tackling defeasible reasoning in bochum
play

Tackling Defeasible Reasoning in Bochum: the Research Group for - PowerPoint PPT Presentation

Tackling Defeasible Reasoning in Bochum: the Research Group for Non-Monotonic Logic and Formal Argumentation Christian Straer and Dunja eelja April 10, 2017 Outline The NMLFA Reasoning by Cases Unrestricted Rebut Comparative Studies


  1. Extension-based Approaches: Default Logic (Reiter) • idea: split the factual part of the knowledge base (Gelfond, Lifschitz, Przymusinska, 1991) Republican Republican Base 1 Republican ∨ Democrat political Base 2 Democrat Democrat • two extensions: 1. Republican, political 2. Democrat, political 13/43

  2. 2. If somebody writes legibly then usually the right hand is not broken. wl rhb 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 14/43

  3. 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 14/43

  4. With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 3. He writes legibly. wl 14/43

  5. Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, ¬ rhb, lhb 2. wl, rhb 14/43

  6. General Stratagem So far: Manipulate the database! 1. produce new defeasible rules from the given ones 2. produce new factual knowledge bases when confronted with disjunctive information 15/43

  7. Enters: the Argumentative Approach • Instead of manipulating the knowledge base and reasoning on top of the manipulated database, • we will, in what follows, use a more direct approach to the modeling of Reasoning by Cases in the context of defeasible reasoning, following the inference scheme: A ∨ B A ⇒ · · · ⇒ C B ⇒ · · · ⇒ C C or, more generally: A ∨ B A | ∼ C B | ∼ C C • This will allow us to have more control over defeating conditions … • … and to avoid pitfalls as the ones demonstrated above. 16/43

  8. • an argument a 2 Arg A with Conc a 2 C , and • an argument a 3 Arg B with Conc a 3 C , we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , 17/43

  9. • an argument a 3 Arg B with Conc a 3 C , we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and 17/43

  10. we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and • an argument a 3 ∈ Arg ( ⟨D , K ∪ { B }⟩ ) with Conc ( a 3 ) = C , 17/43

  11. A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and • an argument a 3 ∈ Arg ( ⟨D , K ∪ { B }⟩ ) with Conc ( a 3 ) = C , we introduce a new RbC-Argument ⟨ a 1 , [ a 2 ] , [ a 3 ] � C ⟩ . 17/43

  12. • We say that a 1 a n are hypothetical sub-arguments of a , in signs: a 1 a n HSub a . • For each a i , Hyp a i A i . More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. 18/43

  13. • For each a i , Hyp a i A i . More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. • We say that a 1 , . . . , a n are hypothetical sub-arguments of a , in signs: a 1 , . . . , a n ∈ HSub ( a ) . 18/43

  14. More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. • We say that a 1 , . . . , a n are hypothetical sub-arguments of a , in signs: a 1 , . . . , a n ∈ HSub ( a ) . • For each a i , Hyp ( a i ) = A i . 18/43

  15. We have for instance the arguments: • a 1 p q r Arg T • a 2 q s v Arg q • a 3 r u v Arg r • a 4 a 1 a 2 a 3 v Arg T . q s v a2: p q r v a1: a3: r u v Let T = ⟨D , K⟩ consist of D = { p ⇒ q ∨ r , q ⇒ s , s ⇒ v , r ⇒ u , u ⇒ v , t ⇒ ¬ s } and K = { p , t } . 19/43

  16. Let T = ⟨D , K⟩ consist of D = { p ⇒ q ∨ r , q ⇒ s , s ⇒ v , r ⇒ u , u ⇒ v , t ⇒ ¬ s } and K = { p , t } . We have for instance the arguments: • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) . q s v a2: p q ∨ r v a1: r u v a3: 19/43

  17. What about attacks? 19/43

  18. • a 5 t s Arg T • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) q s v a2: p q ∨ r v a1: r u v a3: 20/43

