Academia.eduAcademia.edu

A Logical Account of Formal Argumentation

2009, Studia Logica

n the current paper, we re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic. In particular, we are able to express the (complete) extensions of an argumentation framework as models of a set of modal logic formulas that represents the argumentation framework. Using this approach, it becomes possible to define the grounded extension in terms of modal logic entailment.

Martin Caminada Dov Gabbay A Logical Account of Formal Argumentation Paper 347, May 2009 Abstract. In the current paper, we re-examine how abstract argumentation can be formulated in terms of labellings, and how the resulting theory can be applied in the field of modal logic. In particular, we are able to express the (complete) extensions of an argumentation framework as models of a set of modal logic formulas that represents the argumentation framework. Using this approach, it becomes possible to define the grounded extension in terms of modal logic entailment. Keywords: abstract argumentation, argument labellings, modal logic, grounded semantics 1. Introduction Formal argumentation has become a popular approach for purposes varying from nonmonotonic reasoning [2, 7], multi-agent communication [1] and reasoning in the semantic web [23]. Although some research on formal argumentation can be traced back to the early 1990s (like for instance the work of Vreeswijk [27] and of Simari and Loui [24]) the topic really started to take off with Dung’s theory of abstract argumentation [12]. Here, arguments are seen as abstract entities (although they can be instantiated using approaches like [7] and [22]) among which an attack relationship is defined. The thus formed argumentation framework can be represented as a directed graph in which the arguments serve as nodes and the attack relation as the arrows. Given such a graph, an interesting question is which sets of nodes can reasonably be accepted. Several criteria of acceptance have been stated, including grounded, complete, preferred and stable semantics [12], as well as more recent approaches like semi-stable semantics [10] and ideal semantics [13]. Despite its relative popularity, formal argumentation has been criticized for its lack of meta-theory [6]. Although quite extensive work has been done describing the properties of the various argument-based semantics [4, 3], what is lacking is a comprehensive way of expressing properties of argumentation using existing logical approaches. Presented by ; Received June 1, 2009 Studia Logica (2009) 0: 1–38 c Springer 2009 2 Caminada and Gabbay In this paper, we describe several alternative ways to express argumentation (and in particular argumentation semantics) other then the traditional extensions approach. In particular, we focus on argument labellings, classical logic and various forms of modal logic. The remaining part of this paper is structured as follows. First, in Section 2, we treat some basic concepts of abstract argumentation, including the traditional extensions approach. Then, in Section 3, we describe the labellings approach and show how this can be used an alternative way to describe the standard admissibility based argumentation semantics. Section 4 then describes how argumentation can be expressed in modal logic. In section 5 argumentation is described using classical logic, and in Section 6 we introduce an alternative approach for using modal logic to describe argumentation. We then round off with a discussion of related work in Section 7. 2. Argumentation Preliminaries An argumentation framework [12] consists of a set of arguments and an attack relation on these arguments. In order to simplify the discussion, we consider only finite argumentation frameworks. Definition 1. Let U be the universe of all possible arguments. An argumentation framework is a pair (Ar , att ) where Ar is a finite subset of U and att ⊆ Ar × Ar. We say that an argument A attacks an argument B iff (A, B) ∈ att . An argumentation framework can be depicted as a directed graph in which the arguments are represented as nodes and the attack relation is represented as arrows. For instance, argumentation framework (Ar , att) where Ar = {A, B, C, D, E} and att = {(A, B), (B, A), (B, C), (C, D), (D, E), (E, C)} is represented in Figure 1. D A B C E Figure 1. An argumentation framework represented as a directed graph. A Logical Account of Formal Argumentation 3 The shorthand notation A+ and A− stands for, respectively, the set of arguments attacked by argument A and the set of arguments that attack argument A. Likewise, if Args is a set of arguments, then we write Args + for the set of arguments that are attacked by at least one argument in Args, and Args − for the set of arguments that attack at least one argument in Args. In the definition below, F (Args) stands for the set of arguments that are acceptable in the sense of [12]. Definition 2 (defense / conflict-free). Let (Ar , att ) be an argumentation framework, A ∈ Ar and Args ⊆ Ar. We define A+ as {B | A att B} and Args + as {B | A att B for some A ∈ Args}. We define A− as {B | B att A} and Args − as {B | B att A for some A ∈ Args}. Args is conflict-free iff Args ∩ Args + = ∅. Args defends an argument A iff A− ⊆ Args + . We define the function F : 2Ar → 2Ar as F (Args) = {A | A is defended by Args}. In the definition below, definitions of grounded, preferred and stable semantics are described in terms of complete semantics, which has the advantage of making the proofs in the remainder of this paper more straightforward. These descriptions are not literally the same as the ones provided by Dung [12], but as was first stated in [8], these are in fact equivalent to Dung’s original versions of grounded, preferred and stable semantics. Definition 3 (acceptability semantics). Let (Ar , att ) be an argumentation framework and let Args ⊆ Ar be a conflict-free set of arguments. - Args is admissible iff Args ⊆ F (Args). - Args is a complete extension iff Args = F (Args). - Args is a grounded extension iff Args is the minimal (w.r.t. set-inclusion) complete extension. - Args is a preferred extension iff Args is a maximal (w.r.t. set-inclusion) complete extension. - Args is a stable extension iff Args is a complete extension that attacks every argument in Ar \Args. - Args is a semi-stable extension iff Args is a complete extension where Args ∪ Args + is maximal (w.r.t. set-inclusion). 4 Caminada and Gabbay As an example, in the argumentation framework of Figure 1 {B, D} is a stable extension, {A} is a preferred extension which is neither stable nor semi-stable, ∅ is the grounded extension, and {B} is an admissible set which is not a complete extension. It is known that for every argumentation framework, there exists at least one admissible set (the empty set), exactly one grounded extension, one or more complete extensions, one or more preferred extensions and zero or more stable extensions. Moreover, when the set of arguments in the argumentation framework is finite, as is assumed in the current paper, there also exist one or more semi-stable extensions. An overview of how the various extensions are related to each other is provided in Figure 2. The fact that every stable extension is also a semistable extension, and that every semi-stable extension is also a preferred extension was first stated in [10]. All other relations shown in Figure 2 have originally been stated in [12]. stable extension is a semi−stable extension is a preferred extension grounded extension is a is a complete extension is a admissible set is a conflict−free set Figure 2. An overview of argumentation semantics (extension based). 3. Argument Labellings The concepts of admissibility, as well as that of complete, grounded, preferred, stable or semi-stable semantics were originally stated in terms of sets of arguments. It is equally well possible, however, to express these concepts using argument labellings. This approach was pioneered by Pollock [21] and Jakobovits and Vermeir [20], and has more recently been extended by Caminada [8, 11], Vreeswijk [28] and Verheij [26]. The idea of a labelling is to associate with each argument exactly one label, which can either be in, out A Logical Account of Formal Argumentation 5 or undec. The label in indicates that the argument is explicitly accepted, the label out indicates that the argument is explicitly rejected, and the label undec indicates that the status of the argument is undecided, meaning that one abstains from an explicit judgment whether the argument is in or out. Definition 4. Let (Ar , att ) be an argumentation framework. A labelling is a total function L : Ar −→ {in, out, undec}. We write in(L) for {A | L(A) = in}, out(L) for {A | L(A) = out} and undec(L) for {A | L(A) = undec}. Sometimes, we write a labelling L as a triple (Args 1 , Args 2 , Args 3 ) where Args 1 = in(L), Args 2 = out(L) and Args 3 = undec(L). We distinguish three special kinds of labellings. The all-in labelling is a labelling that labels every argument in. The all-out labelling is a labelling that labels every argument out. The all-undec labelling is a labelling that labels every argument undec. We say that a labelling is conflict-free if no in-labelled argument attacks an (other or the same) in-labelled argument. 3.1. Complete Labellings We will now define the concept of a complete labelling and show its relationship with Dung’s concept of a complete extension. Definition 5. Let (Ar , att ) be an argumentation framework. A complete labelling is a labelling such that for every A ∈ Ar it holds that: 1. if A is labelled in then all attackers of A are labelled out 2. if all attackers of A are labelled out then A is labelled in 3. if A is labelled out then A has a attacker that is labelled in, and 4. if A has a attacker that is labelled in then A is labelled out Conditions 1 and 2 essentially form a bi-implication (“A is labelled in iff all its attacker are labelled out”), just like conditions 3 and 4 (“A is labelled out iff it has a attacker that is labelled in”). It is also possible to characterize a complete labelling as a labelling without arguments that are illegally in, illegally out, or illegally undec. Definition 6. Let L be a labelling of argumentation framework (Ar, att ) and let A ∈ Ar . We say that: 1. A is illegally in iff A is labelled in but not all its attackers are labelled out 6 Caminada and Gabbay 2. A is illegally out iff A is labelled out but it does not have an attacker that is labelled in 3. A is illegally undec iff A is labelled undec but either all its attackers are labelled out or it has a attacker that is labelled in. We say that an argument is legally in iff it is labelled in and is not illegally in. We say that an argument is legally out iff it is labelled out and is not illegally out. We say that an argument is legally undec iff it is labelled undec and is not illegally undec. Theorem 1. Let L be a labelling of argumentation framework (Ar, att ). It holds that L is a complete labelling iff • every in-labelled argument is legally in, • every out-labelled argument is legally out, and • every undec-labelled argument is legally undec. Proof. “=⇒”: The fact that each in-labelled argument is legally in follows from point 1 of Definition 5. The fact that each out-labelled argument is legally out follows from point 3 of Definition 5. We will now prove that each undeclabelled argument is legally undec. Let A be an argument that is labelled undec. Then from point 2 of Definition 5 it follows that not all attackers of A are labelled out and from point 4 of Defintion 5 it follows that A does not have a attacker that is labelled in. Hence, A is legally undec. “⇐=”: Point 1 of Definition 5 follows from the fact that each in-labelled argument is legally in. Point 3 of Definition 5 follows from the fact that each out-labelled argument is legally out. Point 2 of Definition 5 can be proved as follows. Let A be an argument of which all attackers are labelled out. Then A cannot be labelled out (otherwise A would be illegally out) and A cannot be labelled undec (otherwise A would be illegally undec). Therefore, A can only be labelled in. Point 4 of Definition 5 can be proved as follows. Let A be an argument that has an attacker that is labelled in. Then A cannot be labelled in (otherwise A would be illegally in) and A cannot be labelled undec (otherwise A would be illegally undec). Hence, A can only be labelled out. Using the results of Theorem 1 we can restate the concept of a complete labelling as follows. Proposition 1. Let L be a labelling of argumentation framework (Ar , att). It holds that L is a complete labelling iff for each argument A it holds that: A Logical Account of Formal Argumentation 7 • if A is labelled in then all its attackers are labelled out, • if A is labelled out then it has at least one attacker that is labelled in, and • if A is labelled undec then it has at least one attacker that is labelled undec and it does not have an attacker that is labelled in. Lemma 1. Let L1 and L2 be complete labellings of argumentation framework AF = (Ar , att ). It holds that: • in(L1 ) ⊆ in(L2 ) iff out(L1 ) ⊆ out(L2 ), and • in(L1 ) ( in(L2 ) iff out(L1 ) ( out(L2 ) Proof. We first prove that in(L1 ) ⊆ in(L2 ) iff out(L1 ) ⊆ out(L2 ). “=⇒”: Suppose in(L1 ) ⊆ in(L2 ). Let A ∈ out(L1 ). From point 3 of Definition 5 it then follows that A has an attacker (say B) that is labelled in by L1 . That is, B ∈ in(L1 ). From the fact that in(L1 ) ⊆ in(L2 ) it then follows that B ∈ in(L2 ). From point 4 of Definition 5 it then follows that A is labelled out by L2 . That is, A ∈ out(L2 ). “⇐=”: Suppose out(L1 ) ⊆ out(L2 ). Let A ∈ in(L1 ). From point 1 of Definition 5 it then follows that each attacker of A must be labelled out by L1 . From the fact that out(L1 ) ⊆ out(L2 ) it then follows that each attacker of A is also labelled out by L2 . From point 2 of Definition 5 it then follows that A is labelled in by L2 . That is, A ∈ in(L2 ). We now prove that in(L1 ) ( in(L2 ) out(L1 ) ( out(L2 ). “=⇒”: Suppose in(L1 ) ( in(L2 ). This means that in(L1 ) ⊆ in(L2 ) and not in(L2 ) ⊆ in(L1 ). It then follows that out(L1 ) ⊆ out(L2 ) and not out(L2 ) ⊆ out(L1 ). This means that out(L1 ) ( out(L2 ). “⇐=”: Suppose out(L1 ) ( out(L2 ). This means that out(L1 ) ⊆ out(L2 ) and not out(L2 ) ⊆ out(L1 ). It then follows that in(L1 ) ⊆ in(L2 ) and not in(L2 ) ⊆ in(L1 ). This means that in(L1 ) ( in(L2 ). Lemma 1 implies that a complete labelling is uniquely defined by the in-labelled part, as well as by the out-labelled part. Lemma 2. Let L1 and L2 be complete labellings of argumentation framework (Ar, att ). 1. if in(L1 ) = in(L2 ) then L1 = L2 2. if out(L1 ) = out(L2 ) then L1 = L2 8 Caminada and Gabbay Proof. 1. Suppose in(L1 ) = in(L2 ). Then in(L1 ) ⊆ in(L2 ) and in(L2 ) ⊆ in(L1 ), so from Lemma 1 it follows that out(L1 ) ⊆ out(L2 ) and out(L2 ) ⊆ out(L1 ), so out(L1 ) = out(L2 ). From the fact that in(L1 ) = in(L2 ) and out(L1 ) = out(L2 ) it then follows that undec(L1 ) = undec(L2 ) so L1 = L2 . 2. Suppose out(L1 ) = out(L2 ). Then out(L1 ) ⊆ out(L2 ) and out(L2 ) ⊆ out(L1 ), so from Lemma 1 it follows that in(L1 ) ⊆ in(L2 ) and in(L2 ) ⊆ in(L1 ), so in(L1 ) = in(L2 ). From the fact that in(L1 ) = in(L2 ) and out(L1 ) = out(L2 ) it then follows that undec(L1 ) = undec(L2 ) so L1 = L2 . It turns out that there is a one-to-one relationship between complete labellings and complete extensions, and that it is relatively straightforward to convert a complete labelling to a complete extension and vice versa. Definition 7. Let AF = (Ar , att ) be an argumentation framework, clabellings be its set of all conflict-free labellings and csets be its set of all conflict-free sets. We define a function Ext2LabAF : csets → clabellings such that Ext2LabAF (Args) = {(A, in) | A ∈ Args} ∪ {(A, out | A ∈ Args + } ∪ {(A, undec | A 6∈ Args and A 6∈ Args + }. We define a function Lab2ExtAF : clabellings → csets such that Lab2ExtAF (L) = in(L). Sometimes, when the argumentation framework is either clear or not relevant, we write Ext2Lab and Lab2Ext instead of Ext2LabAF and Lab2ExtAF . Theorem 2. Let AF = (Ar , att ) be an argumentation framework and let L be a complete labelling. Then Lab2ExtAF (L) is a complete extension. Proof. Let Args = Lab2ExtAF (L). We now prove that Args is a fixpoint of F . Args ⊆ F (Args): Let A ∈ Args. Then L(A) = in. The fact that L is a complete labelling implies (point 1 of Definition 5) that each attacker B of A is labelled out. Point 3 of Definition 5 then implies that each such B has an attacker (say C) that is labelled in. From the definition A Logical Account of Formal Argumentation 9 of Lab2ExtAF it then follows that C ∈ Args. This means that for each attacker B of A, there is a C ∈ Args that attacks B. Therefore, A ∈ F (Args). F (Args) ⊆ Args: Let A ∈ F (Args). Then each B that attacks A is attacked by some C ∈ Args. From the definition of Lab2ExtAF it follows that C is labelled in. The fact that L is a complete labelling then implies (point 4 of Definition 5) that each such B is labelled out, which then implies (point 2 of Definition 5) that A is labelled in. Therefore, by definition of Lab2ExtAF , it holds that A ∈ Args. The fact that Args is a fixpoint of F , together with the fact that Args is conflict-free (which follows from the fact that each complete labelling is also a conflict-free labelling) implies that Args is a complete extension. Theorem 3. Let AF = (Ar, att ) be an argumentation framework and let Args be a complete extension. Then Ext2LabAF (Args) is a complete labelling. Proof. We first observe that Ext2LabAF (Args) is well-defined because the fact that Args is a complete extension implies that it is conflict-free. We now prove the four properties of Definition 5. 