Skip to main content

Bipolar Argumentation Frameworks, Modal Logic and Semantic Paradoxes

  • Conference paper
  • First Online:
Logic, Rationality, and Interaction (LORI 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11813))

Included in the following conference series:

Abstract

Bipolar Argumentation Frameworks (BAF) are a natural extension of Dung’s Argumentation Frameworks (AF) where a relation of support between arguments is added to the standard attack relation. Despite their interest, BAF present several difficulties and their semantics are quite complex. This paper provides a definition of semantic concepts for BAF in terms of fixpoints of the functions of neutrality and defense, thus preserving most of the fundamental properties of Dung’s AF. From this angle it becomes easy to show that propositional dynamic logic provides an adequate language to talk about BAF. Finally, we illustrate how this framework allows to encode the structure of the referential discourse involved in semantic paradoxes such as the Liar. It turns out that such paradoxes can be seen as BAF without a stable extension.

Carlo Proietti gratefully acknowledges funding received from the European Commission (Marie Skłodowska-Curie Individual Fellowship 2016, 748421) for his research. The authors would like to thank the anonymous reviewers of LORI’19 for many helpful suggestions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Indeed, the only support available in standard AF is the “defense” relation: argument a supports argument b by attacking one of its attackers. This is too restrictive in most real-life debates, where arguments providing direct support are commonly used.

  2. 2.

    We limit ourselves to binary necessary support. Indeed this notion of support is often introduced as a more general relation between a set of arguments and an argument [18, 19].

  3. 3.

    Evidential support can be seen as a special kind of necessary support where an argument cannot be accepted unless it is ultimately supported by “evidence”, the latter being a special type argument (also called a prima facie argument) that can be neither attacked nor supported by other arguments.

  4. 4.

    A similar strategy was proposed by [7], which already provides some of our results. However, this was done without the use of algebraic and fixpoint notions.

  5. 5.

    Fixpoint-theoretic notions were of high impact in Dung’s original work; since then, they have been scarcely exploited for the study of BAF and for abstract argumentation in general.

  6. 6.

    We recall that a binary relation is well-founded whenever it does not contain any infinitely descending chain, i.e., in our case, there exists no infinite chain \(a_{0} \leftarrow a_{1} \leftarrow \dots \leftarrow a_{n} \leftarrow \dots \) of attacked arguments.

  7. 7.

    This is because both relations \( \rightarrow \Rightarrow ^{*}\) and \((\Rightarrow ^{-1})^{*} \rightarrow \) are contained in relation \((\Rightarrow ^{-1})^{*} \rightarrow \Rightarrow ^{*}\).

  8. 8.

    In an analogous way we could assume extended or \(n+\)-attacks as our primitive notion and define the neutrality and defense function accordingly.

  9. 9.

    We may rephrase this condition as: for any \(x \in X\), all of x’s attackers are outside X and all x’s supporters are inside.

  10. 10.

    That is, \(R_{\alpha ^{-1}} = (R_\alpha )^{-1}\), \(R_{\beta ^{-1}} = (R_\beta )^{-1}\), \( R_{\pi ;\pi '} = \{ (a,b) \in A \times A \mid \exists c \in A : (R_{\pi }ac \,\,{ \& }\,\, R_{\pi '}cb)\}\) and \(R_{\pi ^*} = \bigcup _{n \ge 0} R_{\pi ^n}\) (with \(R_{\pi ^0} = \{ (a,a) \mid a \in A \}\) and \(R_{\pi ^{n+1}} = R_{\pi ^{n};\pi }\), for the latter).

  11. 11.

    Thus, (i) \(\mathcal {M},a\,\models \,\langle \alpha \rangle \phi \) if and only if \(\exists b \in A\) with \(b \rightarrow a\) and \(b \in [\![\phi ]\!]_{\mathcal {M}}\), (ii) \(\mathcal {M},a\,\models \,\langle \beta \rangle \phi \) if and only if \(\exists b \in A\) with \(b \Rightarrow a\) and \(b \in [\![\phi ]\!]_{\mathcal {M}}\), and (iii) \(\mathcal {M},a\,\models \,[U] \phi \) if and only if \([\![\phi ]\!]_{\mathcal {M}} = A\).

