{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:46:50Z","timestamp":1777434410227,"version":"3.51.4"},"reference-count":45,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T00:00:00Z","timestamp":1500854400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Argument &amp; Computation"],"published-print":{"date-parts":[[2017,8,17]]},"abstract":"<jats:p>Enthymeme reconstruction, i.e. the task of reformulating arguments with missing propositions, is an exciting task at the borderline of text understanding and argument interpretation. However, there is some doubt in the community about the feasibility of this task due to the wide range of possible reformulations that are open to humans. We therefore believe that research on how to define an objective ground truth for these tasks is necessary before any work on the automatic reconstruction can begin.<\/jats:p>\n                  <jats:p>Here, we present a feasibility study for the task of finding and expanding enthymemes involving a fortiori arguments in real-world texts, and we show that given a sufficiently strict reformulation of the human annotation task, substantial agreement can be achieved. We split the task into three sub-tasks: 1. deciding whether a candidate text span really represents an enthymematic argument, 2. classifying the type of a fortiori argument concerned and 3. describing the missing premise in natural language. In a case study involving the two authors of this paper as annotators, we test a specific type of a fortiori arguments, the let alone construction, for its suitability for reaching high agreement in all three stages of the task. We also discuss pragmatic effects of let alone and how they relate to argumentation theory.<\/jats:p>","DOI":"10.3233\/aac-170020","type":"journal-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T12:06:16Z","timestamp":1500984376000},"page":"113-129","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Finding enthymemes in real-world texts: A\u00a0feasibility study"],"prefix":"10.1177","volume":"8","author":[{"given":"Olesya","family":"Razuvayevskaya","sequence":"first","affiliation":[{"name":"Computer Laboratory, University of Cambridge, Cambridge, United Kingdom. E-mails:\u00a0,\u00a0"}]},{"given":"Simone","family":"Teufel","sequence":"additional","affiliation":[{"name":"Computer Laboratory, University of Cambridge, Cambridge, United Kingdom. E-mails:\u00a0,\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2017,7,24]]},"reference":[{"key":"ref001","doi-asserted-by":"crossref","unstructured":"M.A.\u00a0Angrosh, S.\u00a0Cranefield and N.\u00a0Stanger, Ontology-based modelling of related work sections in research articles: Using crfs for developing semantic data based information retrieval systems, in: Proceedings of the 6th International Conference on Semantic Systems, ACM, 2010, p.\u00a014.","DOI":"10.1145\/1839707.1839725"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"E.\u00a0Black and A.\u00a0Hunter, Using enthymemes in an inquiry dialogue system, International Foundation for Autonomous Agents and Multiagent Systems1 (2008), 437\u2013444. ISBN 9780981738109.","DOI":"10.1145\/1329125.1329417"},{"key":"ref003","doi-asserted-by":"crossref","unstructured":"M.B.\u00a0Burke, Unstated premises, Informal Logic7(2) (1985). doi:10.22329\/il.v7i2.2709.","DOI":"10.22329\/il.v7i2.2709"},{"key":"ref004","first-page":"58","author":"Campbell J.A.","year":"1990","journal-title":"The Rhetorical Turn: Invention and Persuasion in the Conduct of Inquiry"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref006","doi-asserted-by":"crossref","unstructured":"E.M.\u00a0Cope and J.E.\u00a0Sandys (eds), Aristotle: Rhetoric, Vol.\u00a01, Cambridge University Press, 2010, Cambridge Books Online. URL, http:\/\/dx.doi.org\/10.1017\/CBO9780511707421. ISBN 9780511707421.","DOI":"10.1017\/CBO9780511707421"},{"key":"ref007","unstructured":"I.M.\u00a0Copi and C.