Tackling Defeasible Reasoning in Bochum: the Research Group for - - PowerPoint PPT Presentation

tackling defeasible reasoning in bochum
SMART_READER_LITE
LIVE PREVIEW

Tackling Defeasible Reasoning in Bochum: the Research Group for - - PowerPoint PPT Presentation

Tackling Defeasible Reasoning in Bochum: the Research Group for Non-Monotonic Logic and Formal Argumentation Christian Straer and Dunja eelja April 10, 2017 Outline The NMLFA Reasoning by Cases Unrestricted Rebut Comparative Studies


slide-1
SLIDE 1

Tackling Defeasible Reasoning in Bochum:

the Research Group for Non-Monotonic Logic and Formal Argumentation

Christian Straßer and Dunja Šešelja April 10, 2017

slide-2
SLIDE 2

Outline

The NMLFA Reasoning by Cases Unrestricted Rebut Comparative Studies Sequent-based argumentation (with Ofer Arieli, Tel Aviv) Agent-Based Models

1/43

slide-3
SLIDE 3

The NMLFA

slide-4
SLIDE 4

The Research Group for Non-Monotonic Logic and Formal Argu- mentation (NMLFA)

  • funding: 2015–2019 (Alexander von Humboldt-Foundation)
  • aim: study defeasible reasoning with methods of formal

argumentation

  • location: Institute for Philosophy II, Ruhr-University

Bochum

  • online:
  • http://homepage.ruhr-uni-bochum.de/

defeasible-reasoning/index.html

  • mailto:defeasible-reasoning@rub.de

2/43

slide-5
SLIDE 5

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-6
SLIDE 6

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-7
SLIDE 7

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-8
SLIDE 8

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-9
SLIDE 9

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-10
SLIDE 10

Members

  • AnneMarie Borg (PhD candidate)
  • Jesse Heyninck (PhD candidate)
  • Pere Pardo (PostDoc researcher)
  • Christian Straßer (Principal researcher)
  • Mathieu Beirlaen (Associated PostDoc researcher)
  • Dunja Šešelja (Associated PostDoc researcher)

3/43

slide-11
SLIDE 11

Some research themes

  • 1. Extending the expressive power of structured

argumentation

1.1 reasoning by cases and hypothetical reasoning 1.2 expressing doubt – non-greedy argumentative reasoning 1.3 unrestricted rebut

  • 2. Comparative studies of different nonmonotonic

formalisms with special attention to argumentation formalisms (ASPIC, ABA, etc.)

  • 3. Applications of argumentation theory to deontic logic
  • 4. Sequent-based argumentation (with Ofer Arieli, Tel Aviv)
  • 5. Agent-based models based on techniques from abstract

argumentation

4/43

slide-12
SLIDE 12

Reasoning by Cases

slide-13
SLIDE 13

Mathieu Beirlaen, Jesse Heyninck, and Christian Straßer, Reasoning by Cases in Structured Argumentation forthcoming in Proceedings KRR/SAC 2017, ACM Digital Library (2017)

4/43

slide-14
SLIDE 14

Reasoning by Cases, Defeasibly

  • strict rules (“→”) vs. defeasible rules (“⇒”)
  • schematically:

A B A C B C C

  • or, more generally:

A B A C B C C

  • or, more generally:

A B A C B C C Read A C: “C follows defeasibly from A” or “There is a (defeasible) argument for C based on A.”

5/43

slide-15
SLIDE 15

Reasoning by Cases, Defeasibly

  • strict rules (“→”) vs. defeasible rules (“⇒”)
  • schematically:

A ∨ B A ⇒ C B ⇒ C C

  • or, more generally:

A B A C B C C

  • or, more generally:

A B A C B C C Read A C: “C follows defeasibly from A” or “There is a (defeasible) argument for C based on A.”

5/43

slide-16
SLIDE 16

Reasoning by Cases, Defeasibly

  • strict rules (“→”) vs. defeasible rules (“⇒”)
  • schematically:

A ∨ B A ⇒ C B ⇒ C C

  • or, more generally:

A ∨ B A ⇒ · · · ⇒ C B ⇒ · · · ⇒ C C

  • or, more generally:

A B A C B C C Read A C: “C follows defeasibly from A” or “There is a (defeasible) argument for C based on A.”

5/43

slide-17
SLIDE 17

Reasoning by Cases, Defeasibly

  • strict rules (“→”) vs. defeasible rules (“⇒”)
  • schematically:

A ∨ B A ⇒ C B ⇒ C C

  • or, more generally:

A ∨ B A ⇒ · · · ⇒ C B ⇒ · · · ⇒ C C

  • or, more generally:

A ∨ B A | ∼ C B | ∼ C C Read A | ∼ C: “C follows defeasibly from A” or “There is a (defeasible) argument for C based on A.”

5/43

slide-18
SLIDE 18

Are there good formal accounts of defeasible Reasoning by Cases?