  12. 12.

    See [2, 16] for the PDL, converse and [U] fragments. (See [21, 22] for PDL\(+[U]\)).

  13. 13.

    Thus, the formulas \([U]([\alpha ] p \supset p) \supset p\), \([U]([\beta ^{*};\alpha ] p \supset p) \supset p\) and \([U]([\beta ^{-1*};\alpha ] p \supset p) \supset p\) characterise, respectively, the well-foundedness of \(\rightarrow \), \(\rightarrow \Rightarrow ^{*}\) and \(\rightarrow (\Rightarrow ^{-1})^{*}\).

References

  1. Bezem, M., Grabmayer, C., Walicki, M.: Expressive power of digraph solvability. Ann. Pure Appl. Logic 162(3), 200–212 (2012)

    Article  MathSciNet  Google Scholar 

  2. Blackburn, P., de Rijke, M., Venema, Y.: Modal Logic. Cambridge University Press, Cambridge (2001)

    Book  Google Scholar 

  3. Boella, G., Gabbay, D.M., van der Torre, L., Villata, S.: Support in abstract argumentation. In: COMMA 2010, pp. 111–122. IOS Press (2010)

    Google Scholar 

  4. Caminada, M., Gabbay, D.: A logical account of abstract argumentation. Studia Logica 93, 109–145 (2009)

    Article  MathSciNet  Google Scholar 

  5. Cayrol, C., Lagasquie-Schiex, M.C.: On the acceptability of arguments in bipolar argumentation frameworks. In: Godo, L. (ed.) ECSQARU 2005. LNCS (LNAI), vol. 3571, pp. 378–389. Springer, Heidelberg (2005). https://doi.org/10.1007/11518655_33

    Chapter  Google Scholar 

  6. Cayrol, C., Lagasquie-Schiex, M.C.: Bipolarity in argumentation graphs: towards a better understanding. Int. J. Approx. Reasoning 54(7), 876–899 (2013)

    Article  MathSciNet  Google Scholar 

  7. Cayrol, C., Lagasquie-Schiex, M.-C.: An axiomatic approach to support in argumentation. In: Black, E., Modgil, S., Oren, N. (eds.) TAFA 2015. LNCS (LNAI), vol. 9524, pp. 74–91. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28460-6_5

    Chapter  MATH  Google Scholar 

  8. Cook, R.: Patterns of paradox. J. Symbolic Logic 69(3), 767–774 (2004)

    Article  MathSciNet  Google Scholar 

  9. Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321–357 (1995)

    Article  MathSciNet  Google Scholar 

  10. Dyrkolbotn, S.: Doing argumentation using theories in graph normal form. In: Rendsvig, R., Katrenko, S. (eds.) ESSLLI 2012 Student Session Proceedings, pp. 13–22 (2012)

    Google Scholar 

  11. Dyrkolbotn, S., Walicki, M.: Propositional discourse logic. Ann. Pure Appl. Logic 162(3), 200–212 (2014)

    MATH  Google Scholar 

  12. Gaifman, H.: Operational pointer semantics: solution to self-referential puzzles. In: Vardi, M. (ed.) Theoretical Aspects of Reasoning About Knowledge, pp. 43–59 (1988)

    Google Scholar 

  13. Grossi, D.: On the logic of argumentation theory. In: van der Hoek, W., Kaminka, G., Lespérance, Y., Sen, S. (eds.) Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), pp. 409–416 (2010)

    Google Scholar 

  14. Grossi, D.: Argumentation in the view of modal logic. In: McBurney, P., Rahwan, I., Parsons, S. (eds.) ArgMAS 2010. LNCS (LNAI), vol. 6614, pp. 190–208. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21940-5_12

    Chapter  Google Scholar 

  15. Grossi, D., Gabbay, D.: When are two arguments the same? Invariance in abstract argumentation. In: Baltag, A., Smets, S. (eds.) Johan van Benthem on Logic and Information Dynamics, pp. 677–701 (2012)

