SlideShare a Scribd company logo
University of Brescia
Dipartimento di Elettronica per l'Automazione
Knowledge Engineering and Human-Computer Interaction Research Group
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Encompassing Attacks toEncompassing Attacks to
Attacks in AbstractAttacks in Abstract
Argumentation FrameworksArgumentation Frameworks
Pietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni GuidaPietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni Guida
Slide 2 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Summary
 Introduction by example
 Formalization
 Relationship with Dung's Argumentation Framework
 Comparison with other approaches
 Conclusion and future works
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Introduction by exampleIntroduction by example
➢ Formalization
➢ Relationship with Dung's Argumentation Framework
➢ Comparison with other approaches
➢ Conclusion and future works
Slide 4 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (1)
 Simple decision support problem
 Bob's holidays plan
 Two possible choices:
 Gstaad
 Cuba
 Preferences among the possible choices
 Exception to the preference's general rule
Slide 5 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (2)
There is a last minute offer
for Gstaad →
I should go to Gstaad
GG
If I go to Cuba, I can not
go to Gstaad
There is a last minute offer
for Cuba →
I should go to Cuba
CC
Slide 6 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (3)
GG
PP
CC
When it is possible, I prefer
to go to a ski resort
According to this preference,
the possible choice for Cuba can
not attack the one for Gstaad
Slide 7 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (4)
GG
PP
CC
The preference about
skiing does not apply
in the current situation
NN
Since there were no snowfalls in
Gstaad since a month, it is not
possible to go to ski in Gstaad.
Slide 8 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (5)
GG
PP
CC
AA NN
It is possible to ski in Gstaad
thanks to artificial snow
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
FormalizationFormalization
➢ Introduction by example
➢ Relationship with Dung's Argumentation Framework
➢ Comparison with other approaches
➢ Conclusion and future works
Slide 10 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Argumentation Framework with
Recoursive Attacks (AFRA)
Slide 11 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formalization of the example (1)
GG
PP
CC
AA NN
d
a
b
g
e
Slide 12 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Defeat relation
Slide 13 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formalization of the example (2)
GG
PP
CC
AA NN
d
a
b
g
e
Slide 14 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Admissibility
Slide 15 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Fundamental lemma and
preferred extension
Slide 16 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
GG
PP
CC
AA NN
d
a
b
g
e
Formalization of the example (3)
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Relationship with Dung's Relationship with Dung's 
Argumentation FrameworkArgumentation Framework
➢ Introduction by example
➢ Formalization
➢ Comparison with other approaches
➢ Conclusion and future works
Slide 18 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Correspondence between AFRA
and AF (1)
AA
BB
aa
bb
CC
AA
BBbb
aa
CC
gg
gg
Slide 19 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Correspondence in the example
GG
ee
PP
CC
AA NN
gg
dd
aa
bb
GG
PP
CC
AA NN
d
a
b
g
e
Slide 20 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Correspondence between AFRA
and AF (2)
Slide 21 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
GG
ee
PP
CC
AA NN
gg
dd
aa
bb
Correspondence in the example:
The Preferred Extension
GG
PP
CC
AA NN
d
a
b
g
e
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Comparison with other Comparison with other 
approachesapproaches
➢ Introduction by example
➢ Formalization
➢ Relationship with Dung's Argumentation Framework
➢ Conclusion and future works
Slide 23 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Argumentation attack model
 Modelling the strength of nodes and attacks with
propagation
 Argumentation attack model [Barringer et al, 2005]
 Recursive definition of “torpedoes”, or attacks,
similarly as AFRA attacks
 Focus on attack network and its numerical valuation
 Dung style semantics issues not considered
Slide 24 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
The EAF formalism
 Reasoning about preferences/values can be
formalized through attacks to attacks
 Extended Argumentation Framework [Modgil,
2007;2009]
 Specific assumptions:
 A limited level of recursion
 A constraint on some attacks to be symmetric (when the
involved arguments represent conflicting preferences)
 In the paper we have considered a possible extension
of EAF aimed at overcoming these restrictions
Slide 25 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Higher-order AF
 Reasoning about coalitions
 Model of attacks to attacks as an instance of Dung's
Argumentation Framework
 Proposal of a “second order argumentation
framework” with some constraints like EAF
 Proposal of a “higher order argumentation
framework” without such constraints [Boella et al,
2009]
© 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Conclusion and future Conclusion and future 
worksworks
➢ Introduction by example
➢ Formalization
➢ Relationship with Dung's Argumentation Framework
➢ Comparison with other approaches
Slide 27 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Conclusion and future works
 Preliminary investigation about AFRA
 Generalization of Dung's Argumentation Framework
 Attacks to attacks recursively encompassed without
restriction
 Focus on decision support context
 Future works:
 Enlarging the theoretical bases of AFRA
 Investigating the definition of argumentation semantics in
this context

More Related Content

Viewers also liked

Cerutti -- TAFA2013
Cerutti -- TAFA2013Cerutti -- TAFA2013
Cerutti -- TAFA2013
Federico Cerutti
 
Algorithm Selection for Preferred Extensions Enumeration
Algorithm Selection for Preferred Extensions EnumerationAlgorithm Selection for Preferred Extensions Enumeration
Algorithm Selection for Preferred Extensions Enumeration
Federico Cerutti
 
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...Federico Cerutti
 
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
Federico Cerutti
 
Cerutti--PhD viva voce defence
Cerutti--PhD viva voce defenceCerutti--PhD viva voce defence
Cerutti--PhD viva voce defence
Federico Cerutti
 
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Federico Cerutti
 
Cerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective LogicCerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective Logic
Federico Cerutti
 
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)Federico Cerutti
 

Viewers also liked (8)

Cerutti -- TAFA2013
Cerutti -- TAFA2013Cerutti -- TAFA2013
Cerutti -- TAFA2013
 
Algorithm Selection for Preferred Extensions Enumeration
Algorithm Selection for Preferred Extensions EnumerationAlgorithm Selection for Preferred Extensions Enumeration
Algorithm Selection for Preferred Extensions Enumeration
 
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
Cerutti--Verification of Crypto Protocols (postgrad seminar @ University of B...
 
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
A SCC Recursive Meta-Algorithm for Computing Preferred Labellings in Abstract...
 
Cerutti--PhD viva voce defence
Cerutti--PhD viva voce defenceCerutti--PhD viva voce defence
Cerutti--PhD viva voce defence
 
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an ...
 
Cerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective LogicCerutti-AT2013-Graphical Subjective Logic
Cerutti-AT2013-Graphical Subjective Logic
 
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
Cerutti--Introduction to Argumentation (seminar @ University of Aberdeen)
 

More from Federico Cerutti

Security of Artificial Intelligence
Security of Artificial IntelligenceSecurity of Artificial Intelligence
Security of Artificial Intelligence
Federico Cerutti
 
Introduction to Evidential Neural Networks
Introduction to Evidential Neural NetworksIntroduction to Evidential Neural Networks
Introduction to Evidential Neural Networks
Federico Cerutti
 
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Federico Cerutti
 
Human-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical MaterialHuman-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical Material
Federico Cerutti
 
Probabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random VariablesProbabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random Variables
Federico Cerutti
 
Supporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain SourcesSupporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain Sources
Federico Cerutti
 
Introduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryIntroduction to Formal Argumentation Theory
Introduction to Formal Argumentation Theory
Federico Cerutti
 
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to PracticeHandout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
Federico Cerutti
 
Argumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to PracticeArgumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to Practice
Federico Cerutti
 
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Federico Cerutti
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Federico Cerutti
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Federico Cerutti
 
Argumentation in Artificial Intelligence
Argumentation in Artificial IntelligenceArgumentation in Artificial Intelligence
Argumentation in Artificial Intelligence
Federico Cerutti
 

More from Federico Cerutti (13)

Security of Artificial Intelligence
Security of Artificial IntelligenceSecurity of Artificial Intelligence
Security of Artificial Intelligence
 
Introduction to Evidential Neural Networks
Introduction to Evidential Neural NetworksIntroduction to Evidential Neural Networks
Introduction to Evidential Neural Networks
 
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
Argumentation and Machine Learning: When the Whole is Greater than the Sum of...
 
Human-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical MaterialHuman-Argumentation Experiment Pilot 2013: Technical Material
Human-Argumentation Experiment Pilot 2013: Technical Material
 
Probabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random VariablesProbabilistic Logic Programming with Beta-Distributed Random Variables
Probabilistic Logic Programming with Beta-Distributed Random Variables
 
Supporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain SourcesSupporting Scientific Enquiry with Uncertain Sources
Supporting Scientific Enquiry with Uncertain Sources
 
Introduction to Formal Argumentation Theory
Introduction to Formal Argumentation TheoryIntroduction to Formal Argumentation Theory
Introduction to Formal Argumentation Theory
 
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to PracticeHandout: Argumentation in Artificial Intelligence: From Theory to Practice
Handout: Argumentation in Artificial Intelligence: From Theory to Practice
 
Argumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to PracticeArgumentation in Artificial Intelligence: From Theory to Practice
Argumentation in Artificial Intelligence: From Theory to Practice
 
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Left ma...
 
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
Argumentation in Artificial Intelligence: 20 years after Dung's work. Right m...
 
Argumentation in Artificial Intelligence
Argumentation in Artificial IntelligenceArgumentation in Artificial Intelligence
Argumentation in Artificial Intelligence
 

Recently uploaded

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
sadiakorobi2
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 

Recently uploaded (13)

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 

Cerutti--ECSQARU 2009

  • 1. University of Brescia Dipartimento di Elettronica per l'Automazione Knowledge Engineering and Human-Computer Interaction Research Group © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Encompassing Attacks toEncompassing Attacks to Attacks in AbstractAttacks in Abstract Argumentation FrameworksArgumentation Frameworks Pietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni GuidaPietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni Guida
  • 2. Slide 2 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Summary  Introduction by example  Formalization  Relationship with Dung's Argumentation Framework  Comparison with other approaches  Conclusion and future works
  • 3. © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Introduction by exampleIntroduction by example ➢ Formalization ➢ Relationship with Dung's Argumentation Framework ➢ Comparison with other approaches ➢ Conclusion and future works
  • 4. Slide 4 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Example (1)  Simple decision support problem  Bob's holidays plan  Two possible choices:  Gstaad  Cuba  Preferences among the possible choices  Exception to the preference's general rule
  • 5. Slide 5 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Example (2) There is a last minute offer for Gstaad → I should go to Gstaad GG If I go to Cuba, I can not go to Gstaad There is a last minute offer for Cuba → I should go to Cuba CC
  • 6. Slide 6 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Example (3) GG PP CC When it is possible, I prefer to go to a ski resort According to this preference, the possible choice for Cuba can not attack the one for Gstaad
  • 7. Slide 7 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Example (4) GG PP CC The preference about skiing does not apply in the current situation NN Since there were no snowfalls in Gstaad since a month, it is not possible to go to ski in Gstaad.
  • 8. Slide 8 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Example (5) GG PP CC AA NN It is possible to ski in Gstaad thanks to artificial snow
  • 9. © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> FormalizationFormalization ➢ Introduction by example ➢ Relationship with Dung's Argumentation Framework ➢ Comparison with other approaches ➢ Conclusion and future works
  • 10. Slide 10 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Argumentation Framework with Recoursive Attacks (AFRA)
  • 11. Slide 11 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Formalization of the example (1) GG PP CC AA NN d a b g e
  • 12. Slide 12 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Defeat relation
  • 13. Slide 13 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Formalization of the example (2) GG PP CC AA NN d a b g e
  • 14. Slide 14 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Admissibility
  • 15. Slide 15 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Fundamental lemma and preferred extension
  • 16. Slide 16 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> GG PP CC AA NN d a b g e Formalization of the example (3)
  • 17. © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Relationship with Dung's Relationship with Dung's  Argumentation FrameworkArgumentation Framework ➢ Introduction by example ➢ Formalization ➢ Comparison with other approaches ➢ Conclusion and future works
  • 18. Slide 18 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Correspondence between AFRA and AF (1) AA BB aa bb CC AA BBbb aa CC gg gg
  • 19. Slide 19 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Correspondence in the example GG ee PP CC AA NN gg dd aa bb GG PP CC AA NN d a b g e
  • 20. Slide 20 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Correspondence between AFRA and AF (2)
  • 21. Slide 21 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> GG ee PP CC AA NN gg dd aa bb Correspondence in the example: The Preferred Extension GG PP CC AA NN d a b g e
  • 22. © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Comparison with other Comparison with other  approachesapproaches ➢ Introduction by example ➢ Formalization ➢ Relationship with Dung's Argumentation Framework ➢ Conclusion and future works
  • 23. Slide 23 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Argumentation attack model  Modelling the strength of nodes and attacks with propagation  Argumentation attack model [Barringer et al, 2005]  Recursive definition of “torpedoes”, or attacks, similarly as AFRA attacks  Focus on attack network and its numerical valuation  Dung style semantics issues not considered
  • 24. Slide 24 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> The EAF formalism  Reasoning about preferences/values can be formalized through attacks to attacks  Extended Argumentation Framework [Modgil, 2007;2009]  Specific assumptions:  A limited level of recursion  A constraint on some attacks to be symmetric (when the involved arguments represent conflicting preferences)  In the paper we have considered a possible extension of EAF aimed at overcoming these restrictions
  • 25. Slide 25 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Higher-order AF  Reasoning about coalitions  Model of attacks to attacks as an instance of Dung's Argumentation Framework  Proposal of a “second order argumentation framework” with some constraints like EAF  Proposal of a “higher order argumentation framework” without such constraints [Boella et al, 2009]
  • 26. © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Conclusion and future Conclusion and future  worksworks ➢ Introduction by example ➢ Formalization ➢ Relationship with Dung's Argumentation Framework ➢ Comparison with other approaches
  • 27. Slide 27 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it> Conclusion and future works  Preliminary investigation about AFRA  Generalization of Dung's Argumentation Framework  Attacks to attacks recursively encompassed without restriction  Focus on decision support context  Future works:  Enlarging the theoretical bases of AFRA  Investigating the definition of argumentation semantics in this context