BAF
AS
is an instantiation of the existing BAF. We de-
fine an extension of BAF using the relationship with
AF
AS
, and show that BAF
AS
is a subset of BAF with
nice properties.
The remainder of this paper is organized as fol-
lows. In Section 2, we introduce Dung’s abstract AF
and describe basic concepts. In Section 3, we de-
fine our AF with why-questions from given knowl-
edge bases, and discuss its properties. In Section 4,
we describe the transformation of the above AF into
an AF with support relations, and discuss its proper-
ties. Finally, in Section 5 we present our conclusions.
2 AUGUMENTATION
FRAMEWORK
Definition 1 (Dung’s AF (Dung, 1995)). An AF is de-
fined as a pair hA , R i, where A is a set of arguments
and R ⊆ A × A is a set of attacks.
Definition 2 (conflict-free,admissible,extension). Let
hA , R i be an AF. For A, B ∈ A , and E ⊆ A ,
(1) E is conflict-free in hA ,R i iff there are no
elements A,B ∈ E such that A attacks B.
(2) E defends A in hA ,R i iff there exists an element
of E attacking each argument that attacks A.
(3) E is admissible in hA ,R i iff E is conflict-free
and defends all of its elements.
(4) E is a preferred extension of hA ,R i iff E is
maximal w.r.t. ⊆ admissible set.
Several extensions are defined as acceptable sets
of arguments within a given AF. Here we focus on
preferred extensions, and hereafter the word “exten-
sion” will mean “preferred extension.” Similar dis-
cussions are available for other extensions.
Example 1. For an AF =
h{A,B,C,D}, {(A,B),(A,C),(B,D),(C,A),(D,A)}i.
the preferred extension is {B,C} .
We instantiate AF with a logical theory.
Definition 3 (consistent,c-consistent (Modgil and
Prakken, 2011)). Let L be a set of propositional logic
formulae. If no formula ψ exists that satisfies both
ψ ∈ L and ¬ψ ∈ L, L is said to be consistent. If no
pair of φ and ψ exists that satisfies both φ ⇒ ψ ∈ L
and φ ⇒ ¬ψ ∈ L, L is said to be c-consistent, where
⇒ is a logical implication.
Let L be a set of propositional logic formulae. A
knowledge base K ⊆ L is a finite, consistent and c-
consistent set of propositional formulae. Each agent
has its own knowledge base, and uses its elements to
participate in argumentation. Note that K may not be
deductively closed; i.e., there may be a case in which
φ,φ ⇒ ψ ∈ K and ψ /∈ K hold. Also note that ¬¬ψ is
considered to be ψ. ∼ is introduced in order to make
extensions c-consistent by setting φ ⇒ ¬ψ can attack
φ ⇒ ψ. Let α be a formula φ ⇒ ψ, where φ may be
⊤. Then ∼α denotes either ¬(φ ⇒ ψ) or φ ⇒ ¬ψ.
3 AF WITH WHY-QUESTIONS
A why-question cannot occur arbitrarily, but occurs
only when an argument exists that it can attack.
Therefore, after constructing the usual arguments and
attack relations from the given pair of knowledge
bases, we construct arguments and attack relations
corresponding to why-questions.
Each agent p has its own knowledge base K
p
.
Definition 4 (argument). Let φ
1
,.. .,φ
n
and ψ be
formulae in K
p
. An argument on K
p
is a triple
(Data,Warrant,Claim), where Data = φ
1
,.. .,φ
n
,
Warrant = φ
1
∧ .. . ∧ φ
n
⇒ ψ and Claim = ψ.
For an argument P = (Data,Warrant,Claim)
on K
p
, Data,Warrant and Claim are denoted by
Dat(P),Wrr(P) and Clm(P), respectively. Fml(P)
is defined to be the set {Dat(P)} ∪ {Wrr(P)} ∪
{Clm(P)}. To simplify the problem, we consider only
the case where n = 1 in every argument; i.e., an argu-
ment is denoted by (φ,φ ⇒ ψ,ψ), where φ,φ ⇒ ψ, ψ ∈
K
p
, and denoted by (ψ) in case φ = ⊤.
Definition 5 (attack). Let A and B be arguments on
K
a
and K
b
, respectively.
If Clm(A) ⇔∼ Clm(B), then (A, B) is said to be
a rebut from A to B. If Clm(A) ⇔∼ Dat(B) or
Clm(A) ⇔∼Wrr(B), then (A,B) is said to be an un-
dercut from A to B. If (A, B) is a rebut or an undercut
from A to B, then (A,B) is an attack from A to B.
Let K
a
and K
b
be knowledge bases for agents a
and b, respectively. Let A
a
and A
b
be sets of argu-
ments on K
a
and K
b
, respectively. Also, let R
a
and
R
b
be sets of attacks from A to B and B to A, respec-
tively. Then, we introduce why-questions and their
answers.
Let p be agent a or b, and q its opponent.
and let WB denote either Wrr or Dat. For Q ∈
A
q
, if WB(Q) 6∈ K
p
, create a new argument called
why-argument A
whyp
= (¬WB(Q)) for p, and a
new attack called why-question (A
whyp
,Q). More-
over, if there exists an argument Q
′
∈ A
q
such that
Clm(Q
′
) ⇔ ¬WB(A
whyp
), create a new attack why-
answer (Q
′
,A
whyp
) corresponding to the answer to the
why-question.
Example 2. Figure 1 shows an example of
why-arguments and why-attacks. Assume that
ICAART2013-InternationalConferenceonAgentsandArtificialIntelligence
552