    Google Scholar 

  16. Harel, D., Tiuryn, J., Kozen, D.: Dynamic Logic. MIT Press, Cambridge (2000)

    Book  Google Scholar 

  17. Nouioua, F., Risch, V.: Bipolar argumentation frameworks with specialized supports. In: 22nd International Conference on Tools with Artificial Intelligence, vol. 1, pp. 215–218 (2010)

    Google Scholar 

  18. Nouioua, F., Risch, V.: Argumentation frameworks with necessities. In: Benferhat, S., Grant, J. (eds.) SUM 2011. LNCS (LNAI), vol. 6929, pp. 163–176. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23963-2_14

    Chapter  Google Scholar 

  19. Nouioua, F.: AFs with necessities: further semantics and labelling characterization. In: Liu, W., Subrahmanian, V.S., Wijsen, J. (eds.) SUM 2013. LNCS (LNAI), vol. 8078, pp. 120–133. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40381-1_10

    Chapter  Google Scholar 

  20. Oren, N., Norman, T.J.: Semantics for evidence-based argumentation. In: COMMA 2008, pp. 276–284 (2008)

    Google Scholar 

  21. Passy, S., Tinchev, T.: PDL with data constants. Inf. Process. Lett. 20(1), 35–41 (1985)

    Article  MathSciNet  Google Scholar 

  22. Passy, S., Tinchev, T.: Quantifiers in combinatory PDL: completeness, definability, incompleteness. In: Budach, L. (ed.) FCT 1985. LNCS, vol. 199, pp. 512–519. Springer, Heidelberg (1985). https://doi.org/10.1007/BFb0028835

    Chapter  Google Scholar 

  23. Walicki, M.: Reference, paradoxes and truth. Synthese 171, 195–226 (2009)

    Article  MathSciNet  Google Scholar 

  24. Wen, L.: Semantic paradoxes as equations. Math. Intell. 23(1), 43–48 (2001)

    Article  MathSciNet  Google Scholar 

  25. Yablo, S.: Paradox without self-reference. Analysis 53(4), 251–252 (1993)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlo Proietti .

Editor information

Editors and Affiliations

Appendix

Appendix

Proof of Theorem 1 :

  1. 1.

    It suffices to show that no \(n{+}\)-attack is possible. Suppose \( \texttt {Adm}^{ns}_{\mathcal {A}}(X)\) and that X contains a and b such that \(a (\Rightarrow ^{-1})^{*} \rightarrow \Rightarrow ^{*} b\). Then there is a c such that \(a (\Rightarrow ^{-1})^{*}c\) and \(c \rightarrow \Rightarrow ^{*} b\) (as in Fig. 2(c)). Therefore c carries a secondary attack towards b. But since X is admissible it defends b against c, i.e. there is \(d \in X\) such that \(d \rightarrow \Rightarrow ^{*} c\). But then \(d \rightarrow \Rightarrow ^{*} a\), i.e. \(d\in X\) attacks \(a\in X\), against the assumption that \( \texttt {Cfr}^{ns}_{\mathcal {A}}(X)\).

  2. 2.

    Suppose \(a \in X\) and \(b \Rightarrow a\). As \(\texttt {Cmp}^{ns}_{\mathcal {A}}(X)\) implies \(X = \mathbf {d}^{ns}_{\mathcal {A}}(X)\), it is enough to show that \(b \in \mathbf {d}^{ns}_{\mathcal {A}}(X)\). Indeed, if \(b\not \in \mathbf {d}^{ns}_{\mathcal {A}}(X)\) then \(\exists c \rightarrow \Rightarrow ^{*}b\) and not \(X \rightarrow \Rightarrow ^{*}c\). But then \(c \rightarrow \Rightarrow ^{*}a\) and X does not defend a, from which we get a contradiction by the completeness of X. Therefore \(b\in \mathbf {d}^{ns}_{\mathcal {A}}(X)\).

  3. 3.

    Suppose \(a \in X\) and \(\exists b \in X\) such that \(b \rightarrow \Rightarrow ^{*}a\). Then there is a c such that \(b \rightarrow c\) and \(c \Rightarrow ^{*}a\). Since \(a \in X\) we get, by \(\Rightarrow ^{-1}\)-closure, that \(c\in X\), which entails that \(X \not \subseteq \mathbf {n}_{\mathcal {A}}(X)\). Contradiction.

  4. 4.

    The proof exploits the equivalence \(\texttt {Stb}^{ns}_{\mathcal {A}}(X)\) iff \(X = \mathbf {n}^{ns}_{\mathcal {A}}(X)\) (Definition 4). It is not difficult to prove that \(X = \mathbf {n}^{ns}_{\mathcal {A}}(X)\) implies \(X = \mathbf {n}_{\mathcal {A}}(X) \cap [\Rightarrow ^{-1}](X)\) even without restriction to well-foundedness of \(\Rightarrow \). We skip this part here.

For the other direction we need to prove that \(\mathbf {n}^{ns}_{\mathcal {A}}(X) = X\). The only difficult part is \(\mathbf {n}^{ns}_{\mathcal {A}}(X) \subseteq X\), the converse inclusion being almost immediate. For this it suffices to show that \(a \not \in X\) implies \(a \not \in \mathbf {n}_{\mathcal {A}}(X)\). Suppose \(a \not \in X\). Therefore, by \(X = \mathbf {n}_{\mathcal {A}}(X) \cap [\Rightarrow ^{-1}](X)\), either (a) \(\exists c_{0} \in X\) such that \(c_{0} \rightarrow a\), in which case \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) and we are done, or else (b) \(\exists b_{0} \not \in X\) such that \(b_{0} \Rightarrow a\). The same reasoning applies to \(b_{0}\): either (a) \(\exists c_{1} \in X\) such that \(c_{1} \rightarrow b\), in which case \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) (since \(c_{1} \rightarrow \Rightarrow ^{*}a\)), or else (b) \(\exists b_{1} \not \in X\) such that \(b_{1} \Rightarrow b_{0}\). Alternative (b) can only apply a finite number of times, otherwise it would determine an infinite descending chain of supports, which is excluded by the well-foundedness of \(\Rightarrow \). Therefore \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) and the inclusion is proved.

Proof of Theorem 2 :

  1. 1.

    Suppose that \( \texttt {Adm}^{ds}_{\mathcal {A}}(X)\) and X contains both a and b with \(a \Rightarrow ^{*}\rightarrow (\Rightarrow ^{-1})^{*} b\). Then there is a c such that \(a \Rightarrow ^{*}c\) and \(c \rightarrow (\Rightarrow ^{-1})^{*} b\). Therefore c carries a mediated attack towards b. Since X is admissible it defends b against c, i.e. there is \(d \in X\) such that \(d \rightarrow (\Rightarrow ^{-1})^{*}c\). But then \(d \rightarrow (\Rightarrow ^{-1})^{*}a\), against the conflict-freeness of X.

  2. 2.

    Suppose \(a \in X\) and \(a \Rightarrow b\). As \( \texttt {Cmp}^{ds}_{\mathcal {A}}(X)\) implies \(X = \mathbf {d}_{\mathcal {A}}(X)\), it is enough to show that \(b\in \mathbf {d}_{\mathcal {A}}(X)\). Suppose \(b\not \in \mathbf {d}_{\mathcal {A}}(X)\); then \(\exists c \rightarrow (\Rightarrow ^{-1})^{*}b\) and not \(X \rightarrow (\Rightarrow ^{-1})^{*}c\). But then clearly \(c \rightarrow (\Rightarrow ^{-1})^{*}a\) and X does not defend a, a contradiction. Therefore \(b\in \mathbf {d}_{\mathcal {A}}(X)\).

Proof of Theorem 3 :

  1. 1.

    From right to left. Assume that \( \texttt {Stb}^{ns}_{\mathcal {A}(\mathcal {T})}( l^{1})\) . Consider any biconditional \(\phi := x_{i} \equiv \bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y\) in the theory. There are two cases: (a) \(l(x_{i}) = 1\), i.e. \(x_{i} \in l^{1}\). An immediate consequence of this, by Theorem 1(4, left-to-right) is that for all attacker x of \(x_{i}\): \(x \not \in l^{1}\), i.e. \(x \in l^{0}\) by the given definition of labelling, and for all supporter y of \(x_{i}\): \(x \in l^{1}\) (closure of stable sets under support Theorem 1(2)). This suffices to guarantee that \(l^{*}(\bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y) = 1\) and then \(l^{*}(\phi ) = 1\).

