9,300 Hits in 5.2 sec

A Deep Modular RNN Approach for Ethos Mining

Rory Duthie, Katarzyna Budzynska
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
By exploring correspondences between ethos in political discourse and major events in the political landscape through ethos analytics, we uncover tantalising evidence that identifying expressions of positive  ...  Annotation of ethotic statements is reliable and its extraction is robust (macro-F1 = 0.83), while annotation of polarity is perfect and its extraction is solid (macro-F1 = 0.84).  ...  Acknowledgments The work was supported by EPSRC in the UK under grant EP/M506497/1. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  ... 
doi:10.24963/ijcai.2018/562 dblp:conf/ijcai/DuthieB18 fatcat:upc47j5wqfhdvjjpljrnu33evu

Trichotomic Argumentation Representation [article]

Merlin Göttlinger, Lutz Schröder
2018 arXiv   pre-print
The Aristotelian trichotomy distinguishes three aspects of argumentation: Logos, Ethos, and Pathos.  ...  We capture Logos in the usual known from AIF+, Ethos in form of weighted edges between actors representing trust, and Pathos via weighted edges from actors to illocutions representing their level of commitment  ...  [17] , is to derive complex attacks from joining support and attack relations and thus reduce to Dung semantics.  ... 
arXiv:1812.06745v1 fatcat:busug3z2uzcrlgn6nkz6dusvdu

The use of rhetorical strategies in Q&A discussion

Reijo Savolainen
2014 Journal of Documentation  
To this end, the percentage distributions were calculated for the rhetorical strategies per ethos, pathos and logos, as well the types of information sources used to support the rhetorical strategies.  ...  First, the rhetorical strategies were approached as factors that serve the ends of the major types of rhetorical appeals identified by Aristotle, i.e., ethos, pathos, and logos.  ... 
doi:10.1108/jd-11-2012-0152 fatcat:kbtjvp6sajhx3dojjgbjqbnyti

Form and variations in negative political advertising

David E. Procter, William J. Schenck‐Hamlin
1996 Communication Research Reports  
Using a sample of 99 political advertisements from 1990 statewide and federal elections, a content analysis was employed to test whether negative political advertisements exhibited a normative style.  ...  Results indicated that negative political advertisements were remarkably similar in substance and style, indicating a normative advertising form.  ...  Incumbents, challengers, and open-seated campaigns selected similar advertisement types, formats, aspects of political ethos to attack, and types of support.  ... 
doi:10.1080/08824099609362081 fatcat:rv6hl4bc35d4tlnuqhr65khf54

Associating Ethos with Objects: Reasoning from Character of Public Figures to Actions in the World

Katarzyna Budzynska, Marcin Koszowy, Martín Pereira-Fariña
2021 Argumentation: an international journal on reasoning  
In this paper, we argue that there is another type of reasoning from ethos, in which people argue about actions in the world.  ...  We propose to extend an existing approach to patterns of reasoning from ethos that will help us to shed new light on ethotic argumentation and open an avenue for a systematic account of these unexplored  ...  Acknowledgements The work reported in this paper was supported in part by the Polish National Sci-  ... 
doi:10.1007/s10503-021-09552-4 fatcat:5xk44yfsbjhvngqtfdkomrpq4e

Learning to Give Feedback: Modeling Attributes Affecting Argument Persuasiveness in Student Essays

Zixuan Ke, Winston Carlile, Nishant Gurrapadi, Vincent Ng
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
, we design and train the first set of neural models that predict the persuasiveness of an argument and its attributes in a student essay, enabling useful feedback to be provided to students on why their  ...  Using a recently released corpus of essays that are simultaneously annotated with argument components, argument persuasiveness scores, and attributes of argument components that impact an argument's persuasiveness  ...  The two relation types include: Support, which indicates that one component supports another, and Attack, which indicates that one component attacks another.  ... 
doi:10.24963/ijcai.2018/574 dblp:conf/ijcai/KeCGN18 fatcat:uyqxuciulfftdeq7qa6d7gswp4

Analyzing the Semantic Types of Claims and Premises in an Online Persuasive Forum

Christopher Hidey, Elena Musi, Alyssa Hwang, Smaranda Muresan, Kathy McKeown
2017 Proceedings of the 4th Workshop on Argument Mining  
(e.g., support, attack).  ...  and 3) are certain types of claims and/or premises more likely to appear in persuasive messages than in nonpersuasive messages?  ...  P 2T IP 1 1 65081 and was mainly responsible for the design of the guidelines (sections 3.2./3.3.), supervision of annotations and the qualitative analysis of the results.  ... 
doi:10.18653/v1/w17-5102 dblp:conf/argmining/HideyMHMM17 fatcat:du4ar2ewlrg67j77uyxrijn2zq

Trump's Speech about Jerusalem: An Analysis on Persuasive Strategies

Ahmad Faiz, Andi Indah Yulianti, Dwiani Septiana
2020 Journal of Pragmatics Research  
The data analyzed in this research are two speech of Trump about Jerusalem. The result showed that Trump used ethos, logos and pathos.  ...  The aim of this research is to analyze the types of persuasive strategies on Donald Trump's speech about Jerusalem.  ...  Ethos Logos Pathos Based on table 1, the data is classified into three types of persuasive strategies, those are ethos, logos and pathos.  ... 
doi:10.18326/jopr.v2i2.160-176 fatcat:lkrktoa3mfeyjnvhw5uiiodaha

Bandwidth Utilization Side-Channel on ML Inference Accelerators [article]

Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari
2021 arXiv   pre-print
This side channel is independent of the type of interface, leaks even in the presence of data and memory address encryption and can be monitored through performance counters or through bus contention from  ...  Data and memory address encryption has been recently proposed to defend against off-chip attacks.  ...  ; (2) Classify model layer boundary and layer type; (3) Use black box attack to reconstruct model or perform adversarial attack.  ... 
arXiv:2110.07157v1 fatcat:weogvdozejbv7apaznysreljxq

Depression in Employees in Privately Owned Enterprises in China: Is It Related to Work Environment and Work Ability?

Jing Sun, Nicholas Buys, Xinchao Wang
2013 International Journal of Environmental Research and Public Health  
The primary organisational environmental factor was a low level of enterprise ethos and culture.  ...  Personal factors include poor work ability and low resilience, while workplace factors include workplace ethos and culture.  ...  Acknowledgements The authors also wish to acknowledge the support of the Peking University and the Credibility Retail Enterprise for the funding support, data collection work and to all participants who  ... 
doi:10.3390/ijerph10041152 pmid:23528811 pmcid:PMC3709310 fatcat:7vqfxur7rfe3hkjvvdbckhgc6u

Before Climategate: Visual strategies to integrate ethos across the "is/ought" divide in the IPCC's Climate Change 2007: Summary for Policy Makers

Lynda Walsh
2010 Poroi  
A survey of the critical responses yields many of the same types of ethical attacks launched in Climategate.  ...  These critics performed readings of the IPCC's claims at the stases of value and action and then used them to attack the authors' Mertonian ethos.  ... 
doi:10.13008/2151-2957.1066 fatcat:ptuaw6yqgrgfrpfoynndi7uwru

Institutional Field Dynamics and the Competition Between Institutional Logics

Sandy Edward Green, Marin Babb, C. Murat Alpaslan
2008 Management Communication Quarterly  
They conclude with a brief discussion of their analysis and a call for further research.  ...  The authors argue that the rhetoric of corporate control shapes and establishes dominant stakeholder groups in the institutional field.  ...  For example, the interviews illustrate what types of arguments are used to legitimize (or de-legitimize) a takeover defense, what types of arguments are used to rhetorically support an IC logic or an MC  ... 
doi:10.1177/0893318908318430 fatcat:kff3yvakqbhyvaer4vn46wya5e

Aggressive language in an online hacking forum

Andrew Caines, Sergio Pastrana, Alice Hutchings, Paula Buttery
2018 Proceedings of the 2nd Workshop on Abusive Language Online (ALW2)  
We probe the heterogeneity in levels of abusive language in different sections of the Internet, using an annotated corpus of Wikipedia page edit comments to train a binary classifier for abuse detection  ...  , and that this may explain the lower levels of abuse found in our forum data than in Wikipedia comments.  ...  We thank Emma Lenton, Dr Alastair Beresford, and the anonymous reviewers for their support and advice.  ... 
doi:10.18653/v1/w18-5109 dblp:conf/acl-alw/CainesPHB18 fatcat:bcpndc5n4vbnzn3py3gnshpkqi

ETHOS: an Online Hate Speech Detection Dataset [article]

Ioannis Mollas, Zoe Chrysopoulou, Stamatis Karlos, Grigorios Tsoumakas
2021 arXiv   pre-print
In this paper, we present 'ETHOS', a textual dataset with two variants: binary and multi-label, based on YouTube and Reddit comments validated using the Figure-Eight crowdsourcing platform.  ...  legislation and maintain a high level of service quality.  ...  discussions and memes supportive of U.S.  ... 
arXiv:2006.08328v2 fatcat:ppg2phh4nber3p42pgbgpyfmrq

Quotations and Presumptions: Dialogical Effects of Misquotations

Douglas Walton, Fabrizio Macagno
2011 Informal Logic  
Several examples are presented from everyday speech, legislative debates and trials. Analysis using dialog models explains the critical defects of argumentation illustrated in each of the examples.  ...  fallacy, and ad hominem arguments.  ...  In this regard, we classify uses of quotations in two main categories: the ones used to support the argument of the quoted speaker and the ones used to attack it.  ... 
doi:10.22329/il.v31i1.657 fatcat:soctwesovvfmlj4ucqavue4t6u
« Previous Showing results 1 — 15 out of 9,300 results