<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A summary of Community Detection from Coalitions through Argument Similarity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Paola D. Budán</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Melisa G. Esca u˜ela González</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maximiliano C. D. Budán</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria Vanina Martinez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Guillermo R. Simari</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Artificial Intelligence Research Institute (IIIA-CSIC)</institution>
          ,
          <addr-line>Carrer de Can Planas, Barcelona, Catalonia</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science and Engineering, Universidad Nacional del Sur (UNS)</institution>
          ,
          <addr-line>Bahía Blanca</addr-line>
          ,
          <country country="AR">Argentina</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute for Computer Science and Engineering (CONICET-UNS)</institution>
          ,
          <addr-line>Bahía Blanca</addr-line>
          ,
          <country country="AR">Argentina</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We present a summary of an argumentation-based method for finding and analyzing communities in social media on the Web, where a community is regarded as a set of supported opinions that might be in conflict. First, we identify argumentative coalitions to define communities; then, we apply a similarity-based evaluation method over the set of arguments in the coalition to determine the level of cohesion inherent to each community, classifying them appropriately. Introducing conflict points and attacks between coalitions based on argumentative (dis)similarities to model the interaction between communities leads to considering a meta-argumentation framework where the set of coalitions plays the role of the set of arguments and where the attack relation between the coalitions is assigned a particular strength which is inherited from the arguments belonging to the coalition. Various semantics are introduced to consider attacks' strength to particularize the efect of the new perspective.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Argument Similarity</kwd>
        <kwd>Communities</kwd>
        <kwd>Coalitions</kwd>
        <kwd>Strength of Attacks between communities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>The identification of communities in social media and the detection of stances in Tweets has</title>
        <p>
          become increasingly important in recent times [
          <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1, 2, 3, 4, 5</xref>
          ] as a result of the tangible efect that
these platforms have on the public opinion. In this domain, identifying communities implies
analyzing the position of contributing agents concerning a particular topic or their respective
argumentative stance; several tools can be used for this purpose, for instance [
          <xref ref-type="bibr" rid="ref1 ref6 ref7">1, 6, 7</xref>
          ]. Most of
these methods focus on analyzing tweets to characterize the relationship between messages.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>The present work summarizes the argumentation-based method propose by Budán et al. [8]</title>
        <p>to analyze stances in a debate exchange and formally characterize the relationships between
these stances using similarity, understanding the similarity as an attribute of the relationship.</p>
      </sec>
      <sec id="sec-1-3">
        <title>Although Formal Argumentation Theory provides several formalisms to model emerging behavior, e.g. [9, 10, 11, 12, 13]; this paper is based on the well-known Abstract Argumentation Frameworks</title>
        <p>
          (AFs) proposed by Dung [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], and in the Cayrol and Lagasquie-Schiex [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] extended Dung’s
framework that considers two independent types of interactions between arguments: attack
and support. This formalism is called Bipolar Argumentation Frameworks (bafs), and models
situations where arguments may give support for other arguments.
        </p>
        <p>
          Based on the bipolar formalism, in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] the authors presented an approach to use a similarity
degree measure between arguments to characterize the attack and support relations in a baf [
          <xref ref-type="bibr" rid="ref15 ref17">17,
15</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], the detection of communities in social media is based on the support and similarity
relations between arguments, while the classification of the communities was done according
to the similarity degree between the stances that conform to them, taking advantage of the
notion of coalition presented in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and the framework proposed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. During the whole
work, the context where the argumentation discussion is put into play is considered. Note that
we mainly refer to discursive communities. This clarification is necessary because it will allow
us to regard communities as subgroups with cohesive thinking.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>The following example will illustrate the ideas involved in this research. Consider the set of</title>
        <p>opinions extracted from the ProCon website§ in favor of (pro) or against (con) the following
proposition “Is Human Activity Primarily Responsible for Global Climate Change?” :
A Con1: More than one thousand scientists disagree that human activity is primarily responsible
for global climate change.</p>
        <p>B Con2: The Cook review of 11,944 peer-reviewed studies found that 66.4% of the studies had
no stated position on anthropogenic global warming, and while 32.6% of the studies implied
or stated that humans are contributing to climate change, only 65 papers (0.5%) explicitly
stated: “that humans are the primary cause of global warming.”
C Pro1: The rise in atmospheric CO2 over the last century was caused by human activity, as it
occurred at a rate much faster than natural climate changes could produce.</p>
        <p>D Pro2: A National Climate Assessment report said human-caused climate changes, such as
increased heat waves and drought, “are visible in every state”.</p>
        <p>E Undef1: A 2012 Purdue University survey found that 47% of climatologists challenge the idea
that humans are primarily responsible for climate change and instead believe that climate
change is caused by an equal combination of humans and the environment (37%), mostly by
the environment (5%), or that there’s not enough information to say (5%).</p>
        <p>We can roughly distinguish three communities that give opinions regarding the responsibility
of humans for climate change: one of them supports the idea that human activity is responsible
for climate change (arguments C and D), another confronts the previous one with the opposite
position (arguments A, B), and lastly, there is argument E representing an intermediate posture
between the other two. By analyzing these well-defined general postures, we will obtain the
details of the beliefs each community backs; but, by closely examining the opinions in each
community, we can determine each community’s inherent strength.</p>
        <p>
          Given a system that represents knowledge as arguments and considers the existing conflicts
and supports between these arguments, it is feasible to create maximal cohesive sets of arguments
§See https://climatechange.procon.org. The ProCon website states that its goal is “To promote civility, critical
thinking, education, and informed citizenship by presenting the pro and con arguments to debatable issues in a
straightforward, nonpartisan, freely accessible way.”
by taking advantage of the mechanism proposed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] to collect in a set as many conflict-free
and related-by-support arguments as possible, ensuring coherence of the whole set.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>In [15], Cayrol and Lagasquie-Schiex proposed an approach known as Bipolar Argumentation</title>
      </sec>
      <sec id="sec-2-2">
        <title>Framework, to model the support and the attack between arguments:</title>
        <p>Definition 1 (Bipolar Argumentation Framework ( baf)). A Bipolar Argumentation
Framework is a 3-tuple Θ = ⟨Args, R, R⟩, where Args is a set of arguments, and R and R are
two disjoint binary relations defined on Args called attack and support, respectively.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Cayrol et al. [15] presented the extensions of the attack and support notions introducing the</title>
        <p>supported and secondary defeats, denoting with GΘ the bipolar argumentation graph:
Definition 2 (Defeat in baf). Let Θ = ⟨Args, R, R⟩ be a baf, and A, B two arguments in
Args. Then, it is said that:
– A is a supported defeat for B if there exists a sequence A1 R1 . . . R A+1, with  ≥ 1,
where A1 = A and A+1 = B, such that R = R, 1 ≤  ≤  − 1, and R = R, A ∈
Args, 1 ≤  ≤  + 1.