    (b) \(l(x_{i}) = 0\). Since \(l^{0}\) is the complement of \(l^{1}\), by Theorem 1(4, left-to-right) either some attacker x of \(x_{i}\): \(x \in l^{1}\), or some supporter y of \(x_{i}\): \(y \in l^{0}\). By construction of \(\mathcal {A}(\mathcal {T})\) all supporters and attackers figure on the right handside of \(\phi \). As a consequence \(l^{*}(\bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y) = 0\) and then \(l^{*}(\phi ) = 1\).

  2. 2.

    From left to right. Assume that l is such that \(l^{*}(\phi )=1\) for all \(\phi \in \mathcal {T}\). In order to show that \( \texttt {Stb}^{ns}_{\mathcal {A}(\mathcal {T})}( l^{1})\) we need to prove that \(l^{1} = \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). We first prove that

    1. (a)

      \(l^{1} \subseteq \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Let \(x \in l^{1}\). We have three cases. (a.1) x is of the form \(\overline{y}\). Then by construction x has no supporters and is only attacked by y. Then \(y \in l^{0}\) by condition 1 on labellings. Since, by construction, y is the only (direct or indirect) attacker of x, it follows that \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). (a.2) x appears only on the right hand side of a biconditional. Again, by construction, x has no supporters and is only attacked directly by \(\overline{x}\), which however is labelled 0. Ergo \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Otherwise suppose that (a.3) \(x \in l^{1}\) appears on the left hand side of some biconditional. If \(x \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\) then there is a chain \(y_{0} \rightarrow y_{1} \Rightarrow \dots \Rightarrow y_{n} \Rightarrow x\) such that \(y_{0}\in l^{1}\), \(y_{1}, \dots ,y_{n} \in V(\mathcal {T})\), and at least \(y_{2}, \dots ,y_{n}\) appear on the right hand side of some biconditional. This forces \(y_{1}, \dots ,y_{n} \in l^{1}\). But then \(l^{1} \rightarrow y_{1}\) against condition 1 on labelling. Therefore \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\).

    2. (b)

      \( \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\subseteq l^{1} \). For this is sufficient to show that for every \(x \not \in l^{1}\) there is an \(y \in l^{1}\): \(y \rightarrow \Rightarrow ^{*}x\). It is straightforward to prove this for the cases where (b.1) x is of the form \(\overline{y}\) or (b.2) x appears only on the right hand side of a biconditional.We consider (b.3) \(x = x_{i}\not \in l^{1}\) appears on the left hand side of some biconditional \(\phi := x_{i} \equiv \bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y\). Since \(x_{i} \in l^{0}\) (the complement of \(l^{1}\)) and \(l^{*}(\phi ) = 1\) by assumption, then either one of the conjuncts \(z \in X_{i}\) is in \(l^{1}\), in which case \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\) and we are done, or else one of the conjuncts \(y \in Y_{i}\) is in \(l^{0}\). If y is as in (b.1) or (b.2) then it is attacked by \(l^{1}\) and therefore \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Otherwise y is either attacked by \(l^{1}\) or supported by some \(y'\) in \(l^{0}\). However the chain of supports cannot go on forever because the support relation is well-founded by assumption. Therefore we should finally find some attacker in \(l^{1}\) and \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\).

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag GmbH Germany, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Proietti, C., Grossi, D., Smets, S., Velázquez-Quesada, F.R. (2019). Bipolar Argumentation Frameworks, Modal Logic and Semantic Paradoxes. In: Blackburn, P., Lorini, E., Guo, M. (eds) Logic, Rationality, and Interaction. LORI 2019. Lecture Notes in Computer Science(), vol 11813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-60292-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-60292-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-60291-1

  • Online ISBN: 978-3-662-60292-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics