tackling defeasible reasoning in bochum
play

Tackling Defeasible Reasoning in Bochum: the Research Group for - PowerPoint PPT Presentation

Tackling Defeasible Reasoning in Bochum: the Research Group for Non-Monotonic Logic and Formal Argumentation Christian Straer and Dunja eelja April 10, 2017 Outline The NMLFA Reasoning by Cases Unrestricted Rebut Comparative Studies


  1. Extension-based Approaches: Default Logic (Reiter) • idea: split the factual part of the knowledge base (Gelfond, Lifschitz, Przymusinska, 1991) Republican Republican Base 1 Republican ∨ Democrat political Base 2 Democrat Democrat • two extensions: 1. Republican, political 2. Democrat, political 13/43

  2. 2. If somebody writes legibly then usually the right hand is not broken. wl rhb 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 14/43

  3. 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 14/43

  4. With disjunctive default logic we get two extensions: 1. wl, rhb, lhb 2. wl, rhb Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 3. He writes legibly. wl 14/43

  5. Problematic Example for Disjunctive Defaults Consider the following example: 1. Either his left hand or his right hand is broken. lhb ∨ rhb 2. If somebody writes legibly then usually the right hand is not broken. wl ⇒ ¬ rhb 3. He writes legibly. wl With disjunctive default logic we get two extensions: 1. wl, ¬ rhb, lhb 2. wl, rhb 14/43

  6. General Stratagem So far: Manipulate the database! 1. produce new defeasible rules from the given ones 2. produce new factual knowledge bases when confronted with disjunctive information 15/43

  7. Enters: the Argumentative Approach • Instead of manipulating the knowledge base and reasoning on top of the manipulated database, • we will, in what follows, use a more direct approach to the modeling of Reasoning by Cases in the context of defeasible reasoning, following the inference scheme: A ∨ B A ⇒ · · · ⇒ C B ⇒ · · · ⇒ C C or, more generally: A ∨ B A | ∼ C B | ∼ C C • This will allow us to have more control over defeating conditions … • … and to avoid pitfalls as the ones demonstrated above. 16/43

  8. • an argument a 2 Arg A with Conc a 2 C , and • an argument a 3 Arg B with Conc a 3 C , we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , 17/43

  9. • an argument a 3 Arg B with Conc a 3 C , we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and 17/43

  10. we introduce a new RbC-Argument a 1 a 2 a 3 C . A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and • an argument a 3 ∈ Arg ( ⟨D , K ∪ { B }⟩ ) with Conc ( a 3 ) = C , 17/43

  11. A New Type of Argument: RbC-Arguments Basic idea: Given • an argument a 1 ∈ Arg ( T ) for which Conc ( a 1 ) = A ∨ B , • an argument a 2 ∈ Arg ( ⟨D , K ∪ { A }⟩ ) with Conc ( a 2 ) = C , and • an argument a 3 ∈ Arg ( ⟨D , K ∪ { B }⟩ ) with Conc ( a 3 ) = C , we introduce a new RbC-Argument ⟨ a 1 , [ a 2 ] , [ a 3 ] � C ⟩ . 17/43

  12. • We say that a 1 a n are hypothetical sub-arguments of a , in signs: a 1 a n HSub a . • For each a i , Hyp a i A i . More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. 18/43

  13. • For each a i , Hyp a i A i . More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. • We say that a 1 , . . . , a n are hypothetical sub-arguments of a , in signs: a 1 , . . . , a n ∈ HSub ( a ) . 18/43

  14. More general: RbC-Argument Definition Where • a 0 ∈ Arg ( T ) with Conc ( a 0 ) = ∨ n i = 1 A i and • a i ∈ Arg ( ⟨D , K ∪ { A i }⟩ ) \ Arg ( T ) (1 ≤ i ≤ n ), ⟨ a 0 , [ a 1 ] , . . . , [ a n ] � ∨ n i = 1 Conc ( A i ) ⟩ is an RbC-argument. • We say that a 1 , . . . , a n are hypothetical sub-arguments of a , in signs: a 1 , . . . , a n ∈ HSub ( a ) . • For each a i , Hyp ( a i ) = A i . 18/43