5/43

slide-19
SLIDE 19

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A

C PREM

  • 2. B

C PREM

  • 3. A

B PREM

  • 4. A

B C 1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-20
SLIDE 20

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A

C PREM

  • 2. B

C PREM

  • 3. A

B PREM

  • 4. A

B C 1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-21
SLIDE 21

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A ⇒ C

PREM

  • 2. B

C PREM

  • 3. A

B PREM

  • 4. A

B C 1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-22
SLIDE 22

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A ⇒ C

PREM

  • 2. B ⇒ C

PREM

  • 3. A

B PREM

  • 4. A

B C 1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-23
SLIDE 23

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A ⇒ C

PREM

  • 2. B ⇒ C

PREM

  • 3. A ∨ B

PREM

  • 4. A

B C 1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-24
SLIDE 24

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A ⇒ C

PREM

  • 2. B ⇒ C

PREM

  • 3. A ∨ B

PREM

  • 4. A ∨ B ⇒ C

1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-25
SLIDE 25

The Meta-Rule Approach: OR

  • Rules for rules:

A ⇒ C B ⇒ C A ∨ B ⇒ C [OR]

  • Illustration:
  • 1. A ⇒ C

PREM

  • 2. B ⇒ C

PREM

  • 3. A ∨ B

PREM

  • 4. A ∨ B ⇒ C

1,2; OR

  • 5. C

3,4; DefeasibleMP

6/43

slide-26
SLIDE 26

A Problematic Example for OR

Suppose we have Σ = {p ⇒ q ∨ r, q ⇒ s, s ⇒ v, r ⇒ u, u ⇒ v, p}. q s v p q ∨ r v r u v

7/43

slide-27
SLIDE 27

A Problematic Example for OR

q s v p q ∨ r v r u v

  • by (OR): from s

v and u v

  • by (Right-Weakening), from q

s and r u

  • by (OR): from q

s u and r s u

8/43

slide-28
SLIDE 28

A Problematic Example for OR

q s v p q ∨ r s ∨ u v r u v

  • by (OR): from s ⇒ v and u ⇒ v
  • by (Right-Weakening), from q

s and r u

  • by (OR): from q

s u and r s u

8/43

slide-29
SLIDE 29

A Problematic Example for OR

q s v p q ∨ r s ∨ u v r u v

  • by (OR): from s ⇒ v and u ⇒ v
  • by (Right-Weakening), from q ⇒ s and r ⇒ u
  • by (OR): from q

s u and r s u

8/43

slide-30
SLIDE 30

A Problematic Example for OR

q s v p q ∨ r s ∨ u v r u v

  • by (OR): from s ⇒ v and u ⇒ v
  • by (Right-Weakening), from q ⇒ s and r ⇒ u
  • by (OR): from q ⇒ s ∨ u and r ⇒ s ∨ u

8/43

slide-31
SLIDE 31

A Problematic Example for OR

t ¬s q s v p q ∨ r s ∨ u v r u v !

  • Suppose now we also have t and t ⇒ ¬s.
  • the possible defeater has no effect on the generalized

path

9/43

slide-32
SLIDE 32

A Problematic Example for OR

t ¬s q s v p q ∨ r s ∨ u v t′ ¬r r u v ! !

  • Suppose now we also have t′ and t′ ⇒ ¬r.
  • the additional possible defeater has no effect on the

generalized path

10/43

slide-33
SLIDE 33

Extension-based Approaches: Default Logic (Reiter)

  • Input: set of defaults and a set of formulas (“facts”)
  • Build extensions by applying Modus Ponens to defaults

while maintaining consistency

  • For instance:

Republican Pacifist Nixon Quaker Pacifist

is a is a

  • Extensions:

1. Nixon Republican Quaker Pacifist 2. Nixon Republican Quaker Pacifist

11/43

slide-34
SLIDE 34

Extension-based Approaches: Default Logic (Reiter)

  • Input: set of defaults and a set of formulas (“facts”)
  • Build extensions by applying Modus Ponens to defaults

while maintaining consistency

  • For instance:

Republican ¬Pacifist Nixon Quaker Pacifist

is a is a

  • Extensions:

1. Nixon Republican Quaker Pacifist 2. Nixon Republican Quaker Pacifist

11/43

slide-35
SLIDE 35

Extension-based Approaches: Default Logic (Reiter)

  • Input: set of defaults and a set of formulas (“facts”)
  • Build extensions by applying Modus Ponens to defaults

while maintaining consistency

  • For instance:

Republican ¬Pacifist Nixon Quaker Pacifist

is a is a

  • Extensions:
  • 1. {Nixon, Republican, Quaker, ¬Pacifist}
  • 2. {Nixon, Republican, Quaker, Pacifist}

11/43

slide-36
SLIDE 36

Extension-based Approaches: Default Logic (Reiter)

  • no handling of disjunctive facts “out-of-the-box”
  • for instance: Σ = {Republican ∨ Democrat, Republican ⇒

political, Democrat ⇒ political}. Republican Republican ∨ Democrat political Democrat

? ?

  • since the default is not triggered by the fact, MP cannot be

applied

12/43

slide-37
SLIDE 37

Extension-based Approaches: Default Logic (Reiter)

  • idea: split the factual part of the knowledge base

(Gelfond, Lifschitz, Przymusinska, 1991) Republican Republican Republican ∨ Democrat political Democrat Democrat

Base 1 Base 2

  • two extensions:
  • 1. Republican, political
  • 2. Democrat, political

13/43

slide-38
SLIDE 38

Extension-based Approaches: Default Logic (Reiter)

  • idea: split the factual part of the knowledge base

(Gelfond, Lifschitz, Przymusinska, 1991) Republican Republican Republican ∨ Democrat political Democrat Democrat

Base 1 Base 2

  • two extensions:
  • 1. Republican, political
  • 2. Democrat, political

13/43

slide-39
SLIDE 39

Problematic Example for Disjunctive Defaults

Consider the following example:

  • 1. Either his left hand or his right hand is broken. lhb ∨ rhb
  • 2. If somebody writes legibly then usually the right hand is

not broken. wl rhb

  • 3. He writes legibly.

wl With disjunctive default logic we get two extensions:

  • 1. wl,

rhb, lhb

  • 2. wl, rhb

14/43

slide-40
SLIDE 40

Problematic Example for Disjunctive Defaults

Consider the following example:

  • 1. Either his left hand or his right hand is broken. lhb ∨ rhb
  • 2. If somebody writes legibly then usually the right hand is

not broken. wl ⇒ ¬rhb

  • 3. He writes legibly.

wl With disjunctive default logic we get two extensions:

  • 1. wl,

rhb, lhb

  • 2. wl, rhb

14/43

slide-41
SLIDE 41

Problematic Example for Disjunctive Defaults

Consider the following example:

  • 1. Either his left hand or his right hand is broken. lhb ∨ rhb
  • 2. If somebody writes legibly then usually the right hand is

not broken. wl ⇒ ¬rhb

  • 3. He writes legibly.

wl With disjunctive default logic we get two extensions:

  • 1. wl,

rhb, lhb

  • 2. wl, rhb

14/43

slide-42
SLIDE 42

Problematic Example for Disjunctive Defaults

Consider the following example:

  • 1. Either his left hand or his right hand is broken. lhb ∨ rhb
  • 2. If somebody writes legibly then usually the right hand is

not broken. wl ⇒ ¬rhb

  • 3. He writes legibly.

wl With disjunctive default logic we get two extensions:

  • 1. wl, ¬rhb, lhb
  • 2. wl, rhb

14/43

slide-43
SLIDE 43

General Stratagem

So far: Manipulate the database!

  • 1. produce new defeasible rules from the given ones
  • 2. produce new factual knowledge bases when confronted

with disjunctive information

15/43

slide-44
SLIDE 44

Enters: the Argumentative Approach

  • Instead of manipulating the knowledge base and

reasoning on top of the manipulated database,

  • we will, in what follows, use a more direct approach to the

modeling of Reasoning by Cases in the context of defeasible reasoning, following the inference scheme: A ∨ B A ⇒ · · · ⇒ C B ⇒ · · · ⇒ C C

  • r, more generally:

A ∨ B A | ∼ C B | ∼ C C

  • This will allow us to have more control over defeating

conditions …

  • … and to avoid pitfalls as the ones demonstrated above.

16/43

slide-45
SLIDE 45

A New Type of Argument: RbC-Arguments

Basic idea: Given

  • an argument a1 ∈ Arg(T) for which Conc(a1) = A ∨ B,
  • an argument a2

Arg A with Conc a2 C, and

  • an argument a3

Arg B with Conc a3 C, we introduce a new RbC-Argument a1 a2 a3 C .

17/43

slide-46
SLIDE 46

A New Type of Argument: RbC-Arguments

Basic idea: Given

  • an argument a1 ∈ Arg(T) for which Conc(a1) = A ∨ B,
  • an argument a2 ∈ Arg(⟨D, K ∪ {A}⟩) with Conc(a2) = C, and
  • an argument a3

Arg B with Conc a3 C, we introduce a new RbC-Argument a1 a2 a3 C .

17/43

slide-47
SLIDE 47

A New Type of Argument: RbC-Arguments

Basic idea: Given

  • an argument a1 ∈ Arg(T) for which Conc(a1) = A ∨ B,
  • an argument a2 ∈ Arg(⟨D, K ∪ {A}⟩) with Conc(a2) = C, and
  • an argument a3 ∈ Arg(⟨D, K ∪ {B}⟩) with Conc(a3) = C,

we introduce a new RbC-Argument a1 a2 a3 C .

17/43

slide-48
SLIDE 48

A New Type of Argument: RbC-Arguments

Basic idea: Given

  • an argument a1 ∈ Arg(T) for which Conc(a1) = A ∨ B,
  • an argument a2 ∈ Arg(⟨D, K ∪ {A}⟩) with Conc(a2) = C, and
  • an argument a3 ∈ Arg(⟨D, K ∪ {B}⟩) with Conc(a3) = C,

we introduce a new RbC-Argument ⟨a1, [a2], [a3] C⟩ .

17/43

slide-49
SLIDE 49

More general: RbC-Argument

Definition Where

  • a0 ∈ Arg(T) with Conc(a0) = ∨n

i=1 Ai and

  • ai ∈ Arg(⟨D, K ∪ {Ai}⟩) \ Arg(T) (1 ≤ i ≤ n),

⟨a0, [a1], . . . , [an] ∨n

i=1 Conc(Ai)⟩ is an RbC-argument.

  • We say that a1

an are hypothetical sub-arguments of a, in signs: a1 an HSub a .

  • For each ai, Hyp ai

Ai.

18/43

slide-50
SLIDE 50

More general: RbC-Argument

Definition Where

  • a0 ∈ Arg(T) with Conc(a0) = ∨n

i=1 Ai and

  • ai ∈ Arg(⟨D, K ∪ {Ai}⟩) \ Arg(T) (1 ≤ i ≤ n),

⟨a0, [a1], . . . , [an] ∨n

i=1 Conc(Ai)⟩ is an RbC-argument.

  • We say that a1, . . . , an are hypothetical sub-arguments of

a, in signs: a1, . . . , an ∈ HSub(a).

  • For each ai, Hyp ai

Ai.

18/43

slide-51
SLIDE 51

More general: RbC-Argument

Definition Where

  • a0 ∈ Arg(T) with Conc(a0) = ∨n

i=1 Ai and

  • ai ∈ Arg(⟨D, K ∪ {Ai}⟩) \ Arg(T) (1 ≤ i ≤ n),

⟨a0, [a1], . . . , [an] ∨n

i=1 Conc(Ai)⟩ is an RbC-argument.

