• Keine Ergebnisse gefunden

Methods for Solving Reasoning Problems in Abstract Argumentation – A Survey

N/A
N/A
Protected

Academic year: 2022

Aktie "Methods for Solving Reasoning Problems in Abstract Argumentation – A Survey"

Copied!
36
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Contents lists available atScienceDirect

Artificial Intelligence

www.elsevier.com/locate/artint

Methods for solving reasoning problems in abstract argumentation – A survey

Günther Charwat

a

, Wolfgang Dvoˇrák

b

, Sarah A. Gaggl

c

, Johannes P. Wallner

a

, Stefan Woltran

a,

aViennaUniversityofTechnology,InstituteofInformationSystems,Austria bUniversityofVienna,FacultyofComputerScience,Austria

cTechnischeUniversitätDresden,InstituteofArtificialIntelligence,Germany

a rt i c l e i n f o a b s t ra c t

Articlehistory:

Received29March2013

Receivedinrevisedform19November2014 Accepted28November2014

Availableonline15December2014 Keywords:

Abstractargumentation Algorithms

Argumentationsystems

Withinthelastdecade,abstractargumentationhasemergedasacentralfieldinArtificial Intelligence.Besidesprovidingacoreformalismformanyadvancedargumentationsystems, abstractargumentationhasalsoservedtocaptureseveralnon-monotoniclogicsandother AIrelatedprinciples.Althoughthe ideaofabstractargumentationis appealinglysimple, severalreasoningproblemsinthisformalismexhibithighcomputationalcomplexity.This callsforadvancedtechniqueswhenitcomestoimplementationissues,achallengewhich hasbeen recently faced from different angles. In this survey, wegive an overview on differentmethodsforsolvingreasoningproblemsinabstractargumentationandcompare their particular features. Moreover, we highlight available state-of-the-art systems for abstractargumentation,whichputthesemethodstopractice.

2015TheAuthors.PublishedbyElsevierB.V.Thisisanopenaccessarticleunderthe CCBYlicense(http://creativecommons.org/licenses/by/4.0/).

1. Introduction

Argumentationisahighlyinterdisciplinaryfieldwithlinkstopsychology,linguistics,philosophy,legaltheory,andformal logic. Sincetheadventofthecomputer age,formalmodels ofargumenthavebeenmaterializedindifferentsystemsthat implement—oratleastsupport—creation,evaluation,andjudgment ofarguments.However,untilDung’sseminalpaper on abstractargumentation[1],the heterogeneityof theseapproacheswas severelyhampering a strongandjointdevelop- ment of afield like “computational argumentation”.In fact, Dung’sidea ofevaluating argumentson an abstract levelby takingonlytheirinter-relationshipsintoaccount,not onlyhasbeenshowntounderliemanyoftheearlierapproachesfor argumentation,butalsouniformlycapturesseveralnon-monotoniclogics.Yetthissecond contributionlocatedArgumenta- tion asasub-discipline ofArtificial Intelligence[2].Theincreasing significanceofargumentation asa research areaofits ownhasalsobeenwitnessedbythebiennialCOMMAConferenceonComputationalModelsofArgument,1 whichfromthe secondmeetingonwardsprovidessessionsforsoftwaredemonstrationsofimplementedsystems,theIJCAIWorkshopSeries onTheoryandApplicationsofFormalArgumentation(TAFA),2 the2010establishedJournalofArgumentandComputation,3 ortheTextbookonArgumentationinArtificialIntelligence[3].

*

Correspondingauthor.

E-mailaddresses:gcharwat@dbai.tuwien.ac.at(G. Charwat),wolfgang.dvorak@univie.ac.at(W. Dvoˇrák),sarah.gaggl@tu-dresden.de(S.A. Gaggl), wallner@dbai.tuwien.ac.at(J.P. Wallner),woltran@dbai.tuwien.ac.at(S. Woltran).

1 http://www.comma-conf.org/.

2 http://homepages.abdn.ac.uk/n.oren/pages/TAFA-13/.

3 http://www.tandfonline.com/toc/tarc20/current.

http://dx.doi.org/10.1016/j.artint.2014.11.008

0004-3702/2015TheAuthors.PublishedbyElsevierB.V.ThisisanopenaccessarticleundertheCCBYlicense (http://creativecommons.org/licenses/by/4.0/).

(2)

One particularfeature ofabstract argumentationframeworks istheir simple structure.In fact, abstractargumentation frameworksarejustdirectedgraphswhereverticesplaytheroleofargumentsandedgesindicateacertainconflictbetween thetwoconnectedarguments.Theseargumentationframeworksareusuallyderivedduringaninstantiationprocess(see,e.g., [4,5]), where structured argumentsare investigated withrespectto their ability to contradictother such arguments; the actualnotionof“contradicting”canbeinstantiatedinmanydifferentforms(see,e.g.,[6]).Havinggeneratedtheframework insuchaway,theprocessof“conflict-resolution”,i.e.,thesearchforjointlyacceptablesetsofarguments,isthendelegated tosemanticswhichoperateontheabstractlevel.Thus,semanticsforargumentationframeworkshavealsobeenreferredto ascalculiofopposition[7].

One directionofresearch inabstract argumentationwas devoted to develop the “right”forms ofsemantics (see, e.g., [8–10] where propertiesfor argumentation semantics are proposed andevaluated). Thishas lead to what G. Simari has called a “plethoraofargumentationsemantics”.4 Today there seems to be agreement within the communitythat different semanticssuitdifferentapplications,hencemanyofthemareinuseforavarietyofapplicationdomains.5 Itisclearthat thissituationimpliesthatsuccessfulsystemsforabstractargumentationareexpectedtooffernotonlyasinglesemantics.

Thecentral roleofabstractargumentationframeworksalsoboostedresearchonefficientprocedures forthisparticular formalism.However,itwassoonrecognizedthatalreadythesesimpleframeworksshowhighcomplexity(see,e.g.,[12–14]);

duetothelinktonon-monotoniclogicandtologicprogramminginparticular,thiscamewithoutahugesurprise.Together withthefactthatmanydifferentsemanticsexist,generalimplementationmethodsforabstractargumentationthusrequire

acertainlevelofgenerality,suchthatnotonlyasinglesemanticscanbetreated;and

asufficientlevelofefficiencytofacethehighinherentcomplexityoftheproblemsathand.

Scopeofthesurvey Inthisarticle,wepresentaselectionofevaluationmethodsforabstractargumentationwhichwebelieve tomeettheserequirements.Wegroupthesemethodsintotwocategories:thereductionapproachandthedirectapproach.

Theunderlyingideaofthereductionapproachistoexploitexistingefficientsoftwarewhichhasoriginallybeendeveloped for other purposes. To this end, one has to formalize the reasoning problems within other formalisms like constraint- satisfaction problems (CSP) [15], propositional logic [16] or answer-set programming (ASP) [17]. In this approach, the resulting argumentation systems directly benefit from the high level of sophistication today’s systems for SAT (satisfia- bilityinpropositional logic)orASPhavereached. Thereduction approachwillbe presentedindetail inSection3 ofthis article.Hereby,wewillfirstfocuson

SAT-basedargumentationsystems.ThisdirectionhasbeenadvocatedbyBesnardandDoutre[18],andlaterextendedby meansofquantifiedpropositionallogic[19,20].Wewillfirstdiscussthetheoreticalunderpinningsofthisapproachand thencontinuewithanintroductiontotheCEGARTIXsystem[21]andtheArgSemSATsystem[22],whichbothrelyon iterativecallstoSATsolversforargumentationsemanticsofhighcomplexity(i.e.,beinglocatedonthesecond levelof thepolynomialhierarchy).

CSP-based approach. Reductions to CSP have been addressed by Amgoud and Devred [23] and Bistarelli and San- tini[24–28];the latterwork led tothe development ofthe ConArg system. Weintroduce the formalizationof argu- mentation frameworksintermsofCSPs, wherethe argumentsofthegivenframework representthevariables ofthe CSPwithdomainsof0and1.Theconstraintsthendependonthespecificsemantics.

ASP-based approach.The useofthislogic-programmingparadigm tosolve abstractargumentationproblemshasbeen initiatedbyseveralauthors(thesurveyarticlebyToniandSergot[29]providesagoodoverview).Wefocushereonthe ASPARTIXapproach[30]whichincontrasttotheaforementionedSATmethodsreliesonaquery-basedimplementation wheretheargumentationframeworktobeevaluatedisprovidedasaninputdatabase(fromthispointofview,theSAT orCSPmethodscanbeseenasacompiler-likeapproachtoabstractargumentation,whiletheASPmethodactslikean interpreter).A largecollectionofsuchASPqueriesisprovidedbytheASPARTIXsystem.Wewilldiscussstandardways ofASPencodings,butalsosomerecentmethodswhichexploitadvancedASPtechniques[31].

Intheremainder ofSection3weshallpresenttheconceptsbehindotherreduction-basedapproaches,forinstance,the equationalapproachasintroducedbyGabbayin[32]andthereductionstomonadicsecondorderlogicasproposedin[33].

In Section 4, we collect methods andalgorithms which havebeen developed from scratch (instead of using another formalismlikeSATorASP).Theobviousdisadvantageofthisdirectapproachisduetothefactthatexistingtechnologycannot bedirectlyemployed.Ontheotherhand,suchargumentation-tailoredalgorithms easetheincorporationofshort-cutsthat arespecifictotheargumentationdomain.Indetail,wewilldiscussthefollowingideas:

The labelingapproach[34–38] givesa morefine-grainedhandleon thestatusof argumentswhen evaluatedw.r.t. se- manticsandalsoprovidesasolidbasisfordedicatedalgorithms.Wepresenttwodifferentproposalsforimplementing

4 Duringthepresentationof[11]atCOMMA2006.

5 However,inconnectionwithparticularinstantiationschemes,itisoftenclaimedthatonlysemanticsthatfollowtheprincipleofadmissibility(argu- mentsshallonlybejointlyacceptedifeachoftheselectedargumentsisdefendedbytheselectedset;wewillmaketheconceptsmoreclearinSection2) shouldbeconsidered(see,e.g.,[5]).

(3)

Fig. 1.Example argumentation framework.

the enumerationofpreferredextensions,one along thelines of[35] andanotherfollowing [34] usingimprovements from [36]. Furthermore, we discussan algorithm dedicatedto credulous reasoning with preferredsemantics follow- ing thework of[38].Labeling-basedalgorithms havebeenmaterializedinthe ArguLabsystemaswellasinVerheij’s CompArgsystem.

•CharacterizationsviaDialogueGames.Heretheacceptancestatusofanargumentisgivenintermsofwinningstrategies incertain gamesontheargumentationframework. Typicallysuchgames aretwo-player gameswhereoneplayer, the proponent,arguesinfavoroftheargumentinquestionandasecondplayer,theopponent,arguesagainstit.Suchgames canbeusedtodesignalgorithms[35,39],whichareemployedinsystemslikeDungineandDung-O-Matic.

Finally,wewilltake alookondynamicprogrammingapproaches[40] whichoperateondecompositionsofframeworks.

Notably, therunning timesinthisapproach arenot mainlydependent on thesize ofthegivenframework, butona structuralparameter.We focusontheparametertree-widthandtheconceptoftreedecomposition.Thismethodwas firstadvocatedbyDunne[41]andlaterrealizedinthedynPARTIXsystem[42].

As already hinted above, many of the methods we presenthave found their way into an available software system.

Therefore, we will not only explain these methods in this survey, but shall also give the interested readerpointers to concretesystemswhichcanbeusedtoexperiment.Section5containsacomparisonofthesystemsw.r.t.theirfeatures(e.g.

supported semanticsandreasoningproblems)andtheunderlyingconcepts.Someofthesystemshavebeenevaluatedand comparedw.r.t.theirperformance(seee.g.,[31,36,43–45]),butnoexhaustiveperformancecomparisonshavebeendoneso far.Infact,anorganizedcompetitioncomparabletotheonesfromtheareasofSAT[46]orASP[47]isplannedtotakeplace in2015forthefirsttime[48].6 Thus,weabstainherefromasystematiccomparisonofthesystems’performance.