– A is a secondary defeat for B if there exists a sequence A1 R1 . . . R A+1, with  ≥ 2,
where A1 = A and A+1 = B, such that R1 = R, and R = R, 2 ≤  ≤ , A ∈ Args, 1 ≤
 ≤  + 1.</p>
        <p>Considering the simplest case of defeat in any baf, a sequence of two arguments A R B is also
regarded as a supported defeat from A to B, i.e., a direct defeat is also a supported defeat.</p>
      </sec>
      <sec id="sec-2-4">
        <title>A set of arguments must keep a minimum of coherence not containing an argument that</title>
        <p>
          attacks another one in the same set [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. And an external coherence requiring that the set does
not include both a supporter and an attacker of the same argument:
Definition 3 (Conflict-freeness and Safety Properties in BAF). Let Θ = ⟨Args, R, R⟩
be a baf, and S ⊆ Args be a set of arguments. We say that S is conflict-free if ∄ A, B ∈ S
s.t. there is an attack (direct, or supported, or secondary) from A to B. We say that S is safe if
∄ A ∈ Args and ∄ B, C ∈ S s.t. there is an attack (direct, or supported, or secondary) from B to A,
and either there is a sequence of support from C to A, or A ∈ S.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>The closure under R introduced in [15] is a requirement that only concerns the support relation.</title>
        <p>Definition 4 (Closure Property in BAF). Let Θ = ⟨Args, R, R⟩ be an baf. S ⊆ Args be a
set of arguments. S is closed under R if ∀ A ∈ S, ∀ B ∈ Args if A R B then B ∈ S.
Definition 5 (Coalitions in a baf). Let Θ = ⟨Args, R, R⟩ be a baf, and GΘ be a bipolar
argumentation graph. A subset Θ ⊆ Args is a coalition in Θ if Θ is a maximal conflict free set
in Θ such that the subgraph G′Θ induced by Θ is connected only by support relations.</p>
        <p>C1
C2</p>
      </sec>
      <sec id="sec-2-6">
        <title>A coalition represents a relationship on the set of arguments; therefore, the notion of attack</title>
        <p>
          between them introduces a meta-argumentation framework:
Definition 6 (Attack between coalitions in baf). Let 1 and 2 be two coalitions over Θ. If
there exist A ∈ 1 and B ∈ 2 such that A R B, then the coalition 1 c-attacks (or just attacks) 2.
Example 1. In the figure 1 we present a baf example described as Θ = ⟨Args, R, R⟩, where:
Args = {A, B, C, D, E, F, G}; R = {(B, D)}; R = {(A, B), (C, B), (E, D), (E, F), (D, F)}. In the
bipolar argumentation graph GΘ of this particular baf we have that the argument G is a secondary
defeater for F, while C and A are supported defeaters for argument D. Moreover, we distinguish
the following coalitions: 1 = {A, B, C}, highlighted green and 2 = {E, D, F}, highlighted purple.
These are maximal conflict-free sets and 1, 2 are maximal sets closed under R. Additionally, we
have that: 1 attacks 2, because B attacks D.
2.1. A Similarity Valued Argumentation Framework
In [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] the authors presented a Similarity-based Bipolar Argumentation Framework (or s-baf),
which is a mechanism for considering the context of the comparison between arguments,
introducing enriched arguments, that is, arguments decorated with additional information. They
assume a set  of available descriptors corresponding to the discursive domain. Each descriptor
has a set of values associated; for a descriptor  ∈ ,  is the set of semantic values.
Definition 7 (Enriched Argument). Let Θ = ⟨Args, R, R⟩ be a baf, A be an abstract
argument in Θ, and  be a set of descriptors. An enriched argument is a pair A = ⟨A,  A⟩, where
 A is a finite non-empty set of pairs (, A ), where  ∈  and  ⊆  . The set of all enriched
A
arguments will be denoted as Args.
        </p>
      </sec>
      <sec id="sec-2-7">
        <title>Next, we introduce the notion of context of the argumentation.</title>
        <p>
          Definition 8 (Context). Let  be a set of descriptors, a context C will be represented as C =
{(, ) |  ∈ ,  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ]}, i.e., a context is a set of ordered pairs where  ∈  is a descriptor
and  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] is the weight associated with . We denote with C the set of descriptors mentioned
in the context C, i.e., C = { | (, ) ∈ C}.
        </p>
        <sec id="sec-2-7-1">
          <title>Given a context C, for any argument X ∈ Args, we denote the descriptors in X that appear</title>
          <p>on the context C as XC, i.e., XC = X ∩ C.</p>
          <p>Definition 9 (Similarity coeficient for a descriptor). Let Args be a set of enriched
arguments, A = ⟨A,  A⟩ and B = ⟨B,  B⟩ two enriched arguments in Args, and C a context. We define
the similarity coeficient for each descriptor  ∈ AC ∩ BC with weight , denoted Coef(A, B),
as follows:
⎧ A B
⎪ |  ∩ B | · 
⎪⎪ A
Coef(A, B) = ⎨ |  ∩  |
⎪
⎪⎪⎩ 
if |  ∩ B |̸= 0</p>
          <p>A
otherwise</p>
        </sec>
      </sec>
      <sec id="sec-2-8">
        <title>Intuitively, to determine the similarity between two arguments based on a specific descriptor, you count the shared semantic values in that descriptor, divide by the non-shared values, and adjust it based on the descriptor’s relevance in the given context, as mentioned in several references [19, 20, 21].</title>
        <p>
          Definition 10 (Similarity degree between arguments). Let Args be a set of enriched
arguments, A = ⟨A,  A⟩ and B = ⟨B,  B⟩ be two enriched arguments in Args, and C be a context.
