Abstract
Bipolar Argumentation Frameworks (BAF) are a natural extension of Dung’s Argumentation Frameworks (AF) where a relation of support between arguments is added to the standard attack relation. Despite their interest, BAF present several difficulties and their semantics are quite complex. This paper provides a definition of semantic concepts for BAF in terms of fixpoints of the functions of neutrality and defense, thus preserving most of the fundamental properties of Dung’s AF. From this angle it becomes easy to show that propositional dynamic logic provides an adequate language to talk about BAF. Finally, we illustrate how this framework allows to encode the structure of the referential discourse involved in semantic paradoxes such as the Liar. It turns out that such paradoxes can be seen as BAF without a stable extension.
Carlo Proietti gratefully acknowledges funding received from the European Commission (Marie Skłodowska-Curie Individual Fellowship 2016, 748421) for his research. The authors would like to thank the anonymous reviewers of LORI’19 for many helpful suggestions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Indeed, the only support available in standard AF is the “defense” relation: argument a supports argument b by attacking one of its attackers. This is too restrictive in most real-life debates, where arguments providing direct support are commonly used.
- 2.
- 3.
Evidential support can be seen as a special kind of necessary support where an argument cannot be accepted unless it is ultimately supported by “evidence”, the latter being a special type argument (also called a prima facie argument) that can be neither attacked nor supported by other arguments.
- 4.
A similar strategy was proposed by [7], which already provides some of our results. However, this was done without the use of algebraic and fixpoint notions.
- 5.
Fixpoint-theoretic notions were of high impact in Dung’s original work; since then, they have been scarcely exploited for the study of BAF and for abstract argumentation in general.
- 6.
We recall that a binary relation is well-founded whenever it does not contain any infinitely descending chain, i.e., in our case, there exists no infinite chain \(a_{0} \leftarrow a_{1} \leftarrow \dots \leftarrow a_{n} \leftarrow \dots \) of attacked arguments.
- 7.
This is because both relations \( \rightarrow \Rightarrow ^{*}\) and \((\Rightarrow ^{-1})^{*} \rightarrow \) are contained in relation \((\Rightarrow ^{-1})^{*} \rightarrow \Rightarrow ^{*}\).
- 8.
In an analogous way we could assume extended or \(n+\)-attacks as our primitive notion and define the neutrality and defense function accordingly.
- 9.
We may rephrase this condition as: for any \(x \in X\), all of x’s attackers are outside X and all x’s supporters are inside.
- 10.
That is, \(R_{\alpha ^{-1}} = (R_\alpha )^{-1}\), \(R_{\beta ^{-1}} = (R_\beta )^{-1}\), \( R_{\pi ;\pi '} = \{ (a,b) \in A \times A \mid \exists c \in A : (R_{\pi }ac \,\,{ \& }\,\, R_{\pi '}cb)\}\) and \(R_{\pi ^*} = \bigcup _{n \ge 0} R_{\pi ^n}\) (with \(R_{\pi ^0} = \{ (a,a) \mid a \in A \}\) and \(R_{\pi ^{n+1}} = R_{\pi ^{n};\pi }\), for the latter).
- 11.
Thus, (i) \(\mathcal {M},a\,\models \,\langle \alpha \rangle \phi \) if and only if \(\exists b \in A\) with \(b \rightarrow a\) and \(b \in [\![\phi ]\!]_{\mathcal {M}}\), (ii) \(\mathcal {M},a\,\models \,\langle \beta \rangle \phi \) if and only if \(\exists b \in A\) with \(b \Rightarrow a\) and \(b \in [\![\phi ]\!]_{\mathcal {M}}\), and (iii) \(\mathcal {M},a\,\models \,[U] \phi \) if and only if \([\![\phi ]\!]_{\mathcal {M}} = A\).
- 12.
- 13.
Thus, the formulas \([U]([\alpha ] p \supset p) \supset p\), \([U]([\beta ^{*};\alpha ] p \supset p) \supset p\) and \([U]([\beta ^{-1*};\alpha ] p \supset p) \supset p\) characterise, respectively, the well-foundedness of \(\rightarrow \), \(\rightarrow \Rightarrow ^{*}\) and \(\rightarrow (\Rightarrow ^{-1})^{*}\).