  • We say that a1, . . . , an are hypothetical sub-arguments of

a, in signs: a1, . . . , an ∈ HSub(a).

  • For each ai, Hyp(ai) = Ai.

18/43

slide-52
SLIDE 52

Let T = ⟨D, K⟩ consist of D = {p ⇒ q ∨ r, q ⇒ s, s ⇒ v, r ⇒ u, u ⇒ v, t ⇒ ¬s} and K = {p, t}. We have for instance the arguments:

  • a1

p q r Arg T

  • a2

q s v Arg q

  • a3

r u v Arg r

  • a4

a1 a2 a3 v Arg T . a1: a2: a3: q s v p q r v r u v

19/43

slide-53
SLIDE 53

Let T = ⟨D, K⟩ consist of D = {p ⇒ q ∨ r, q ⇒ s, s ⇒ v, r ⇒ u, u ⇒ v, t ⇒ ¬s} and K = {p, t}. We have for instance the arguments:

  • a1 = ⟨⟨p⟩ ⇒ q ∨ r⟩ ∈ Arg(T)
  • a2 = ⟨⟨q⟩ ⇒ s ⇒ v⟩ ∈ Arg(⟨D, K ∪ {q}⟩)
  • a3 = ⟨⟨r⟩ ⇒ u ⇒ v⟩ ∈ Arg(⟨D, K ∪ {r}⟩)
  • a4 = ⟨a1, [a2], [a3] v⟩ ∈ Arg(T).

a1: a2: a3: q s v p q ∨ r v r u v

19/43

slide-54
SLIDE 54

What about attacks?

19/43

slide-55
SLIDE 55
  • a1 = ⟨⟨p⟩ ⇒ q ∨ r⟩ ∈ Arg(T)
  • a2 = ⟨⟨q⟩ ⇒ s ⇒ v⟩ ∈ Arg(⟨S, D, K ∪ {q}⟩)
  • a3 = ⟨⟨r⟩ ⇒ u ⇒ v⟩ ∈ Arg(⟨S, D, K ∪ {r}⟩)
  • a4 = ⟨a1, [a2], [a3] v⟩ ∈ Arg(T)
  • a5

t s Arg T a1: a2: a3: q s v p q ∨ r v r u v

20/43

slide-56
SLIDE 56
  • a1 = ⟨⟨p⟩ ⇒ q ∨ r⟩ ∈ Arg(T)
  • a2 = ⟨⟨q⟩ ⇒ s ⇒ v⟩ ∈ Arg(⟨S, D, K ∪ {q}⟩)
  • a3 = ⟨⟨r⟩ ⇒ u ⇒ v⟩ ∈ Arg(⟨S, D, K ∪ {r}⟩)
  • a4 = ⟨a1, [a2], [a3] v⟩ ∈ Arg(T)
  • a5 = ⟨⟨t⟩ ⇒ ¬s⟩ ∈ Arg(T)

a1: a2: a3: a5: t ¬s q s v p q ∨ r v r u v

20/43

slide-57
SLIDE 57
  • a1 = ⟨⟨p⟩ ⇒ q ∨ r⟩ ∈ Arg(T)
  • a2 = ⟨⟨q⟩ ⇒ s ⇒ v⟩ ∈ Arg(⟨D, K ∪ {q}⟩)
  • a3 = ⟨⟨r⟩ ⇒ u ⇒ v⟩ ∈ Arg(⟨D, K ∪ {r}⟩)
  • a4 = ⟨a1, [a2], [a3] v⟩ ∈ Arg(T)
  • a6

q s Arg q a1: a2: a3: q s v p q ∨ r v r u v

21/43

slide-58
SLIDE 58
  • a1 = ⟨⟨p⟩ ⇒ q ∨ r⟩ ∈ Arg(T)
  • a2 = ⟨⟨q⟩ ⇒ s ⇒ v⟩ ∈ Arg(⟨D, K ∪ {q}⟩)
  • a3 = ⟨⟨r⟩ ⇒ u ⇒ v⟩ ∈ Arg(⟨D, K ∪ {r}⟩)
  • a4 = ⟨a1, [a2], [a3] v⟩ ∈ Arg(T)
  • a6 = ⟨⟨q⟩ ⇒ ¬s⟩ ∈ Arg(⟨D, K ∪ {q}⟩)

a1: a2: a3: a6: q ¬s q s v p q ∨ r v r u v

21/43

slide-59
SLIDE 59

Attacks again (non-nested case)

Let HArg(T) be the set of all arguments a for which there is a b ∈ Arg(T) for which a ∈ HSub(b). Argumentation frameworks are now triples Arg T HArg T Attacks T . Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b1 bn B iff Conc a B or B Conc a and

  • 1. a

Arg T and b Arg T HArg T or

  • 2. a

HArg T and b HArg T and Hyp a Hyp b .

22/43

slide-60
SLIDE 60

Attacks again (non-nested case)

Let HArg(T) be the set of all arguments a for which there is a b ∈ Arg(T) for which a ∈ HSub(b). Argumentation frameworks are now triples ⟨Arg(T), HArg(T), Attacks(T)⟩. Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b1 bn B iff Conc a B or B Conc a and

  • 1. a

Arg T and b Arg T HArg T or

  • 2. a

HArg T and b HArg T and Hyp a Hyp b .

22/43

slide-61
SLIDE 61

Attacks again (non-nested case)

Let HArg(T) be the set of all arguments a for which there is a b ∈ Arg(T) for which a ∈ HSub(b). Argumentation frameworks are now triples ⟨Arg(T), HArg(T), Attacks(T)⟩. Altogether attacks are defined as follows: Attacks(T) ⊆ (Arg(T) × Arg(T)) ∪ (Arg(T) × HArg(T)) ∪ (HArg(T) × HArg(T)) where a rebuts b b1 bn B iff Conc a B or B Conc a and

  • 1. a

Arg T and b Arg T HArg T or

  • 2. a

HArg T and b HArg T and Hyp a Hyp b .

22/43

slide-62
SLIDE 62

Attacks again (non-nested case)

Let HArg(T) be the set of all arguments a for which there is a b ∈ Arg(T) for which a ∈ HSub(b). Argumentation frameworks are now triples ⟨Arg(T), HArg(T), Attacks(T)⟩. Altogether attacks are defined as follows: Attacks(T) ⊆ (Arg(T) × Arg(T)) ∪ (Arg(T) × HArg(T)) ∪ (HArg(T) × HArg(T)) where a rebuts b = ⟨b1, . . . , bn ⇒ B⟩ iff Conc(a) = ¬B or B = ¬Conc(a) and

  • 1. a ∈ Arg(T) and b ∈ Arg(T) ∪ HArg(T) or
  • 2. a

HArg T and b HArg T and Hyp a Hyp b .

22/43

slide-63
SLIDE 63

Attacks again (non-nested case)

Let HArg(T) be the set of all arguments a for which there is a b ∈ Arg(T) for which a ∈ HSub(b). Argumentation frameworks are now triples ⟨Arg(T), HArg(T), Attacks(T)⟩. Altogether attacks are defined as follows: Attacks(T) ⊆ (Arg(T) × Arg(T)) ∪ (Arg(T) × HArg(T)) ∪ (HArg(T) × HArg(T)) where a rebuts b = ⟨b1, . . . , bn ⇒ B⟩ iff Conc(a) = ¬B or B = ¬Conc(a) and

  • 1. a ∈ Arg(T) and b ∈ Arg(T) ∪ HArg(T) or
  • 2. a ∈ HArg(T) and b ∈ HArg(T) and Hyp(a) = Hyp(b).

22/43

slide-64
SLIDE 64

Unrestricted Rebut

slide-65
SLIDE 65

joint work: Jesse Heyninck and Christian Straßer

22/43

slide-66
SLIDE 66

Status quo

  • in ASPIC+ only restricted rebut: a rebuts b iff
  • 1. the conclusion of a is contrary to the conclusion of b
  • 2. and b has a defeasible top rule
  • unrestricted rebut: only the first requirement
  • pro: natural (Caminada)
  • contra: leads to trouble for many semantics such as

preferred, stable, etc

23/43

slide-67
SLIDE 67

Status quo

  • in ASPIC+ only restricted rebut: a rebuts b iff
  • 1. the conclusion of a is contrary to the conclusion of b
  • 2. and b has a defeasible top rule
  • unrestricted rebut: only the first requirement
  • pro: natural (Caminada)
  • contra: leads to trouble for many semantics such as

preferred, stable, etc

23/43

slide-68
SLIDE 68

Enters: Caminada et al. (COMMA 2014)

  • for grounded semantics unrestricted rebut works just fine

(really?)

  • Rationality postulates:
  • Sub-argument closure: where a

and b Sub a , b .

  • Closure under strict rules: where a1

an Arg T and Conc a1 Conc an B, also a1 an B Arg T

  • Consistency:

Conc a a is consistent.

24/43

slide-69
SLIDE 69

Enters: Caminada et al. (COMMA 2014)

  • for grounded semantics unrestricted rebut works just fine

(really?)

  • Rationality postulates:
  • Sub-argument closure: where a ∈ E and b ∈ Sub(a), b ∈ E.
  • Closure under strict rules: where a1

an Arg T and Conc a1 Conc an B, also a1 an B Arg T

  • Consistency:

Conc a a is consistent.

24/43

slide-70
SLIDE 70

Enters: Caminada et al. (COMMA 2014)

  • for grounded semantics unrestricted rebut works just fine

(really?)

  • Rationality postulates:
  • Sub-argument closure: where a ∈ E and b ∈ Sub(a), b ∈ E.
  • Closure under strict rules: where a1, . . . , an ∈ E ∩ Arg(T)

and Conc(a1), . . . , Conc(an) ⊢ B, also ⟨a1, . . . , an → B⟩ ∈ E ∩ Arg(T)

  • Consistency:

Conc a a is consistent.

24/43

slide-71
SLIDE 71

Enters: Caminada et al. (COMMA 2014)

  • for grounded semantics unrestricted rebut works just fine

(really?)

  • Rationality postulates:
  • Sub-argument closure: where a ∈ E and b ∈ Sub(a), b ∈ E.
  • Closure under strict rules: where a1, . . . , an ∈ E ∩ Arg(T)

and Conc(a1), . . . , Conc(an) ⊢ B, also ⟨a1, . . . , an → B⟩ ∈ E ∩ Arg(T)

  • Consistency: {Conc(a) | a ∈ E} is consistent.

24/43

slide-72
SLIDE 72

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-73
SLIDE 73

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-74
SLIDE 74

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-75
SLIDE 75

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-76
SLIDE 76

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-77
SLIDE 77

Grounded Semantics

c d a b e f h i g

  • first select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • select unattacked arguments
  • remove the arguments attacked by the selected arguments
  • and so on … until fixed point is reached

25/43

slide-78
SLIDE 78

Non-Interference

For a set of formulas F let Atoms(F) be the set of all propositional atoms in F.

  • Non-interference1 Where T

and T are argumentation theories and A is a formula such that Atoms A Atoms then: T A iff A

1Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic

relevance criterion.

26/43

slide-79
SLIDE 79

Non-Interference

For a set of formulas F let Atoms(F) be the set of all propositional atoms in F.

  • Non-interference1 Where T = ⟨D, K⟩ and T′ = ⟨D′, K′⟩ are

argumentation theories and A is a formula such that Atoms(D ∪ K ∪ {A}) ∩ Atoms(D′ ∪ K′) = ∅ then: T | ∼ A iff ⟨D ∪ D′, K ∪ K′⟩ | ∼ A.

1Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic

relevance criterion.

26/43

slide-80
SLIDE 80

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a

p is in the grounded extension.

  • Now, take the knowledge base:

p s s .

  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by

s s p .

  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-81
SLIDE 81

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base:

p s s .

  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by

s s p .

  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-82
SLIDE 82

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base: {⊤ ⇒ p, ⊤ ⇒ s, ⊤ ⇒ ¬s}.
  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by

s s p .

  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-83
SLIDE 83

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base: {⊤ ⇒ p, ⊤ ⇒ s, ⊤ ⇒ ¬s}.
  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by

s s p .

  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-84
SLIDE 84

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base: {⊤ ⇒ p, ⊤ ⇒ s, ⊤ ⇒ ¬s}.
  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by ⟨⟨⊤ ⇒ s⟩, ⟨⊤ ⇒ ¬s⟩ → ¬p⟩.
  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-85
SLIDE 85

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base: {⊤ ⇒ p, ⊤ ⇒ s, ⊤ ⇒ ¬s}.
  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by ⟨⟨⊤ ⇒ s⟩, ⟨⊤ ⇒ ¬s⟩ → ¬p⟩.
  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-86
SLIDE 86

The problem with unrestricted rebut in ASPIC−

  • Take the knowledge base: {⊤ ⇒ p}.
  • Clearly: a = ⟨⊤ ⇒ p⟩ is in the grounded extension.
  • Now, take the knowledge base: {⊤ ⇒ p, ⊤ ⇒ s, ⊤ ⇒ ¬s}.
  • (Let the strict rules be closed under classical logic.)
  • Now, a is attacked by ⟨⟨⊤ ⇒ s⟩, ⟨⊤ ⇒ ¬s⟩ → ¬p⟩.
  • As a consequence, a is not in the grounded extension.
  • Thus, Non-Interference doesn’t hold for unrestricted rebut.

27/43

slide-87
SLIDE 87

Prima Facie solution

  • sort out inconsistent arguments (Wu, 2012: this works in

ASPIC+)

  • however, this doesn’t work with unrestricted rebut

28/43

slide-88
SLIDE 88

Prima Facie solution ii

Let {⊤ ⇒1 p, p ⇒1 q, ⊤ ⇒2 ¬(p ∧ q)} be our knowledge base. We have, e.g., the following arguments:

  • a = ⟨⊤ ⇒1 p⟩
  • b = ⟨a ⇒1 q⟩
  • a ⊕ b = ⟨a, b → p ∧ q⟩
  • c = ⟨⊤ ⇒2 ¬(p ∧ q)⟩
  • a ⊕ c = ⟨a, c → ¬q⟩
  • b ⊕ c = ⟨b, c → ¬p⟩

a b c b ⊕ c a ⊕ c a ⊕ b Problem:

  • b

c is inconsistent and thus filtered out

  • this leaves a and c in but

a c out of the grounded extension.

  • Failure of closure!

29/43

slide-89
SLIDE 89

Prima Facie solution ii

Let {⊤ ⇒1 p, p ⇒1 q, ⊤ ⇒2 ¬(p ∧ q)} be our knowledge base. We have, e.g., the following arguments:

  • a = ⟨⊤ ⇒1 p⟩
  • b = ⟨a ⇒1 q⟩
  • a ⊕ b = ⟨a, b → p ∧ q⟩
  • c = ⟨⊤ ⇒2 ¬(p ∧ q)⟩
  • a ⊕ c = ⟨a, c → ¬q⟩
  • b ⊕ c = ⟨b, c → ¬p⟩

a b c b ⊕ c a ⊕ c a ⊕ b Problem:

  • b ⊕ c is inconsistent and

thus filtered out

  • this leaves a and c in but

a ⊕ c out of the grounded extension.

  • Failure of closure!

29/43

slide-90
SLIDE 90

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • A1

An

df n i 1 Ai, or

  • A1

An

df n i 1 Ai.

  • Concs a

df

Conc b b Sub a Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a.

30/43

slide-91
SLIDE 91

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • {A1, . . . , An} =df

∧n

i=1 Ai, or

  • A1

An

df n i 1 Ai.

  • Concs a

df

Conc b b Sub a Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a.

30/43

slide-92
SLIDE 92

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • {A1, . . . , An} =df

∧n

i=1 Ai, or

  • {A1, . . . , An} =df

∨n

i=1 Ai.

  • Concs a

df

Conc b b Sub a Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a.

30/43

slide-93
SLIDE 93

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • {A1, . . . , An} =df

∧n

i=1 Ai, or

  • {A1, . . . , An} =df

∨n

i=1 Ai.

  • Concs(a) =df {Conc(b) | b ∈ Sub(a)}

Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a.

30/43

slide-94
SLIDE 94

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • {A1, . . . , An} =df

∧n

i=1 Ai, or

  • {A1, . . . , An} =df

∨n

i=1 Ai.

  • Concs(a) =df {Conc(b) | b ∈ Sub(a)}

Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a.

30/43

slide-95
SLIDE 95

Enters: ASPIC⊖: generalized unrestricted rebut

  • lifting of the contrariness operator to (finite) sets of

formulas, e.g.,

  • {A1, . . . , An} =df

∧n

i=1 Ai, or

  • {A1, . . . , An} =df

∨n

i=1 Ai.

  • Concs(a) =df {Conc(b) | b ∈ Sub(a)}

Definition a gen-rebuts b iff b is defeasible and Conc(a) = ∆ for some ∆ ⊆ Concs(b). Definition a gen-defeats b iff a gen-rebuts c for some c ∈ Sub(b) and c ⪯ a.

30/43

slide-96
SLIDE 96

Back to the example

a b c b ⊕ c a ⊕ c a ⊕ b

31/43

slide-97
SLIDE 97

Rationality

Where the strict rules are obtained from classical logic, for weakest link we get

  • sub-argument closure
  • closure under strict rules
  • consistency
  • non-interference

32/43

slide-98
SLIDE 98

Comparative Studies

slide-99
SLIDE 99

Jesse Heyninck, Christian Straßer: Relations between assumption-based approaches in nonmonotonic logic and formal argumentation (NMR 2016, Cape Town, also available

  • n Arxiv)

32/43

slide-100
SLIDE 100

The landscape

  • ABA: assumption-based argumentation (Dung, Kowalski,

Toni)

  • ALs: adaptive logics (Batens)
  • DACR: default assumptions (Makinson)
  • KLM: preferential semantics (Shoham,

Kraus/Lehman/Magidor)

33/43

slide-101
SLIDE 101

On the argumentative side

  • ASPIC+:
  • defeasible and strict rules
  • various attack types: rebuts, undercuts, undermine
  • arguments as proof trees
  • ABA (Assumption-based argumentation)
  • only strict rules
  • higher level of abstraction: arguments as sets of defeasible

assumptions

  • only “assumption-attacks” (

undermine)

  • our translation: without priorities

34/43

slide-102
SLIDE 102

On the argumentative side

  • ASPIC+:
  • defeasible and strict rules
  • various attack types: rebuts, undercuts, undermine
  • arguments as proof trees
  • ABA (Assumption-based argumentation)
  • only strict rules
  • higher level of abstraction: arguments as sets of defeasible

assumptions

  • only “assumption-attacks” (≈ undermine)
  • our translation: without priorities

34/43

slide-103
SLIDE 103

Currently

  • extending (Heyninck, Straßer, NMR 2016) with priorities
  • relations between adaptive logics and parametrized logic

programming (Jesse Heyninck, Pere Pardo, Christian Straßer)

35/43

slide-104
SLIDE 104

Sequent-based argumentation (with Ofer Arieli, Tel Aviv)

slide-105
SLIDE 105

Sequent-based Argumentation

  • arguments are
  • provable sequents, where
  • is a sound and complete sequent-calculus
  • of a (Tarskian) core logic L

36/43

slide-106
SLIDE 106

Sequent-based Argumentation

  • arguments are C-provable sequents, where
  • is a sound and complete sequent-calculus
  • of a (Tarskian) core logic L

36/43

slide-107
SLIDE 107

Sequent-based Argumentation

  • arguments are C-provable sequents, where
  • C is a sound and complete sequent-calculus
  • of a (Tarskian) core logic L

36/43

slide-108
SLIDE 108

Sequent-based Argumentation

  • arguments are C-provable sequents, where
  • C is a sound and complete sequent-calculus
  • of a (Tarskian) core logic L

36/43

slide-109
SLIDE 109

Sequent-based attacks: elimination rules

Attacker Sequent Conditions Attacked Sequent Eliminated Sequent Examples

  • Undercut:

1 1 1 2 2 2 2 2 2 2

  • Compact Undercut:

1 2 2 2 2 2

  • Rebuttal:

1 1 1 2 2 2 2 2

  • Specificity, etc.

37/43

slide-110
SLIDE 110

Sequent-based attacks: elimination rules

Attacker Sequent Conditions Attacked Sequent Eliminated Sequent Examples

  • Undercut:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬∧Γ′

2

Γ2, Γ′

2 ⇒ ψ2

Γ2, Γ′

2 ̸⇒ ψ2

  • Compact Undercut:

1 2 2 2 2 2

  • Rebuttal:

1 1 1 2 2 2 2 2

  • Specificity, etc.

37/43

slide-111
SLIDE 111

Sequent-based attacks: elimination rules

Attacker Sequent Conditions Attacked Sequent Eliminated Sequent Examples

  • Undercut:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬∧Γ′

2

Γ2, Γ′

2 ⇒ ψ2

Γ2, Γ′

2 ̸⇒ ψ2

  • Compact Undercut:

Γ1 ⇒ ¬ ∧ Γ′

2

Γ2, Γ′

2 ⇒ ψ

Γ2, Γ′

2 ̸⇒ ψ

  • Rebuttal:

1 1 1 2 2 2 2 2

  • Specificity, etc.

37/43

slide-112
SLIDE 112

Sequent-based attacks: elimination rules

Attacker Sequent Conditions Attacked Sequent Eliminated Sequent Examples

  • Undercut:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬∧Γ′

2

Γ2, Γ′

2 ⇒ ψ2

Γ2, Γ′

2 ̸⇒ ψ2

  • Compact Undercut:

Γ1 ⇒ ¬ ∧ Γ′

2

Γ2, Γ′

2 ⇒ ψ

Γ2, Γ′

2 ̸⇒ ψ

  • Rebuttal:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬ψ2 Γ2 ⇒ ψ2 Γ2 ̸⇒ ψ2

  • Specificity, etc.

37/43

slide-113
SLIDE 113

Sequent-based attacks: elimination rules

Attacker Sequent Conditions Attacked Sequent Eliminated Sequent Examples

  • Undercut:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬∧Γ′

2

Γ2, Γ′

2 ⇒ ψ2

Γ2, Γ′

2 ̸⇒ ψ2

  • Compact Undercut:

Γ1 ⇒ ¬ ∧ Γ′

2

Γ2, Γ′

2 ⇒ ψ

Γ2, Γ′

2 ̸⇒ ψ

  • Rebuttal:

Γ1 ⇒ ψ1 ⇒ ψ1 ↔ ¬ψ2 Γ2 ⇒ ψ2 Γ2 ̸⇒ ψ2

  • Specificity, etc.

37/43

slide-114
SLIDE 114

Dynamic proof theories

1. p ⇒ p Axiom 2. ⇒ p, ¬p [⇒¬], 1 3. ⇒ p ∨ ¬p [⇒∨], 2 4. p ∨ ¬p ⇒ ¬(p ∧ ¬p) . . . 5. ¬(p ∧ ¬p) ⇒ p ∨ ¬p . . . 6. q ⇒ q Axiom 7. ¬p ⇒ ¬p Axiom 8. p ̸⇒ p Ucut, 7, 7, 7, 1 ¬p ⇒ ¬p 9. p ⇒ ¬¬p … 10. ¬¬p ⇒ p … 11. ¬p ̸⇒ ¬p Ucut, 1, 9, 10, 7 p ⇒ p

38/43

slide-115
SLIDE 115

Dynamic proof theories (Retraction, Basic Idea)

function Evaluate(D) /* D Attack := ∅; Elim := ∅; Derived := ∅; while (D is not empty) do { if (Top(D) = ⟨i, s, J, ∅⟩) then Derived := Derived ∪ {s}; if (Top(D) = ⟨i, s, J, r⟩) then if (r ̸∈ Elim) then Elim := Elim ∪ {s} and Attack := Attack ∪ {r}; D := Tail(D); } Accept := Derived − Elim; return (Attack, Elim, Accept)

  • A derivation must be

coherent: Attack(D) ∩ Elim(D) = ∅

  • A sequent A is

finally derived in a dynamic derivation D if A Accept D and D cannot be extended to a dynamic derivation D such that A Elim D .

39/43

slide-116
SLIDE 116

Dynamic proof theories (Retraction, Basic Idea)

function Evaluate(D) /* D Attack := ∅; Elim := ∅; Derived := ∅; while (D is not empty) do { if (Top(D) = ⟨i, s, J, ∅⟩) then Derived := Derived ∪ {s}; if (Top(D) = ⟨i, s, J, r⟩) then if (r ̸∈ Elim) then Elim := Elim ∪ {s} and Attack := Attack ∪ {r}; D := Tail(D); } Accept := Derived − Elim; return (Attack, Elim, Accept)

  • A derivation must be

coherent: Attack(D) ∩ Elim(D) = ∅

  • A sequent A is

finally derived in a dynamic derivation D if A ∈ Accept(D) and D cannot be extended to a dynamic derivation D′ such that A ∈ Elim(D′).

39/43

slide-117
SLIDE 117

Sequent-based Argumentation: some publications

  • Ofer Arieli, Christian Straßer, Sequent-Based Logical Argumentation, in

Argument and Computation, Vol. 6, Issue 1, pp. 73–99, 2015

  • Ofer Arieli, Christian Straßer, Dynamic Derivations for Sequent-Based

Deductive Argumentation, Proceedings of Computational Models of Argument (Editors: S. Parsons, N. Oren, C. Reed, and F. Cerutti) in the series Frontiers in Artificial Intelligence and Applications, Volume 266, IOS Press, pp. 89–100, 2014

  • Christian Straßer and Ofer Ariel, Normative Reasoning by

Sequent-Based Argumentation, Journal of Logic and Computation, doi.org/10.1093/logcom/exv050 (2015)

  • Ofer Arieli and Christian Straßer, Deductive argumentation by enhanced

sequent calculi and dynamic derivations, Electronic Notes in Theoretical Computer Science, 323, 21–37 (2016).

  • Ofer Arieli, Annemarie Borg, and Christian Straßer, Argumentative

Approaches to Reasoning with Consistent Subsets of Premises in proceedings of IEA/AIE’2017 (full paper), Lecture Notes in Artificial Intelligence series, Springer (2017)

40/43

slide-118
SLIDE 118

Agent-Based Models

slide-119
SLIDE 119
  • joint work: AnneMarie Borg, Daniel Frey, Dunja Šešelja and

Christian Straßer

  • Borg A., Frey D., Šešelja D. and Straßer C. (accepted) An

Argumentative Agent-Based Model of Scientific Inquiry, forthcoming in the Proceedings of IEA/AIE, Springer-Verlag (extended version at: https://arxiv.org/abs/1612.04432

  • Borg A., Frey D., Šešelja D. and Straßer C. (under revision)

Epistemic Effects of Scientific Interaction: approaching the question with an argumentative agent-based model, special issue of Historical Social Research: “Agent Based Modelling across Social Science, Economics, and Philosophy”

41/43

slide-120
SLIDE 120

Explanatory Argumentation Frameworks

Šešelja and Straßer, Synthese, 2013, 190:2195–2217

42/43

slide-121
SLIDE 121

Abstract argumentation in our ABM

We represent in an abstract way:

  • arguments
  • discovery relation
  • attack relation

Theory 1 Theory 2

43/43