To summarize, ourgoal isto introduce aselection of methodsfor evaluating abstractargumentation frameworks;we shallexplainthekeyconceptsindetailforselectedsemanticsandgivepointerstotheliteraturefortheremainingsemantics or when it comes to more subtle aspects like optimization. Concerningabstract argumentation itself, we give a concise introduction inSection 2. Forreadersnot familiar withabstractargumentation, wehighly recommendthe recentsurvey articlebyBaronietal.[49].

SincethefocusofthisarticleisontheevaluationofsemanticsforDung’sabstractargumentationframework,advanced systems including instantiation (e.g., ASPIC [50] and Carneades [51]), assumption-based argumentation [52], or systems based on defeasible logic [53] are out ofthe scope ofthis article.7 Likewise, we will not consider the vastcollection of extensionstoDung’sframeworks,8 likevalue-based[56],bipolar[57],extended[58],constrained[59],temporal[60],prac- tical [61], andfibringargumentation frameworks [62], aswell asargumentation frameworks withrecursive attacks [63], argumentationcontextsystems[64],andabstractdialecticalframeworks[65].Wealsoexcludeabstractargumentationwith uncertainty orweightshere; recentarticlesby Hunter[66] andrespectively Dunne etal.[67] introduce thesevariantsin detail.

2. Background

In thissectionwe introduce (abstract)argumentationframeworks[1]andrecallthe semanticswe studyinthispaper (seealso[10,49,68]).

Definition1. An argumentationframework(AF)is a pair F=(A,R) where A is a setof argumentsand RA×A is the attackrelation.Thepair(a,b)∈Rmeansthataattacksb.WesaythatanargumentaA isdefended(in F)byaset SA if,foreachbA suchthat(b,a)∈R,thereexistsacS suchthat(c,b)∈R.

Anargumentationframeworkcanberepresentedasadirectedgraph.

Example1.LetF=(A,R)beanAFwith A= {a,b,c,d,e}andR= {(a,b),(b,c),(c,b),(d,c),(d,e),(e,e)}.Thecorrespond- inggraphrepresentationisdepictedinFig. 1.

Asemanticsforargumentationframeworksisdefinedasafunction

σ

whichassignstoeachAFF=(A,R)aset

σ

(F)⊆ 2A ofextensions.

6 Seehttp://argumentationcompetition.orgforfurtherinformation.

7 Anoverviewontheseapproachesisgivenin[54].

8 Abriefoverviewonsuchapproachesisgivenin[55].

(4)

Fig. 2. Relationsbetween argumentationsemantics: An arrowfrom asemantics σ toanother semantics τ denotes that eachσ-extensionis also a τ-extension.

We considerfor

σ

the functionsnaive,stb,adm, com,grd,prf, semand stg which standfor naive,stable, admissible, complete,grounded,preferred,semi-stableandstageextensions,respectively.Towardsthedefinitionofthesesemanticswe introduceafewmoreformalconcepts.

Definition 2. Given an AF F =(A,R), the characteristicfunction FF :2A2A of F is defined as FF(S)= {xA | xis defended byS}.Foraset SAandanargumentaA,wewrite S!Ra(resp.a!R S)incasethereisanargument bS,such that (b,a)∈R (resp.(a,b)∈R). Furthermore,we write S&!Ra (resp.a&!R S) in casethereis no argument bS,suchthat(b,a)∈R (resp.(a,b)∈R).

Moreover,fora set SA,we denotetheset ofargumentsattackedby (resp.attacking) S asSR = {x|S!Rx} (resp.

S(R = {x|x!RS}),anddefinetherangeof S asS+R =SSR andthenegativerangeof S asSR =SS(R.

Thenextdefinitionformallydefinesthesemanticswewillfocusoninthissurvey.Allofthemarebasedonconflict-free sets,i.e.itisnotallowedtojointlyacceptargumentswhichareadjacentintheframework.Differentadditionalcriteriaare then usedforthe concretedefinition: naive extensionsarejustmaximal (with respectto set-inclusion) conflict-freesets, stableextensionshavetoattackallotherarguments,admissiblesetsdefendthemselvesfromattackers,completeextensions in addition have to contain all defended arguments. The grounded extension is given by the subset-minimal complete extension. Preferred extensions are subset-maximal admissible sets (equivalently: subset-maximal complete extensions);

finally,semi-stableandstageextensionsarecharacterizedbymaximizingtheconceptofrange.

Definition3.Let F=(A,R)beanAF.Aset SA isconflict-free(in F),iftherearenoa,bS,such that(a,b)∈R.cf(F) denotesthecollectionofconflict-freesetsofF.Foraconflict-freesetScf(F),itholdsthat

Snaive(F),ifthereisnoTcf(F)withTS;

Sstb(F),ifS+R=A;

Sadm(F),ifS⊆FF(S);

Scom(F),ifS=FF(S);

Sgrd(F),ifScom(F)andthereisnoTcom(F)withTS;

Sprf(F),ifSadm(F)andthereisnoTadm(F)withST;

Ssem(F),if Sadm(F)andthereisnoTadm(F)withS+RT+R;

Sstg(F),ifthereisnoTcf(F),withS+RTR+.

Werecallthat foreachAF F,thegroundedsemanticsyields auniqueextension, thegroundedextension,whichisthe least fixed-point of the characteristic function FF.Furthermore, Fig. 2 showsthe relations betweenthe aforementioned semantics. Thefigure is completein thesense that ifthere isno arrowfrom semantics

σ

to semantics

τ

,then thereis someAFF suchthat

σ

(F)!

τ

(F).Forallsemantics

σ

weintroducedhere,exceptstablesemantics,itholdsthatforanyAF F wehave

σ

(F)&=∅.

Example2.ConsidertheAFfromExample 1.Then:cf(F)= {∅,{a},{b},{c},{d},{a,c},{a,d},{b,d}};naive(F)= {{a,c},{a,d}, {b,d}};adm(F)= {∅,{a},{d},{a,d}};andstb(F)=com(F)=grd(F)=prf(F)=sem(F)=stg(F)= {{a,d}}.

Labeling-basedsemantics So far we haveconsidered so-calledextension-based semantics. However, there are severalap- proachesdefiningargumentationsemanticsviacertainkindsoflabelingsinsteadofextensions.Asanexampleweconsider thepopularapproachbyCaminadaandGabbay[69]andinparticulartheircompletelabelings.Basically,such alabelingis athree-valuedfunctionthat assignsoneofthelabelsin,outandundectoeachargument,withtheintuitionbehind these labelsbeingthefollowing.Anargumentislabeledwith:inifitisaccepted,i.e.,itisdefendedbytheinlabeledarguments;

outiftherearestrongreasonstorejectit,i.e.,itisattackedbyanacceptedargument;undeciftheargumentisundecided, i.e.,neitheracceptednorattackedbyacceptedarguments.WedenotelabelingfunctionsLalsobytriples(Lin,Lout,Lundec),

(5)

where Lin is the set of arguments labeled by in, Lout is the set of arguments labeled by out and Lundec is the set of argumentslabeledbyundec.

Asanexample,wegivethedefinitionofcompletelabelingsfrom[69].

Definition4.GivenanAF F=(A,R),a functionL:A→{in,out,undec} isacompletelabeling iffthe followingconditions hold:

• L(a)=iniffforeachb with(b,a)∈R,L(b)=out.

• L(a)=outiffthereexistsbwith(b,a)∈R,L(b)=in.

There is a one-to-one mapping betweencomplete extensionsand completelabelings, such that the set ofarguments labeled within corresponds tothecomplete extensionandthearguments labeledwithout correspondtothe arguments attacked by the complete extension. Having complete labelings athand we can also characterize preferred labelings as follows:

Definition5.Givenan AF F=(A,R).Thepreferredlabelingsare thosecompletelabelingswhereLin is⊆-maximalamong allcompletelabelings.

Right by thedefinitions,we havethesameone-to-one mappingbetweenpreferredextensionsandpreferredlabelings asforcompletesemantics.Onecandefinelabeling-basedversionsforallofoursemantics(see[69]),butthisisoutofthe scopeofthissurvey.

Reasoninginargumentationframeworks WerecallthemostimportantreasoningproblemsforAFs:Givenanargumentation framework F anda semantics

σ

, Enumσ(F) resultsin an enumeration ofall extensions. Asimpler notionis Countσ(F), whichonlycountsthenumberofextensions.Query-basedproblemsareCredσ(a,F)andSkeptσ(a,F)fordecidingcredulous (respectivelyskeptical)acceptanceofanargumenta.Theformerreturnsyesifaiscontainedinatleastoneextensionunder

σ

,whileforthelattertoreturnyes,amustbecontainedinallextensionsunder

σ

.Finally,we alsoconsidertheproblem Verσ(S,F)ofverifyinga givenextension, i.e.,testingwhethera givenset S isa

σ

-extension of F.Thisproblemtypically occursasasubroutineofareasoningprocedure.

Definition6.GivenanAF F=(A,R),asemantics

σ

andanargumentaA,then

Enumσ(F)=

σ

(F)

Countσ(F)= |

σ

(F)|

Credσ(a,F)=!yes ifa∈"

S∈σ(F)S no otherwise

Skeptσ(a,F)=!yes ifa∈#

S∈σ(F)S no otherwise

Verσ(S,F)=!yes ifS

σ

(F) no otherwise

Example3. Considerthe AF F givenin Example 1.Fornaive semantics,the reasoningproblemsresultinEnumnaive(F)= {{a,c},{a,d},{b,d}}andCountnaive(F)=3.Furthermore,forargumentaweobtain Crednaive(a,F)=yes andSkeptnaive(a,F)

=no. For preferred semantics, F has a single extension Enumprf(F)= {{a,d}}, Countprf(F)=1, andthus credulous and skepticalacceptancecoincide(e.g.,Credprf(a,F)=Skeptprf(a,F)=yes).

Next, let us turn to the complexity of reasoning in abstract argumentation frameworks. We assume the reader has knowledgeaboutstandardcomplexityclasses,i.e.,P,NP andL (logarithmicspace).Furthermore,webrieflyrecapitulatethe conceptoforaclemachinesandrelatedcomplexityclasses.LetC denotesomecomplexityclass.ByaC-oraclemachinewe meana(polynomialtime)Turingmachinewhichcanaccessanoraclethatdecides agiven(sub)-probleminC withinone step. Wedenotesuch machinesasNPC iftheunderlyingTuring machineisnon-deterministic. Theclass Σ2P =NPNP thus denotesthesetofproblemswhichcanbedecidedbyanon-deterministicpolynomialtimealgorithmthathas(unrestricted) accesstoanNP-oracle.TheclassΠ2P=coNPNPisdefinedasthecomplementaryclassofΣ2P,i.e.,Π2P=coΣ2P.Therelation betweenthecomplexityclassesisasfollows:

L

P

coNPNP

⊆ Σ

2P

Π

2P

The computational complexityof credulousandskepticalreasoninghasbeenstudied extensivelyinthe literature(see [70] fora starting point). Table 1summarizes thecomputational complexity classifications ofthe defineddecisionprob- lems[68,12,1,13,71,14,72,73],whereC-cdenotesthatthecorrespondingproblemiscompleteforclassC.

(6)

Table 1

ComputationalcomplexityofreasoninginAFs.

σ Credσ Skeptσ Verσ

naive in L in L in L

stb NP-c coNP-c in L

adm NP-c trivial in L

com NP-c P-c in L

grd P-c P-c P-c

prf NP-c Π2P-c coNP-c

sem Σ2P-c Π2P-c coNP-c

stg Σ2P-c Π2P-c coNP-c

3. Reduction-basedapproaches

In thissection we will discussreduction-based approachesin abstractargumentation. Asimplied by thename,these methodsreduceortranslateareasoningproblemtoanother,typicallytoanotherformalism.Fromacomputationalpointof view,weassurethatthisreductionisefficientlycomputable,i.e.,achievableinpolynomialtime,andthattheanswerforthe originalprobleminstancecanbeimmediatelyobtainedfromtheanswertothenewprobleminstance.Suchmethodsoffer thegreatbenefitofexploitingexistingandhighlysophisticatedsolversforwell-knownandwell-studiedproblemdomains.