The similarity degree between arguments in a context C, denoted SimC, is defined as a function
SimC : Args × Args → [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ], such that:
        </p>
        <p>SimC(A, B) =
{︃  
0
if AC ∩ BC = {1, . . . , } ̸= ∅
otherwise
where  1 = Coef1 (A, B) and   = ⊙ ( − 1, Coef (A, B)) with 2 ≤  ≤ , and, the operator
⊙ should be either a T-norm satisfying the following properties: commutative, associative,
monotonically increasing, and with 1 as its neutral element; or ⊙ should be a T-conorm, satisfying
commutative, associative, monotonically decreasing with 0 as its neutral element.</p>
      </sec>
      <sec id="sec-2-9">
        <title>The abstract concepts presented earlier will be illustrated in the following example.</title>
        <p>Example 2. Suppose that we are analyzing the arguments A and C of our example, which have the
following descriptors and values:  A = {(climate_change, {});(refers_evidence, {})};
 C = {(climate_change, {});(refers_evidence, {});(human_responsability , {})}.
Now, suppose that the context for the arguments comparison is the following:
C = {(climate_change, 0.4);(human_responsability , 0.4);(non_human_causes, 0.2)}.
For climate_change descriptor, we have that the two arguments have a single value in common
and no diferent ones. So, the Coef(A, C) = 0.4; for human_responsability , arguments have
diferent values for this descriptor, and no common value. So that, according to the similarity
coeficient definition, the Coef(A, C) = 0; and for non_human_causes, it is not mentioned in
the arguments under analysis. Now, considering the bounded sum T-conorm, we have that the
SimC(A, C) = 0.4, given that: (0.4 + 0, 1) = 0.4. The similarity value obtained reflects that
the both arguments refer to climate change, but each argument in diferent way.</p>
      </sec>
      <sec id="sec-2-10">
        <title>The following definition introduces the enriched baf framework based on the original baf:</title>
        <p>Definition 11 ((Induced) Enriched baf). Let Θ = ⟨Args, R, R⟩ be a baf, the enriched baf
induced is defined as Θ = ⟨Args, R, R⟩, where Args is the set of enriched arguments
corresponding to arguments in Args, and R and R are the attack and support relationships in Args that
are induced by R and R, respectively.
0.8
0.4
0.6
0.6</p>
        <p>C</p>
      </sec>
      <sec id="sec-2-11">
        <title>Now, we introduce the cohesion degree of a set of supporting enriched arguments and the controversy degree associated with a set of attacking enriched arguments.</title>
        <p>Definition 12 (Cohesion &amp; Controversy degrees). Given a set of enriched arguments S ⊆
Args and a context C, let SimC be a similarity degree function for C, and RS = {(X, Y) ∈
R | X, Y ∈ S} be the subset of R restricted to the arguments of S and RS = {(X, Y) ∈
R | X, Y ∈ S} be the subset of R restricted to the arguments of S then we have:
– The cohesion degree for S, denoted as CohC(S), is defined as:</p>
        <p>where  1 = SimC(A1, B1) and   = ⊕ ( − 1, SimC(Ai , Bi )) with 2 ≤  ≤ .
– The controversy degree for S, denoted as ContC(S), is defined as:</p>
        <p>CohC(S) =
ContC(S) =
{︃</p>
        <p>0
{︃  
0
if RS = {(A1, B1), . . . , (A, B)} ̸= ∅
otherwise
if RS = {(A1, B1), . . . , (A, B)} ̸= ∅
otherwise
where  1 = SimC(A1, B1) and   = ⊗ ( − 1, SimC(Ai , Bi )) with 2 ≤  ≤ .</p>
        <sec id="sec-2-11-1">
          <title>Both CohC(· ) and ContC(· ) can be obtained independently using a recursive function instantiated</title>
          <p>
            with T-norms or T-conorms, in the same manner as with the similarity function SimC, depending
on the user modeling intentions [
            <xref ref-type="bibr" rid="ref22">22</xref>
            ]. Next, we present our example where the similarity degree
associated with each relationship was previously established (for more details, see [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]).
Example 3. We continue with our abstract example, the graph in Figure 2 shows the similarity
degree associated with the arguments in each relation. Intuitively, we can observe that the weakest
support is between the arguments C and B and D and F. Based on the similarity degree obtained
in each relation, we compute the cohesion coeficient associated with the set of supporting
arguments (considering a product T-norm) and the controversy coeficient associated with attacking
arguments (considering a max T-conorm). Thus, we have that: CohC({(E, D), (D, F)}) = 0.42;
CohC({(A, B)}) = 0.8; CohC({(C, B)}) = 0.6; CohC({(E, F)}) = 0.8; and ContC({(B, D)}) =
0.4. Observe that, in this particular case, the cohesion associated with the support relation is
analyzed considering the support chain presented in the argumentation model (see Figure 2). At the
same time, the controversy measure is obtained by analyzing the pairs of attacking arguments.
          </p>
        </sec>
      </sec>
      <sec id="sec-2-12">
        <title>The enriched baf Θ will be extended to include the degrees just defined.</title>
        <p>Definition 13 (Similarity-based baf). Let Θ = ⟨Args, R, R⟩ be an enriched baf and C a
context, a Similarity-Based Bipolar Argumentation Framework (or s-baf) is defined as a tuple
Φ = ⟨Θ, SimC, CohCΘ, ContCΘ⟩, where SimC is a similarity degree function for enriched arguments
in Args, and CohCΘ and ContCΘ are, respectively, the cohesion and controversy degree functions
defined over Θ in the context C.</p>
        <p>
          When no confusion may arise, we will avoid mentioning the Θ enriched baf as a superscript of
the cohesion and controversy degree operators, writing instead ⟨Θ, SimC, CohC, ContC⟩, making
the notation more straightforward. Additionally, in s-baf, the support and attack relations will
have a particular interpretation since a threshold  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] will be considered in the specification
of the type of attack being analyzed. Consequently, the attacks in an s-baf will be of two types:
() strong, when the cohesion and controversy values associated with the attack are greater
than the threshold  ; in this situation, we have strong-direct attack, strong-supported attack, and
strong-secondary attack, or () weak, if at least one of the values is less than  ; then, in this case,
we have weakly-direct attack, weakly-supported attack, and weakly-secondary attack:
Definition 14 (Conflict-freeness and Safety properties in a s-baf). Let
Φ = ⟨Θ, SimC, CohC, ContC⟩ be a s-baf, where Θ = ⟨Args, R, R⟩ is the enriched baf, and
 ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] be a given threshold. Then:
– S is a strongly-conflict-free set if there is no A, B ∈ S such that there exists a strong or
weak attack from A to B.
– S is a  -conflict-free set if there is no A, B ∈ S such that there exists a strong attack from
        </p>
        <p>A to B and ContC(S) &gt;  .
– S is a weakly-conflict-free set if there is no A, B ∈ S such that there exists a strong attack
from A to B.
– S is a strongly-safe set if there is no A ∈ Args and no pair B, C ∈ S such that there exists
a strong or weak attack from B to A, and either there is a sequence of support from C to A,
or A ∈ S.
– S is  -safe set if there is no A ∈ Args and no pair B, C ∈ S such that there exists a strong
attack from B to A, ContC(S ∪ {A}) &gt;  , and either there is a sequence of support from C
to A such that CohC({C, . . . , A}) &gt;  , or A ∈ S.
– S is weakly-safe set if there is no A ∈ Args and no pair B, C ∈ S such that there is a
strong attack from B to A and either there is a sequence of support from C to A such that
CohC({C, . . . , A}) &gt;  , or A ∈ S.</p>
      </sec>
      <sec id="sec-2-13">
        <title>In the following step, in [16] the authors extended the notions of defense for an argument with respect to a set of arguments.</title>
        <p>Definition 15. Let S ⊆ Args be a set of arguments, and A ∈ Args an argument. Then:
– S is a strong defense for A if for all B ∈ Args such that if B is a strong or weak attacker of</p>
        <p>A then there exists C ∈ S where C is a strong attacker of B.
– S is a weak defense for A if for all B ∈ Args such that if B is a strong or weak attacker
attacker of A then there exists C ∈ S where C is a weak attacker attacker of B.</p>
        <p>C1</p>
      </sec>
      <sec id="sec-2-14">
        <title>Next, we analyze our running example to obtain the diferent types of acceptable argument sets, where the properties of conflict-freeness and safety are considered.</title>
        <p>Example 4. We continue analyzing the Example 3 presented in Figure 2, introducing a threshold
 = 0.48. With that addition we obtain: a weakly-direct attacks, with controversy coeficient lower
than  , are from B to D; a weakly-supported attacks are from C to D (since CohC({(C, B)}) ≥ 
and ContC({(B, D)}) &lt;  ), from A to D (because CohC({(A, B)}) ≥  and ContC({(B, D)}) &lt;
 ). Additionally, we have: 1 = {A, B, C}, is strongly-conflict-free , strongly-safe, because there
are no elements in the set that simultaneously support and attack external arguments.</p>
      </sec>
      <sec id="sec-2-15">
        <title>In the next, we explore how these arguments can be organized into communities or coalitions.</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Communities from Valuated-Similarity Coalitions</title>
      <p>
        The community term definition is a complex task that is being approached from diferent
perspectives [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26">23, 24, 22, 25, 26</xref>
        ]. For us, a community is a group of agents presenting diferent
postures through a set of arguments expressing supporting and conflicting positions in a setting
akin to a debate (see Figure 3). Support signifies a relationship based on common opinions,
forming coalitions that represent communities. Additionally, we measure the internal cohesion
of a community. Conflict between communities indicates the degree of controversy on specific
statements. In a knowledge system that represents arguments and their conflicts and supports,
we can find cohesive sets of arguments by employing a mechanism from Budan et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] to
gather conflict-free and support-related arguments. We also introduce a degree of controversy
by considering the addition of attacks while maintaining coherence. This results in sets of
arguments or stances forming a community—a group with consistent stances on a topic. We
define a threshold with dual significance: it represents the maximum controversy a community
can have without losing coherence or the minimum coherence required for a community to
have a solid position. To identify communities, we use a bipolar argumentation graph where
arguments are labeled with similarity degrees between related arguments.
      </p>
      <p>Definition 16 (S-valued bipolar argumentation graph). Given Φ = ⟨Θ, SimC, CohC,
ContC⟩, an s-baf where Θ = ⟨Args, R, R⟩ is the underlying bipolar argumentation
framework. An s-valued Bipolar Argumentation Graph, denoted GΦ, is the argumentation graph where
the nodes are the elements of Args and the arcs between nodes depict the R (dashed arcs) and R
(full arcs) relationships, where the arcs are decorated with the similarity degree SimC.</p>
      <sec id="sec-3-1">
        <title>Now, it is necessary to revisit the concept of coalitions [15] to extend it by formalizing how a similarity degree can influence the support relations.</title>
        <p>Definition 17 (S-coalitions ). Given an s-baf Φ = ⟨Θ, SimC, CohC, ContC⟩, where Θ =
⟨Args, R, R⟩ is the underlying bipolar argumentation framework, let GΦ be the s-valued bipolar
interaction graph over Φ, and  ⊆ Args be a set of enriched arguments. Then, we say that  is an
s-coalition if it is a maximally strongly-conflict-free set such that the sub-graph G′Φ induced by 
is connected only by support relations. We will denote as Φ the set of coalitions obtained from Φ.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Note that self-attacking arguments are disregarded in this approach according to the classic definition of a coalition where no attacks are permitted (Definition 5).</title>
        <p>Proposition 1. Each enriched argument, which is not self-attacking, belongs to an s-coalition.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Given that a s-coalition is a set of enriched arguments, we can use the cohesion function</title>
        <p>
          established in Definition 12 to determine a cohesion measure associated with that s-coalition.
Definition 18 (Types of s-coalitions). Let Φ = ⟨Θ, SimC, CohC, ContC⟩ be an s-baf,  ∈ Φ
be a coalition obtained from Φ, and  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] be a threshold. Then:
–  is a strong-coalition if CohC() = 1.
