focused on diferent aspects. (iii) An experimental
evaluation on three diverse datasets that may be used as a baseline for future work.</p>
      <p>Next, we discuss related work in section 2. In particular, we address similarities and diferences
to our work. In section 3 we describe the seven methods we use utilizing pseudo code and in
section 4 we discuss the evaluation setup and results. In section 5 we conclude the paper and
provide starting points for future work.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Foundations and Related Work</title>
      <p>
        The general approach for argument graph construction in the literature is based on the utilization
of information extracted in the previous tasks. Following the concept of claim-premise model [
        <xref ref-type="bibr" rid="ref7 ref8">7,
8</xref>
        ], the approach is to classify potentially argumentative text spans as either claim, premise,
major claim, or non-argumentative [
        <xref ref-type="bibr" rid="ref10 ref3 ref9">3, 9, 10</xref>
        ]. The claim depicts a potentially controversial
viewpoint. The arguer tries to support it with premises, which serve as evidence. Frequently,
there is also a core viewpoint in texts, the major claim. Each of these three terms is a certain
kind of an ADU—the smallest unit of argumentation introduced earlier.
      </p>
      <p>
        Stab and Gurevych [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] describe an argument graph annotation process specifically for the
Persuasive Essays dataset because of their structured constituency. Arguments are defined as a
single claim with several premises (one-claim approach). A paragraph can consist of multiple
arguments. Premises are allowed to be connected only to a claim of the same paragraph, but not
to claims outside of this defined space. All claims are linked to the major claim. An exemplary
graph from this dataset is depicted in fig. 1. It will also be part of our experimental evaluation
in section 4.
      </p>
      <p>
        Similar approaches are implemented by Persing and Ng [
        <xref ref-type="bibr" rid="ref3 ref9">3, 9</xref>
        ] while additional rules are
exploited and utilized for the graph construction process. As part of a larger argument mining
pipeline, Lenz et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] describe and evaluate three graph construction approaches. Due to
the larger scope of their work, they were able to utilize additional information during graph
construction—for instance, the probability that one ADU is supported/attacked by another one.
An interesting approach to the graph construction task has been published by Gemechu and
Reed [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] where the authors identify diferent functional components (i.e., concepts, aspects,
1https://github.com/recap-utr/argmining-clustering
–––––––––––––––––––––––––––––
–––––––
––––––
––––––––
––––––
–––––––––––
–––––
–––––––––
–––––––
–––––
––––– ––––
–––––––
–––––––
–––––––––
––––
––
––––
–––
–––
–––––
–––
––––– –––
–––––––
– ––––––––––––
–––––––––
––––––––––
      </p>
      <p>––––––
––––––––––––––––––––
–––––––
–––––––
–––––––</p>
      <p>
        –––––––
––––––––––––
–––
–––– ––
––––
––––
––––
opinions) from argumentative statements and utilize these features to connect argument
structures into the final argument graph. We refer the interested reader to the surveys conducted by
Lawrence and Reed [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as well as Schaefer and Stede [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for more details. The methods that we
introduce in this paper follow the work of Lenz et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and can be diferentiated from other
research by the fact that we aim to avoid domain-specific construction rules, e.g. restricting the
connection of arguments by their (predicted) classification type.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Algorithms</title>
      <p>In this section we will introduce our algorithms for constructing argument graphs from a
given set of ADUs. In addition to the aforementioned implementations in Python (used for our
evaluation in section 4), we also provide pseudocode for each of them to aid understanding
implementing them in other languages.</p>
      <p>Before diving in, we will first define some common symbols used in the pseudocode. All
algorithms are passed a set of ADUs  = {1, . . . , } where each  ∈  is string. We
denote the ADU being major claim of an argument graph as mc ∈ . Each algorithm returns
this major claim mc together with a list of relations  = {1, . . . , }. Each relation  =
(prem, claim) ∈  ×  is a tuple containing a premise prem that is connected to a claim claim
via an inference. Some of our proposed algorithms make use of clustering methods where
 = {1, . . . , } denotes the set of clusters  that forms a partition of . Each cluster  ∈ 
is defined as a set of ADUs (i.e.,  ⊆ ).</p>
      <p>We also use some functions that are crucial for most of the algorithms. Each ADU  ∈  has
a feature vector that can be accessed using the function vec() and is defined via a embedding
model. This vector space makes it possible to compute a centroid  for each cluster  at its
center point. These vectors are also used to compute the cosine similarity between ADUs—as
an abbreviation, we use the function sim(,  ) = cos(vec(), vec( )).</p>
      <p>Our algorithms are able to predict the central major claim mc without any further information.
In addition, it is also possible to set mc manually. For details on that matter we refer the
interested reader to our reference implementation mentioned above.</p>
      <p>Agglomerative With algorithm 3.1, we present a graph construction strategy that is based
on agglomerative clustering and retains its hierarchical structures throughout the construction
prem
Algorithm 3.1 Agglomerative-clustering-based algorithm for constructing argument graphs.
 ← {{
 ← ∅
while || &gt; 1 do
,  ← ifnd the two most similar clusters in  ◁ Ordered s.t. || &lt; | |
prem ← root of smaller cluster []
merge ← [] root ADU of larger cluster
claim ← ADU of larger cluster  ∈  having the highest similarity to premise
delete entries ,  of sets  and 
 ←  ∪ {(prem, claim)}
 ←  ∪ Merge(Clusters ,  )
 ←  ∪ {merge}
mc ← root node of relations 
return , mc
process. The graph construction strategy utilizes a selection metric based on cosine similarity
between embedding representations of ADUs to mimic an hypothetical concept of relatedness.
The hypothesis follows the idea that more similar ADUs have a higher chance to target the
same topics and thus provide related argumentative information. Each of the  argumentative
components starts within its own cluster (algorithm 3.1). Clusters are iteratively merged on the
basis of a given criterion—in our case, average linkage. From the pair of most similar clusters,
we identify the smaller and larger cluster. For the purpose of constructing more dense argument
graphs structures, we consider the size of the clusters to be merged. The smaller cluster proposes
the root of its respective sub-graph as premise (algorithm 3.1). Then, from the larger cluster we
identify the ADU that maximizes the similarity to the previously identified premise and denote
it as claim. Finally, we draw a relation from premise to claim (algorithm 3.1) which connects
the sub-graphs of the two respective clusters. We update our lists and continue the iteration.
Merging is repeated a total of  − 1 times and per step only two clusters are merged until all
ADUs are in the same cluster. Finally, we are left with a single connected argument graph.
Density Algorithm 3.2 is a cluster-based approach that uses Hdbscan [13, 14] internally.
Hdbscan is optimized for scenarios with a high density of data points as well as noisy data—both
of which are relevant for embeddings of natural language texts. First, the underlying algorithm
is run (algorithm 3.2) to construct the hierarchical/tree-based cluster structure. The following
steps are diferent for natural clusters—that is, a cluster containing actual ADUs—and synthetic
clusters—that is, a cluster with a single element that is not part of the set of ADUs  and thus
only created to allow nesting of other clusters. In the former case (algorithm 3.2), we define the
claim to be the ADU having the highest similarity to all others and create relations between it
and the remaining premises. In the latter case, we first need to resolve connections between two
synthetic clusters that have no natural cluster as a direct child. More specifically, this means
9
mc ← claim</p>
      <p>∪ {(prem, claim)} for all prem ∈ ′
 ←
contract connections between two synthetic clusters having no natural clusters
for all synthetic clusters synt ∈ tree do ◁ Now, we can connect the nested clusters
 ←  ∪ {(claim ofnat, claim ofsynt)}
return , mc
that we remove two relations from the hierarchical cluster structure tree and replace it with a
single relation (algorithm 3.2). We then can continue by connecting the claims of the synthetic
clusters to the claims of the natural clusters (algorithm 3.2).</p>
      <p>Divide The main idea behind algorithm 3.3 is to divide it into smaller subproblems, solve
them individually, and aggregate these solutions later on—the so-called divide and conquer
approach [15]. More specifically, we use a relatively straightforward clustering algorithm—
Means [16]—to divide the set of ADUs into smaller chunks (algorithm 3.3). This procedure
is recursively executed until there are at most leaf ADUs in a cluster (algorithm 3.3). This
hyperparameter may be set to an arbitrary value, but in our experiments, we set it to 3 since
most argumentation schemes [17] are composed of one claim and two premises. Within each
cluster, we select the ADU being most similar to all remaining ones to be the claim, the others are
used as premises for that claim. The -Means algorithm expects a fixed number  corresponding
to the number of clusters that shall be created. We run the algorithm using a range of diferent
’s and utilize the well-known silhouette score [18] to determine the optimal number of clusters.
In order to limit the computational overhead of this approach in some extent, we restrict the
maximum value for  to half the number of available ADUs. At the end, we receive one argument
graph where each branch corresponds to a recursive function call.</p>
      <p>
        Flat Algorithm 3.4 is mainly implemented as a baseline/comparison algorithm and is
borrowed from Lenz et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. First, the major claim is identified using the same heuristic as for the
algorithm Sim (algorithm 3.4). Then, all remaining ADUs are directly connected to the major
claim, resulting in a graph with only two levels (algorithm 3.4).
      </p>
      <p>Order The idea of algorithm 3.5 is that we sort ADUs based on their similarity to the major
claim and process them in that order with some degree of freedom. This uses the assumption
that ADUs being similar to the major claim should be connected to it as claims. More precisely,
Algorithm 3.3 Divide-based algorithm for constructing argument graphs.</p>
      <p>1 procedure Divide(ADUs , Centroid  ←
3)</p>
      <p>NULL, Maximum number of leaf nodes leaf ←
 ← ∅
if  = NULL then</p>
      <p>← arithmetic mean of vec() for all  ∈ 
claim ←  ∈  having the highest similarity to all other ADUs
 ←  ∖ {claim}
if || ≤ leaf then
return  × { claim}, claim</p>
      <p>◁ Termination criterion for recursive calls
◁ Connect all remaining ADUs to the claim claim
min ← 2 ◁ We need at least two clusters . . .
max ← max(|| ÷ 2, min) + 1 ◁ . . . and at most half the number of ADUs
opt ← value of  ∈ [min, max] resulting in the highest silhouette score
for all centroids ′ ∈ KMeans(, opt) do
′ ← subset of  where each  ∈  is assigned to centroid ′
′, ′claim ← Divide(′, ′) ◁ Call function on subset of ADUs
 ←  ∪ ′ ∪ {(′claim, claim)}
return , claim
Algorithm 3.4 Flat algorithm for constructing argument graphs.</p>
      <p>1 procedure Flat(ADUs )
2  ← ∅
3 mc ←  ∈  having the highest similarity to all other ADUs
4 for all  ∈  ∖ {mc} do
5  ←  ∪ {(, mc)}
6 return , mc
we select the candidate in the -neighborhood (algorithm 3.5) as premise that maximizes the
similarity between claim and premise for each queued claim. The selected premise is then
removed from the queue and connected to the claim. Finally, we update the variables and
continue the iteration until all ADUs are connected to one graph structure. The approach is
applied TOP-DOWN and is viable from any arbitrary major claim position.</p>
      <p>Random The purpose of algorithm 3.6 is to serve as an evaluation baseline. We do not
consider similarities at all, but follow a completely random approach. Consequently, the major
claim is chosen randomly (algorithm 3.6). For all remaining ADUS, we randomly select one that
is not yet assigned together with one that is part of the graph (algorithm 3.6).