References
Bezem, M., Grabmayer, C., Walicki, M.: Expressive power of digraph solvability. Ann. Pure Appl. Logic 162(3), 200–212 (2012)
Blackburn, P., de Rijke, M., Venema, Y.: Modal Logic. Cambridge University Press, Cambridge (2001)
Boella, G., Gabbay, D.M., van der Torre, L., Villata, S.: Support in abstract argumentation. In: COMMA 2010, pp. 111–122. IOS Press (2010)
Caminada, M., Gabbay, D.: A logical account of abstract argumentation. Studia Logica 93, 109–145 (2009)
Cayrol, C., Lagasquie-Schiex, M.C.: On the acceptability of arguments in bipolar argumentation frameworks. In: Godo, L. (ed.) ECSQARU 2005. LNCS (LNAI), vol. 3571, pp. 378–389. Springer, Heidelberg (2005). https://doi.org/10.1007/11518655_33
Cayrol, C., Lagasquie-Schiex, M.C.: Bipolarity in argumentation graphs: towards a better understanding. Int. J. Approx. Reasoning 54(7), 876–899 (2013)
Cayrol, C., Lagasquie-Schiex, M.-C.: An axiomatic approach to support in argumentation. In: Black, E., Modgil, S., Oren, N. (eds.) TAFA 2015. LNCS (LNAI), vol. 9524, pp. 74–91. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28460-6_5
Cook, R.: Patterns of paradox. J. Symbolic Logic 69(3), 767–774 (2004)
Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321–357 (1995)
Dyrkolbotn, S.: Doing argumentation using theories in graph normal form. In: Rendsvig, R., Katrenko, S. (eds.) ESSLLI 2012 Student Session Proceedings, pp. 13–22 (2012)
Dyrkolbotn, S., Walicki, M.: Propositional discourse logic. Ann. Pure Appl. Logic 162(3), 200–212 (2014)
Gaifman, H.: Operational pointer semantics: solution to self-referential puzzles. In: Vardi, M. (ed.) Theoretical Aspects of Reasoning About Knowledge, pp. 43–59 (1988)
Grossi, D.: On the logic of argumentation theory. In: van der Hoek, W., Kaminka, G., Lespérance, Y., Sen, S. (eds.) Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), pp. 409–416 (2010)
Grossi, D.: Argumentation in the view of modal logic. In: McBurney, P., Rahwan, I., Parsons, S. (eds.) ArgMAS 2010. LNCS (LNAI), vol. 6614, pp. 190–208. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21940-5_12
Grossi, D., Gabbay, D.: When are two arguments the same? Invariance in abstract argumentation. In: Baltag, A., Smets, S. (eds.) Johan van Benthem on Logic and Information Dynamics, pp. 677–701 (2012)
Harel, D., Tiuryn, J., Kozen, D.: Dynamic Logic. MIT Press, Cambridge (2000)
Nouioua, F., Risch, V.: Bipolar argumentation frameworks with specialized supports. In: 22nd International Conference on Tools with Artificial Intelligence, vol. 1, pp. 215–218 (2010)
Nouioua, F., Risch, V.: Argumentation frameworks with necessities. In: Benferhat, S., Grant, J. (eds.) SUM 2011. LNCS (LNAI), vol. 6929, pp. 163–176. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23963-2_14
Nouioua, F.: AFs with necessities: further semantics and labelling characterization. In: Liu, W., Subrahmanian, V.S., Wijsen, J. (eds.) SUM 2013. LNCS (LNAI), vol. 8078, pp. 120–133. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40381-1_10
Oren, N., Norman, T.J.: Semantics for evidence-based argumentation. In: COMMA 2008, pp. 276–284 (2008)
Passy, S., Tinchev, T.: PDL with data constants. Inf. Process. Lett. 20(1), 35–41 (1985)
Passy, S., Tinchev, T.: Quantifiers in combinatory PDL: completeness, definability, incompleteness. In: Budach, L. (ed.) FCT 1985. LNCS, vol. 199, pp. 512–519. Springer, Heidelberg (1985). https://doi.org/10.1007/BFb0028835
Walicki, M.: Reference, paradoxes and truth. Synthese 171, 195–226 (2009)
Wen, L.: Semantic paradoxes as equations. Math. Intell. 23(1), 43–48 (2001)
Yablo, S.: Paradox without self-reference. Analysis 53(4), 251–252 (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Proof of Theorem 1 :
-
1.
It suffices to show that no \(n{+}\)-attack is possible. Suppose \( \texttt {Adm}^{ns}_{\mathcal {A}}(X)\) and that X contains a and b such that \(a (\Rightarrow ^{-1})^{*} \rightarrow \Rightarrow ^{*} b\). Then there is a c such that \(a (\Rightarrow ^{-1})^{*}c\) and \(c \rightarrow \Rightarrow ^{*} b\) (as in Fig. 2(c)). Therefore c carries a secondary attack towards b. But since X is admissible it defends b against c, i.e. there is \(d \in X\) such that \(d \rightarrow \Rightarrow ^{*} c\). But then \(d \rightarrow \Rightarrow ^{*} a\), i.e. \(d\in X\) attacks \(a\in X\), against the assumption that \( \texttt {Cfr}^{ns}_{\mathcal {A}}(X)\).
-
2.
Suppose \(a \in X\) and \(b \Rightarrow a\). As \(\texttt {Cmp}^{ns}_{\mathcal {A}}(X)\) implies \(X = \mathbf {d}^{ns}_{\mathcal {A}}(X)\), it is enough to show that \(b \in \mathbf {d}^{ns}_{\mathcal {A}}(X)\). Indeed, if \(b\not \in \mathbf {d}^{ns}_{\mathcal {A}}(X)\) then \(\exists c \rightarrow \Rightarrow ^{*}b\) and not \(X \rightarrow \Rightarrow ^{*}c\). But then \(c \rightarrow \Rightarrow ^{*}a\) and X does not defend a, from which we get a contradiction by the completeness of X. Therefore \(b\in \mathbf {d}^{ns}_{\mathcal {A}}(X)\).
-
3.
Suppose \(a \in X\) and \(\exists b \in X\) such that \(b \rightarrow \Rightarrow ^{*}a\). Then there is a c such that \(b \rightarrow c\) and \(c \Rightarrow ^{*}a\). Since \(a \in X\) we get, by \(\Rightarrow ^{-1}\)-closure, that \(c\in X\), which entails that \(X \not \subseteq \mathbf {n}_{\mathcal {A}}(X)\). Contradiction.
-
4.
The proof exploits the equivalence \(\texttt {Stb}^{ns}_{\mathcal {A}}(X)\) iff \(X = \mathbf {n}^{ns}_{\mathcal {A}}(X)\) (Definition 4). It is not difficult to prove that \(X = \mathbf {n}^{ns}_{\mathcal {A}}(X)\) implies \(X = \mathbf {n}_{\mathcal {A}}(X) \cap [\Rightarrow ^{-1}](X)\) even without restriction to well-foundedness of \(\Rightarrow \). We skip this part here.
For the other direction we need to prove that \(\mathbf {n}^{ns}_{\mathcal {A}}(X) = X\). The only difficult part is \(\mathbf {n}^{ns}_{\mathcal {A}}(X) \subseteq X\), the converse inclusion being almost immediate. For this it suffices to show that \(a \not \in X\) implies \(a \not \in \mathbf {n}_{\mathcal {A}}(X)\). Suppose \(a \not \in X\). Therefore, by \(X = \mathbf {n}_{\mathcal {A}}(X) \cap [\Rightarrow ^{-1}](X)\), either (a) \(\exists c_{0} \in X\) such that \(c_{0} \rightarrow a\), in which case \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) and we are done, or else (b) \(\exists b_{0} \not \in X\) such that \(b_{0} \Rightarrow a\). The same reasoning applies to \(b_{0}\): either (a) \(\exists c_{1} \in X\) such that \(c_{1} \rightarrow b\), in which case \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) (since \(c_{1} \rightarrow \Rightarrow ^{*}a\)), or else (b) \(\exists b_{1} \not \in X\) such that \(b_{1} \Rightarrow b_{0}\). Alternative (b) can only apply a finite number of times, otherwise it would determine an infinite descending chain of supports, which is excluded by the well-foundedness of \(\Rightarrow \). Therefore \(a \not \in \mathbf {n}^{ns}_{\mathcal {A}}(X)\) and the inclusion is proved.
Proof of Theorem 2 :
-
1.
Suppose that \( \texttt {Adm}^{ds}_{\mathcal {A}}(X)\) and X contains both a and b with \(a \Rightarrow ^{*}\rightarrow (\Rightarrow ^{-1})^{*} b\). Then there is a c such that \(a \Rightarrow ^{*}c\) and \(c \rightarrow (\Rightarrow ^{-1})^{*} b\). Therefore c carries a mediated attack towards b. Since X is admissible it defends b against c, i.e. there is \(d \in X\) such that \(d \rightarrow (\Rightarrow ^{-1})^{*}c\). But then \(d \rightarrow (\Rightarrow ^{-1})^{*}a\), against the conflict-freeness of X.
-
2.
Suppose \(a \in X\) and \(a \Rightarrow b\). As \( \texttt {Cmp}^{ds}_{\mathcal {A}}(X)\) implies \(X = \mathbf {d}_{\mathcal {A}}(X)\), it is enough to show that \(b\in \mathbf {d}_{\mathcal {A}}(X)\). Suppose \(b\not \in \mathbf {d}_{\mathcal {A}}(X)\); then \(\exists c \rightarrow (\Rightarrow ^{-1})^{*}b\) and not \(X \rightarrow (\Rightarrow ^{-1})^{*}c\). But then clearly \(c \rightarrow (\Rightarrow ^{-1})^{*}a\) and X does not defend a, a contradiction. Therefore \(b\in \mathbf {d}_{\mathcal {A}}(X)\).
Proof of Theorem 3 :
-
1.
From right to left. Assume that \( \texttt {Stb}^{ns}_{\mathcal {A}(\mathcal {T})}( l^{1})\) . Consider any biconditional \(\phi := x_{i} \equiv \bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y\) in the theory. There are two cases: (a) \(l(x_{i}) = 1\), i.e. \(x_{i} \in l^{1}\). An immediate consequence of this, by Theorem 1(4, left-to-right) is that for all attacker x of \(x_{i}\): \(x \not \in l^{1}\), i.e. \(x \in l^{0}\) by the given definition of labelling, and for all supporter y of \(x_{i}\): \(x \in l^{1}\) (closure of stable sets under support Theorem 1(2)). This suffices to guarantee that \(l^{*}(\bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y) = 1\) and then \(l^{*}(\phi ) = 1\).
(b) \(l(x_{i}) = 0\). Since \(l^{0}\) is the complement of \(l^{1}\), by Theorem 1(4, left-to-right) either some attacker x of \(x_{i}\): \(x \in l^{1}\), or some supporter y of \(x_{i}\): \(y \in l^{0}\). By construction of \(\mathcal {A}(\mathcal {T})\) all supporters and attackers figure on the right handside of \(\phi \). As a consequence \(l^{*}(\bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y) = 0\) and then \(l^{*}(\phi ) = 1\).
-
2.
From left to right. Assume that l is such that \(l^{*}(\phi )=1\) for all \(\phi \in \mathcal {T}\). In order to show that \( \texttt {Stb}^{ns}_{\mathcal {A}(\mathcal {T})}( l^{1})\) we need to prove that \(l^{1} = \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). We first prove that
-
(a)
\(l^{1} \subseteq \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Let \(x \in l^{1}\). We have three cases. (a.1) x is of the form \(\overline{y}\). Then by construction x has no supporters and is only attacked by y. Then \(y \in l^{0}\) by condition 1 on labellings. Since, by construction, y is the only (direct or indirect) attacker of x, it follows that \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). (a.2) x appears only on the right hand side of a biconditional. Again, by construction, x has no supporters and is only attacked directly by \(\overline{x}\), which however is labelled 0. Ergo \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Otherwise suppose that (a.3) \(x \in l^{1}\) appears on the left hand side of some biconditional. If \(x \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\) then there is a chain \(y_{0} \rightarrow y_{1} \Rightarrow \dots \Rightarrow y_{n} \Rightarrow x\) such that \(y_{0}\in l^{1}\), \(y_{1}, \dots ,y_{n} \in V(\mathcal {T})\), and at least \(y_{2}, \dots ,y_{n}\) appear on the right hand side of some biconditional. This forces \(y_{1}, \dots ,y_{n} \in l^{1}\). But then \(l^{1} \rightarrow y_{1}\) against condition 1 on labelling. Therefore \(x \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\).
-
(b)
\( \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\subseteq l^{1} \). For this is sufficient to show that for every \(x \not \in l^{1}\) there is an \(y \in l^{1}\): \(y \rightarrow \Rightarrow ^{*}x\). It is straightforward to prove this for the cases where (b.1) x is of the form \(\overline{y}\) or (b.2) x appears only on the right hand side of a biconditional.We consider (b.3) \(x = x_{i}\not \in l^{1}\) appears on the left hand side of some biconditional \(\phi := x_{i} \equiv \bigwedge _{x \in X_{i}} \lnot x \wedge \bigwedge _{x \in Y_{i}} y\). Since \(x_{i} \in l^{0}\) (the complement of \(l^{1}\)) and \(l^{*}(\phi ) = 1\) by assumption, then either one of the conjuncts \(z \in X_{i}\) is in \(l^{1}\), in which case \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\) and we are done, or else one of the conjuncts \(y \in Y_{i}\) is in \(l^{0}\). If y is as in (b.1) or (b.2) then it is attacked by \(l^{1}\) and therefore \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\). Otherwise y is either attacked by \(l^{1}\) or supported by some \(y'\) in \(l^{0}\). However the chain of supports cannot go on forever because the support relation is well-founded by assumption. Therefore we should finally find some attacker in \(l^{1}\) and \(x_{i} \not \in \mathbf {n}^{ns}_{\mathcal {A}}(l^{1})\).
-
(a)
Rights and permissions
Copyright information
© 2019 Springer-Verlag GmbH Germany, part of Springer Nature
About this paper
Cite this paper
Proietti, C., Grossi, D., Smets, S., Velázquez-Quesada, F.R. (2019). Bipolar Argumentation Frameworks, Modal Logic and Semantic Paradoxes. In: Blackburn, P., Lorini, E., Guo, M. (eds) Logic, Rationality, and Interaction. LORI 2019. Lecture Notes in Computer Science(), vol 11813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-60292-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-60292-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-60291-1
Online ISBN: 978-3-662-60292-8
eBook Packages: Computer ScienceComputer Science (R0)