–  is a  -coalition if  ≤ CohC() &lt; 1.
        </p>
        <p>–  is a weak-coalition if 0 ≤ CohC() &lt;  .</p>
      </sec>
      <sec id="sec-3-4">
        <title>Intuitively, in a strong-coalition the pieces of knowledge refer to the same aspects of the</title>
        <p>argumentation process, without conflict. In a  -coalition, the opinions allude to the same values
for each descriptor considered but contain some descriptors whose values difer. Lastly, in a
weak-coalition, although the arguments do not contradict each other, they can refer to the same
aspects diferently, or some of them might refer to diferent aspects of the issue.
Example 5. Continuing our Example 4, using a product T-norm to obtain the cohesion value,
considering a  = 0.48, and analyzing the abstract argumentation framework represented in
Figure 3, we have that the coalitions 1 = {A, B, C}, 2 = {E, D, F} are weak because the
CohC(1) = 0.2 &lt;  , CohC(2) = 0.34 &lt;  . However, if we choose a diferent function to obtain
the cohesion of the sets, the max T-conorm for instance, we have that: CohC(1) = 0.8 &gt;  ; the
same occurs with 2. Under this perspective, all the communities are  -coalitions. At the level of
semantic analysis, by using a product T-norm to obtain the cohesion value, we find that the 1 and
2 are sd-fragile-communities, while in the second interpretation that relies on a max T-conorm,
we conclude that 1 and 2 are sd-moderate-communities.</p>
      </sec>
      <sec id="sec-3-5">
        <title>When we find a strong support relation inside a coalition, it is natural to think that the cohesion associated with the supported arguments would be high.</title>
        <p>Proposition 2. Let Φ = ⟨Θ, SimC, CohC, ContC⟩ be an s-baf, where Θ is the underlying bipolar
argumentation framework Θ = ⟨Args, R, R⟩, and let A, B ∈ Args two enriched arguments such
that (A, B) ∈ R, and R does not contain (A, B) or (B, A). If A R B is either a strong-support
or weak-support relation, then there exists at least a weak-coalition containing both A and B.</p>
      </sec>
      <sec id="sec-3-6">
        <title>Now, it is necessary to introduce an attack relationship between conflicting coalitions:</title>
        <p>Definition 19 (Internal attacks between s-coalitions). Given the s-baf Φ = ⟨Θ,SimC,CohC,
ContC⟩, where Θ = ⟨Args, R, R⟩ is the underlying bipolar argumentation framework, let Φ be
the set of s-coalitions obtained from Φ, and , ′ ∈ Φ be two s-coalitions. We will say that there
exists an attack point from  to ′ if there are two enriched arguments A ∈  and B ∈ ′ such
that (A, B) ∈ R. We will denote as R[,′] the set of all attacks points between  and ′.</p>
      </sec>
      <sec id="sec-3-7">
        <title>Intuitively, it is possible to say that if there is an attack between two arguments that belong to</title>
        <p>two diferent coalitions, then it is natural to raise this conflict to the coalition level and define
now an attack between these coalitions.</p>
        <p>Definition 20 (S-coalitions Attacks). Let Φ = ⟨Θ, SimC, CohC, ContC⟩ be an s-baf, where
Θ = ⟨Args, R, R⟩ is the underlying bipolar argumentation framework, let Φ be the set of
s-coalitions obtained from Φ. We will define the attack relation between s-coalitions derived from
Φ, denoted RΦ , as</p>
        <p>RΦ = {(, ′) | , ′ ∈ Φ and R[,′] ̸= ∅}</p>
      </sec>
      <sec id="sec-3-8">
        <title>Furthermore, it is interesting to study the strength of the attack from one coalition to another by considering the strength of the attacks that define the existing points of conflict. Formally:</title>
        <p>Definition 21 (Strength of attack between s-coalitions). Let Φ be the set of s-coalitions
obtained from Φ, , ′ ∈ Φ be two s-coalitions, and R[,′] = {(A1, B1), . . . , (A, B)} ⊆ R
be the set of all attack points between  and ′ with R[,′] ̸= ∅. The attack strength, or attack
degree between  and ′, denoted StrΦ(, ′), is defined as:</p>
        <p>StrΦ(, ′) =  ,
where   is defined as  1 = SimC(A1, B1) and   = ⊗ ( − 1, SimC(Ai , Bi )) with 2 ≤  ≤ .</p>
        <sec id="sec-3-8-1">
          <title>The attack degree can be obtained by instantiating the SimC(· , · ) similarity function with T</title>
          <p>norms or T-conorms, considering the user modeling preferences. Once the attacks between
s-coalitions are identified, and their strength is computed, we begin by using the attack degree
to distinguish between strong and weak attacks. This classification can be employed to define
diferent semantics by using diferent forms of acceptability.</p>
          <p>
            Definition 22 (Classification of attacks between s-coalitions). Given an s-baf Φ =
⟨Θ, SimC, CohC, ContC⟩, with Θ = ⟨Args, R, R⟩ as the underlying bipolar argumentation
framework, let Φ be the set of s-coalitions obtained from Φ, , ′ ∈ Φ be two s-coalitions such
that (, ′) ∈ RΦ , and  ∈ [
            <xref ref-type="bibr" rid="ref1">0, 1</xref>
            ] be a threshold. We say that:
-  strongly-attacks ′ if CohC() ≥  and StrΦ(, ′) ≥  ,
-  weakly-attacks ′ if CohC() &lt;  or StrΦ(, ′) &lt;  .
          </p>
        </sec>
      </sec>
      <sec id="sec-3-9">
        <title>The previous definition formalizes the intuition that a strong attack considers two necessary elements: the strength of attack and the s-coalition internal cohesion measure applied to the set of the enriched arguments in the s-coalition. Now, we can formalize a new meta-argumentation framework to analyze a new kind of semantics concerning the set of communities.</title>
        <p>Definition 23 (Meta-argumentation framework). Given Φ = ⟨Θ, SimC, CohC, ContC⟩, an
s-baf with Θ = ⟨Args, R, R⟩ as the underlying bipolar argumentation framework, we define the
meta-argumentation framework associated with Φ, as a 3-tuple Ω = ⟨Φ, RΦ , StrΦ⟩, where
Φ is the set of s-coalitions obtained from Φ, RΦ is an attack relation between s-coalitions derived
from Φ, StrΦ is the attack strength function defined over Φ.</p>
        <sec id="sec-3-9-1">
          <title>Note that in the new meta-argumentation framework, the set Φ of coalitions plays the role of</title>
          <p>the argument set, and the relation RΦ represents the set of attacks. Henceforth, we will describe
this meta-argumentation framework Ω = ⟨Φ, RΦ , StrΦ⟩ through a weighted directed graph</p>
        </sec>
        <sec id="sec-3-9-2">
          <title>GΦ , called meta-argumentation graph, with a unique kind of edge representing attacks between</title>
          <p>coalitions. Furthermore, each edge is assigned a weight representing the strength behind the
attack it represents under the interpretation of attack strength.</p>
        </sec>
      </sec>
      <sec id="sec-3-10">
        <title>Next, we will introduce the measure of controversy associated with a set of s-coalitions, where the diferent types of attacks are analyzed to specify how contradictory they are.</title>
        <p>Definition 24 (Controversy degree for a s-coalition set). Given a meta-argumentation
framework Ω = ⟨Φ, RΦ , StrΦ⟩, where Φ is a set of s-coalitions, RΦ is an attack
relation, StrΦ is the attack strength function,  ⊆  Φ be a set of s-coalitions, and
R = {(1, 2), . . . , (− 1, )} ⊆ RΦ . The controversial measure for , denoted
ContΦ
 (), is defined as:</p>
        <p>ContΦ
 () =
0</p>
        <p>otherwise
{︃  
if R ̸= ∅
where  1 = StrΦ(1, 2) and   = ⊗ ( − 1, StrΦ(− 1, )) with 2 ≤  ≤ .</p>
      </sec>
      <sec id="sec-3-11">
        <title>The instantiation of the controversy degree function is a design decision. Two possible choices are the T-norms and T-conorms.</title>
        <p>Proposition 3. Let  ⊆  Φ be a set of coalitions, and S ⊆
involved in , then ContC(S) = ContΦ
 ().</p>
        <p>Args be the enriched arguments</p>
      </sec>
      <sec id="sec-3-12">
        <title>Given that the controversy associated with a set of coalitions is the same as the controversy</title>
        <p>
          associated with the set of enriched arguments involved, the previous result establishes a common
point between the s-baf and the meta-argumentation framework. Now, based on the semantic
analysis done in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], we introduce the notions of conflict-free s-coalition sets in our
metaargumentation framework Ω. Thus, it is possible to determine the set of communities that can
coexist within an argumentative model.
        </p>
        <p>Definition 25 (Conflict-freeness in Ω ). Given a meta-argumentation framework Ω =
⟨Φ, RΦ , StrΦ⟩, where Φ is the set of s-coalitions, RΦ is an attack relation between s-coalitions,
and StrΦ the strength of attack function. Given a controversy degree function ContΦ defined over
Ω . Let  ⊆  Φ be a subset of coalitions, and  be a threshold. Then:
–  is a strongly-conflict-free set if there is no 1, 2 ∈  such that there exists a strong or
weak attack from 1 to 2.
–  is a  -conflict-free set if there is no 1, 2 ∈  such that there exists a strong attack from
1 to 2, and ContΦ</p>
        <p>() ≤  .
–  is a weakly-conflict-free set if there is no 1, 2 ∈  such that there exists a strong attack
from 1 to 2.</p>
      </sec>
      <sec id="sec-3-13">
        <title>The following proposition establishes the semantic connections between the metaargumentation framework dealing with coalitions of arguments and the subjacent similaritybased argumentation framework.</title>
        <p>Proposition 4. Let Ω = ⟨Φ, RΦ , StrΦ</p>
        <p>
          ⟩ be the meta-argumentation framework associated
with Φ, ContΦ a controversy degree function defined over Ω , {1, . . . , } be a finite set of
coalitions, and  ∈ [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] be a threshold. Then:
) {1, . . . , } is strongly-conflict-free for Ω if 1 ∪ · · · ∪   is strongly-conflict-free for Φ.
) {1, . . . , } is strongly-conflict-free for Ω if 1 ∪ · · · ∪   is strongly-safe for Φ.
) If 1 ∪ · · · ∪   is  -conflict-free for Φ, then {1, . . . , } is  -conflict-free for Ω .
) If 1 ∪ · · · ∪   is at least  -safe for Φ then {1, . . . , } is  -conflict-free for Ω .
) {1, . . . , } is weakly-conflict-free for Ω if 1 ∪ · · · ∪   is weakly-conflict-free for Φ.
) {1, . . . , } is weakly-conflict-free for Ω if 1 ∪ · · · ∪   is at least weakly-safe for Φ.
        </p>
      </sec>
      <sec id="sec-3-14">
        <title>The following example exercises the concepts just introduced:</title>
        <p>Example 6. Continuing the analysis of Example 5, and recalling that the threshold set is  = 0.48
we have that there is a conflict point between the s-coalitions 1 and 2: the pair (B, D). In this
case, StrΦ</p>
        <p>(1, 2) = 0.4 &lt;  , therefore, 1 weakly-attacks 2.</p>
      </sec>
      <sec id="sec-3-15">
        <title>The characterization of the attack relationship between coalitions and considering the associated strength of attacks allows us to establish the following property.</title>
        <p>Proposition 5. Let 1, 2 ∈ Φ be two s-coalitions. If 1 and 2 are two disjoint s-coalitions that
are connected by the attack relation, then there exists at least a weak-attack between 1 and 2.</p>
      </sec>
      <sec id="sec-3-16">
        <title>Now, we will introduce the notions of defense for coalitions by extrapolating from the defense relationship between the arguments gathered in the coalitions.</title>
        <p>Definition 26. Let Ω = ⟨Φ, RΦ , StrΦ⟩ be the meta-argumentation framework associated with
Φ, ContΦ a controversy degree function defined over Ω ,  ⊆  Φ be a set of coalitions over Φ, and
1 ∈ Φ a s-coalitions. Then:
– The set  is a strong defense for 1 if for all 2 ∈ Φ such that if 2 is a strong or weak
attacker of 1 then there exists 3 ∈  where 3 is a strong attacker of 2.
– The set  is a weak defense for 1 if for all 2 ∈ Φ such that if 2 is a strong or weak
attacker of 1 then there exists 3 ∈  where 3 is a weak attacker of 2.</p>
        <p>Example 7. Continuing with the running example, we observe that 1 does not receive any attack.
Furthermore, there is no defense for the attacks of 1 to 2.</p>
      </sec>
      <sec id="sec-3-17">
        <title>The concept of a coalition introduced provides a valuable framework for defining communities</title>
        <p>within argumentation-supported debates. It is worth noting that the principles of conflict-freeness
and safety can also be applied to these communities. These characteristics are particularly
useful for analyzing intricate debates, such as those often encountered on social networks. This
expanded formal argumentation theory equips us with tools to enhance the analysis of debates.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Related Works, Conclusion and Future Work</title>
      <p>
        Puertas et al. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] used Twitter data to detect social communities. They employed expert
knowledge, computational linguistics, and AI techniques to extract vocabulary-based community
features, and explore language-related relationships within the social network. One notable
difference from our work is that the s-coalition detection method here doesn’t focus on individual
opinions. Instead, it considers relationships among opinions to find and characterize
communities or coalitions. However, both approaches involve language-related features. Puertas et
al. employ term frequency techniques, while our method relies on enriched arguments using
descriptors. Lenine [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] propose a work to categorize coalition into three types: conceptual
(math-based), quasi-conceptual (deductive empirical), and extrapolative (statistical). Our work
falls into the first category, building on s-baf [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Another notable approach by Vassiliades et
al. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] introduces an Abstract Argumentation Framework (AF) with domain-specific arguments,
allowing the determination of argument acceptance scope. It difers from Budan et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]
in considering only attack relations, and using diferent argument modeling tools. Bistarelli
at al. [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] detail a set of semantics based on weighted defences. A threshold  obtained from
collective attacks received by an argument is used to define a threshold representing the conflict
permitted in the AF semantics without alter its coherence, providing flexibility. In our approach,
the threshold is a given value that fulfills the same role, but it is applied both direct attacks and
attacks that involve the support relationships necessary to express the coalition strength.
      </p>
      <p>The detection of communities has broad applications today, such as identifying common
research areas in collaboration networks, targeting like-minded users for marketing, or
predictions in political areas. This work introduces a novel approach to identify meta-structures
(coalitions) based on the similarity between supported arguments. We utilize similarity to
characterize attacks between coalitions and assess controversy. However, these methods rely
on specialized argument mining techniques and argument descriptors, and computational costs
vary based on tree traversal. Future research directions include implementing this approach for
coalition detection and community modeling, particularly in decision support systems with
user preferences. Additionally, applying the proposed conceptualization to enhance argument
schemes, especially those involving analogies represents an intriguing avenue for development.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <sec id="sec-5-1">
        <title>This work was supported by funds provided by Universidad Nacional de Santiago del</title>
      </sec>
      <sec id="sec-5-2">
        <title>Estero (UNSE) under grant 23/C201PIP-2023, Universidad Nacional del Sur (UNS) under</title>
        <p>grants PGI 24/N046 and PGI 24/ZN057), Agencia Nacional de Promoción Científica y</p>
      </sec>
      <sec id="sec-5-3">
        <title>Tecnológica under grants PICT-2018-0475 (PRH-2014-0007) and PICT-2020-SERIEA-01481,</title>
        <p>and CONICET under grants PIP 11220200101408CO and PIP 11220170100871CO. The
authors also acknowledge support by the Spanish project PID2022-139835NB-C21 funded by
MCIN/AEI/10.13039/501100011033, MCIN/AEI/ 10.13039/501100011033 and by “European Union</p>
      </sec>
      <sec id="sec-5-4">
        <title>NextGenerationEU/PRTR”.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Furman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Marro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cardellino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Popa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Alemany</surname>
          </string-name>
          ,
          <article-title>You can simply rely on communities for a robust characterization of stances</article-title>
          ,
          <source>Florida Artificial Intelligence Research Society</source>
          <volume>34</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fogelman-Soulié</surname>
          </string-name>
          ,
          <article-title>Identification of generalized semantic communities in large social networks</article-title>
          ,
          <source>IEEE Transactions on Network Science and Engineering</source>
          <volume>7</volume>
          (
          <year>2020</year>
          )
          <fpage>2966</fpage>
          -
          <lpage>2979</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Fraisier</surname>
          </string-name>
          , G. Cabanac,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pitarch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Besançon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Boughanem</surname>
          </string-name>
          ,
          <article-title>Stance classification through proximity-based community detection</article-title>
          ,
          <source>in: Proc of the 29th on Hypertext and Social Media</source>
          , Association for Computing Machinery, New York, NY, USA,
          <year>2018</year>
          , p.
          <fpage>220</fpage>
          -
          <lpage>228</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          , G. Rufo,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          ,
          <article-title>Stance evolution and twitter interactions in an italian political debate</article-title>
          ,
          <source>in: International Conference on Applications of Natural Language to Information Systems</source>
          , Springer,
          <year>2018</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Becker</surname>
          </string-name>
          ,
          <article-title>INF-UFRGS-OPINION-MINING at SemEval-2016 task 6: Automatic generation of a training corpus for unsupervised identification of stance in tweets</article-title>
          ,
          <source>in: Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016)</source>
          ,
          <article-title>Association for Computational Linguistics</article-title>
          , San Diego, California,
          <year>2016</year>
          , pp.
          <fpage>378</fpage>
          -
          <lpage>383</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E. W.</given-names>
            <surname>Pamungkas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Patti</surname>
          </string-name>
          ,
          <article-title>Stance classification for rumour analysis in Twitter: Exploiting afective information and conversation structure</article-title>
          , in: A.
          <string-name>
            <surname>Cuzzocrea</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Bonchi</surname>
          </string-name>
          , D. Gunopulos (Eds.),
          <source>Proc. of the CIKM</source>
          <year>2018</year>
          <article-title>Workshops co-located with 27th ACM Int</article-title>
          .
          <source>Conf. on Information and Knowledge Management (CIKM</source>
          <year>2018</year>
          ), Torino, Italy, volume
          <volume>2482</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Misra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ecker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Handleman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Hahn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Walker</surname>
          </string-name>
          ,
          <article-title>A semi-supervised approach to detecting stance in tweets</article-title>
          ,
          <source>arXiv preprint arXiv:1709</source>
          .
          <year>01895</year>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Budán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Escañuela Gonzalez</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. C. D. Budán</surname>
            ,
            <given-names>M. V.</given-names>
          </string-name>
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>G. R.</given-names>
          </string-name>
          <string-name>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Strength in coalitions: Community detection through argument similarity</article-title>
          ,
          <source>Argument &amp; Computation</source>
          <year>2023</year>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .3233/AAC-220006.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dunne</surname>
          </string-name>
          , Argumentation in artificial intelligence,
          <source>AI</source>
          <volume>171</volume>
          (
          <year>2007</year>
          )
          <fpage>619</fpage>
          -
          <lpage>641</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hunter</surname>
          </string-name>
          , Elements of argumentation, volume
          <volume>47</volume>
          , MIT press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rahwan</surname>
          </string-name>
          , G. Simari,
          <source>Argumentation in artificial intelligence</source>
          , Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. van der Torre</surname>
          </string-name>
          ,
          <source>Handbook of Formal Argumentation</source>
          , volume
          <volume>1</volume>
          ,
          <string-name>
            <surname>College</surname>
            <given-names>Publications</given-names>
          </string-name>
          , London,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          , Handbook of Formal Argumentation, volume
          <volume>2</volume>
          ,
          <string-name>
            <surname>College</surname>
            <given-names>Publications</given-names>
          </string-name>
          , London,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>On the acceptability of arguments in bipolar argumentation frameworks, in: Symbolic and quantitative approaches to reasoning with uncertainty</article-title>
          , Springer,
          <year>2005</year>
          , pp.
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Budán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Escañuela Gonzalez</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. C. D. Budán</surname>
            ,
            <given-names>M. V.</given-names>
          </string-name>
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>G. R.</given-names>
          </string-name>
          <string-name>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Similarity notions in bipolar abstract argumentation</article-title>
          ,
          <source>Argum. Comput</source>
          .
          <volume>11</volume>
          (
          <year>2020</year>
          )
          <fpage>103</fpage>
          -
          <lpage>149</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>On the bipolarity in argumentation frameworks</article-title>
          .,
          <source>in: Nmr</source>
          , volume
          <volume>4</volume>
          ,
          <year>2004</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>Coalitions of arguments: A tool for handling bipolar argumentation frameworks</article-title>
          ,
          <source>International Journal of Intelligent Systems</source>
          <volume>25</volume>
          (
          <year>2010</year>
          )
          <fpage>83</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <article-title>An information-theoretic definition of similarity</article-title>
          , in: J. W. Shavlik (Ed.),
          <source>Proceedings of the Fifteenth International Conference on Machine Learning (ICML</source>
          <year>1998</year>
          ), USA, Morgan Kaufmann,
          <year>1998</year>
          , pp.
          <fpage>296</fpage>
          -
          <lpage>304</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Similarity measures for text document clustering</article-title>
          ,
          <source>in: Proceedings of the sixth new zealand computer science research student conference (NZCSRSC2008)</source>
          , Christchurch, New Zealand,
          <year>2008</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Le</surname>
          </string-name>
          , T. Mikolov,
          <article-title>Distributed representations of sentences and documents</article-title>
          ,
          <source>in: International Conference on Machine Learning</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1188</fpage>
          -
          <lpage>1196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>E. P.</given-names>
            <surname>Klement</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mesiar</surname>
          </string-name>
          , E. Pap, Triangular Norms, volume
          <volume>8</volume>
          of Trends in Logic, Studia Logica Library, reprint ed., Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>T. K. Bradshaw</surname>
          </string-name>
          ,
          <article-title>The post-place community: Contributions to the debate about the definition of community</article-title>
          ,
          <source>Community Development</source>
          <volume>39</volume>
          (
          <year>2008</year>
          )
          <fpage>5</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fortunato</surname>
          </string-name>
          , Community detection in graphs,
          <source>Physics reports 486</source>
          (
          <year>2010</year>
          )
          <fpage>75</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Prodnik</surname>
          </string-name>
          ,
          <article-title>Post-fordist communities and cyberspace: A critical approach</article-title>
          , in: Cybercultures, Brill,
          <year>2012</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>N.</given-names>
            <surname>Chouchani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abed</surname>
          </string-name>
          ,
          <article-title>Online social network analysis: detection of communities of interest</article-title>
          ,
          <source>Journal of Intelligent Information Systems</source>
          <volume>54</volume>
          (
          <year>2020</year>
          )
          <fpage>5</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>E.</given-names>
            <surname>Puertas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. G.</given-names>
            <surname>Moreno-Sandoval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Redondo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Alvarado-Valencia</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>PomaresQuimbaya, Detection of sociolinguistic features in digital social networks for the detection of communities</article-title>
          ,
          <source>Cognitive Computation 13</source>
          (
          <year>2021</year>
          )
          <fpage>518</fpage>
          -
          <lpage>537</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>E.</given-names>
            <surname>Lenine</surname>
          </string-name>
          ,
          <article-title>Modelling coalitions: From concept formation to tailoring empirical explanations</article-title>
          ,
          <source>Games</source>
          <volume>11</volume>
          (
          <year>2020</year>
          )
          <fpage>55</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vassiliades</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Patkos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Flouris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bikakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bassiliades</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Plexousakis</surname>
          </string-name>
          ,
          <article-title>Abstract argumentation frameworks with domain assignments</article-title>
          ,
          <source>in: Proc. IJCAI</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>2076</fpage>
          -
          <lpage>2082</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          ,
          <article-title>A novel weighted defence and its relaxation in abstract argumentation</article-title>
          ,
          <source>International Journal of Approximate Reasoning</source>
          <volume>92</volume>
          (
          <year>2018</year>
          )
          <fpage>66</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>