SlideShare a Scribd company logo
1 of 30
Download to read offline
A SAT-based Approach for
Computing Extensions in
Abstract Argumentation
Federico Cerutti, Paul E. Dunne, Massimiliano Giacomin, Mauro Vallati
TAFA-2013
Sunday 4th
August, 2013
c 2013 Federico Cerutti <f.cerutti@abdn.ac.uk>
Summary
Background in abstract argumentation
SAT encodings of complete labellings with interesting theoretical
properties
An algorithm exploiting SAT solvers for enumerating preferred
extensions
Empirical evaluation of the algorithm
Background
Definition
Given an AF Γ = A, R :
a set S ⊆ A is conflict–free if a, b ∈ S s.t. a → b;
an argument a ∈ A is acceptable with respect to a set S ⊆ A if
∀b ∈ A s.t. b → a, ∃ c ∈ S s.t. c → b;
a set S ⊆ A is admissible if S is conflict–free and every element of
S is acceptable with respect to S;
a set S ⊆ A is a complete extension, i.e. S ∈ ECO(Γ), iff S is
admissible and ∀a ∈ A s.t. a is acceptable w.r.t. S, a ∈ S;
a set S ⊆ A is a preferred extension, i.e. S ∈ EPR(Γ), iff S is a
maximal (w.r.t. set inclusion) admissible set.
N.B.: EPR(Γ) ⊆ ECO(Γ)
Background
Definition
Let A, R be an argumentation framework. A total function
Lab : A → {in, out, undec} is a complete labelling iff it satisfies the
following conditions for any a ∈ A:
Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) =
undec;
From [Caminada, 2006], preferred extensions are in one-to-one
correspondence with those complete labellings maximizing the set of
arguments labelled in.
An Approach for Expressing the Complete
Labelling as a SAT Problem
Given an AF Γ = A, R , ΠΓ is a boolean formula (complete labelling
formula) such that each satisfying assignment of the formula
corresponds to a complete labelling:
k = |A|
φ : {1, . . . , k} → A is a bijection (the inverse map is φ−1)
For each argument φ(i) we define three boolean variables:
Ii, which is true when argument φ(i) is labelled in, false otherwise;
Oi, which is true when argument φ(i) is labelled out, false
otherwise;
Ui, which is true when argument φ(i) is labelled undec, false
otherwise;
V(Γ) ∪1≤i≤|A|{Ii, Oi, Ui} (set of variables for the AF Γ)
SAT Encoding of Complete Labelling: C1
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) =
undec.
SAT Encoding of Complete Labelling: C1
i∈{1,...,k}
(Ii ∨ Oi ∨ Ui) ∧ (¬Ii ∨ ¬Oi)∧(¬Ii ∨ ¬Ui) ∧ (¬Oi ∨ ¬Ui) ∧
{i|φ(i)−=∅}
(Ii ∧ ¬Oi ∧ ¬Ui) ∧
{i|φ(i)−=∅}

Ii ∨


{j|φ(j)→φ(i)}
(¬Oj )



 ∧
{i|φ(i)−=∅}


{j|φ(j)→φ(i)}
¬Ii ∨ Oj

 ∧
{i|φ(i)−=∅}


{j|φ(j)→φ(i)}
¬Ij ∨ Oi

 ∧
{i|φ(i)−=∅}

¬Oi ∨


{j|φ(j)→φ(i)}
Ij



 ∧
{i|φ(i)−=∅}


{k|φ(k)→φ(i)}

Ui ∨ ¬Uk ∨


{j|φ(j)→φ(i)}
Ij





 ∧
{i|φ(i)−=∅}




{j|φ(j)→φ(i)}
(¬Ui ∨ ¬Ij )

 ∧

¬Ui ∨


{j|φ(j)→φ(i)}
Uj





 ∧
SAT Encoding of Complete Labelling: Ca
1
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) =
undec.
SAT Encoding of Complete Labelling: Ca
1
i∈{1,...,k}
(Ii ∨ Oi ∨ Ui) ∧ (¬Ii ∨ ¬Oi)∧(¬Ii ∨ ¬Ui) ∧ (¬Oi ∨ ¬Ui) ∧
{i|φ(i)−=∅}
(Ii ∧ ¬Oi ∧ ¬Ui) ∧
{i|φ(i)−=∅}

Ii ∨


{j|φ(j)→φ(i)}
(¬Oj )



 ∧
{i|φ(i)−=∅}


{j|φ(j)→φ(i)}
¬Ii ∨ Oj

 ∧
{i|φ(i)−=∅}


{j|φ(j)→φ(i)}
¬Ij ∨ Oi

 ∧
{i|φ(i)−=∅}

¬Oi ∨


{j|φ(j)→φ(i)}
Ij



 ∧
(((((((((((((((((((((((hhhhhhhhhhhhhhhhhhhhhhh
{i|φ(i)−=∅}


{k|φ(k)→φ(i)}

Ui ∨ ¬Uk ∨


{j|φ(j)→φ(i)}
Ij





 ∧
((((((((((((((((((((((((((((hhhhhhhhhhhhhhhhhhhhhhhhhhhh
{i|φ(i)−=∅}




{j|φ(j)→φ(i)}
(¬Ui ∨ ¬Ij )

 ∧

¬Ui ∨


{j|φ(j)→φ(i)}
Uj





 ∧
SAT Encoding of Complete Labelling: Cb
1
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) =
undec.
SAT Encoding of Complete Labelling: Cc
1
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) =
undec.
SAT Encoding of Complete Labelling: C2
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇒ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇒ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇒
∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
SAT Encoding of Complete Labelling: C3
Lab is a total function;
If a is not attacked, Lab(a) = in;
Lab(a) = in ⇐ ∀b ∈ a−Lab(b) = out;
Lab(a) = out ⇐ ∃b ∈ a− : Lab(b) = in;
Lab(a) = undec ⇐
∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
Equivalence of the Encodings
Proposition
The encodings C1, Ca
1 , Cb
1, Cc
1, C2, C3 are equivalent.
Let us note that Ca
1 and C2 correspond to the alternative definitions
of complete labellings in [Caminada and Gabbay, 2009], where a proof
of their equivalence is provided.
Exploiting SAT Solvers for Enumerating
Preferred Extensions
Algorithm 1 Enumerating the preferred extensions of an AF
1: Input: Γ = A, R
2: Output: Ep ⊆ 2A
3: Ep := ∅
4: cnf := ΠΓ
5: repeat
6: prefcand := ∅
7: cnfdf := cnf
8: repeat
9: lastcompfound := SS(cnfdf)
10: if lastcompfound ! = ε then
11: prefcand := lastcompfound
12: for a ∈ INARGS(lastcompfound) do
13: cnfdf := cnfdf ∧ Iφ−1(a)
14: end for
15: remaining := FALSE
16: for a ∈ A  INARGS(lastcompfound) do
17: remaining := remaining ∨ Iφ−1(a)
18: end for
19: cnfdf := cnfdf ∧ remaining
20: end if
21: until (lastcompfound ! = ε ∧ INARGS(lastcompfound) ! = A)
22: if prefcand ! = ∅ then
23: Ep := Ep ∪ {INARGS(prefcand)}
24: oppsolution := FALSE
25: for a ∈ A  INARGS(prefcand) do
26: oppsolution := oppsolution ∨ Iφ−1(a)
27: end for
28: cnf := cnf ∧ oppsolution
29: end if
30: until (prefcand ! = ∅)
31: if Ep = ∅ then
32: Ep = {∅}
33: end if
34: return Ep
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
Complete extensions:
{}, {f}, {d}, {a, f}, {b, d}, {d, f}, {b, d, e}, {a, c, f}, {b, d, f},
{a, d, f}
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
First complete extension found (not deterministic)
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
Forcing the search process for finding additional in arguments given
the found complete
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
Another complete found. . .
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
. . . which is also preferred: {a, d, f}
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
Searching for other complete extensions. . .
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
. . . for instance {b, d} . . .
Exploiting SAT Solvers for Enumerating
Preferred Extensions: an Example
. . . from which we compute the preferred extensions {b, d, f}.
Empirical Evaluation: the Experiment
Two SAT solvers considered (separately):
PrecoSAT [Biere, 2009], SAT Competition 2009 winner
(Application track) → PS-PRE;
Glucose
[Audemard and Simon, 2009, Audemard and Simon, 2012] SAT
Competition 2011 and SAT Challenge 2012 winner (Application
track) → PS-GLU
Random generated 2816 AFs divided in different classes according to two
dimensions:
|A|: ranging from 25 to 200 with a step of 25;
generation of the attack relations:
fixing the probability patt that there is an attack for each ordered
pair of arguments (self-attacks are included), step of 0.25
selecting randomly the number natt of attacks in it