  19. • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) • a 5 = ⟨⟨ t ⟩ ⇒ ¬ s ⟩ ∈ Arg ( T ) a5: t ¬ s q s v a2: p q ∨ r v a1: r u v a3: 20/43

  20. • a 6 q s Arg q • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) q s v a2: p q ∨ r v a1: r u v a3: 21/43

  21. • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) • a 6 = ⟨⟨ q ⟩ ⇒ ¬ s ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) q ¬ s a6: q s v a2: p q ∨ r v a1: a3: r u v 21/43

  22. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . Argumentation frameworks are now triples Arg T HArg T Attacks T . Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . 22/43

  23. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . 22/43

  24. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) 22/43

  25. 2. a HArg T and b HArg T and Hyp a Hyp b . Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) where a rebuts b = ⟨ b 1 , . . . , b n ⇒ B ⟩ iff Conc ( a ) = ¬ B or B = ¬ Conc ( a ) and 1. a ∈ Arg ( T ) and b ∈ Arg ( T ) ∪ HArg ( T ) or 22/43

  26. Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) where a rebuts b = ⟨ b 1 , . . . , b n ⇒ B ⟩ iff Conc ( a ) = ¬ B or B = ¬ Conc ( a ) and 1. a ∈ Arg ( T ) and b ∈ Arg ( T ) ∪ HArg ( T ) or 2. a ∈ HArg ( T ) and b ∈ HArg ( T ) and Hyp ( a ) = Hyp ( b ) . 22/43

  27. Unrestricted Rebut

  28. joint work: Jesse Heyninck and Christian Straßer 22/43

  29. • unrestricted rebut: only the first requirement • pro: natural (Caminada) • contra: leads to trouble for many semantics such as preferred, stable, etc Status quo • in ASPIC + only restricted rebut: a rebuts b iff 1. the conclusion of a is contrary to the conclusion of b 2. and b has a defeasible top rule 23/43

  30. Status quo • in ASPIC + only restricted rebut: a rebuts b iff 1. the conclusion of a is contrary to the conclusion of b 2. and b has a defeasible top rule • unrestricted rebut: only the first requirement • pro: natural (Caminada) • contra: leads to trouble for many semantics such as preferred, stable, etc 23/43

  31. • Sub-argument closure: where a and b Sub a , b . • Closure under strict rules: where a 1 a n Arg T and Conc a 1 Conc a n B , also a 1 a n B Arg T • Consistency: Conc a a is consistent. • Rationality postulates: Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) 24/43

  32. • Closure under strict rules: where a 1 a n Arg T and Conc a 1 Conc a n B , also a 1 a n B Arg T • Consistency: Conc a a is consistent. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . 24/43

  33. • Consistency: Conc a a is consistent. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . • Closure under strict rules: where a 1 , . . . , a n ∈ E ∩ Arg ( T ) and Conc ( a 1 ) , . . . , Conc ( a n ) ⊢ B , also ⟨ a 1 , . . . , a n → B ⟩ ∈ E ∩ Arg ( T ) 24/43

  34. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . • Closure under strict rules: where a 1 , . . . , a n ∈ E ∩ Arg ( T ) and Conc ( a 1 ) , . . . , Conc ( a n ) ⊢ B , also ⟨ a 1 , . . . , a n → B ⟩ ∈ E ∩ Arg ( T ) • Consistency: { Conc ( a ) | a ∈ E} is consistent. 24/43

  35. • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g 25/43

  36. • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments 25/43

  37. • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments 25/43

  38. • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments 25/43

  39. • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments 25/43

  40. Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached 25/43

  41. • Non-interference 1 Where T and T are argumentation theories and A is a formula such that Atoms A Atoms then: T A iff A Non-Interference For a set of formulas F let Atoms ( F ) be the set of all propositional atoms in F . 1 Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic relevance criterion. 26/43