Naturally,reduction-basedmethodscanbedistinguishedbythetargetsystem.Manysuchapproacheshavebeenstudied for abstract argumentation ranging from propositional logic [19,18,21,20], constraint satisfaction problems (CSP) [27,23, 26,28] and answer-set programming(ASP) [30,74–76] to equational systems [32,77]. We will give an overview of these approachesandinparticularfocusonthefirstthreevery prominenttarget systems,thereductionstopropositionallogic, CSPandASP.

3.1. Propositional-logicbasedapproach

Propositionallogicistheprototypicaltargetsystemformanyapproachesbasedonreductions,astheBooleanSATprob- lemiswellstudiedandmoreoveraccompaniedwithmanymatureandefficientsolverssuchasMiniSat[78]andGRASP[79].

First,werecallthenecessarybackgroundofBooleanlogicandquantifiedBooleanformulae(QBF)sincetheyserveasour targetsystems.

Thebasis ofpropositionallogic isasetofpropositional variablesP,to whichwealsorefer toasatoms.Propositional formulaeare builtasusual fromtheconnectives∧,∨,→ and¬,denoting thelogicalconjunction, disjunction,(material) implicationandnegationrespectively.Weusethetruthconstants0todenotetrueandforfalse.Inaddition,weconsider quantifiedBooleanformulaewiththeuniversalquantifier∀andtheexistentialquantifier∃(bothoveratoms),thatis,given aformulaφ,then Q pφisaQBF,withQ ∈{∀,∃}andp∈P.Furthermore, Q{p1,. . . ,pn}φisashorthandfor Q p1· · ·Q pnφ. Theorderofvariablesinconsecutivequantifiersofthesametypedoesnotmatter.

A propositional variable p in a QBF φ is free if it does not occur within the scope of a quantifier Q p and bound otherwise.Ifφ containsnofreevariable,thenφissaidtobeclosedandotherwiseopen.Wewillwrite φ[p/ψ] todenote theresultofuniformlysubstitutingeachfreeoccurrenceofpwithψ informulaφ.

AninterpretationI⊆PdefinesforeachpropositionalvariableatruthassignmentwherepIindicatesthatpevaluates totruewhile p∈/I indicatesthat pevaluates tofalse.Thisgeneralizestoarbitraryformulaeinthestandardway:Givena formulaφandaninterpretation I,thenφ evaluatesto trueunder I (i.e., Isatisfies φ)ifoneofthefollowingholds(with p∈P).

• φ=pandpI

• φ= ¬pandp∈/I

• φ=ψ1∧ψ2 andbothψ1 andψ2 evaluatetotrueunderI

• φ=ψ1∨ψ2 andoneofψ1andψ2evaluatestotrueunderI

• φ=ψ1→ψ2 andψ1 evaluatestofalseorψ2evaluatestotrueunderI

• φ=∃pψ andoneofψ[p/0]andψ[p/⊥]evaluatestotrueunderI

• φ=∀pψ andbothψ[p/0]andψ[p/⊥]evaluatetotrueunderI.

IfaninterpretationI satisfiesaformulaφ,denotedby I|4φ,wesaythat Iisamodelofφ.

The approaches in Section 3.1.1 and Section 3.1.2 share the basic idea of translating a given AF, a semantics and a reasoning problem to a propositional formula, thereby reducing the problemto Boolean logic. In generalthis works by eitherinspectingthemodelsoftheresultingformula,whichareincorrespondencetotheextensionsoftheAF,ordeciding whetheraformulaissatisfiableorunsatisfiable,tosolvequery-basedreasoning.Notethatwerestrictourselvesheretothe semanticswhichweconsidertobe sufficient forillustratingthemainconcepts. Ingeneral,theapproachescanbeapplied tomanyothersemantics.

(7)

3.1.1. Reductionstopropositionallogic

The firstreduction-based approach[18,20]we considerhereuses propositionallogic formulae(withoutquantifiers) to encode the problemoffindingadmissible sets.Givenan AF F=(A,R), foreachargumentaA apropositional variable va isused.Then, SA isan extensionundersemantics

σ

iff{va|aS}|4φ,withφbeingapropositional formulathat evaluates AF F under semantics

σ

(below we will present in detail how to translate AFs into formulae). Formally, the correspondencebetweensetsofextensionsandmodelsofapropositionalformulacanbedefinedasfollows.

Definition7.LetS⊆2A beacollectionofsetsofargumentsandletI⊆2P beacollectionofinterpretations.Wesaythat S andIcorrespondtoeachother,insymbolsS∼=I,if

1. foreach S∈S,thereexistsan I∈I,suchthat{a|vaI,aA}=S;

2. foreach I∈I,thereexistsan S∈S,suchthat{a|vaI,aA}=S;and 3. |S|= |I|.

GivenanAF F=(A,R)thefollowingformulacanbeusedtosolvetheenumerationproblemofadmissiblesemantics.

admA,R

= $

aA

%%

va

→ $

(b,a)∈R

¬

vb

&

%

va

→ $

(b,a)∈R

% '

(c,b)∈R vc

&&&

(1) The models of admA,R now correspondto the admissible sets of F, i.e., Enumadm(F)∼= {M|M|4admA,R}. Taken into considerationthatbydefinitionasatisfiableformulahasinfinitelymanymodels(thusviolatingitemthreeinDefinition 7), itisnowpossibletorestrictthesetofmodelstothosecontainingonlyatomsoccurringintheformula.Thefirstconjunction in (1) ensures that the resulting set of arguments is conflict-free, that is, whenever we accept an argument a (i.e., va evaluatestotrueunderamodel),allitsattackerscannotbeselectedanyfurther.Thesecondconjunctexpressesthedefense ofargumentsbystatingthat,ifweaccepta,thenforeachattackerb,somedefenderc mustbeacceptedaswell.Notethat anemptyconjunctionistreatedas0,whereastheemptydisjunctionistreatedas⊥.

Example4.Thepropositionalformulaforadmissiblesetsoftheframework F=(A,R)inExample 1isgivenby

admA,R

≡ (

va

→ 0 ) ∧

(2)

(

vb

→ ( ¬

va

∧ ¬

vc

) )

(3)

(

vc

→ ( ¬

vb

∧ ¬

vd

) )

(4)

(

vd

→ 0) ∧

(5)

(

ve

→ ( ¬

vd

∧ ¬

ve

) )

(6)

(

va

→ 0 ) ∧

(7)

(

vb

→ (

⊥ ∧ (

vb

vd

) ))

(8)

(

vc

→ (

(

va

vc

) ∧ ⊥ ))

(9)

(

vd

→ 0) ∧

(10)

(

ve

→ ( ⊥ ∧

vd

) )

(11) Lines (2)to (6)encode the conflict-freeproperty, while lines(7) to(11) ensurethat arguments inan admissible set are defended. Note that for convenience, the conjuncts are arranged in a different order than in the definition of admA,R. Consider forinstance argumentb.Line (3)specifiesthat ifwe accept b we cannot accept a andc anymore (conflict-free property).Likewise,line(8)statesthatbcanonlybeacceptedincaseitisdefendedagainstitsattackers.Fortheattackerc eitherbitselfordmustbeaccepted.However,sinceattackeraisnotattackedbyanyotherargument,thereisnomodelof admA,R wherevb evaluatestotrue.

Anotherinteresting translation tocapturesemantics ofAFs within propositionallogic isdone by Gabbay[80].Here, a correspondencebetweenAFsandpropositionallogicisshownviathePeirce–Quinedagger(“nor”)connective.

Furthermore,severalpapersdealwiththeconversetranslation,i.e.translatingaBooleanformulainCNFtoan AF.Simi- larasbefore,foreachatominaformulaacorrespondingargumentisconstructed.Acceptingsuchanargument,e.g.under stablesemantics,istheninterpretedassettingtheatomtotrue.Theresultisacorrespondencebetweenextensionsunder a specificsemanticsandsatisfyingassignmentsoftheformula. Usually,thesetranslationsincorporateauxiliary arguments, which areusedtosimulatethelogicalconnectives.In[12,13] and[81] suchmethodsare studiedandused toshowcom- plexityboundsorfortranslationsbetweenformalisms.

(8)

3.1.2. ReductionstoquantifiedBooleanformulae

ProblemsbeyondNP requireamoreexpressiveformalismthanBooleanlogic.Preferredsemantics,forexample,isdefined as subset-maximaladmissible (or complete) sets. Intuitively, we can compute a preferred extension by searching for an admissiblesetandadditionallymaking surethatthereisnopropersupersetwhichisalsoadmissible.Inordertoexpress subsetmaximalitydirectlyinsidethelogic,auniversal(or,equivalently,anegatedexistential)quantifiercanbeused,making quantified Boolean formulae a well-suited formalism. It is possible to specify preferredsemantics in QBFs either via an extension-based,oralabeling-basedapproach.

First, we consider the extension-based approach from [20]. Here, we encode the maximality check with an auxiliary formula.Forconveniencewedenoteby A7= {a7|aA}thesetofrenamedargumentsinA.Likewise,wedefinearenaming fortheattack relationasR7= {(a7,b7)|(a,b)∈R}.Thefollowingdefinesashorthand forcomparingtwo setsofatomsan interpretationisdefineduponwithrespecttothesubset-relation.

A

<

A7

= $

aA

(

va

va7

) ∧ ¬ $

a7A7

(

va7

va

)

Inother words,thisformulaensuresthatanymodelM|4(A<A7)satisfies{aA|vaM}⊂{aA|va7M}.Nowwe canstatetheQBFforpreferredextensions.Letthequantifiedvariablesbe A7v= {va7|a7A7}.

prfA,R

=

admA,R

∧ ¬∃

A7v

((

A

<

A7

)

admA7,R7

)

(12) Inshort,wecheckwhethertheacceptedargumentsforman admissiblesetandwhetherthereexistsapropersuperset of it which isalso admissible. Ifthe former check succeeds and inthe latter no such set exists, then we have found a preferredextension.ForanarbitraryAF F=(A,R),itspreferredextensionsareina1-to-1correspondencetothemodels ofprfA,R,i.e.,Enumprf(F)∼= {M|M|4prfA,R}.

The second approach is based on complete labelings (see Definition 4) instead of extensions [19].9 To this end, we employ four-valuedinterpretations to expressmore thantwo possible statesforeach argument. Inaddition tothe truth valuestrueandfalsewealsoaddvaluesundecidedandinconsistent.Thethreelabelingsin,out andundecidedcorrespond to thefirstthree truthvalues.The wholeapproach canbe encodedinclassical two-valuedQBFs. Hereby,thetruth value of p∈P isencodedvia p and p(.Now every classical two-valuedinterpretationassigns valuesto thesetwo atomsas usual.Fortwovariableswehavefourdifferentcases,whichcorrespondtothefourtruthvalues:{p,p(}⊆Iisinterpreted asassigning inconsistentto p,true(resp. false)isassignedto p ifonly p (resp.p()isinI,andundecidedisassignedif neither pnor p(isinI.

Forpreferredsemanticstheencoding ismorecomplexthan(12),buttheideasaresimilar.Webeginwithformulaefor thefourtruthvalues.Notethatweslightlyadaptedtherepresentationandformulaefrom[19]tobettermatchtheprevious encodings,buttheimportantconceptsremainthesame.

val

(

p

,

v

) =

 

 

p

p( ifv

=

i p

∧ ¬

p( ifv

=

t

¬

p

p( ifv

=

f

¬

p

∧ ¬

p( ifv

=

u

Here,val(p,v)encodesthefourpossibletruthvaluesforavirtualatom pthatcanbereferredtoonasortofmeta-level.

Actually,insteadofptheauxiliaryatomspandp(arepresentintheconcreteformula.Usingthisconcept,wecanspecify thelabelingformulaforeachargumentinanAF F=(A,R).

labtA,R

(

a

) =

val

(

va

,

t

) → $

(b,a)∈R

val

(

vb

,

f

)

(13)

labAf,R

(

a

) =

val

(

va

,

f

) → '

(b,a)∈R

val

(

vb

,

t

)

(14)

labuA,R

(

a

) =

val

(

va

,

u

) →

%%

¬ $

(b,a)∈R

val

(

vb

,

f

)

&

%

¬ '

(b,a)∈R

val

(

vb

,

t

)

&&

(15) TheseformulaereflectDefinition 4:Theformulae(13),(14)and(15)encodethein,outandundecidedlabelings,respec- tively.Forexample,(13)canbeinterpretedinthefollowingway:Ifanargumenta issettotrue,thenallitsattackersmust befalse.(14)canbeinterpretedsimilarly,exceptthatifanatomdenotesthatanargumentisfalse,thenoneofitsattackers must betrue. Finally,(15)states thatfor anyargumentto whichwe assign undecided,itcannot be the casethat all its attackersarefalseorthatoneofthemistrue.

9 Asimilarapproachwasrecentlyrealizedforabstractdialecticalframeworks(andthusalsoforAFs)inthesystemQADF:http://www.dbai.tuwien.ac.at/ proj/adf/qadf/.

(9)

Threevaluesaresufficienttoreflectthethreelabelings.Toavoidproblemswiththefourthtruthvalue(inconsistent),we excludeitfromoccurringintheevaluationbythefollowingformula.

3valA

= $

aA

¬

val

(

va

,

i

)

Now,completeextensionsarecharacterizedbythefollowingformula.WewilluseLassuperscriptincomLA,R todenote thatthisformulahandleslabelingsinsteadofextensions.

comLA,R

:=

3valA

∧ $

aA

(

labtA,R

(

a

) ∧

labAf,R

(

a

) ∧

labuA,R

(

a

) )

The formula comLA,R expresses that all the arguments are assignedeither true,false or undecidedvia the 3valA sub- formula. Foreach argument,the three conjuncts onthe right ofthe formulaencode implications which ensure that the labels are assigned asspecified forcomplete labelings. For example,ifa is true,then all its attackersmust be false. By applying this, one can encode complete labelings andhence completeextensions. Preferred extensions(or labelings)are expressedasbeforebysubsetmaximization.

A

<

LA7

= $

aA

(

val

(

va

,

t

) →

val

(

va7

,

t

) )

∧ ¬ $

a7A7

(

val

(

va7

,

t

) →

val

(

va

,

t

) )

(16) Then, similar asin prfA,R,the preferredextensionsortheir labelingscan beencodedwitha QBFasfollows,withthe quantifiedatoms A7v= {va7,v(a7|a7A7}.

prfLA,R

=

comLA,R

∧ ¬∃

A7v

((

A

<

LA7

)

comLA7,R7

)

(17)

For an AF F=(A,R)the followingnotion ofcorrespondenceholds: Letthe setofatoms evaluatedto trueunder the four-valuedinterpretationbeMt= {p|pM,p(∈/M},thenEnumprf(F)∼= {Mt|M|4prfLA,R}.NotethatprfLA,R differsfrom prfA,R notonlybyusingalabeling-basedapproach,butalsobymaximizingcompletelabelingsratherthanadmissiblesets.

Utilizing the expressive power of quantifiers and the labeling approach, the authors of [19] also encode a range of other semantics,forinstancesemi-stablereasoning,whereonecan applythesameidea asoutlined above,butinsteadof maximizingtheargumentsthatarein,theargumentsthatarelabeledundecidedareminimized.

Thisresultsinageneralsystemforencodingmanysemantics,butonehastobecarefulwithchoosingtherighttarget system.Forexample,groundedsemanticscaneasilybespecifiedinthisformalismusingaQBF,butcomputingthegrounded extensioncanbedoneusinganalgorithmwithpolynomialrunningtime.Thus,anappropriateencodingwouldyieldaQBF from afragment which isknown tobe efficientlydecidable, forinstance,2-QBF(the generalization ofKrom formulae to QBFs).However,wearenotawareofanyworkwhichdealswithsuch“complexity-sensitive”encodingsintermsofQBFs.

3.1.3. IterativeapplicationofSATsolvers

The lastpropositional-logic basedapproachwe outlinehereisbasedontheideaofiteratively searchingformodelsof propositionalformulaeandhasbeeninstantiatedinthesystemsArgSemSAT[82,22]andCEGARTIX[21,83].Theideaistouse an algorithmwhichiterativelyconstructsformulaeandsearchesformodelsoftheseformulae.A newformulaisgenerated basedonthemodelofthepreviousone(orbasedonthefactthatthepreviousformulaisunsatisfiable).Atsomepointthe algorithm reachesa final decisionand terminates.This isin contrastto so-calledmonolithic encodings,whichformulate the whole problemin a single formula. The encodingsin previous sectionsare examples forsuch monolithic encodings.

Theiterativeapproachissuitablewhentheproblemtobesolvedcannotbedecidedingeneral(understandardcomplexity theoretic assumptions) by the satisfiability of a single propositional formula (constructible in polynomial time) without quantifiers. Thisis, for instance,the case withskeptical acceptance under preferredsemantics where the corresponding decisionproblemisΠ2P complete.InsteadofreducingtheproblemtoasingleQBFformula,wedelegatethesolvingtaskin theiterativeschemetoanalgorithmqueryingaSATsolvermultipletimes.

Thealgorithmsforpreferredsemanticsworkroughlyasfollows.Tocomputepreferredextensionswetraversethesearch space ofacomputationally simplersemantics. Forinstance,we caniteratively search foradmissible setsorcomplete ex- tensions anditeratively extendthem until we reacha maximal set,which isa preferredextension. Bygenerating anew candidateadmissibleset/completeextension,whichisnotcontainedinanalreadyvisitedpreferredextensionwecanenu- merateallpreferredextensionsinthismanner.Thisallowsansweringcredulousandskepticalreasoningaswell.

Fordecidinge.g.skepticalacceptanceofanargumentunderpreferredsemanticsonerequiresingeneralanexponential numberofcalls totheSATsolver(understandardcomplexitytheoreticassumptions).However,thenumberofSATcalls in theiterativeSATschemeisdependentonthenumberofpreferredextensionsofthegivenAF,see[21].

In thefollowing,we firstsketch theCEGARTIXapproach from[21] forskepticalacceptance underpreferredsemantics andsubsequentlyoutlinethePrefSatapproach[82],implementedintheArgSemSATsystem,forenumeratingallpreferred extensions.Again,weslightlyadaptedthealgorithmsforauniformsettingandpresentation.

Algorithm 1decidesskepticalacceptanceunderpreferredsemanticsofanargumentainanAFF.Theideaistoproceed fromonepreferredextensiontothenextandcheckingwhetheraisinoneoftheextensions.Thisisencodedintheouter

(10)

Algorithm1Skeptprf(a,F). Require:AFF=(A,R),argumentaA,

Ensure:returnsyesiffaisskepticallyacceptedunderpreferredsemantics 1:φ←admA,R

2:whileI,I|4φdo

3: whileI7,I7|4ψI(A,R)∧¬vado 4: II7

5: end while

6: ifI7,I7|4ψI(A,R)then 7: φ←φ∧γI

8: else

9: no

10: end if 11:end while 12:yes

while loop, lines 2 to 11. The models offormula φ representthe remaining admissible sets in the currentstate of the algorithm.In thebeginning,φ encodesall admissiblesets of F.Westart withan admissiblesetanditerativelyextendit while making sure that a is not accepted in thisadmissible set. This is done inthe second loop (lines 3 to 5) and by adding¬va tothequery.TheformulaψI incorporatesthemodelI andstatesthatamodelofitmuststillcorrespondtoan admissibleset,butalsohastobeasupersetofthecurrentone,specifiedby I.

Ifwecannotaddfurtherargumentstotheadmissibleset,wecheckwhetherwecanextenditwithhavinga inside,in line6.Ifthisis thecase,every preferredextensionthat isasupersetofthecurrentadmissiblesetcontains a.Hence,we canproceed toadifferentadmissiblesetnot containinga.Incasewecannot adda to theadmissibleset,wehavefound apreferredextension withouta,herebyrefutingits skepticalacceptancein F.In theformercase(I doesnotrepresenta preferredextension)we strengthenthemainqueryφ byadding

γ

I inline7,statingthatatleastoneargumentcurrently notacceptedinI mustbeacceptedfromnowon.Thisensuresthatinfutureiterationswecomputeadmissiblesetsthatare notcontainedinpreviouslyfoundpreferredextensions.

Theformulaearedefinedasfollows.

ψ

I

(

A

,

R

) =

admA,R

∧ $

aA,vaI

va

∧ % '

aA,va∈/I va

&

γ

I

= '

aA,va∈/I va

.

Example5. Forthe AF F fromExample 1 we cancheck the skepticalacceptance ofb. Thecondition ofthe firstloop is satisfiedasthereexisttheadmissiblesets ∅,{a},{d}and{a,d}in F.The algorithmnownon-deterministicallyselectsone oftheadmissiblesets.Saywepick∅.Thesecondwhileloopthencreatesasubsetmaximaladmissibleset(excludingb)in two iterations,say firstaddinga andthend.As {a,d} isnowsubset maximal,the second loopterminates. Sincethisset cannotbeextendedifweallowtoalsoacceptb,weknowthatwehavefoundapreferredextension.Thismeanswerefute theskepticalacceptanceofb.

ThePrefSatapproach[82]isdesignedtoenumerateallpreferredextensionsutilizingasimilaridea.Hereby,alsoasimpler semanticsfortraversingthesearchspaceisused,buttheencodingsrelyontheconceptoflabellings(seealsoSection4.1).

WeoutlinethePrefSatprocedureinAlgorithm 2.

PrefSatencodes labelings ofan AF F=(A,R) by generatingthree variables per argument,i.e., the setof variables in the constructed formula are {Ia,Oa,Ua|aA}. In the final result these variables correspond naturally to a labeling.In particular,a three-valuedlabeling K corresponds toamodel J if K=(I,O,U)with I= {a|IaJ}, O= {a|OaJ}and U= {a|UaJ}.Thefollowingconstraintencodesthatforeveryargumentexactlyonelabelingisassigned.

$

aA

( (

Ia

Oa

Ua

) ∧ ( ¬

Ia

∨ ¬

Oa

) ∧ ( ¬

Ia

∨ ¬

Ua

) ∧ ( ¬

Oa

∨ ¬

Ua

) )

Furthermore,one canencodetheconditionsforalabelingtobe completebyconjoining certainsubformulae.Forinstance, theformula

$

xA,∃(y,x)∈R

% $

(x7,x)∈R

( ¬

Ix

Ox7

)

&

encodesthatwecan acceptxifeachattackerisout.Theremainingconstraintsforalabelingtobecompleteare encoded similarly. Severalequivalent formulae for encoding complete labelings have been investigated by Cerutti et al. [82]. Let com7A,R beoneofthesechoicesforencodingcompletelabelings.TheformulaeforAlgorithm 2arethendefinedasfollows.

Referenzen

ÄHNLICHE DOKUMENTE

Note that Theorem 5.1 demonstrates the uniqueness of the pair ( x, b λ) and even the b individual uniqueness of x b and λ b within x e + X and λ e + Λ, resp. This holds although we

While even-cycle free AFs are tractable for admissible-based semantics, in particular for stable semantics, they are still hard for cf2 , stage2 and also for stage semantics [31,

This article is organized as follows. 2 we introduce the necessary background on abstract argumentation frameworks and the semantics in terms of extensions and labelings. 3 we

We can trace the reason for this difference in naive-based semantics for ADFs back to the definition of a conflict-free interpretation, which basically requires differ- ent strengths

Interesting results: some involve little-known classes of so-called Boolean hierarchy (another hierarchy in between classes of polynomial hierarchy) Credulous and sceptical

12 see http://homepage.univie.ac.at/wolfgang.dvorak/files/cf2-challenge.pdf.. Caminada and Amgoud defined rationality postulates for argumentation systems [29]. In particular

We combine cf2 and stage semantics [Dvorák and Gaggl, 2012a], by using the SCC-recursive schema of the cf2 semantics and instantiate the base case with stage semantics.... Gaggl,

They are both based on naive sets, thus they are, in contrast to admissible-based semantics, capable to select arguments out of odd-length cycles as accepted.. Consider the