the extreme cases of empty attack relation (patt = natt = 0) and of
fully connected attack relation (patt = 1, natt = |A|2
)
Empirical Evaluation: the Analysis Using the
International Planning Competition (IPC) Score
For each test case (in our case, each test AF) let T∗ be the best
execution time among the compared systems (if no system
produces the solution within the time limit, the test case is not
considered valid and ignored).
For each valid case, each system gets a score of
1/(1 + log10(T/T∗)), where T is its execution time, or a score of 0
if it fails in that case. Runtimes below 1 sec get by default the
maximal score of 1.
The (non normalized) IPC score for a system is the sum of its
scores over all the valid test cases. The normalised IPC score
ranges from 0 to 100 and is defined as
(IPC/# of valid cases) ∗ 100.
Empirical Evaluation: Comparison of Different
Encodings
50
60
70
80
90
100
50 100 150 200
IPCnormalisedto100
Number of arguments
IPC normalised to 100 with respect to the number of arguments
C1
Ca
1
Cb
1
Cc
1
C2
C3
Empirical Evaluation: Comparison with Aspartix,
Aspartix Meta, [Nofal et al., 2012]
60
65
70
75
80
85
90
95
100
50 100 150 200
%ofsuccess
Number of arguments
Percentage of success
ASP
ASP-META
NOF
PS-PRE
PS-GLU
Empirical Evaluation: Comparison with Aspartix,
Aspartix Meta, [Nofal et al., 2012]
20
30
40
50
60
70
80
90
100
50 100 150 200
IPCnormalisedto100
Number of arguments
IPC normalised to 100 with respect to the number of arguments
ASP
ASP-META
NOF
PS-PRE
PS-GLU
Conclusions
Novel SAT-based approach for preferred extension enumeration in
abstract argumentation
Assessed its performances by an empirical comparison with
well-known state-of-the-art systems
Evidence that different encodings, although theoretically
equivalent, lead to very different empirical results
The proposed approach outperforms the state-of-the-art
Future works (currently ongoing):
Implementation of the other Labelling-based semantics
(Grounded, Complete, Stable, Semi-stable)
Evaluating different SAT-based search schema
Integrate the proposed approach in the SCC-recursive schema
(encouraging preliminary results!)
Wider empirical investigation
References I
[Audemard and Simon, 2009] Audemard, G. and Simon, L. (2009).
Predicting learnt clauses quality in modern sat solvers.
In Proceedings of IJCAI 2009, pages 399–404.
[Audemard and Simon, 2012] Audemard, G. and Simon, L. (2012).
Glucose 2.1.
http://www.lri.fr/~simon/?page=glucose.
[Biere, 2009] Biere, A. (2009).
P{re,ic}osat@sc’09.
In SAT Competition 2009.
[Caminada, 2006] Caminada, M. (2006).
On the issue of reinstatement in argumentation.
In Proceedings of JELIA 2006, pages 111–123.
[Caminada and Gabbay, 2009] Caminada, M. and Gabbay, D. M. (2009).
A logical account of formal argumentation.
Studia Logica (Special issue: new ideas in argumentation theory), 93(2–3):109–145.
[Nofal et al., 2012] Nofal, S., Dunne, P. E., and Atkinson, K. (2012).
On preferred extension enumeration in abstract argumentation.
In Proceedings of COMMA 2012, pages 205–216.

More Related Content

What's hot

SPU Optimizations - Part 2
SPU Optimizations - Part 2SPU Optimizations - Part 2
SPU Optimizations - Part 2
Naughty Dog
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalence
satrajit
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mapping
satrajit
 
Practical Spherical Harmonics Based PRT Methods
Practical Spherical Harmonics Based PRT MethodsPractical Spherical Harmonics Based PRT Methods
Practical Spherical Harmonics Based PRT Methods
Naughty Dog
 
Gate 2013 complete solutions of ec electronics and communication engineering
Gate 2013 complete solutions of ec  electronics and communication engineeringGate 2013 complete solutions of ec  electronics and communication engineering
Gate 2013 complete solutions of ec electronics and communication engineering
manish katara
 
Lab 3 nust control
Lab 3 nust controlLab 3 nust control
Lab 3 nust control
talhawaqar
 
Stephan berg track f
Stephan berg   track fStephan berg   track f
Stephan berg track f
Alona Gradman
 
L03-ajc-C-arrays
L03-ajc-C-arraysL03-ajc-C-arrays
L03-ajc-C-arrays
Balaji Ravi
 
MarcoCeze_defense
MarcoCeze_defenseMarcoCeze_defense
MarcoCeze_defense
Marco Ceze
 

What's hot (20)

TMPA-2017: Generating Cost Aware Covering Arrays For Free
TMPA-2017: Generating Cost Aware Covering Arrays For Free TMPA-2017: Generating Cost Aware Covering Arrays For Free
TMPA-2017: Generating Cost Aware Covering Arrays For Free
 
Biochip
BiochipBiochip
Biochip
 
Crabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic modelCrabs dataset GLM Poisson and Logistic model
Crabs dataset GLM Poisson and Logistic model
 
SPU Optimizations - Part 2
SPU Optimizations - Part 2SPU Optimizations - Part 2
SPU Optimizations - Part 2
 
How to add an optimization for C# to RyuJIT
How to add an optimization for C# to RyuJITHow to add an optimization for C# to RyuJIT
How to add an optimization for C# to RyuJIT
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalence
 
Polynomial Kernel for Interval Vertex Deletion
Polynomial Kernel for Interval Vertex DeletionPolynomial Kernel for Interval Vertex Deletion
Polynomial Kernel for Interval Vertex Deletion
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mapping
 
Practical Spherical Harmonics Based PRT Methods
Practical Spherical Harmonics Based PRT MethodsPractical Spherical Harmonics Based PRT Methods
Practical Spherical Harmonics Based PRT Methods
 
Incremental and Interactive Process Model Repair
Incremental and Interactive Process Model RepairIncremental and Interactive Process Model Repair
Incremental and Interactive Process Model Repair
 
Gate 2013 complete solutions of ec electronics and communication engineering
Gate 2013 complete solutions of ec  electronics and communication engineeringGate 2013 complete solutions of ec  electronics and communication engineering
Gate 2013 complete solutions of ec electronics and communication engineering
 
Complete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business ProcessesComplete and Interpretable Conformance Checking of Business Processes
Complete and Interpretable Conformance Checking of Business Processes
 
Lab 3 nust control
Lab 3 nust controlLab 3 nust control
Lab 3 nust control
 
Stephan berg track f
Stephan berg   track fStephan berg   track f
Stephan berg track f
 
L03-ajc-C-arrays
L03-ajc-C-arraysL03-ajc-C-arrays
L03-ajc-C-arrays
 
Biconnectivity
BiconnectivityBiconnectivity
Biconnectivity
 
MarcoCeze_defense
MarcoCeze_defenseMarcoCeze_defense
MarcoCeze_defense
 
GTC16 - S6510 - Targeting GPUs with OpenMP 4.5
GTC16 - S6510 - Targeting GPUs with OpenMP 4.5GTC16 - S6510 - Targeting GPUs with OpenMP 4.5
GTC16 - S6510 - Targeting GPUs with OpenMP 4.5
 
Performance Portability Through Descriptive Parallelism
Performance Portability Through Descriptive ParallelismPerformance Portability Through Descriptive Parallelism
Performance Portability Through Descriptive Parallelism
 
Early Results of OpenMP 4.5 Portability on NVIDIA GPUs & CPUs
Early Results of OpenMP 4.5 Portability on NVIDIA GPUs & CPUsEarly Results of OpenMP 4.5 Portability on NVIDIA GPUs & CPUs
Early Results of OpenMP 4.5 Portability on NVIDIA GPUs & CPUs
 

Viewers also liked

Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Federico Cerutti
 
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
Federico Cerutti
 
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Federico Cerutti
 
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Federico Cerutti
 

Viewers also liked (13)

Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
 
Cerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective LogicCerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective Logic
 
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
 
Cerutti--ARGAIP 2010
Cerutti--ARGAIP 2010Cerutti--ARGAIP 2010
Cerutti--ARGAIP 2010
 
Cerutti--ECSQARU 2009
Cerutti--ECSQARU 2009Cerutti--ECSQARU 2009
Cerutti--ECSQARU 2009
 
Cerutti--AAAI Fall Symposia 2009
Cerutti--AAAI Fall Symposia 2009Cerutti--AAAI Fall Symposia 2009
Cerutti--AAAI Fall Symposia 2009
 
Cerutti--TAFA 2011
Cerutti--TAFA 2011Cerutti--TAFA 2011
Cerutti--TAFA 2011
 
Cerutti--PhD viva voce defence
Cerutti--PhD viva voce defenceCerutti--PhD viva voce defence
Cerutti--PhD viva voce defence
 
Cerutti-AT2013-Trust and Risk
Cerutti-AT2013-Trust and RiskCerutti-AT2013-Trust and Risk
Cerutti-AT2013-Trust and Risk
 
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
Cerutti--Knowledge Representation and Reasoning (postgrad seminar @ Universit...
 
Cerutti--NMR 2010
Cerutti--NMR 2010Cerutti--NMR 2010
Cerutti--NMR 2010
 
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
 
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
 

Similar to Cerutti -- TAFA2013

ContextFreeGrammars.pptx
ContextFreeGrammars.pptxContextFreeGrammars.pptx
ContextFreeGrammars.pptx
PEzhumalai
 
DS Unit-1.pptx very easy to understand..
DS Unit-1.pptx very easy to understand..DS Unit-1.pptx very easy to understand..
DS Unit-1.pptx very easy to understand..
KarthikeyaLanka1
 

Similar to Cerutti -- TAFA2013 (20)

C2.0 propositional logic
C2.0 propositional logicC2.0 propositional logic
C2.0 propositional logic
 
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
 
Introduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic NotationIntroduction to Algorithms and Asymptotic Notation
Introduction to Algorithms and Asymptotic Notation
 
Hay hay
Hay hayHay hay
Hay hay
 
Algorithm Assignment Help
Algorithm Assignment HelpAlgorithm Assignment Help
Algorithm Assignment Help
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
 
Ai4 heuristic2
Ai4 heuristic2Ai4 heuristic2
Ai4 heuristic2
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
 
Compiler Construction | Lecture 9 | Constraint Resolution
Compiler Construction | Lecture 9 | Constraint ResolutionCompiler Construction | Lecture 9 | Constraint Resolution
Compiler Construction | Lecture 9 | Constraint Resolution
 
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to PracticeHandout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
 
ContextFreeGrammars.pptx
ContextFreeGrammars.pptxContextFreeGrammars.pptx
ContextFreeGrammars.pptx
 
ContextFreeGrammars (1).pptx
ContextFreeGrammars (1).pptxContextFreeGrammars (1).pptx
ContextFreeGrammars (1).pptx
 
New tools from the bandit literature to improve A/B Testing
New tools from the bandit literature to improve A/B TestingNew tools from the bandit literature to improve A/B Testing
New tools from the bandit literature to improve A/B Testing
 
Data_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.pptData_Structure_and_Algorithms_Lecture_1.ppt
Data_Structure_and_Algorithms_Lecture_1.ppt
 
DBMS 11 | Design Theory [Normalization 1]
DBMS 11 | Design Theory [Normalization 1]DBMS 11 | Design Theory [Normalization 1]
DBMS 11 | Design Theory [Normalization 1]
 
APSEC2020 Keynote
APSEC2020 KeynoteAPSEC2020 Keynote
APSEC2020 Keynote
 
Iterative methods with special structures
Iterative methods with special structuresIterative methods with special structures
Iterative methods with special structures
 
Optimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processesOptimization of probabilistic argumentation with Markov processes
Optimization of probabilistic argumentation with Markov processes
 
KARNAUGH MAP(K-MAP)
KARNAUGH MAP(K-MAP)KARNAUGH MAP(K-MAP)
KARNAUGH MAP(K-MAP)
 
DS Unit-1.pptx very easy to understand..
DS Unit-1.pptx very easy to understand..DS Unit-1.pptx very easy to understand..
DS Unit-1.pptx very easy to understand..
 

More from Federico Cerutti

Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Federico Cerutti
 

More from Federico Cerutti (9)

Security of Artificial Intelligence
Security of Artificial IntelligenceSecurity of Artificial Intelligence
Security of Artificial Intelligence
 
Introduction to Evidential Neural Networks
Introduction to Evidential Neural NetworksIntroduction to Evidential Neural Networks
Introduction to Evidential Neural Networks
 
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
 
Human-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical MaterialHuman-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical Material
 
Probabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random VariablesProbabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random Variables
 
Supporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain SourcesSupporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain Sources
 
Introduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryIntroduction to Formal Argumentation Theory
Introduction to Formal Argumentation Theory
 
Argumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to PracticeArgumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to Practice
 
Argumentation in Artificial Intelligence
Argumentation in Artificial IntelligenceArgumentation in Artificial Intelligence
Argumentation in Artificial Intelligence
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 

Cerutti -- TAFA2013

  • 1. A SAT-based Approach for Computing Extensions in Abstract Argumentation Federico Cerutti, Paul E. Dunne, Massimiliano Giacomin, Mauro Vallati TAFA-2013 Sunday 4th August, 2013 c 2013 Federico Cerutti <f.cerutti@abdn.ac.uk>
  • 2. Summary Background in abstract argumentation SAT encodings of complete labellings with interesting theoretical properties An algorithm exploiting SAT solvers for enumerating preferred extensions Empirical evaluation of the algorithm
  • 3. Background Definition Given an AF Γ = A, R : a set S ⊆ A is conflict–free if a, b ∈ S s.t. a → b; an argument a ∈ A is acceptable with respect to a set S ⊆ A if ∀b ∈ A s.t. b → a, ∃ c ∈ S s.t. c → b; a set S ⊆ A is admissible if S is conflict–free and every element of S is acceptable with respect to S; a set S ⊆ A is a complete extension, i.e. S ∈ ECO(Γ), iff S is admissible and ∀a ∈ A s.t. a is acceptable w.r.t. S, a ∈ S; a set S ⊆ A is a preferred extension, i.e. S ∈ EPR(Γ), iff S is a maximal (w.r.t. set inclusion) admissible set. N.B.: EPR(Γ) ⊆ ECO(Γ)
  • 4. Background Definition Let A, R be an argumentation framework. A total function Lab : A → {in, out, undec} is a complete labelling iff it satisfies the following conditions for any a ∈ A: Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec; From [Caminada, 2006], preferred extensions are in one-to-one correspondence with those complete labellings maximizing the set of arguments labelled in.
  • 5. An Approach for Expressing the Complete Labelling as a SAT Problem Given an AF Γ = A, R , ΠΓ is a boolean formula (complete labelling formula) such that each satisfying assignment of the formula corresponds to a complete labelling: k = |A| φ : {1, . . . , k} → A is a bijection (the inverse map is φ−1) For each argument φ(i) we define three boolean variables: Ii, which is true when argument φ(i) is labelled in, false otherwise; Oi, which is true when argument φ(i) is labelled out, false otherwise; Ui, which is true when argument φ(i) is labelled undec, false otherwise; V(Γ) ∪1≤i≤|A|{Ii, Oi, Ui} (set of variables for the AF Γ)
  • 6. SAT Encoding of Complete Labelling: C1 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 7. SAT Encoding of Complete Labelling: C1 i∈{1,...,k} (Ii ∨ Oi ∨ Ui) ∧ (¬Ii ∨ ¬Oi)∧(¬Ii ∨ ¬Ui) ∧ (¬Oi ∨ ¬Ui) ∧ {i|φ(i)−=∅} (Ii ∧ ¬Oi ∧ ¬Ui) ∧ {i|φ(i)−=∅}  Ii ∨   {j|φ(j)→φ(i)} (¬Oj )     ∧ {i|φ(i)−=∅}   {j|φ(j)→φ(i)} ¬Ii ∨ Oj   ∧ {i|φ(i)−=∅}   {j|φ(j)→φ(i)} ¬Ij ∨ Oi   ∧ {i|φ(i)−=∅}  ¬Oi ∨   {j|φ(j)→φ(i)} Ij     ∧ {i|φ(i)−=∅}   {k|φ(k)→φ(i)}  Ui ∨ ¬Uk ∨   {j|φ(j)→φ(i)} Ij       ∧ {i|φ(i)−=∅}     {j|φ(j)→φ(i)} (¬Ui ∨ ¬Ij )   ∧  ¬Ui ∨   {j|φ(j)→φ(i)} Uj       ∧
  • 8. SAT Encoding of Complete Labelling: Ca 1 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 9. SAT Encoding of Complete Labelling: Ca 1 i∈{1,...,k} (Ii ∨ Oi ∨ Ui) ∧ (¬Ii ∨ ¬Oi)∧(¬Ii ∨ ¬Ui) ∧ (¬Oi ∨ ¬Ui) ∧ {i|φ(i)−=∅} (Ii ∧ ¬Oi ∧ ¬Ui) ∧ {i|φ(i)−=∅}  Ii ∨   {j|φ(j)→φ(i)} (¬Oj )     ∧ {i|φ(i)−=∅}   {j|φ(j)→φ(i)} ¬Ii ∨ Oj   ∧ {i|φ(i)−=∅}   {j|φ(j)→φ(i)} ¬Ij ∨ Oi   ∧ {i|φ(i)−=∅}  ¬Oi ∨   {j|φ(j)→φ(i)} Ij     ∧ (((((((((((((((((((((((hhhhhhhhhhhhhhhhhhhhhhh {i|φ(i)−=∅}   {k|φ(k)→φ(i)}  Ui ∨ ¬Uk ∨   {j|φ(j)→φ(i)} Ij       ∧ ((((((((((((((((((((((((((((hhhhhhhhhhhhhhhhhhhhhhhhhhhh {i|φ(i)−=∅}     {j|φ(j)→φ(i)} (¬Ui ∨ ¬Ij )   ∧  ¬Ui ∨   {j|φ(j)→φ(i)} Uj       ∧
  • 10. SAT Encoding of Complete Labelling: Cb 1 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 11. SAT Encoding of Complete Labelling: Cc 1 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇔ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇔ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇔ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 12. SAT Encoding of Complete Labelling: C2 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇒ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇒ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇒ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 13. SAT Encoding of Complete Labelling: C3 Lab is a total function; If a is not attacked, Lab(a) = in; Lab(a) = in ⇐ ∀b ∈ a−Lab(b) = out; Lab(a) = out ⇐ ∃b ∈ a− : Lab(b) = in; Lab(a) = undec ⇐ ∀b ∈ a−Lab(b) = in ∧ ∃c ∈ a− : Lab(c) = undec.
  • 14. Equivalence of the Encodings Proposition The encodings C1, Ca 1 , Cb 1, Cc 1, C2, C3 are equivalent. Let us note that Ca 1 and C2 correspond to the alternative definitions of complete labellings in [Caminada and Gabbay, 2009], where a proof of their equivalence is provided.
  • 15. Exploiting SAT Solvers for Enumerating Preferred Extensions Algorithm 1 Enumerating the preferred extensions of an AF 1: Input: Γ = A, R 2: Output: Ep ⊆ 2A 3: Ep := ∅ 4: cnf := ΠΓ 5: repeat 6: prefcand := ∅ 7: cnfdf := cnf 8: repeat 9: lastcompfound := SS(cnfdf) 10: if lastcompfound ! = ε then 11: prefcand := lastcompfound 12: for a ∈ INARGS(lastcompfound) do 13: cnfdf := cnfdf ∧ Iφ−1(a) 14: end for 15: remaining := FALSE 16: for a ∈ A INARGS(lastcompfound) do 17: remaining := remaining ∨ Iφ−1(a) 18: end for 19: cnfdf := cnfdf ∧ remaining 20: end if 21: until (lastcompfound ! = ε ∧ INARGS(lastcompfound) ! = A) 22: if prefcand ! = ∅ then 23: Ep := Ep ∪ {INARGS(prefcand)} 24: oppsolution := FALSE 25: for a ∈ A INARGS(prefcand) do 26: oppsolution := oppsolution ∨ Iφ−1(a) 27: end for 28: cnf := cnf ∧ oppsolution 29: end if 30: until (prefcand ! = ∅) 31: if Ep = ∅ then 32: Ep = {∅} 33: end if 34: return Ep
  • 16. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example Complete extensions: {}, {f}, {d}, {a, f}, {b, d}, {d, f}, {b, d, e}, {a, c, f}, {b, d, f}, {a, d, f}
  • 17. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example First complete extension found (not deterministic)
  • 18. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example Forcing the search process for finding additional in arguments given the found complete
  • 19. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example Another complete found. . .
  • 20. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example . . . which is also preferred: {a, d, f}
  • 21. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example Searching for other complete extensions. . .
  • 22. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example . . . for instance {b, d} . . .
  • 23. Exploiting SAT Solvers for Enumerating Preferred Extensions: an Example . . . from which we compute the preferred extensions {b, d, f}.
  • 24. Empirical Evaluation: the Experiment Two SAT solvers considered (separately): PrecoSAT [Biere, 2009], SAT Competition 2009 winner (Application track) → PS-PRE; Glucose [Audemard and Simon, 2009, Audemard and Simon, 2012] SAT Competition 2011 and SAT Challenge 2012 winner (Application track) → PS-GLU Random generated 2816 AFs divided in different classes according to two dimensions: |A|: ranging from 25 to 200 with a step of 25; generation of the attack relations: fixing the probability patt that there is an attack for each ordered pair of arguments (self-attacks are included), step of 0.25 selecting randomly the number natt of attacks in it the extreme cases of empty attack relation (patt = natt = 0) and of fully connected attack relation (patt = 1, natt = |A|2 )
  • 25. Empirical Evaluation: the Analysis Using the International Planning Competition (IPC) Score For each test case (in our case, each test AF) let T∗ be the best execution time among the compared systems (if no system produces the solution within the time limit, the test case is not considered valid and ignored). For each valid case, each system gets a score of 1/(1 + log10(T/T∗)), where T is its execution time, or a score of 0 if it fails in that case. Runtimes below 1 sec get by default the maximal score of 1. The (non normalized) IPC score for a system is the sum of its scores over all the valid test cases. The normalised IPC score ranges from 0 to 100 and is defined as (IPC/# of valid cases) ∗ 100.
  • 26. Empirical Evaluation: Comparison of Different Encodings 50 60 70 80 90 100 50 100 150 200 IPCnormalisedto100 Number of arguments IPC normalised to 100 with respect to the number of arguments C1 Ca 1 Cb 1 Cc 1 C2 C3
  • 27. Empirical Evaluation: Comparison with Aspartix, Aspartix Meta, [Nofal et al., 2012] 60 65 70 75 80 85 90 95 100 50 100 150 200 %ofsuccess Number of arguments Percentage of success ASP ASP-META NOF PS-PRE PS-GLU
  • 28. Empirical Evaluation: Comparison with Aspartix, Aspartix Meta, [Nofal et al., 2012] 20 30 40 50 60 70 80 90 100 50 100 150 200 IPCnormalisedto100 Number of arguments IPC normalised to 100 with respect to the number of arguments ASP ASP-META NOF PS-PRE PS-GLU
  • 29. Conclusions Novel SAT-based approach for preferred extension enumeration in abstract argumentation Assessed its performances by an empirical comparison with well-known state-of-the-art systems Evidence that different encodings, although theoretically equivalent, lead to very different empirical results The proposed approach outperforms the state-of-the-art Future works (currently ongoing): Implementation of the other Labelling-based semantics (Grounded, Complete, Stable, Semi-stable) Evaluating different SAT-based search schema Integrate the proposed approach in the SCC-recursive schema (encouraging preliminary results!) Wider empirical investigation
  • 30. References I [Audemard and Simon, 2009] Audemard, G. and Simon, L. (2009). Predicting learnt clauses quality in modern sat solvers. In Proceedings of IJCAI 2009, pages 399–404. [Audemard and Simon, 2012] Audemard, G. and Simon, L. (2012). Glucose 2.1. http://www.lri.fr/~simon/?page=glucose. [Biere, 2009] Biere, A. (2009). P{re,ic}osat@sc’09. In SAT Competition 2009. [Caminada, 2006] Caminada, M. (2006). On the issue of reinstatement in argumentation. In Proceedings of JELIA 2006, pages 111–123. [Caminada and Gabbay, 2009] Caminada, M. and Gabbay, D. M. (2009). A logical account of formal argumentation. Studia Logica (Special issue: new ideas in argumentation theory), 93(2–3):109–145. [Nofal et al., 2012] Nofal, S., Dunne, P. E., and Atkinson, K. (2012). On preferred extension enumeration in abstract argumentation. In Proceedings of COMMA 2012, pages 205–216.