... produced1
Here, the arguments are under the form of an ``Explanation-Conclusion Pair''. This is one possible way to compute arguments. See also [17,25,20,22,23,12,15,2].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline2845#2
Weights being probabilities, the weight of an argument is the probability of the conjunction of the formulae of the argument, and the weight of $\phi_4$ is the probability of the disjunction of $A_1$ and $A_2$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... etc.3
Here, we consider only the interactions corresponding to attacks between arguments. There exist also some other types of interactions (for example, arguments which reinforce other arguments instead of attacking them, see [14,24]). For this kind of interaction, graduality has not been considered.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... arguments4
Here, the initial knowledge base is useless.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... arguments5
For example, using [4]'s valuation, we can decide that all the arguments whose value is $> 0.5$ are selected, because $0.5$ is the mean value of the set of values; Another possibility, with different valuations (interaction-based or intrinsic), is to accept an argument when its value is better than the value of each of its attackers.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline2921#6
${\mathcal{R}}^-(A) = \{A_i \in {\mathcal{A}}\vert A_i {\mathcal{R}}A\}$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline2927#7
${\mathcal{R}}^+(A) = \{A_i \in {\mathcal{A}}\vert A {\mathcal{R}}A_i\}$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... root8
The word ``root'' is used in an informal sense (it just means that there are in the graph some paths leading to this node). This term and other terms (leaf, branch, path, ...) which are used in this document are standard in graph theory but may have a different definition. They are usual terms in the argumentation domain. Please see Definition 1 in order to know their precise meaning in this document. These definitions simply take into account the fact that the directed edges of our graph link attackers to attacked argument).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... attackers9
$A$ is a leaf iff ${\mathcal{R}}^-(A) = \varnothing$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... path10
We will assume that there exists an infinity of such paths. This assumption greatly simplifies the handling of leaves later in the paper.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...cycle11
This definition of a cycle corresponds to the definition of an elementary cycle in graph theory (an elementary cycle does not contain 2 edges with the same initial extremity, or the same ending extremity).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... equivalent12
In [9]'s work, direct attackers (resp. defenders) are also indirect attackers (resp. defenders) which is not true in our definitions.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... arguments13
We pursue a work initiated in [7] and propose some improvements.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... ratio14
The golden ratio is a famous number since the antiquity which has several interesting properties in several domains (architecture, for example).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... complete15
A complete preordering on ${\mathcal{A}}$ means that any two elements of ${\mathcal{A}}$ are comparable.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... arguments16
$v(A) = g^2(h(g^2(V_{\mbox{\scriptsize Max}}, g(V_{\mbox{\scriptsize Max}})))$ and $v(B_1) = g(h(g^2(V_{\mbox{\scriptsize Max}}), g(V_{\mbox{\scriptsize Max}})))$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline3641#17
Otherwise it is false : $(0^{\infty} \star (p)) \oplus k = (p + k)$, whereas $(0^{\infty} \oplus k) \star ((p) \oplus k) = (k) \star (p + k) = (k, p + k)$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... tuples18
This definition is different from the definition given in [7]. The ideas are the same but the formalisation is different.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... both19
The proof is the following:. So, the value of a leaf is $[0^{\infty},()]$, and it is impossible that $v_p(A) = v_i(A) = ()$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... exists20
The operator mod is the modulo function.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... tuple21
The proof is the following:.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline4481#22
We will also use the notation $B \preceq A$ defined by: $B \preceq A$ iff $A \succeq B$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... than23
With the valuation proposed in [4], we obtain: $v(A) = \frac{3}{4}$ and $v(A') = \frac{1}{2}$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... acceptability24
This work has been presented in a workshop [6].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... cases25
The terminology used in this section is also used in the domain of nonmonotonic reasoning, see [19]: the word uni comes from the word universal which is a ``synonym'' of the word skeptical, and the word exi comes from the word existential which is a ``synonym'' of the word credulous. We have chosen to use the words uni and exi because they recall the logical quantificators $\forall$ (for all) and % latex2html id marker 4793 $\exists$ (exists at least one).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... coincide26
If there is only one extension then the fact that $A$ belongs to all the extensions is equivalent to the fact that $A$ belongs to at least one extension. Moreover, with only one extension containing $A$, all the attackers of $A$ do not belong to an extension. So, $A$ is cleanly-accepted.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... stable27
This corresponds to the consistent argumentation system proposed by [9].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... attackers28
This idea is also used in the notion of ``defeat'' proposed by [3]. So, there is a link between a ``well-defended argument'' and an argument which is not ``attacked'' in the sense of [3] by its direct attackers. Note that, in [3], the valuation is an extra knowledge added in the argumentation framework. In contrast, here, the $v$-preference is extracted from the attack graph.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... cycles29
So, $({\mathcal{A}}, {\mathcal{R}})$ is well-founded.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... identical''30
Proof: let $g$ be a non-increasing function, let $\alpha$ and $\beta$ be two fixpoints of $g$. If $\alpha \neq \beta$, we may suppose that $\alpha > \beta$, so $g(\alpha) \leq g(\beta)$ (since $g$ is non-increasing), so $\alpha \leq \beta$ (since $\alpha$ and $\beta$ are fixpoints of $g$), which is in contradiction with the assumption $\alpha > \beta$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... case31
We work case by case in order to avoid the complex cases in which we have several simultaneous simple modifications. For example, the modification of the length of a branch which changes the status of the branch (an even integer replaced by an odd integer) is a complex case corresponding to two simple cases: the removal of a branch with a given status, then the addition of a new branch with a different status.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...#tex2html_wrap_inline5979#32
${\mathcal{R}}'$ is the restriction of ${\mathcal{R}}$ to ${\mathcal{A}}'$ if and only if ${\mathcal{R}}' = \{(a,b) \vert a {\mathcal{R}}b, a \in {\mathcal{A}}', b \in {\mathcal{A}}'\}$.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.