Sim Algorithm 3.7 may be viewed as a more simplistic version of Order. In essence, we leave
out the sorting step of ADUs to the major claim. We start by selecting the ADU having the
highest similarity to all others as the major claim (algorithm 3.7). Then, we iterate over the
Algorithm 3.5 Ordering-based algorithm for constructing argument graphs.
′ ← { mc}
while || &gt; 0 do</p>
      <p>prem, claim ←
pair of ADUs in  × ′ having the highest similarity
◁ s.t. Constraint(prem, claim) holds
Algorithm 3.6 Random algorithm for constructing argument graphs.</p>
      <p>1 procedure Random(ADUs )
2  ← ∅
3 mc ← random()
4  ←  ∖ {mc} , ′ ← { mc}
5 while || &gt; 0 do
6 prem, claim ←
7  ←  ∪ {(prem, claim)}
8  ←  ∖ {prem} , ′ ←
9 return , mc
random( × ′)</p>
      <p>′ ∪ {prem}
remaining ADUs (algorithm 3.7) and compute the similarity between all ADUs that are not part
of the graph to the ones already added by constructing the cross product of the sets  and ′
(algorithm 3.7). A new relation is then created between the two ADUs selected in the previous
step (algorithm 3.7) until all ADUs are connected.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Evaluation</title>
      <p>Having presented our proposed algorithms for constructing argument graphs, we will now
conduct an experimental evaluation with the goal of discussing the advantages as well as the
drawbacks of them. We will briefly describe our experimental setup, present the results, and
discuss them afterwards.</p>
      <p>Algorithm 3.7 Similarity-based algorithm for constructing argument graphs.
prem, claim ←
 ←  ∪ {(prem, claim)}
 ←  ∖ {prem}
′ ← ′ ∪ {prem}</p>
      <p>pair of ADUs in  × ′ having the highest similarity
11</p>
      <p>return , mc</p>
      <sec id="sec-4-1">
        <title>4.1. Datasets</title>
        <p>
          In order to obtain meaningful results, we evaluated our algorithms on a total of three datasets.
The first is the Microtexts dataset from Peldszus and Stede [19] as ofered by the AIFdb project. 2
This comprises a total of 110 argument graphs, each containing 4 ADUs on average. The second
dataset by Stab and Gurevych [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] includes a total of 402 persuasive essays. Herein, the structure
is more complex than for the Microtexts because, as already described in section 2, they consist
of three levels, namely the major claim level, the claim level, and the premise level. The average
number of ADUs per graph here is 14. The last dataset is a subset of the Kialo dataset containing
all graphs obtained by Lenz et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] that do not exceed a maximum size of 100 KB and is once
again more complex, comprising a total of 90 argument graphs with an average of 41 ADUs per
graph.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Metrics</title>
        <p>
          As measures for graphs yield diferent scores depending on the goal, we use multiple:
1. The duration ms (measued in ms) needed to reconstruct the graph.
2. The graph edit similarity simedit that computes the number edit of operations needed to
transform one graph to another.3 We transform this distedit to a similarity score in [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ]
by computing
simedit(1, 2) = 1 −
distedit(1, 2)
distmax(1, 2)
(1)
with distmax denoting the maximum number of edit operations—that is, removing every
element of one graph and adding all elements of the other. In our paper, the nodes are
identical, meaning that edit operations only operate on edges.
2http://corpora.aifdb.org/Microtext
3We utilize the library graphkit-learn: https://github.com/jajupmochi/graphkit-learn
3. The Jaccard similarity sim assesses the number of correctly predicted edges as
sim (1, 2) =  (︀ edges(1), edges(2)︀)
with edges() being the set of edges of argument graph  and  being the Jaccard index
that for the two sets ,  is defined as [20]
4. The major claim agreement simmc is a binary metric that is defined as
 (, ) = | ∩ | .