1. “if A is labelled in then all attackers of A are labelled out” Let A be an argument that is labelled in. From the definition of Ext2LabAF it then follows that A ∈ Args. The fact that Args is a complete extension implies that it is an admissible set. That is, Args attacks every attacker of A. From the definition of Ext2LabAF it then follows that every attacker of A is labelled out. 2. “if all attackers of A are labelled out then A is labelled in” Let A be an argument such that every attacker of A is labelled out. From the definition of Ext2LabAF it then follows that every attacker of A is an element of Args + . This means that A is defended by Args (A ∈ F (Args)). From the fact that Args is a complete extension it then follows that A ∈ Args. From the definition of Ext2LabAF it then follows that A is labelled in. 3. “if A is labelled out then A has an attacker that is labelled in” Let A be an argument that is labelled out. From the definition of Ext2LabAF it then follows that A ∈ Args + , so there is an argument B ∈ Args that attacks A. From the definition of Ext2LabAF it follows that B is labelled in. 10 Caminada and Gabbay 4. “if A has an attacker that is labelled in then A is labelled out” Let A be an argument that has an attacker (say B) that is labelled in. From the definition of Ext2LabAF it follows that B ∈ Args, so A ∈ Args + . From the definition of Ext2LabAF it then follows that A is labelled out. When the domain and range of Lab2ExtAF are restricted to complete labellings and complete extensions, and the domain and range of Ext2LabAF are restricted to complete extensions and complete labellings, then the resulting functions (call them Lab2ExtcAF and Ext2LabcAF ) are bijective and each other’s inverse. Theorem 4. Let AF = (Ar , att ) be an argumentation framework, cextensions its set of complete extensions and clabellings its set of complete labellings. Let Ext2LabcAF : cextensions → clabellings be a function such that Ext2LabcAF (Args) = Ext2LabAF (Args) and Lab2ExtcAF : clabellings → cextensions be a function such that Lab2ExtcAF (L) = Lab2ExtAF (L). The functions Ext2LabcAF and Lab2ExtcAF are bijective and each other’s inverse. Proof. As every function that has an inverse is bijective, we only need to prove that Lab2ExtcAF and Ext2LabcAF are each other’s inverses. That is (Lab2ExtcAF )−1 = Ext2LabcAF and (Ext2LabcAF )−1 = Lab2ExtcAF . For this, we prove the following two things: 1. For every complete labelling L it holds that Ext2LabcAF (Lab2ExtcAF (L)) = L. Let L be a complete labelling of AF and let A ∈ Ar . If L(A) = in then A ∈ Lab2ExtcAF (L), so Ext2LabcAF (Lab2ExtcAF (L)) (A) = in. If L(A) = out then A is attacked by Lab2ExtcAF (L), so Ext2LabcAF (Lab2ExtcAF (L))(A) = out. If L(A) = undec then A 6∈ Lab2ExtcAF (L) and A is not attacked by Lab2ExtcAF (L), so Ext2LabcAF (Lab2ExtcAF (L))(A) = undec. 2. For every complete extension Args it holds that Lab2ExtcAF (Ext2LabcAF (Args)) = Args. Let Args be a complete extension of AF . We now prove two things: (a) Lab2ExtcAF (Ext2LabcAF (Args)) ⊆ Args Let A ∈ Lab2ExtcAF (Ext2LabcAF (Args)). Then A is labelled in by Ext2LabcAF (Args). Therefore A ∈ Args. A Logical Account of Formal Argumentation 11 (b) Args ⊆ Lab2ExtcAF (Ext2LabcAF (Args)) Let A ∈ Args. Then A is labelled in by Ext2LabcAF (Args). Therefore A ∈ Lab2ExtcAF (Ext2LabcAF (Args)). From Theorem 4 it follows that complete labellings and complete extensions stand in a one-to-one relationship to each other. In essence, complete labellings and complete extensions are different ways of describing the same thing. Given the one-to-one relationship between complete extensions and complete labellings, the next step would be to examine what kind of labellings are associated with stable, grounded, preferred and semi-stable extensions, all of which are essentially special forms of complete extensions. What would be the properties of the labellings associated with these types of extensions? This question is studied in the following sections. 3.2. Stable Labellings We start the discussion with examining the labellings that are associated with stable extensions. These labellings will be called stable labellings. Definition 8. Let AF = (Ar , att ) be an argumentation framework. A stable labelling is a complete labelling L such that Lab2ExtAF (L) is a stable extension. The fact that for complete labellings and complete extensions, Lab2Ext and Ext2Lab are inverse functions implies that if Args is a stable extension, then Ext2Lab(Args) is a stable labelling. Stable labellings can also be characterized as complete labellings without undec. Theorem 5. Let AF = (Ar , att) be an argumentation framework. The following statements are equivalent: 1. L is a complete labelling such that undec(L) = ∅ 2. L is a stable labelling Proof. from 1 to 2: Suppose L is a complete labelling such that undec(L) = ∅. Let Args be Lab2ExtAF (L). We now prove that Args is a stable extension 12 Caminada and Gabbay (Definition 3). Let A ∈ Ar \Args. From the fact that A 6∈ Args it follows that A is not labelled in by L. From the fact that undec(L) = ∅ it follows that A is not labelled undec either. Therefore, A is labelled out by L. From the fact that L is a complete labelling, it follows that A is attacked by an argument (say B) that is labelled in. From the fact that B is labelled in it follows that B ∈ Args. This means that A is attacked by Args. from 2 to 1: Suppose L is a stable labelling, meaning that Args = Lab2ExtAF (L) is a stable extension. We now prove that undec(L) = ∅. Let A ∈ Ar. We distinguish two cases: 1. A ∈ Args. Then A is labelled in by L. 2. A 6∈ Args. Then from the fact that Args is a stable extension, it follows that A is attacked by Args, so A is labelled out by L. In both cases, A 6∈ undec(L). Since this folds for an arbitrary A ∈ Ar, it follows that undec(L) = ∅. As an aside, one can also raise the question whether there exist labellings with empty in or empty out, and if so, what would be the meaning of these labellings. As for complete labellings with empty in it follows that these also have empty out, so each argument has to be labelled undec. Thus, a complete labelling with empty in is essentially the grounded labelling (see Definition 9 and Theorem 6) in an argumentation framework where each argument has at least one attacker. As for complete labellings with empty out, it follows that each argument has to be labelled either in or undec. This means that no argument that is labelled in attacks any (other) argument. In essence, a complete labelling with empty out is the grounded labelling in an argumentation framework where each argument without attackers also does not attack any argument itself. 3.3. The Grounded Labelling The next thing to be examined are the properties of the labelling associated with the grounded extension. Definition 9. Let AF = (Ar , att ) be an argumentation framework. A grounded labelling is a complete labelling L such that Lab2ExtAF (L) is the grounded extension. A Logical Account of Formal Argumentation 13 The fact that the grounded extension is unique, and that for complete labellings and complete extensions, Lab2Ext and Ext2Lab are inverse functions, implies that the grounded labelling is unique, and that if Args is the grounded labelling, then Ext2Lab(Args) is the grounded extension. The grounded labelling can be characterized as the complete labelling with minimal in, as the complete labelling with minimal out, or as the complete labelling maximal undec. Theorem 6. Let AF = (Ar , att) be an argumentation framework. The following statements are equivalent: 1. L is a complete labelling where in(L) is minimal (w.r.t. set inclusion) among all complete labellings of AF 2. L is a complete labelling where out(L) is minimal (w.r.t. set inclusion) among all complete labellings of AF 3. L is a complete labelling where undec(L) is maximal (w.r.t. set inclusion) among all complete labellings of AF 4. L is the grounded labelling Proof. from 1 to 2: Let L be a complete labelling where out(L) is not minimal. Then there exists a complete labelling L′ with out(L′ ) ( out(L). From Lemma 1 it then follows that in(L′ ) ( in(L), so L is a labelling where in(L) is not minimal. from 2 to 1: Let L be a complete labelling where in(L) is not minimal. Then there exists a complete labelling L′ with in(L′ ) ( in(L). From Lemma 1 it then follows that out(L′ ) ( out(L), so L is a labelling where out(L) is not minimal. from 1 to 4: Let L be a complete labelling where in(L) is minimal. Then Lab2ExtAF (L) is a minimal complete extension, which implies it is the grounded extension, so L is the grounded labelling. from 4 to 1: Let L be the grounded labelling. Then Lab2ExtAF (L) is the grounded extension, which means it is the minimal complete extension. It then follows that in(L) is minimal. from 1 to 3: Let L be a complete labelling where in(L) is minimal. Then Lab2ExtAF (L) is the grounded extension. Now suppose that undec(L) is not maximal. Then there exists a complete labelling L′ with undec(L) ( 14 Caminada and Gabbay undec(L′ ). It holds that Lab2ExtAF (L′ ) is a complete extension, and from the fact that the grounded extension is a subset of each complete extension, it follows that Lab2ExtAF (L) ⊆ Lab2ExtAF (L′ ), so in(L) ⊆ in(L′ ). From Lemma 1 it then follows that out(L) ⊆ out(L′ ). From the fact that in(L) ⊆ in(L′ ) and out(L) ⊆ out(L′ ) it then follows that undec(L′ ) ⊆ undec(L). Contradiction. from 3 to 1: Let L be a complete labelling where in(L) is not minimal. Then there exists a complete labelling L′ with in(L′ ) ( in(L). It then also follows (Lemma 1) that out(L′ ) ( out(L), so undec(L) ( undec(L′ ). Contradiction. 3.4. Preferred Labellings We now examine the properties of the labellings associated with preferred extensions. Definition 10. Let AF = (Ar , att) be an argumentation framework. A preferred labelling is a complete labelling L such that Lab2ExtAF (L) is a preferred extension. The fact that for complete labellings and complete extensions, Lab2Ext and Ext2Lab are inverse functions implies that if Args is a preferred extension, then Ext2Lab(Args) is a preferred labelling. Preferred labellings can be characterized as complete labellings with maximal in, or as complete labellings with maximal out. Theorem 7. Let AF = (Ar , att) be an argumentation framework. The following statements are equivalent: 1. L is a complete labelling where in(L) is maximal (w.r.t. set inclusion) among all complete labellings of AF 2. L is a complete labelling where out(L) is maximal (w.r.t. set inclusion) among all complete labellings of AF 3. L is a preferred labelling Proof. from 1 to 2: Let L be a complete labelling where out(L) is not maximal. Then there exists a complete labelling L′ with out(L) ( out(L′ ). From Lemma 1 it then follows that in(L) ( in(L′ ), so L is a labelling where in(L) is not maximal. A Logical Account of Formal Argumentation 15 from 2 to 1: Let L be a complete labelling where in(L) is not maximal. Then there exists a complete labelling L′ with in(L) ( in(L′ ). From Lemma 1 it then follows that out(L) ( out(L′ ), so L is a labelling where out(L) is not maximal. from 1 to 3: Let L be a complete labelling where in(L) is maximal. Then Lab2ExtAF (L) is a maximal complete extension, which implies it is a preferred extension, so L is a preferred labelling. from 3 to 1: Let L be a preferred labelling. Then Lab2ExtAF (L) is a preferred extension, which means it is a maximal complete extension. It then follows that in(L) is maximal. 3.5. Semi-Stable Labellings We now examine the properties of the labellings associated with semi-stable extensions. Definition 11. Let AF = (Ar , att) be an argumentation framework. A semi-stable labelling is a complete labelling L such that Lab2ExtAF (L) is a semi-stable extension. The fact that for complete labellings and complete extensions, Lab2Ext and Ext2Lab are inverse functions implies that if Args is a semi-stable extension, then Ext2Lab(Args) is a semi-stable labelling. Semi-stable labellings can be characterized as complete labellings with minimal undec. Theorem 8. Let AF = (Ar , att) be an argumentation framework. The following statements are equivalent: 1. L is a complete labelling where undec(L) is minimal (w.r.t. set inclusion) among all complete labellings of AF 2. L is a semi-stable labelling Proof. from 1 to 2: Suppose L is a complete labelling, but not a semi-stable labelling. Then Lab2ExtAF (L) is a complete extension but not a semistable extension. This implies that Lab2ExtAF (L) ∪ Lab2ExtAF (L)+ is not maximal. So there exists a complete extension Args ′ such that 16 Caminada and Gabbay Lab2ExtAF (L) ∪ Lab2ExtAF (L)+ ( Args ′ ∪ Args ′+ . Let L′ be the labelling associated with Args ′ (that is: L′ = Ext2LabAF (Args ′ ) and Args ′ = Lab2ExtAF (L′ )). It then follows that Lab2ExtAF (L)∪Lab2ExtAF (L)+ ( Lab2ExtAF (L′ ) ∪ Lab2ExtAF (L′ )+ , so in(L) ∪ out(L) ( in(L′ ) ∪ out(L′ ), so undec(L′ ) ( undec(L). This means that L is not a labelling where undec(L) is minimal. from 2 to 1: Suppose that L is a complete labelling where undec(L) is not minimal. This implies that there exists a complete labelling L′ such that undec(L′ ) ( undec(L). It then follows that in(L) ∪ out(L) ( in(L′ ) ∪ out(L′ ). Let Args = Lab2ExtAF (L) and Args ′ = Lab2ExtAF (L′ ). It then follows that Args ∪ Args + ( Args ′ ∪ Args ′+ , which means that Args is not a semi-stable extension, which implies that L is not a semistable labelling. 3.6. Roundup The main results of the discussion until so far are summarized in Table 1. Notice that we have covered all combinations of minimal or maximal in, out or undec. Almost all combinations turn out to correspond to the traditional Dung-style semantics. The only exception are the labellings with minimal undec, which corresponds with a semantics not introduced in [12] but in [10]. restriction complete labellings no restrictions empty undec maximal in maximal out maximal undec minimal in minimal out minimal undec Dung-style semantics complete semantics stable semantics preferred semantics preferred semantics grounded semantics grounded semantics grounded semantics semi-stable semantics linked by def. and th. Def. 5 and Th. 1 Def. 8 and Th. 5 Def. 10 and Th. 7 Def. 10 and Th. 7 Def. 9 and Th. 6 Def. 9 and Th. 6 Def. 9 and Th. 6 Def. 11 and Th. 8 Table 1. Argument labellings and Dung-style semantics. Overall, one can see labellings as an alternative way to specify argumentation semantics. The essential rule is that an argument has to be accepted A Logical Account of Formal Argumentation 17 iff all its attackers are rejected, and an argument has to be rejected iff it has at least one attacker that is accepted. Thus, argumentation can be explained without referring to things like admissibility or fixpoints of Dung’s characteristic function. In a gunfight, one stays alive iff all attackers are dead, and one dies iff at least one attacker is still alive. Those who can understand this have basically understood what abstract argumentation is all about. 3.7. Admissible Labellings Until so far, we have modelled the concepts of complete, stable, grounded, preferred and semi-stable semantics in terms of labellings. This was done by strengthening the concept of complete labellings. Another route would be to weaken the concept of a complete labelling. An obvious way to do this would be to take only a subset of the four properties of Definition 5. However, these four properties are not completely independent. If one requires property 1 (“if A is labelled in then all attackers of A are labelled out”) then it makes sense also to require property 3 (“if A is labelled out then A has an attacker that is labelled in”), and vice versa. If one requires each in label to make sense, and defines this in terms of out labels, then one should also require each out label to make sense (and vice versa). Together, properties 1 and 3 stand for admissibility. Definition 12. Let (Ar, att ) be an argumentation framework. An admissible labelling is a labelling such that for every A ∈ Ar it holds that: 1. if A is labelled in then all attackers of A are labelled out 2. if A is labelled out then A has an attacker that is labelled in Admissible labellings correspond to admissible sets, but the relationship is no longer one-to-one. Theorem 9. Let AF = (Ar , att ) be an argumentation framework. It holds that: 1. if Args is an admissible set of AF then Ext2LabAF (Args) is an admissible labelling of AF , and 2. if L is an admissible labelling of AF then Lab2ExtAF (L) is an admissible set of AF . Proof. 18 Caminada and Gabbay 1. Let Args be an admisssible set of AF , and let L = Ext2LabAF (Args). We now prove that L is an admissible labelling. (a) Let A be an argument that is labelled in by L. Let B be an arbitrary attacker of A. The fact that A is labelled in by L implies that A ∈ Args. The fact that Args is an admissible set implies that Args attacks B. That is, B ∈ Args + , so B is labelled out by L. Since this holds for any attacker B of A it follows that every attacker of A is labelled out by L (b) Let A be an argument that is labelled out by L. It then follows that A ∈ Args + , so there exists a B ∈ Args that attacks A. This B is labelled in by L. This means that A has a attacker that is labelled in by L. 2. Let L be an admissible labelling of AF , and let Args = Lab2ExtAF (L). We now prove that Args is an admissible set. (a) We first prove that Args is conflict-free. Suppose this is not the case. Then there exist A, B ∈ Args such that A attacks B. It then follows that both A and B are labelled in by L. But this cannot be the case because the fact that L is an admissible labelling implies that all attackers of A (including B) are labelled out by L. (b) We now prove that Args defends all its elements. Let A ∈ Args. Then A is labelled in by L. Let B be an arbitrary argument that attacks A. From the fact that L is an admissible labelling, it follows that B is labelled out by L. From the fact that L is an admissible labelling it then also follows that B has an attacker C that is labelled in by L, so C ∈ Args. Therefore Args is self-defending. Admissible labellings and admissible sets have a many-to-one relationship. That is, each admissible labelling is associated with exactly one admissible set, but each admissible set is associated with one or more admissible labellings. As an example, consider again the argumentation framework of Figure 1. Here, ({B}, {A, C}, {D, E}) and ({B}, {A}, {C, D, E}) are two admissible labellings associated with the same admissible set {B}. For admissible labellings (say L1 and L2 ) it does not hold that if in(L1 ) ⊆ in(L2 ) then out(L1 ) ⊆ out(L2 ). As a counter example, consider again the argumentation framework of Figure 1, with L1 = ({B}, {A, C}, {D, E}) and L2 = ({B}, {A}, {C, D, E}). Similarly, it also does not hold that if out(L1 ) ⊆ out(L2 ) then in(L1 ) ⊆ in(L2 ). As a counter example, consider A Logical Account of Formal Argumentation 19 the argumentation framework AF = ({A, B, C, D}, {(A, C), (B, C), (C, D)}) with L1 = ({A, B, D}, {C}, ∅) and L2 = ({A, D}, {C}, {B}). Between the concept of an admissible labelling and a complete labelling, one can distinguish two intermediate forms. Definition 13. Let AF = (Ar , att ) be an argumentation framework. A JV-labelling is a labelling that satisfies: 1. if A is labelled in then all attackers of A are labelled out 2. if A is labelled out then A has an attacker that is labelled in 3. if A has an attacker that is labelled in then A is labelled out A VJ-labelling is a labelling that satisfies: 1. if A is labelled in then all attackers of A are labelled out 2. if A is labelled out then A has an attacker that is labelled in 3. if all attackers of A are labelled out then A is labelled in In essence, an admissible labelling satisfies point 1 and 3 of a complete labelling (Definition 5), a JV-labelling satisfies point 1, 3 and 4, and a VJ-labelling satisfies point 1, 3 and 2. It immediately follows that every complete labelling is also a JV-labelling and a VJ-labelling, and that every JV-labelling or VJ-labelling is also an admissible labelling. We use the term JV-labelling, because these are quite close to a proposal of Jakobovits and Vermeir [20]. An important difference, however, is that in our approach each argument gets exactly one out of three possible labels (in, out or undec) whereas in Jakobovits and Vermeir’s original proposal, there are four possibilities (either no label, single in, single out, or both in and out).1 It turns out that JV-labellings are uniquely identified by their in labelled part, whereas VJ-labellings are uniquely identified by their out labelled part. Lemma 3. Let AF = (Ar , att ) be an argumentation framework. Let L1 and L2 be JV-labellings of AF and let L3 and L4 be VJ-labellings of AF . It holds that: 1. if in(L1 ) ⊆ in(L2 ) then out(L1 ) ⊆ out(L2 ) 2. if in(L1 ) ( in(L2 ) then out(L1 ) ( out(L2 ) 3. if out(L3 ) ⊆ out(L4 ) then in(L3 ) ⊆ in(L4 ) 1 Another difference is that Jakobovits and Vermeir use the symbol “+” instead of in and the symbol “−” instead of out. 20 Caminada and Gabbay 4. if out(L3 ) ( out(L4 ) then in(L3 ) ( in(L4 ) Proof. Similar to the proof of Lemma 1. Lemma 4. Let AF = (Ar , att ) be an argumentation framework. Let L1 and L2 be JV-labellings of AF and let L3 and L4 be VJ-labellings of AF . It holds that: 1. if in(L1 ) = in(L2 ) then L1 = L2 2. if out(L3 ) = out(L4 ) then L3 = L4 Proof. Similar to the proof of Lemma 2. Since JV-labellings are uniquely identified by their in labelled part, and the fact that an admissible set essentially specifies a set of in labelled arguments, it does not come as a surprise that there exists a one-to-one relation between admissible sets and JV-labellings. Theorem 10. Let AF = (Ar , att ) be an argumentation framework, asets be its set of admissible sets and JV−labellings be its set of JV-labellings. Let Ext2LabJV : asets → JV−labellings be a function such that AF JV Ext2LabAF (Args) = Ext2LabAF (Args) and Lab2ExtJV AF : JV−labellings → asets be a function such that Lab2ExtJV (L) = Lab2Ext AF (L). The funcAF JV are bijective and each other’s inverse. tions Ext2LabJV and Lab2Ext AF AF Proof. Similar to the proof of Theorem 4. A global overview of the relations between the various forms of labellings is provide in Figure 3. 4. Argumentation and Modal Logic There are three main methods of introducing modal logic into argumentation theory: the metalevel approach, the object level approach and the mixed approach. We view an argumentation system as a combination of an argumentation framework AF = (Ar , att ) (where Ar is a set of atomic arguments and att ⊆ Ar × Ar is the attack relation) and a complete labelling L of AF . To us, the thus described argumentation system serves as the object level. The metalevel approach talks about the argumentation framework from “above”, using another language and logic. The metalevel language can be classical logic or modal logic. These are traditional metalevel languages 21 A Logical Account of Formal Argumentation stable labelling is a semi−stable labelling is a preferred labelling grounded labelling is a is a complete labelling is a is a JV−admissible labelling VJ−admissible labelling is a is a admissible labelling is a conflict−free labelling Figure 3. An overview of argumentation semantics (labelling based). and are used in this way in many areas. Classical logic can be full classical logic or the computational Horn clause logic programming language. When classical logic is used, one can think of the process as translation. There is a traditional translation of modal logic into classical logic and through this translation the metalevel approaches are related. For the sake of clarity, we shall present all three metalevel versions in the appropriate sections: the classical logic one, the Horn clause logic programming one, and the modal logic one. They are related but are not the same; each one has its advantages and limitations. 4.1. Modal Logic Preliminaries This subsection introduces some modal logic background needed for introducing our approaches. The modal logic K is a propositional system with the modal operator  and the atomic propositions Q = {q1 , q2 , q3 . . .} and ¬, ∧, ∨, →, ⊤ and ⊥. Models for K have the form M = (S, R, h) where S is the set of possible worlds, R ⊆ S × S, S 6= ∅ and h is the assignment function, giving to each atomic letter q a subset h(q) ⊆ S. Satisfaction is defined as follows for t ∈ S: • t  q iff t ∈ h(q), for atomic q • t  A ∧ B, A ∨ B, ¬A, A → B are defined as usual 22 Caminada and Gabbay • t  A iff for all s such that tRs we have s  A • A holds in (S, R, h) iff for all t ∈ S we have t  A. K can be axiomatised as follows: 1. all substitution instances of truth functional tautologies 2. (A → B) → (A → B) ⊢A 3. ⊢ A It is complete for the class of all finite frames of the form (S, R) where S 6= ∅, S is finite, and R ⊆ S × S. 4.2. Products of Modal Logics We need the concept of an H-product of a fixed frame modal logic. To define this, we need to introduce the concept of a fixed frame modal logic as well as the concept of a product. Definition 14. A modal logic L is said to be a fixed frame modal logic (FF modal logic) if it can be characterised by a family of models of the form (S0 , R0 , h), h ∈ H, where (S0 , R0 ) is a fixed frame and H is a set of assignments to this frame. We have L ⊢ A iff A holds in all FF-models (S0 , R0 , h), h ∈ H. We can now define the cross product of the two modal logics. Let 1 be a modality of modal logic E1 that is completely chacterised by a class of models of the form M1 = {(Si1 , Ri1 , h1i )}, i ∈ I1 and similarly for 2 , E2 , M2 = {(Sj2 , Rj2 , h2j )}, j ∈ I2 . We define the flat-cross product of these two logics semantically, through their models. The language contains the two modalities {1 , 2 }. The models have the form (S 1 × S 2 , R1 ∪ R2 , h1,2 ) where (S 1 , R1 , h1 ) and (S 2 , R2 , h2 ) are any models of 1 and 2 respectively and S 1 × S 2 is the product of the sets S 1 and S 2 . We define R1 and R2 as follows. (x1 , x2 )R1 (y1 , x2 ) iff x1 R1 y1 (x1 , x2 )R2 (x1 , y2 ) iff x2 R2 y2 We define h1,2 by some boolean function of h1 and h2 , for example (x1 , x2 ) ∈ h1,2 (q) iff x1 ∈ h1 (q) or x2 ∈ h2 (q) or another definition (x1 , x2 ) ∈ h1,2 (q) iff x1 ∈ h1 (q). We have (x1 , x2 )  1 A iff for all y1 , x1 R1 y1 we have (y1 , x2 )  A. 23 A Logical Account of Formal Argumentation (x1 , x2 )  2 A iff for all y2 , x2 R2 y2 we have (x1 , y2 )  A. The above definition defines a general flat product. When we have a single FF-logic, with  characterised by a fixed frame (S0 , R0 ) and a family of assignments H, we can form the universal product of the logic with  along the axis of H. We need a new modality for the H axis, which we denote by ⊡. Definition 15. Let (S0 , R0 ) be a frame for a fixed frame modal logic L with . Let H be a family of assignments h ∈ H such that (S0 , R0 , h) is a model of L. We form the universal H product of the frame as follows. We form the set M = {(S0 , R0 , h) | h ∈ H}. We use a modality ⊡ to move around M. We then have two modalities:  and ⊡. Satisfaction in M is defined as follows. (t, h)  q iff t ∈ h(q), for t ∈ S, h ∈ H (t, h)  A iff for all s, tRs implies (s, h)  A (t, h)  ⊡A iff for all h′ 6= h, (t, h′ )  A A holds in the model iff for all t, h, (t, h)  A. Figure 4 shows this is indeed a product. R0 axis s t model (S0,R 0,t,h) H axis h h´ Figure 4.  moves from t to s on the h vertical.⊡ moves from h to h′ on the t horizontal. See the book [18] for a wealth of material products. 4.3. Modal Provability Logic Löb’s logic for one modality  has the following axioms and rules. 24 Caminada and Gabbay 1. axioms and rules of modal logic K 2. ♦A → ♦(A ∧ ¬A) 3. A → A Axiom 2 says that if A is possible then it is possible for the last time. Axiom 3 says R is transitive. It is complete for the class of all frames which are finite and acyclic (we can take all finite tree frames). The following holds. Theorem 11 (fixed point theorem). Let Ψ(x) be a modal formula with the propositional variable x such that x is in the scope of a modality . Then there is a formula φ which is a solution to the fixed point equation x ↔ Ψ(x). Namely, we have ⊢ φ ↔ Ψ(x/φ). Proof. See Theorem 3.4 (page 464) of [25]. We shall use an extension of this logic in our object level modal approach. The logic we use we call LN 1; it is characterised by linear chains. The axiom we add for it is: 4. ♦A ∧ ♦B → ♦(A ∧ B) ∨ ♦(A ∧ ♦B) ∨ ♦(B ∧ ♦A) If we then also add the following axiom 5. ⊥ we get the logic of chains of length 3 (3-chains) of the form of Figure 5. 3 2 1 Figure 5. A 3-chain. The next step will be to connect these chains to labellings. A Logical Account of Formal Argumentation 4.4. 25 The Metalevel Approach We use the modal logic K to describe the system of Definition 4. We can view (Ar, att ) as a modal frame and view L as an assignment to three propositional atomic letters: q1 , q0 and q? , which we regard as constants. We have a  q1 iff L(a) = in, a  q0 iff L(a) = out, and a  q? iff L(a) = undec. The modality goes by the direction of “being attacked from”, namely a  A iff for all y such that y att a (that is, (y, a) ∈ att ), we have y  A. We therefore must adopt the following axioms, written as ∆(q1 , q0 , q? ). 1. ⊥ ∨ q0 → q1 (if a is not attacked by any argument, i.e. ⊥ holds, or all attackets of a are out then a is in) 2. ♦q1 → q0 (if a is attacked by an argument which is in then a is out) 3. (q0 ∨ q? ) ∧ ♦q? → q? (if all the attackers of a are either out or undec and at least one attacker of a is undec then a is undec) 4. ⊢m (q0 ∨ q1 ∨ q? ), m ≥ 0 (each argument has at least one label out, in or undec) 5. ⊢m (¬(qi ∧ qj )), i 6= j, i, j ∈ {0, 1, ?}, m ≥ 0 (no argument has more than one label) Let ∆ be the above theory and let AF = (Ar , att ) be an argumentation framework and L be a labelling of AF . Then for any a ∈ Ar it holds that a  ∆(q1 , q0 , q? ), provided that a  q1 iff L(a) = in a  q0 iff L(a) = out a  q? iff L(a) = undec Conversely if (S, R, h) is a modal model of ∆ (i.e. for all t ∈ S, t  ∆) then it is an argumentation system with L(a) = in iff a  q1 L(a) = out iff a  q0 L(a) = undec iff a  q? This turns g into a complete labelling (see Theorem 1 and Proposition 1). The above is may be a nice model but there is still not much we can do with it. Since the extensions are assignments to q0 , q1 , q? satisfying ∆ we cannot directly talk about them, except for the grounded labelling. We shall see later how to deal with the other labellings, using circumscription. We shall see that to be able to fully understand our metalevel modal model 26 Caminada and Gabbay and its options we should also introduce and compare with the classical logic metamodel. This we shall do in section 5. Using the modality  as above and results from [5], we can define extensions. Let E be a propositional letter. Then E defines a set of points in Ar. So according to our notation, t  E iff for all s such that sRt we have s  E. So if E denotes a set of arguments, the ♦E is the set of arguments attacked by E and ♦E is the set of arguments defended by E. We have: 1. E is stable iff E = ¬♦E = ¬E 2. (a) E is conflict-free iff E → ¬♦E (b) E is admissible iff E → (♦E) ∧ (¬E) iff E → (¬E ∧ ♦E) 3. E is a complete extension iff E = (¬E ∧ ♦E) Using fixed points methods of Section 4.5 and reference [16], we can find the fixed point solutions for (1) (stable extensions) and (3) (complete extensions) for finite frames. Altogether, the metalevel approach can be summarized as follows. Given AF = (Ar , att ) 1. We view elements a ∈ Ar as possible worlds and so AF becomes a model for modal logic K (with the modality ). 2. Labellings become assignments in the modal logic. 3. The frame of our modal logic is fixed, it is (Ar , att ). What changes are the assignments defined by the labellings. This means we have what we call a fixed frame modal logic FF modality. 4. Properties of labellings are studied in a circumscription logic based on modal logic K (to be introduced in Section 5. 4.5. The object level approach The previous view used modal logic to talk about argumentation. The now to be introduced object level approach will model argumentation from within. To introduce our point of view, let us ask what does an argumentation framework of the form AF = (Ar, att ) say to us? Here we view the arguments a ∈ Args as atoms in some logic. So let X be the logical content of the argumentation framework AF and labelling L. Hence if a is in then X ⊢ a in some logic. If a is out then X ⊢ ¬a and if a is undec then we have neither. We might take the simple minded view and let XL = {a | L(a) = in} ∪ {¬a | L(a) = out} and propose this as a solution. The problem, however, is that this is too simplistic because 27 A Logical Account of Formal Argumentation 1. It does not take into account the internal structure of AF (i.e. the attack relation) 2. It has an explicit dependence on L Our aim is therefore to introduce a more sophisticated approach. We borrow the Löb modal provability logic and use a suitable extension of it, which we call LN 1, and view the logical content of (AF, L) as a formula M(AF, L) of LN 1. LN 1 is a fixed frame modal logic, the frame being a chain of 3 elements. We should therefore have (using ⊟ as the modal provability operator) 1. M(AF, L) ⊢ ⊟a if a is in 2. M(AF, L) ⊢ ⊟¬a if a is out 3. neither, if a is undec We read ⊟ as provability. Figure 6 shows how we find M(AF, L). y 1 x V y a n not attacked by any y Figure 6. Finding M(AF, L). Let x ∈ Ar and let y1 , . . . , yn denote all arguments attacking it (i.e. (yi , x) ∈ att). The labelling conditions basically say that L(x) = in iff for each V attacker yi it holds that L(yi ) is out. So if in means provable, we get x ↔ yi ¬ ⊟ ¬(M(AF, L) ∧ ¬yi ) so we have something like M(AF, L) ↔ ∧a not atttacked by any V y ⊟ a ∧ [ a∈Ar ,x attacked by y1 ,...,yn V (x ↔ yi ¬ ⊟ ¬(M(AF, L) ∧ ¬yi ))]. The exact solution formula for M(AF, L) is given in the beginning of Section 6. Thus, M(AF, L) is obtained as a fixed point solution in a suitable modal provability logic. The fixpoint equation is generated by AF . All models of M(AF ) should give us all labellings of AF . A model of M(AF ) gives the 28 Caminada and Gabbay atoms, the elements of Ar assignments and from the assignments we can tell which a is in, out or undec. This we will see in later sections. Altogether, the object level approach can be summarised as follows. Let AF = (Ar , att ). • We regard elements of Ar as atomic propositions in some modal provability logic LN 1. The graph (Ar , att ) generates a fixed point equation in the modal logic and the unique solution M(AF ) of this equation is a formula of modal logic representing the logical content of AF . • The possible world models of M(AF ) are in one to one correspondence with all labellings L of AF . • The logic we use, LN 1 is a fixed frame modal logic. 4.6. The Mixed Approach We saw that the metalevel approach regards arguments as possible worlds, while the object level approach regards them as propositions in a logic. The problem in both approaches is how to characterise extensions. We will now introduce a mixed approach. Consider the previous two approaches. In each of them, the fixed argumentation framework gives rise to a fixed frame modal logic. On the metalevel approach, the fixed frame is (Ar , att ), and the set of assignments H is what all the possible labellings give us. On the object level approach the fixed frame is a chain of three elements (see Figure 5) and the assignments are all those assignments L that give us models of M(AF ). We shall see later that there is a one-to-one correspondance between the assignments which are models of M(AF ) and the labellings of AF . In either case we get a fixed frame modal logic, one with  and the other with ⊟. The mixed approach adds the modality ⊡ to the existing modality and forms the universal products with {, ⊡} and with {⊟, ⊡} respectively. To show how the mixed approach works, consider the semi-stable semantics of Table 1. For this we need to say that our labelling has a minimal undec. Let us explain the approach for the metalevel mixed case. Let gs−s be the assignment arising from the semi-stable labelling. Then there is no other h for a model such that h(q2 ) $ gs−s (q? ). We can express this in the universal model. The grounded extension for example is characterised by minimal in, so we obtain  q1 ∧ ⊡q1 . A Logical Account of Formal Argumentation 5. 29 The metalevel approach We saw that the metalevel approach uses modal logic K to talk about argumentation frameworks of the form AF = (Ar , att ). The arguments become the possible worlds of a Kripke model, the attack relation becomes the accessibility relation and an associated labelling L gives rise to and assignment. By varying L we get a fixed frame modal logic based on K. To fully appreciate the advantages and limitations of this approach we need to compare it to two other approaches, the Logic Programming and the classical logic ones. 5.1. The Classical Logic Metalevel Approach We start with classical logic with equality (“=”) and three modal predicates Q1 , Q0 and Q? and a binary relation R. Given an argumentation framework AF = (Ar , att ) and a labelling L we construct the associated model of classical logic. We take Ar as the domain, att as the relation R and use L to get the extensions of tree predicates Q0 , Q1 and Q? as follows. 1. a ∈ Q1 iff L labels a as in 2. a ∈ Q0 iff L labels a as out 3. a ∈ Q? iff L labels a as undec Consider the following classical theory ∆(R, Q0 , Q1 , Q? ). 1. ∀x(Q0 (x) ∨ Q1 (x) ∨ Q? (x)) 2. ¬∃x(Qi (x) ∧ Qj (x)) for i 6= j, i, j ∈ {0, 1, ?} 3. ∀y(∀x(xRy → Q0 (x)) → Q1 (y) 4. ∀y(∃x(xRy ∧ Q1 (x)) → Q0 (y)) 5. ∀y(∀x(xRy → (Q0 (x) ∨ Q? (x))) ∧ ∃x(xRy ∧ Q? (x)) → Q? (y)) Any model of ∆ with domain D defines an argumentation framework with Ar = D, att = R and L is what we obtain from the elements satisfying the respective predicates Q0 , Q1 and Q? . Notice that we are not using “=”. If we want to characterise any specific argumentation framework AF = (Ar, att ) we need equality and we need constant names for every element of Ar. We write the following additional axioms θ(AF ). W 6. ∀x( a∈Ar x = a) V 7. a,b∈Ar ,a6=b a 6= b 30 8. Caminada and Gabbay V a,b∈att aRb We want to see how to characterise the different extensions of the argumentation frameworks obtained in classical logic as models of ∆. This means for example that we want to say that the predicate Q1 is minimal in the model (in order to obtain the grounded extension) or for example that the predicate Q? is minimal to get the semi-stable extension, or that the predicate Q1 is maximal to get the preferred extension. The concept “Q is maximal” or “Q is minimal” is not first order. We therefore need second order formula to express this, an approach that is know as predicate circumscription of John McCarthy; the subject has a very well developed theory. So the theory we want is for example ∆semi−stable (R, Q0 , Q1 , Q? ) = ∆(R, Q0 , Q1 , Q? ) ∧ “ Q? is minimal”. Any model of ∆semi−stable yields an argumentation framework based on the domain of the model, with L (derived from Q1 , Q1 , Q? ) which is semi-stable. Using circumscription we write ∆semi−stable = ∆(AF, Q0 , Q1 , Q? ) ∧ ∀Q0 ∀Q1 ∀Q∗? ((Q∗? ( Q? ) → ¬∆(AF, Q0 , Q1 , Q∗? )) where X ( Y is defined as ∀y(X(y) → Y (y)) ∧ ∃z(Y (z) ∧ ¬X(z)). Similarly to maximise we use ) in the circumscription formulas for Q1 and Q∗1 . According to our book [14] it is possible to eliminate such second order quantifiers under certain circumstance. We need to check whether this can be done in our case. When we deal with a specific finite argumentation framework AF , our set of axioms is ∆(AF ) = ∆ ∪ θ(AF ). In this case characterising some of the extensions is easier. For one thing we can use provability to characterise some extensions and for others circumscription becomes first order. The above axioms ∆(AF ) = ∆ ∪ θ(AF ) can immediately characterise the grounded extension of AF as the set of all x such that ∆(AF ) ⊢ Q1 (x). The preferred semantics is characterised by maximal in, which implies min that Q1 is maximal, so ¬Q1 is minimal. So let Q1 = {x | ∆(L) ⊢ ¬Q1 } min and add the axiom ∀(Q1 (x) ↔ Q1 (x)). The problem with the above min definition is that Qmin and Q1 are defined using provability, which is ? outside the logic itself. To bring this in, we need to use circumscription as we did before. However, since for a given AF , Ar is finite, we can turn the second order qualtifier ∀X into a big conjunction by enumerating all possible 31 A Logical Account of Formal Argumentation subsets B ⊆ Ar. We get ∀XΨ[y ∈ X] is replaced by This makes circumscription first order for AF fixed. 5.2. V B⊆Ar W Ψ[ a∈B y = a]. The Logic Programming Metalevel Approach The logic programming metalevel approach has been worked out in [29]. The approach is similar to the classical logic approach except that we use logic programming to represent the argumentation framework. The extensions correspond to the models of the corresponding logic program. For each argument x we write the clause x ← ¬y1 , . . . , ¬yn (n ≥ 0), where {y1 , . . . , yn } is the set of all arguments attacking x. We get a resulting logic program satisfying 1. each atom is the head of exactly one clause 2. the bodies of clauses consist of weakly negated atoms only For more information, we refer to [29] and [17]. 6. The Modal Provability Object Level Approach Let AF = (Ar , att ) be an argumentation framework. Let x be an argument whose set of attackers is y1 , . . . , yn , as was illustrated in Figure 6. We construct the following modal formula in the modal logic LN 3 of provability. V V M(AF ) = G(⊥ ∨ y∈Ar and y has attackers yi y ↔ i ♦¬yi )∧ V y∈Ar and y is not attacked Gx Here, GA stands for A ∧ A. The logic LN 3 has the following axioms. 1. all substitution instances of classical tautologies 2. all K4 axioms • (A → B) → (A → B) • A → A ⊢A • ⊢ A 3. all substitution instances of Löb’s axioms ♦A → ♦(A ∧ ¬A) 4. linearity axiom ♦A ∧ ♦B → ♦(A ∧ B) ∨ ♦(A ∧ ♦B) ∨ ♦(B ∧ ♦A) 32 Caminada and Gabbay 5. 3-chain axiom ⊥ 6. axioms for atoms q only • q → (¬q → q) • (⊥ ∨ q) ↔ q • (⊥ ∨ ¬q) ↔ ¬q Lemma 5. 1. The logic LN 3 is complete for all 3-chain models whose assignment to atoms has one of the types of Table 2. 2. Any 3-chain model of LN 1 allows for the atoms to have one of types 1, 0 or 2 assignments. Proof. The axioms of LN1 force the following for atomic q in the chain 1 < 2 < 3: • 1  q and 2  q ⇒ 3  q • 1 ∼ q and 2 ∼ q ⇒ 3 ∼ q • 1  q and 2 ∼ q ⇒ 3  q. We need to prove that the option “1  q and 2 ∼ q and 3 ∼ q” cannot arise. Consider a point y such as y is being attacked. (If V not then Gy is in M (AF ) and so y is of type 1.) We have G(⊥ ∨ (y ↔ ♦ ∼ yi )) holds in V the model. Hence y ↔ i ♦ ∼ yi holds at points 1 and 2. We distinguish several cases: 1. If for any j, if yj = ⊥ at 3 then ♦ ∼ yj is true at 1 and 2 and it plays no role in the conjunction. If for all yj , 3 ∼ yj then y = ⊤ at 1 and 2 and y is of type 1. 2. Some yj are ⊤ at 3. Then ♦ ∼ yj is ⊥ at 2 and y = ⊥ at 2. 3. We now check whether yj is true or false at 2. If for some j, yj = ⊤ at 2 then ♦ ∼ yj = ⊥ at 1 and y = ⊥ at 1 and hence y = ⊥ everywhere, and hence y is of type 0. If for all j, yj = ⊥ at 2 then y = ⊤ at 1 and we have that y = ⊤ at 1 and y = ⊥ at 2 and we must have by the axiom 4.1 that 3  y and y is of type 3. 33 A Logical Account of Formal Argumentation world 3 2 1 type 1 ⊤ ⊤ ⊤ type 0 ⊥ ⊥ ⊥ type 2 ⊤ ⊥ ⊤ Table 2. 3-chain models. Theorem 12. Let AF = (Ar, att ) be an argumentation framework and let M(AF ) be the modal sentence as defined. Then: 1. Any complete labelling L for AF gives rise to a model of M(AF ), where for any q, the correspondence is as in Table 2. • q is assigned type 1 assignment iff L(q) = 1 • q is assigned type 0 assignment iff L(q) = 0 • q is assigned type 2 assignment iff L(q) =? 2. Let M1 , M2 , M3 , . . . be all the 3-chain models of M(AF ). Then {Mi } are all the complete labellings for AF , where these complete labellings are obtained as in Table 2. Proof. Direction 1. Let h be an assignment model satisfying M (AF ). By Lemma 5 every atom node x in P gets assigned values h(x) of types 0, 1, or ?. Define a Caminada candidate function L according to the types, namely L(x) = i iff h(x) is of type i, i ∈ {0, 1, ?}. We now show that L satisfies the conditions of a Caminada function of Definition 5. 1 If x is an initial point then Gx is a conjunct of M (AF ), therefore h(x) is of type 1 and hence L(x) = 1. 