  42. Non-Interference For a set of formulas F let Atoms ( F ) be the set of all propositional atoms in F . • Non-interference 1 Where T = ⟨D , K⟩ and T ′ = ⟨D ′ , K ′ ⟩ are argumentation theories and A is a formula such that Atoms ( D ∪ K ∪ { A } ) ∩ Atoms ( D ′ ∪ K ′ ) = ∅ then: T | ∼ A iff ⟨D ∪ D ′ , K ∪ K ′ ⟩ | ∼ A . 1 Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic relevance criterion. 26/43

  43. • Clearly: a p is in the grounded extension. • Now, take the knowledge base: p s s . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . 27/43

  44. • Now, take the knowledge base: p s s . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. 27/43

  45. • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . 27/43

  46. • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) 27/43

  47. • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . 27/43

  48. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . • As a consequence, a is not in the grounded extension. 27/43

  49. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. 27/43

  50. Prima Facie solution • sort out inconsistent arguments (Wu, 2012: this works in ASPIC + ) • however, this doesn’t work with unrestricted rebut 28/43

  51. Problem: • b c is inconsistent and thus filtered out • this leaves a and c in but a c out of the grounded extension. • Failure of closure! Prima Facie solution ii Let {⊤ ⇒ 1 p , p ⇒ 1 q , ⊤ ⇒ 2 ¬ ( p ∧ q ) } be our knowledge base. a b c We have, e.g., the following arguments: b ⊕ c a ⊕ c a ⊕ b • a = ⟨⊤ ⇒ 1 p ⟩ • b = ⟨ a ⇒ 1 q ⟩ • a ⊕ b = ⟨ a , b → p ∧ q ⟩ • c = ⟨⊤ ⇒ 2 ¬ ( p ∧ q ) ⟩ • a ⊕ c = ⟨ a , c → ¬ q ⟩ • b ⊕ c = ⟨ b , c → ¬ p ⟩ 29/43

  52. Prima Facie solution ii Let {⊤ ⇒ 1 p , p ⇒ 1 q , ⊤ ⇒ 2 ¬ ( p ∧ q ) } be our knowledge base. a b c We have, e.g., the following arguments: b ⊕ c a ⊕ c a ⊕ b • a = ⟨⊤ ⇒ 1 p ⟩ • b = ⟨ a ⇒ 1 q ⟩ Problem: • a ⊕ b = ⟨ a , b → p ∧ q ⟩ • b ⊕ c is inconsistent and • c = ⟨⊤ ⇒ 2 ¬ ( p ∧ q ) ⟩ thus filtered out • a ⊕ c = ⟨ a , c → ¬ q ⟩ • this leaves a and c in but • b ⊕ c = ⟨ b , c → ¬ p ⟩ a ⊕ c out of the grounded extension. 29/43 • Failure of closure!

  53. n • A 1 A n 1 A i , or df i n • A 1 A n 1 A i . df i • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., 30/43

  54. n • A 1 A n 1 A i . df i • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or 30/43

  55. • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . 30/43

  56. Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } 30/43

  57. Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } 30/43

  58. Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } Definition a gen-rebuts b iff b is defeasible and Conc ( a ) = ∆ for some ∆ ⊆ Concs ( b ) . Definition a gen-defeats b iff a gen-rebuts c for some c ∈ Sub ( b ) and c ⪯ a . 30/43

  59. Back to the example a b c b ⊕ c a ⊕ c a ⊕ b 31/43

  60. Rationality Where the strict rules are obtained from classical logic, for weakest link we get • sub-argument closure • closure under strict rules • consistency • non-interference 32/43

  61. Comparative Studies

  62. Jesse Heyninck, Christian Straßer: Relations between assumption-based approaches in nonmonotonic logic and formal argumentation (NMR 2016, Cape Town, also available on Arxiv) 32/43

  63. The landscape • ABA: assumption-based argumentation (Dung, Kowalski, Toni) • ALs: adaptive logics (Batens) • DACR: default assumptions (Makinson) • KLM: preferential semantics (Shoham, Kraus/Lehman/Magidor) 33/43

Recommend


More recommend