        </p>
        <p>| ∪ |
simmc(1, 2) =
{︃1, if mc(1) = mc(2),
0, otherwise.</p>
        <p>(2)
(3)
(4)
(5)
(6)
(7)</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Implementation Notes</title>
        <p>We implemented the project with Python4 and seeded random states with the integer 0 to
get deterministic results. We also created a Docker container that makes it straightforward
to reproduce our results. For the computation of the embeddings we use the popular library
spaCy. We conduct experiments using the standard model en_core_web_lg based on plain
word embeddings as well as the more advanced en_core_web_trf utilizing transformer-based
embeddings.5 To parse the argument graph corpora, we utilize the arguebuf library [22].</p>
        <p>with mc() being the major claim of argument graph .
5. The metric simdepth is based on the average tree depth [21] that is a visual indicator
whether the vertical structure of two graphs overlaps. It is defined as
simdepth(1, 2) = 1 −</p>
        <p>|depth(1) − depth(2)|
max(depth(1), depth(2))
with depth() denoting the average tree depth of an argument graph .
6. Similar to simdepth, the metric simbreadth functions as a visual indicator of a graph’s
horizontal structure. We determine the mean average error of the number of nodes each
graph has on each level and define the operators level() for retrieving the number of
nodes on level  of argument graph  as well as levels() for determining the total levels
of graph . Using  = max(levels(1), levels(2)) and the equation
we can now define simdepth as</p>
        <p>distbreadth(1, 2) = ∑︁ |level(1) − level(2)| ,</p>
        <p>=1
simbreadth(1, 2) = 1 −</p>
        <p>distbreadth(1, 2)
∑︀le=v1els(1) level(1)
s
t
x
e
t
o
r
c
i
M
s
y
a
s
s
E
o
l
a
i
K</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Results</title>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Case Study</title>
        <p>Since the creation of these rather complex graph structures is quite subjective [23], quantitative
results as shown in table 1 only tell a part of the story. To complement our findings, fig. 2 shows
4https://github.com/recap-utr/argmining-clustering
5https://spacy.io/
(e.g., Density) that still look rather similar to the original.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Future Work</title>
      <p>In this paper, we have successfully implemented a series of unsupervised algorithms for
constructing highly structured argument graphs from an unordered set of ADUs. In addition, we
introduced metrics that assess diferent properties of the resulting graphs and provide a
comprehensive numerical view on the results. Lastly, we have demonstrated that our approaches
create vastly diferent graphs from the same input data. The construction of argument graphs
still is a rather subjective topic where even humans may not share the same opinion. Thus, the
least our algorithms provide is a diferent perspective on the internal structure of an argument.
We consider Density to be the most promising algorithm as it produces rather consistent
result even for vastly diferent corpora. In future work it may be worth investigating whether
the availability of multiple argument graphs of the same source has a positive impact on the
understandability of an argument for certain types of users. Another area of improvement is
the detection of the correct major claim which could be solved using a binary classifier trained
on this task. Such approaches could then in turn be combined with our proposed algorithms to
achieve even better results.
[13] R. J. G. B. Campello, D. Moulavi, J. Sander, Density-Based Clustering Based on Hierarchical
Density Estimates, in: J. Pei, V. S. Tseng, L. Cao, H. Motoda, G. Xu (Eds.), Advances in
Knowledge Discovery and Data Mining, Lecture Notes in Computer Science, Springer,
2013, pp. 160–172. doi:10.1007/978-3-642-37456-2_14.
[14] L. McInnes, J. Healy, S. Astels, Hdbscan: Hierarchical density based clustering, The Journal
of Open Source Software 2 (2017) 205. URL: http://joss.theoj.org/papers/10.21105/joss.00205.
doi:10.21105/joss.00205.
[15] D. R. Smith, The design of divide and conquer algorithms, Science of Computer
Programming 5 (1985) 37–58. URL: https://www.sciencedirect.com/science/article/pii/
0167642385900036. doi:10.1016/0167-6423(85)90003-6.
[16] J. MacQueen, Some methods for classification and analysis of multivariate
observations, in: Proceedings of the Fifth Berkeley Symposium on Mathematical
Statistics and Probability, volume 1, 1967, pp. 281–297. URL: https://projecteuclid.
org/ebooks/berkeley-symposium-on-mathematical-statistics-and-probability/
Some-methods-for-classification-and-analysis-of-multivariate-observations/chapter/
Some-methods-for-classification-and-analysis-of-multivariate-observations/bsmsp/
1200512992?tab=ChapterArticleLink.
[17] D. Walton, C. Reed, F. Macagno, Argumentation schemes, Cambridge University Press,
2008.
[18] P. J. Rousseeuw, Silhouettes: A graphical aid to the interpretation and validation of
cluster analysis, Journal of Computational and Applied Mathematics 20 (1987) 53–65.
URL: https://www.sciencedirect.com/science/article/pii/0377042787901257. doi:10.1016/
0377-0427(87)90125-7.
[19] A. Peldszus, M. Stede, Joint prediction in mst-style discourse parsing for
argumentation mining, in: L. Màrquez, C. Callison-Burch, J. Su, D. Pighin, Y. Marton (Eds.),
Proceedings of the 2015 Conference on Empirical Methods in Natural Language
Processing, EMNLP 2015, Lisbon, Portugal, September 17-21, 2015, The Association for
Computational Linguistics, 2015, pp. 938–948. URL: https://doi.org/10.18653/v1/d15-1110.
doi:10.18653/v1/d15-1110.
[20] P. Jaccard, The Distribution of the Flora in the Alpine Zone, New Phytologist 11 (1912) 37–
50. URL: https://nph.onlinelibrary.wiley.com/doi/abs/10.1111/j.1469-8137.1912.tb05611.x.
doi:10.1111/j.1469-8137.1912.tb05611.x.
[21] J. Nešetřil, P. Ossona de Mendez, Bounded Height Trees and Tree-Depth, in: J. Nešetřil,
P. Ossona de Mendez (Eds.), Sparsity: Graphs, Structures, and Algorithms,
Algorithms and Combinatorics, Springer, 2012, pp. 115–144. URL: https://doi.org/10.1007/
978-3-642-27875-4_6. doi:10.1007/978-3-642-27875-4_6.
[22] M. Lenz, R. Bergmann, User-Centric Argument Mining with ArgueMapper and Arguebuf,
in: Computational Models of Argument, volume 353 of Frontiers in Artificial Intelligence
and Applications, IOS Press, Cardif, Wales, 2022, pp. 367–368. URL: https://ebooks.iospress.
nl/doi/10.3233/FAIA220176. doi:10.3233/FAIA220176.
[23] L. Dumani, M. Biertz, A. Witry, A.-K. Ludwig, M. Lenz, S. Ollinger, R. Bergmann,
R. Schenkel, The ReCAP Corpus: A Corpus of Complex Argument Graphs on German
Education Politics, in: 2021 IEEE 15th International Conference on Semantic Computing
(ICSC), 2021, pp. 248–255. doi:10.1109/ICSC50631.2021.00083.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lawrence</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          , Argument Mining: A Survey,
          <source>Computational Linguistics</source>
          <volume>45</volume>
          (
          <year>2019</year>
          )
          <fpage>765</fpage>
          -
          <lpage>818</lpage>
          . URL: https://doi.org/10.1162/coli_a_00364. doi:
          <volume>10</volume>
          .1162/coli_a_
          <fpage>00364</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Stab</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Gurevych</surname>
          </string-name>
          ,
          <article-title>Recognizing insuficiently supported arguments in argumentative essays</article-title>
          , in: M.
          <string-name>
            <surname>Lapata</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Blunsom</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Koller (Eds.),
          <source>Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics</source>
          ,
          <string-name>
            <surname>EACL</surname>
          </string-name>
          <year>2017</year>
          , Valencia, Spain, April 3-
          <issue>7</issue>
          ,
          <year>2017</year>
          , Volume
          <volume>1</volume>
          :
          <string-name>
            <given-names>Long</given-names>
            <surname>Papers</surname>
          </string-name>
          ,
          <source>Association for Computational Linguistics</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>980</fpage>
          -
          <lpage>990</lpage>
          . URL: https://doi.org/10.18653/v1/e17-
          <fpage>1092</fpage>
          . doi:
          <volume>10</volume>
          .18653/ v1/e17-
          <fpage>1092</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Persing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ng</surname>
          </string-name>
          ,
          <article-title>End-to-end argumentation mining in student essays</article-title>
          , in: K.
          <string-name>
            <surname>Knight</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Nenkova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          Rambow (Eds.),
          <source>NAACL HLT</source>
          <year>2016</year>
          ,
          <article-title>The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies</article-title>
          , San Diego California, USA, June 12-17,
          <year>2016</year>
          , The Association for Computational Linguistics,
          <year>2016</year>
          , pp.
          <fpage>1384</fpage>
          -
          <lpage>1394</lpage>
          . URL: https://doi.org/10.18653/v1/n16-
          <fpage>1164</fpage>
          . doi:
          <volume>10</volume>
          .18653/v1/n16-
          <fpage>1164</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sahitaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kallenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Coors</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Dumani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Schenkel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bergmann</surname>
          </string-name>
          ,
          <article-title>Towards an argument mining pipeline transforming texts to argument graphs</article-title>
          , in: H.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          Taticchi (Eds.),
          <source>Computational Models of Argument - Proceedings of COMMA</source>
          <year>2020</year>
          , Perugia, Italy, September 4-
          <issue>11</issue>
          ,
          <year>2020</year>
          , volume
          <volume>326</volume>
          <source>of Frontiers in Artificial Intelligence and Applications</source>
          , IOS Press,
          <year>2020</year>
          , pp.
          <fpage>263</fpage>
          -
          <lpage>270</lpage>
          . URL: https://doi.org/10.3233/ FAIA200510. doi:
          <volume>10</volume>
          .3233/FAIA200510.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wachsmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Khatib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ajjour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Puschmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Qu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dorsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Morari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bevendorf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <article-title>Building an argument search engine for the web</article-title>
          , in: I.
          <string-name>
            <surname>Habernal</surname>
            , I. Gurevych,
            <given-names>K. D.</given-names>
          </string-name>
          <string-name>
            <surname>Ashley</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Cardie</surname>
            ,
            <given-names>N. L.</given-names>
          </string-name>
          <string-name>
            <surname>Green</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          <string-name>
            <surname>Litman</surname>
            , G. Petasis,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Reed</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Slonim</surname>
            ,
            <given-names>V. R.</given-names>
          </string-name>
          <string-name>
            <surname>Walker</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 4th Workshop on Argument Mining</source>
          ,
          <source>ArgMining@EMNLP</source>
          <year>2017</year>
          , Copenhagen, Denmark, September 8,
          <year>2017</year>
          , Association for Computational Linguistics,
          <year>2017</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>59</lpage>
          . URL: https://doi.org/10.18653/v1/w17-
          <fpage>5106</fpage>
          . doi:
          <volume>10</volume>
          .18653/v1/w17-
          <fpage>5106</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Stab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Daxenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Stahlhut</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schiller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tauchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Eger</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Gurevych</surname>
          </string-name>
          ,
          <article-title>Argumentext: Searching for arguments in heterogeneous sources</article-title>
          , in: Y. Liu,
          <string-name>
            <given-names>T.</given-names>
            <surname>Paek</surname>
          </string-name>
          , M. S. Patwardhan (Eds.),
          <source>Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics, NAACL-HLT</source>
          <year>2018</year>
          , New Orleans, Louisiana, USA, June 2-4,
          <year>2018</year>
          , Demonstrations, Association for Computational Linguistics,
          <year>2018</year>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>25</lpage>
          . URL: https://doi.org/10.18653/v1/n18-
          <fpage>5005</fpage>
          . doi:
          <volume>10</volume>
          .18653/v1/n18-
          <fpage>5005</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>James</surname>
          </string-name>
          ,
          <article-title>Freeman. dialectics and the macrostructure of arguments: A theory of argument structure</article-title>
          ,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Habernal</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Gurevych</surname>
          </string-name>
          ,
          <article-title>Argumentation mining in user-generated web discourse</article-title>
          ,
          <source>CoRR abs/1601</source>
          .02403 (
          <year>2016</year>
          ). URL: http://arxiv.org/abs/1601.02403. arXiv:
          <volume>1601</volume>
          .
          <fpage>02403</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Persing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ng</surname>
          </string-name>
          ,
          <article-title>Unsupervised argumentation mining in student essays</article-title>
          , in: N.
          <string-name>
            <surname>Calzolari</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Béchet</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Blache</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Choukri</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Cieri</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Declerck</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Goggi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Isahara</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Maegaard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Mariani</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Mazo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Moreno</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Odijk</surname>
          </string-name>
          , S. Piperidis (Eds.),
          <source>Proceedings of The 12th Language Resources and Evaluation Conference</source>
          ,
          <string-name>
            <surname>LREC</surname>
          </string-name>
          <year>2020</year>
          , Marseille, France, May
          <volume>11</volume>
          - 16,
          <year>2020</year>
          ,
          <string-name>
            <given-names>European</given-names>
            <surname>Language Resources Association</surname>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>6795</fpage>
          -
          <lpage>6803</lpage>
          . URL: https: //aclanthology.org/
          <year>2020</year>
          .lrec-
          <volume>1</volume>
          .839/.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Stab</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Gurevych</surname>
          </string-name>
          ,
          <article-title>Parsing argumentation structures in persuasive essays</article-title>
          ,
          <source>Comput. Linguistics</source>
          <volume>43</volume>
          (
          <year>2017</year>
          )
          <fpage>619</fpage>
          -
          <lpage>659</lpage>
          . URL: https://doi.org/10.1162/COLI_a_00295. doi:
          <volume>10</volume>
          .1162/ COLI\_a\_
          <volume>00295</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Gemechu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <article-title>Decompositional argument mining: A general purpose approach for argument graph construction</article-title>
          , in: A.
          <string-name>
            <surname>Korhonen</surname>
            ,
            <given-names>D. R.</given-names>
          </string-name>
          <string-name>
            <surname>Traum</surname>
          </string-name>
          , L. Màrquez (Eds.),
          <source>Proceedings of the 57th Conference of the Association for Computational Linguistics</source>
          ,
          <string-name>
            <surname>ACL</surname>
          </string-name>
          <year>2019</year>
          , Florence, Italy,
          <source>July 28- August 2</source>
          ,
          <year>2019</year>
          , Volume
          <volume>1</volume>
          :
          <string-name>
            <given-names>Long</given-names>
            <surname>Papers</surname>
          </string-name>
          ,
          <source>Association for Computational Linguistics</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>516</fpage>
          -
          <lpage>526</lpage>
          . URL: https://doi.org/10.18653/v1/p19-
          <fpage>1049</fpage>
          . doi:
          <volume>10</volume>
          .18653/v1/p19-
          <fpage>1049</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Schaefer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stede</surname>
          </string-name>
          , Argument Mining on Twitter: A survey, it - Information
          <source>Technology</source>
          <volume>63</volume>
          (
          <year>2021</year>
          )
          <fpage>45</fpage>
          -
          <lpage>58</lpage>
          . URL: https://www.degruyter.com/document/doi/10.1515/itit-2020-0053/ html. doi:
          <volume>10</volume>
          .1515/itit-2020-0053.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>