2 If y1 , . . . , yn are allV nodes with arrows to y, then we have the conjunct y ↔ i ♦ ∼ yi in M (AF ) in the clause ^ ^ G(⊥ ∨ (y ↔ ♦ ∼ yi )) y i V This means that at nodes 1 and 2 of the chain y ↔ i ♦ ∼ yi must hold. Assume all yi are of type 0, then y = ⊤ at 2 34 Caminada and Gabbay and 1. Hence by axiom 6.2, y = ⊤ also at node 3 and y is of type 1. This means that if all yi are ‘out’ then y is ‘in’. Assume one of yi is of type 1. Then for this yi , ♦ ∼ yi is ⊥ at nodes 1 and 2. Hence y is false at 1 and 2 and by axiom 4.3, y = ⊥ at node 3. Hence y is of type 0. Now assume all of yi are either of type 0 or of type ?, and at least one of yi say y1 is of type?. The yi of type 0 have no influence on y because ♦ ∼ yi is ⊤ at nodes 1 and 2. The crucial nodes are the nodes like y1 which are of type ?. This means that 1  y1 , 2 ∼ y1 , 3  y1 . Thus ♦ ∼ y1 = ⊥ at 2 and ♦ ∼ y1 = ⊤ at 1. This holds for any type yi of type ?. Thus y = ⊤ at 1 and y = ⊥ at 2. Hence by axiom 6.1, y = ⊤ at 3 and hence y is of type ?. Direction 2. Let L be a Caminada function. Define a model by assigning values to the propositions according to the code of Table 2. We claim M (AF ) holds in this model. First all nodes y without arrows into them are assigned type 1 and hence Gy holds. For the other nodes we must check the formula ^ ^ G(⊥ ∨ (y ↔ ♦ ∼ yi )) y y has arrows leading to it i and show it holds in the model. We distinguish several cases. Assume all yi are of type 0. This means L(yi ) = 0 for all yi . So ♦ ∼ yi is ⊤ at nodes 1 and 2. But V since all L(yi ) = 0 we get that L(y) = 1 and hence y ↔ i ♦ ∼ yi holds at 1 and 2 as required. If one V of yi is of type 1, this means ♦ ∼ yi is ⊥ at 1 and 2. Hence i ♦ ∼ yi is ⊥ at 1 and 2. But also since L(yi ) = 1, we get L(y) = 0 and so y is of type 0 and y = ⊥ at 1 and 2. V Hence y ↔ i ♦ ∼ yi holds at 1 and 2. Now assume that all yi are either of type 0 or type ?. This means L(yi ) is either 0 or ?. Assume that at least one yi is of type ? (i.e. L(yi ) =?). Then L(y) =? and V we have y = ⊤ at 1 and y = ⊥ at 2. Let us check whether i ♦ ∼ yi is ⊥ at and ⊤ at 2. Since all yi are of type ? or ⊥ with at least one yi of type 35 A Logical Account of Formal Argumentation ?, the type ? yi will be ⊤ at node 2 and hence ♦ ∼ yi = ⊥ at node 1 and hence y = ⊥ at node 1. V On the other hand all yi are ⊥ at nodeV3 and hence i ♦ ∼ yi is ⊤ at node 2. This shows that y ↔ i ♦ ∼ yi is ⊤ at nodes 1 and 2. Thus the above argument shows that ^ ^ G(⊥ ∨ (y ↔ ♦ ∼ yi )) u i holds at all nodes 1, 2, and 3. This completes the proof of the theorem. Corollary 1. M(AF ) characterises all the extensions of AF through the modal logic LN 3. In particular, we obtain the following theorem. Theorem 13. x is in the grounded extension of AF iff M(AF ) ⊢LN 3 Gx. Proof. This holds because the grounded extension is the minimal complete extension [12]. Since Gx is in every model of M(AF ) we cannot characterise other extensions, e.g. preferred extensions, in a similar way. We need the mixed approach with additional modalities. 7. Discussion Grossi in [19] uses modal logic to represent argumentation frameworks. His approach is metalevel. We use (in Section 5.1) classical logic to talk about argumentation frameworks and use circumscription to define the various extensions. Grossi uses modal logic to describe the argumentation frameworks. He needs two modalities, one to go with the attack relation and one to go with the converse of the attack relation (like two temporal logic modalities). He also uses a universal modality and to get the extensions he needs µ-calculus on top. Our approach, on the other hand, is to use classical logic with circumscription to do the job. We would not be surprised if the approach of Grossi could simulate the relevant classical logic with circumscription, since all the ingredients are present. Note that our use of modal logic in section 6 is object level and is completely different from its use as a metalevel tool. 36 Caminada and Gabbay As was mentioned in Section 3 the approach of argument labellings can be traced back to Pollock, who in his 1995 book [21] described his oscar system in terms of labellings. As explained in [20], Pollock’s approach essentially boils down to preferred semantics. The labelling approach of Jakobovits and Vermeir [20] is aimed not so much at describing Dung’s original semantics but rather to defining additional semantics driven by what they perceive to be problems in Dung’s original semantics. Caminada first described complete semantics in terms of labellings in [9] and showed how this can be used to provide labelling based descriptions of other semantics as well. This approach was then applied in [11] and [28] to provide labelling-based algorithms for computing particular argumentation sets and extensions. Besnard and Doutre [5] examine how complete and preferred semantics can be expressed in terms of set theoretical equations, but do not provide a logical account of these semantics. A connection between the current work and the topic of linear programming equations can be found in [15]. We did use some of the equations of [15] in Section 4.4. References [1] L. Amgoud, N. Maudet, and S. Parsons. Modelling dialogues using argumentation. In Proceedings of the Fourth International Conference on MultiAgent Systems (ICMAS00), pages 31–38, Boston, MA, 2000. [2] ASPIC-consortium. Deliverable D2.5: Draft formal semantics for ASPIC system, June 2005. [3] Pietro Baroni and Massimiliano Giacomin. Comparing argumentation semantics with respect to skepticism. In Proc. ECSQARU 2007, pages 210–221, 2007. [4] Pietro Baroni and Massimiliano Giacomin. On principle-based evaluation of extension-based argumentation semantics. Artificial Intelligence, 171(10-15):675–700, 2007. [5] Philippe Besnard and Sylvie Doutre. Characterization of semantics for argument systems. In Proceedings of the Ninth International Conference on the principles of Knowledge Representation and reasoning, pages 183–193. AAAI Press, 2004. [6] G. Boella, J. Hulstijn, and L. van der Torre. A logic of abstract argumentation. In Proceedings of the Workshop on Argumentation in Multi-Agent Systems (ArgMAS), 2005. [7] Martin Caminada and Leila Amgoud. On the evaluation of argumentation formalisms. Artificial Intelligence, 171(5-6):286–310, 2007. [8] M.W.A. Caminada. On the issue of reinstatement in argumentation. In M. Fischer, W. van der Hoek, B. Konev, and A. Lisitsa, editors, Logics in Artificial Intelligence; 10th European Conference, JELIA 2006, pages 111–123. Springer, 2006. LNAI 4160. [9] M.W.A. Caminada. On the issue of reinstatement in argumentation. Technical Report UU-CS-2006-023, Institute of Information and Computing Sciences, Utrecht Univer- A Logical Account of Formal Argumentation 37 sity, 2006. [10] M.W.A. Caminada. Semi-stable semantics. In P.E. Dunne and TJ.M. Bench-Capon, editors, Computational Models of Argument; Proceedings of COMMA 2006, pages 121–130. IOS Press, 2006. [11] M.W.A. Caminada. An algorithm for computing semi-stable semantics. In Proceedings of the 9th European Conference on Symbolic and Quantitalive Approaches to Reasoning with Uncertainty (ECSQARU 2007), number 4724 in Springer Lecture Notes in AI, pages 222–234, Berlin, 2007. Springer Verlag. [12] P. M. Dung. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence, 77:321–357, 1995. [13] P. M. Dung, P. Mancarella, and F. Toni. Computing ideal sceptical argumentation. Artificial Intelligence, 171(10-15):642–674, 2007. [14] D. Gabbay, R. Schmidt, and A. Szalas. Order Quantifier Elmination. College Publications, 2008. [15] Dov M. Gabbay. Fibring argumentation frames. submitted to Studia Logica, 2009. [16] Dov M. Gabbay. Modal provability foundations for argumentation networks. submitted to Studia Logica, 2009. [17] Dov M. Gabbay and Artur S. d’Avila Garcez. Logical modes of attack in argumentation networks. submitted to Studia Logica, 2009. [18] Dov M. Gabbay, A. Kurucz, F. Wolter, and M. Zakharyaschev. Many-dimensional Modal Logics: Theory and Applications. Number 148 in Studies in Logic and the Foundations of Mathematics. Elsevier, 2003. [19] Davide Grossi. Doing argumentation theory in modal logic. Technical Report PP2009-24, ILLC, 2009. [20] H. Jakobovits and D. Vermeir. Robust semantics for argumentation frameworks. Journal of logic and computation, 9(2):215–261, 1999. [21] J. L. Pollock. Cognitive Carpentry. A Blueprint for How to Build a Person. MIT Press, Cambridge, MA, 1995. [22] H. Prakken and G. Sartor. Argument-based extended logic programming with defeasible priorities. Journal of Applied Non-Classical Logics, 7:25–75, 1997. [23] I. Rahwan, F. Zablith, and C. Reed. Laying the foundations for a world wide argument web. Artificial Intelligence, 171(10-15):897–921, 2007. [24] G.R. Simari and R.P. Loui. A mathematical treatment of defeasible reasoning and its implementation. Artificial Intelligence, 53:125–157, 1992. [25] Craig Smorynski. modal logic and self reference. In Dov M. Gabbay and F. Guenter, editors, Handbook of Philosophical Logic, 1st edition, volume 2. Kluwer, 1984. [26] Bart Verheij. A labeling approach to the computation of credulous acceptance in argumentation. In Manuela M. Veloso, editor, Proceedings of the 20th International Joint Conference on Artificial Intelligence, Hyderabad, India, pages 623–628, 2007. [27] G. A. W. Vreeswijk. Studies in defeasible argumentation. PhD thesis at Free University of Amsterdam, 1993. [28] G.A.W. Vreeswijk. An algorithm to compute minimally grounded and admissible defence sets in argument systems. In P.E. Dunne and TJ.M. Bench-Capon, editors, Computational Models of Argument; Proceedings of COMMA 2006, pages 109–120. 38 Caminada and Gabbay IOS, 2006. [29] Yining Wu, Martin Caminada, and Dov Gabbay. Complete extensions in argumentation coincide with 3-valued stable models in logic programming. submitted to Studia Logica, 2009. Martin W.A. Caminada Interdisciplinary Lab for Intelligent and Adaptive Systems University of Luxembourg [email protected] Dov M. Gabbay King’s College, London Bar-Alan University, Israel University of Luxembourg [email protected]