\u00a0Cohen, Introduction to Logic, Maxwell Macmillan International Editions, 1990, URL, https:\/\/books.google.co.uk\/books?id=UnIbAQAAMAAJ. ISBN 9780023250354."},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1353\/par.2004.0009"},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"J.\u00a0Eckle-Kohler, R.\u00a0Kluge and I.\u00a0Gurevych, On the role of discourse markers for discriminating claims and premises in argumentative discourse, in: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), Lisbon, Portugal, September 2015, Association for Computational Linguistics, 2015, pp.\u00a02249\u20132255.","DOI":"10.18653\/v1\/D15-1267"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1007\/BF00413849"},{"key":"ref011","doi-asserted-by":"crossref","unstructured":"C.\u00a0Fellbaum, WordNet, Springer, Dordrecht, Netherlands, 2010, pp.\u00a0231\u2013243, ISBN 978-90-481-8847-5. doi:10.1007\/978-90-481-8847-5_10.","DOI":"10.1007\/978-90-481-8847-5_10"},{"key":"ref012","unstructured":"V.W.\u00a0Feng and G.\u00a0Hirst, Classifying arguments by scheme, in: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies\u00a0\u2013 Volume 1, HLT \u201911, Association for Computational Linguistics, Stroudsburg, PA, USA, 2011, pp.\u00a0987\u2013996, URL, http:\/\/dl.acm.org\/citation.cfm?id=2002472.2002597. ISBN 978-1-932432-87-9."},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.2307\/414531"},{"key":"ref014","doi-asserted-by":"crossref","unstructured":"T.\u00a0Goudas, C.\u00a0Louizos, G.\u00a0Petasis and V.\u00a0Karkaletsis, Argument extraction from news, blogs, and social media, in: Hellenic Conference on Artificial Intelligence, Springer, 2014, pp.\u00a0287\u2013299.","DOI":"10.1007\/978-3-319-07064-3_23"},{"key":"ref015","doi-asserted-by":"crossref","unstructured":"J.\u00a0Gough and C.\u00a0Tindale, Hidden\u2019, or \u2018Missing\u2019 Premises, 1985. URL, http:\/\/scholar.uwindsor.ca\/philosophypub\/20.","DOI":"10.22329\/il.v7i2.2708"},{"key":"ref016","doi-asserted-by":"crossref","unstructured":"H.P.\u00a0Grice, Logic and conversation, in: Syntax and Semantics: Vol. 3: Speech Acts, P.\u00a0Cole and J.L.\u00a0Morgan, eds, Academic Press, San Diego, CA, 1975, pp.\u00a041\u201358.","DOI":"10.1163\/9789004368811_003"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"D.\u00a0Hitchcock, Enthymematic Arguments, 1985.","DOI":"10.22329\/il.v7i2.2707"},{"key":"ref018","unstructured":"P.J.\u00a0Hurley, A Concise Introduction to Logic. Cengage Learning, 2014, URL, https:\/\/books.google.co.uk\/books?id=qGBQAwAAQBAJ. ISBN 9781285965567."},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1080\/00335638009383524"},{"key":"ref020","unstructured":"M.\u00a0Kienpointner, Alltagslogik: Struktur und Funktion Von Argumentationsmustern, Problemata (Stuttgart). Frommann-Holzboog, 1992, URL, https:\/\/books.google.co.uk\/books?id=CsJlQgAACAAJ. ISBN 9783772814624."},{"key":"ref021","unstructured":"K.\u00a0Krippendorff, Content Analysis: An Introduction to Its Methodology, Sage, 2004."},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1515\/text.1.1988.8.3.243"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"M.\u00a0McShane and P.\u00a0Babkin, Automatic ellipsis resolution: Recovering covert information from text, 2015, http:\/\/www.aaai.org\/ocs\/index.php\/AAAI\/AAAI15\/paper\/view\/9441.","DOI":"10.1609\/aaai.v29i1.9223"},{"key":"ref024","doi-asserted-by":"crossref","unstructured":"M.F.\u00a0Moens, E.\u00a0Boiy, R.M.\u00a0Palau and C.\u00a0Reed, Automatic detection of arguments in legal texts, in: Proceedings of the 11th International Conference on Artificial Intelligence and Law, ACM, 2007, pp.\u00a0225\u2013230.","DOI":"10.1145\/1276318.1276362"},{"key":"ref025","doi-asserted-by":"crossref","unstructured":"D.\u00a0Nute, Defeasible reasoning: A philosophical analysis in prolog, in: Aspects of Artificial Intelligence, Springer, 1988, pp.\u00a0251\u2013288. doi:10.1007\/978-94-009-2699-8_9.","DOI":"10.1007\/978-94-009-2699-8_9"},{"key":"ref026","doi-asserted-by":"publisher","DOI":"10.1017\/S1930297500002205"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.4018\/jcini.2013010101"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1104_4"},{"key":"ref029","doi-asserted-by":"publisher","DOI":"10.1002\/int.4550060103"},{"key":"ref030","doi-asserted-by":"crossref","unstructured":"T.\u00a0Rietveld and R.\u00a0Van Hout, Statistical Techniques for the Study of Language Behaviour, Mouton de Gruyter, Berlijn, 1993.","DOI":"10.1515\/9783110871609"},{"key":"ref031","unstructured":"O.\u00a0Sawada, Rethinking the let alone construction: what are its construction specific characteristics, 2003."},{"key":"ref032","unstructured":"J.\u00a0Schneider and A.\u00a0Wyner, Identifying consumers\u2019 arguments in text, in: SWAIE, 2012, pp.\u00a031\u201342."},{"issue":"1","key":"ref033","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1515\/joll-2016-0001","volume":"15","author":"Schrickx J.","year":"2016","journal-title":"Journal of Latin Linguistics"},{"key":"ref034","unstructured":"M.\u00a0Scriven, Reasoning, 1977."},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020867916902"},{"key":"ref036","unstructured":"J.Z.\u00a0Sukkarieh, Mind your language! controlled language for inference purposes, 2003."},{"key":"ref037","unstructured":"N.\u00a0Suszcza\u0144ska, J.\u00a0Romaniuk and P.\u00a0Szmal, Automatic analysis of elliptic sentences in the thetos system1, 2005."},{"key":"ref038","unstructured":"S.\u00a0Teufelet al., Argumentative zoning: Information extraction from scientific text, PhD thesis, Citeseer, 2000."},{"key":"ref039","doi-asserted-by":"crossref","unstructured":"S.\u00a0Teufel and M.\u00a0Moens, What\u2019s yours and what\u2019s mine: Determining intellectual attribution in scientific text, in: Proceedings of the 2000 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora: Held in Conjunction with the 38th Annual Meeting of the Association for Computational Linguistics, Vol.\u00a013, Association for Computational Linguistics, 2000, pp.\u00a09\u201317.","DOI":"10.3115\/1117794.1117796"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1162\/089120102762671936"},{"key":"ref041","unstructured":"S.A.\u00a0Thompson and W.C.\u00a0Mann, Rhetorical structure theory: A frarnework for the analysis of texts, 1987."},{"key":"ref042","doi-asserted-by":"crossref","unstructured":"M.\u00a0Toosarvandani, Letting negative polarity alone for let alone, in: Proceedings from Semantics and Linguistic Theory XVIII, T.\u00a0Friedman and S.\u00a0Ito, eds, CLC Publications, Ithaca, New York, 2008, pp.\u00a0729\u2013746.","DOI":"10.3765\/salt.v18i0.2493"},{"key":"ref043","unstructured":"G.\u00a0Tremper, A.\u00a0Frank, H.\u00a0Zinsmeister and B.\u00a0Webber, A discriminative analysis of fine-grained semantic relations including presupposition: Annotation and classification."},{"issue":"5","key":"ref044","first-page":"360","volume":"37","author":"Viera A.J.","year":"2005","journal-title":"Fam Med"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-005-6198-x"}],"container-title":["Argument &amp; Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/AAC-170020","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/AAC-170020","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/AAC-170020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T11:53:49Z","timestamp":1777377229000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/AAC-170020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,24]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,8,17]]}},"alternative-id":["10.3233\/AAC-170020"],"URL":"https:\/\/doi.org\/10.3233\/aac-170020","relation":{},"ISSN":["1946-2166","1946-2174"],"issn-type":[{"value":"1946-2166","type":"print"},{"value":"1946-2174","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,24]]}}}