  15. We have for instance the arguments: • a 1 p q r Arg T • a 2 q s v Arg q • a 3 r u v Arg r • a 4 a 1 a 2 a 3 v Arg T . q s v a2: p q r v a1: a3: r u v Let T = ⟨D , K⟩ consist of D = { p ⇒ q ∨ r , q ⇒ s , s ⇒ v , r ⇒ u , u ⇒ v , t ⇒ ¬ s } and K = { p , t } . 19/43

  16. Let T = ⟨D , K⟩ consist of D = { p ⇒ q ∨ r , q ⇒ s , s ⇒ v , r ⇒ u , u ⇒ v , t ⇒ ¬ s } and K = { p , t } . We have for instance the arguments: • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) . q s v a2: p q ∨ r v a1: r u v a3: 19/43

  17. What about attacks? 19/43

  18. • a 5 t s Arg T • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) q s v a2: p q ∨ r v a1: r u v a3: 20/43

  19. • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨S , D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) • a 5 = ⟨⟨ t ⟩ ⇒ ¬ s ⟩ ∈ Arg ( T ) a5: t ¬ s q s v a2: p q ∨ r v a1: r u v a3: 20/43

  20. • a 6 q s Arg q • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) q s v a2: p q ∨ r v a1: r u v a3: 21/43

  21. • a 1 = ⟨⟨ p ⟩ ⇒ q ∨ r ⟩ ∈ Arg ( T ) • a 2 = ⟨⟨ q ⟩ ⇒ s ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) • a 3 = ⟨⟨ r ⟩ ⇒ u ⇒ v ⟩ ∈ Arg ( ⟨D , K ∪ { r }⟩ ) • a 4 = ⟨ a 1 , [ a 2 ] , [ a 3 ] � v ⟩ ∈ Arg ( T ) • a 6 = ⟨⟨ q ⟩ ⇒ ¬ s ⟩ ∈ Arg ( ⟨D , K ∪ { q }⟩ ) q ¬ s a6: q s v a2: p q ∨ r v a1: a3: r u v 21/43

  22. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . Argumentation frameworks are now triples Arg T HArg T Attacks T . Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . 22/43

  23. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . Altogether attacks are defined as follows: Attacks T Arg T Arg T Arg T HArg T HArg T HArg T where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . 22/43

  24. 1. a Arg T and b Arg T HArg T or 2. a HArg T and b HArg T and Hyp a Hyp b . where a rebuts b b 1 b n B iff Conc a B or B Conc a and Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) 22/43

  25. 2. a HArg T and b HArg T and Hyp a Hyp b . Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) where a rebuts b = ⟨ b 1 , . . . , b n ⇒ B ⟩ iff Conc ( a ) = ¬ B or B = ¬ Conc ( a ) and 1. a ∈ Arg ( T ) and b ∈ Arg ( T ) ∪ HArg ( T ) or 22/43

  26. Attacks again (non-nested case) Let HArg ( T ) be the set of all arguments a for which there is a b ∈ Arg ( T ) for which a ∈ HSub ( b ) . Argumentation frameworks are now triples ⟨ Arg ( T ) , HArg ( T ) , Attacks ( T ) ⟩ . Altogether attacks are defined as follows: Attacks ( T ) ⊆ ( Arg ( T ) × Arg ( T )) ∪ ( Arg ( T ) × HArg ( T )) ∪ ( HArg ( T ) × HArg ( T )) where a rebuts b = ⟨ b 1 , . . . , b n ⇒ B ⟩ iff Conc ( a ) = ¬ B or B = ¬ Conc ( a ) and 1. a ∈ Arg ( T ) and b ∈ Arg ( T ) ∪ HArg ( T ) or 2. a ∈ HArg ( T ) and b ∈ HArg ( T ) and Hyp ( a ) = Hyp ( b ) . 22/43

  27. Unrestricted Rebut

  28. joint work: Jesse Heyninck and Christian Straßer 22/43

  29. • unrestricted rebut: only the first requirement • pro: natural (Caminada) • contra: leads to trouble for many semantics such as preferred, stable, etc Status quo • in ASPIC + only restricted rebut: a rebuts b iff 1. the conclusion of a is contrary to the conclusion of b 2. and b has a defeasible top rule 23/43

  30. Status quo • in ASPIC + only restricted rebut: a rebuts b iff 1. the conclusion of a is contrary to the conclusion of b 2. and b has a defeasible top rule • unrestricted rebut: only the first requirement • pro: natural (Caminada) • contra: leads to trouble for many semantics such as preferred, stable, etc 23/43

  31. • Sub-argument closure: where a and b Sub a , b . • Closure under strict rules: where a 1 a n Arg T and Conc a 1 Conc a n B , also a 1 a n B Arg T • Consistency: Conc a a is consistent. • Rationality postulates: Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) 24/43

  32. • Closure under strict rules: where a 1 a n Arg T and Conc a 1 Conc a n B , also a 1 a n B Arg T • Consistency: Conc a a is consistent. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . 24/43

  33. • Consistency: Conc a a is consistent. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . • Closure under strict rules: where a 1 , . . . , a n ∈ E ∩ Arg ( T ) and Conc ( a 1 ) , . . . , Conc ( a n ) ⊢ B , also ⟨ a 1 , . . . , a n → B ⟩ ∈ E ∩ Arg ( T ) 24/43

  34. Enters: Caminada et al. (COMMA 2014) • for grounded semantics unrestricted rebut works just fine (really?) • Rationality postulates: • Sub-argument closure: where a ∈ E and b ∈ Sub ( a ) , b ∈ E . • Closure under strict rules: where a 1 , . . . , a n ∈ E ∩ Arg ( T ) and Conc ( a 1 ) , . . . , Conc ( a n ) ⊢ B , also ⟨ a 1 , . . . , a n → B ⟩ ∈ E ∩ Arg ( T ) • Consistency: { Conc ( a ) | a ∈ E} is consistent. 24/43

  35. • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g 25/43

  36. • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments 25/43

  37. • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments 25/43

  38. • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments 25/43

  39. • and so on … until fixed point is reached Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments 25/43

  40. Grounded Semantics c d a b e f h i g • first select unattacked arguments • remove the arguments attacked by the selected arguments • select unattacked arguments • remove the arguments attacked by the selected arguments • and so on … until fixed point is reached 25/43

  41. • Non-interference 1 Where T and T are argumentation theories and A is a formula such that Atoms A Atoms then: T A iff A Non-Interference For a set of formulas F let Atoms ( F ) be the set of all propositional atoms in F . 1 Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic relevance criterion. 26/43

  42. Non-Interference For a set of formulas F let Atoms ( F ) be the set of all propositional atoms in F . • Non-interference 1 Where T = ⟨D , K⟩ and T ′ = ⟨D ′ , K ′ ⟩ are argumentation theories and A is a formula such that Atoms ( D ∪ K ∪ { A } ) ∩ Atoms ( D ′ ∪ K ′ ) = ∅ then: T | ∼ A iff ⟨D ∪ D ′ , K ∪ K ′ ⟩ | ∼ A . 1 Caminada, Carnielli, Dunne (JLC, 2012). Avron (2016) calls this the basic relevance criterion. 26/43

  43. • Clearly: a p is in the grounded extension. • Now, take the knowledge base: p s s . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . 27/43

  44. • Now, take the knowledge base: p s s . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. 27/43

  45. • (Let the strict rules be closed under classical logic.) • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . 27/43

  46. • Now, a is attacked by s s p . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) 27/43

  47. • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . 27/43

  48. • Thus, Non-Interference doesn’t hold for unrestricted rebut. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . • As a consequence, a is not in the grounded extension. 27/43

  49. The problem with unrestricted rebut in ASPIC − • Take the knowledge base: {⊤ ⇒ p } . • Clearly: a = ⟨⊤ ⇒ p ⟩ is in the grounded extension. • Now, take the knowledge base: {⊤ ⇒ p , ⊤ ⇒ s , ⊤ ⇒ ¬ s } . • (Let the strict rules be closed under classical logic.) • Now, a is attacked by ⟨⟨⊤ ⇒ s ⟩ , ⟨⊤ ⇒ ¬ s ⟩ → ¬ p ⟩ . • As a consequence, a is not in the grounded extension. • Thus, Non-Interference doesn’t hold for unrestricted rebut. 27/43

  50. Prima Facie solution • sort out inconsistent arguments (Wu, 2012: this works in ASPIC + ) • however, this doesn’t work with unrestricted rebut 28/43

  51. Problem: • b c is inconsistent and thus filtered out • this leaves a and c in but a c out of the grounded extension. • Failure of closure! Prima Facie solution ii Let {⊤ ⇒ 1 p , p ⇒ 1 q , ⊤ ⇒ 2 ¬ ( p ∧ q ) } be our knowledge base. a b c We have, e.g., the following arguments: b ⊕ c a ⊕ c a ⊕ b • a = ⟨⊤ ⇒ 1 p ⟩ • b = ⟨ a ⇒ 1 q ⟩ • a ⊕ b = ⟨ a , b → p ∧ q ⟩ • c = ⟨⊤ ⇒ 2 ¬ ( p ∧ q ) ⟩ • a ⊕ c = ⟨ a , c → ¬ q ⟩ • b ⊕ c = ⟨ b , c → ¬ p ⟩ 29/43

  52. Prima Facie solution ii Let {⊤ ⇒ 1 p , p ⇒ 1 q , ⊤ ⇒ 2 ¬ ( p ∧ q ) } be our knowledge base. a b c We have, e.g., the following arguments: b ⊕ c a ⊕ c a ⊕ b • a = ⟨⊤ ⇒ 1 p ⟩ • b = ⟨ a ⇒ 1 q ⟩ Problem: • a ⊕ b = ⟨ a , b → p ∧ q ⟩ • b ⊕ c is inconsistent and • c = ⟨⊤ ⇒ 2 ¬ ( p ∧ q ) ⟩ thus filtered out • a ⊕ c = ⟨ a , c → ¬ q ⟩ • this leaves a and c in but • b ⊕ c = ⟨ b , c → ¬ p ⟩ a ⊕ c out of the grounded extension. 29/43 • Failure of closure!

  53. n • A 1 A n 1 A i , or df i n • A 1 A n 1 A i . df i • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., 30/43

  54. n • A 1 A n 1 A i . df i • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or 30/43

  55. • Concs a Conc b b Sub a df Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . 30/43

  56. Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } 30/43

  57. Definition a gen-rebuts b iff b is defeasible and Conc a for some Concs b . Definition a gen-defeats b iff a gen-rebuts c for some c Sub b and c a . Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } 30/43

  58. Enters: ASPIC ⊖ : generalized unrestricted rebut • lifting of the contrariness operator to (finite) sets of formulas, e.g., ∧ n • { A 1 , . . . , A n } = df i = 1 A i , or ∨ n • { A 1 , . . . , A n } = df i = 1 A i . • Concs ( a ) = df { Conc ( b ) | b ∈ Sub ( a ) } Definition a gen-rebuts b iff b is defeasible and Conc ( a ) = ∆ for some ∆ ⊆ Concs ( b ) . Definition a gen-defeats b iff a gen-rebuts c for some c ∈ Sub ( b ) and c ⪯ a . 30/43

  59. Back to the example a b c b ⊕ c a ⊕ c a ⊕ b 31/43

  60. Rationality Where the strict rules are obtained from classical logic, for weakest link we get • sub-argument closure • closure under strict rules • consistency • non-interference 32/43

  61. Comparative Studies

  62. Jesse Heyninck, Christian Straßer: Relations between assumption-based approaches in nonmonotonic logic and formal argumentation (NMR 2016, Cape Town, also available on Arxiv) 32/43

  63. The landscape • ABA: assumption-based argumentation (Dung, Kowalski, Toni) • ALs: adaptive logics (Batens) • DACR: default assumptions (Makinson) • KLM: preferential semantics (Shoham, Kraus/Lehman/Magidor) 33/43

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend