Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

1 Introduction

Logic-based argumentation specialises Dung’s abstract argumentation theory [8], representing arguments in formal logic. One significant advantage of logic-based argumentation over abstract argumentation is that it can directly benefit from logical properties such as logical consistency of the underlying formal logic. It promotes adherence of an argumentation framework to rational principles. There are studies (e.g. [2, 5, 10, 15]) in this direction that identify logically desirable properties in argumentation frameworks.

It may appear trivial to attain such logical rigour among arguments and attacks at first sight. If we just assume that all arguments in an argumentation framework are classical logic sentences, any conflict between them could be just logical inconsistency. However, the use of logical inconsistency causes attack relation R to be necessarily symmetric, attacks meanwhile become necessarily cyclic, which was reported to restrict expressiveness of an argumentation framework [6]. A few approaches were proposed to bar the uniform symmetry. One could add a preference relation [12] to eliminate some of the members of R. One may also consider dividing an argument into its supports and its conclusion, facilitating differentiation of attacks. For instance, there is the rebutting where a conclusion of an argument attacks a conclusion of another argument, and there is the undercutting where a conclusion of an argument attacks a support of another argument. One may make use of both strict and defeasible rules, which is a popular approach in defeasible reasoning.

Either of them could reduce logical rigour, however. The preference relation, while powerful, does not elucidate the origin of the preference. The division or, to be more precise, the assumption that an argument is clear-cuttingly dividable into supports and a conclusion, too, is a source of logical incoherence. Consider a dialogue:

 

A(1): :

You finish your homework today.

B: :

No, dad. I still have one week. I will do it this weekend.

A(2): :

No arguing. You must listen to me.

 

Suppose \(P_{1,2,3,4}\) are the following propositions: \(P_1\): \(\mathbf B \) finish homework today.; \(P_2\): \(\mathbf B \) still has one week.; \(P_3\): \(\mathbf B \) will do homework this weekend.; and \(P_4\): \(\mathbf B \) must listen to \(\mathbf A \). Suppose that (XF) stands for an argument having its supports X, a set of sentences, and its conclusion F, a sentence. A possible encoding of the three arguments \(\mathbf A \text {(1)}, \mathbf B \) and \(\mathbf A \text {(2)}\) is then: \((\emptyset , P_1)\), \((\{P_2, P_3\}, \lnot P_1)\), and \((\{P_4\}, \lnot \lnot P_1)\). Assume that each conclusion follows logically from their supports. The problem is that it is not the unique encoding, since \((\emptyset , P_1)\), \((\{P_2\}, \lnot P_1 \wedge P_3)\), \((\{\lnot \lnot P_1\}, P_4)\) is also plausible. Again, assume that each conclusion follows logically from their supports. It is usually not possible to totally demarcate supports and conclusions when arguments are obtained from natural expressions like shown above.

1.1 Contribution

In this work we show a way of enhancing utility without sacrificing so much of rationality by utilising a contraction operation from belief revision theories [1, 7, 13]. A contraction operation is informally an operation to rationally - as well as minimally - change a particular set of beliefs when existing beliefs are removed from it. A belief is often a formal sentence. We consider a rational argumentation framework \((\varGamma , \div )\) where \(\varGamma \) is a set of classical logic sentences, and \(\div \), used for belief contraction, is a binary operation defined on a pair of the power set of the set of formal sentences. This framework as we will show has fair expressiveness despite its minimalistic appearance. The key observation is that \(\div \) can be used to know attack strengths, in particular whether an attack is defeating or non-defeating. If we assume the concept of conflict-eliminability [3]: arguments can be grouped together so long as they do not defeat each other, then symmetric attacks are no longer such a big issue, for they do not imply symmetric defeats. We will show that our rational argumentation framework is expressive enough to represent certain features of coalition formation, specifically coalition profitability and formability semantics we described for abstract argumentation [3]. Though we pass the details to Sect. 2, this result - that coalition profitability and formability semantics can be just as well characterised in the rational framework as in abstract framework - is quite nice in light of gathering interests in “argument strength”, to which this winter will incidentally dedicate a workshop.Footnote 1 Out of the key discussions expected in the venue, our work should offer insights into the following three questions.

  1. 1.

    Which factors influence the strength of an argument?

  2. 2.

    Can weaker arguments defeat and/or defend stronger arguments?

  3. 3.

    How do formal and informal approaches to argument strength relate?

In the rest, we will: go through preliminary materials (in Sect. 2); develop our rational argumentation frameworks (in Sect. 3); and characterise coalition profitability and formability semantics as well as detail relation to abstract argumentation (in Sect. 4), before drawing conclusions with related work.

2 Preliminaries

2.1 Abstract Argumentation Frameworks for Coalition Profitability and Formability

We recall abstract coalition profitability and formability we previously discussed [3]. Let \(\mathbb {N}\) be the class of natural numbers including 0, let \(\mathcal {A}\) be the set of abstract entities representing arguments, and let \(\mathcal {S}\) be \(\mathcal {A} \times \mathbb {N}\). We denote each element of \(\mathbb {N}\) by ijkm or n with or without a subscript, each element of \(\mathcal {A}\) by a with or without a subscript, and each element of \(\mathcal {S}\) by s with or without a subscript. We assume a projection operator \(\pi \) which is defined on ordered sets \(\varSigma \) and which is such that \(\pi (n, \varSigma )\) is: \(\{n\text {-th element of } \varSigma \}\) if \(n \le |\varSigma |\); and undefined, otherwise. For any \(s \in \mathcal {S}\), we call \(\pi (1, s)\) the argument identity of s and call \(\pi (2, s)\) the argument capacity of s. We assume that an argumentation framework is a (SR) for \(S \subseteq \mathcal {S}\) and \(R: 2^{\mathcal {S}} \times \mathcal {S} \rightharpoonup \mathbb {N}\) such that it satisfies all the following conditions. In the rest, a relation G (not the specific symbol G but any relation) being defined for something, say X (likewise, not the specific symbol X, but some entity on which G is defined), is synonymous to G(X) being defined.

  1. 1.

    S is a finite set [Finite arguments].

  2. 2.

    For any \((a, n) \in S\), it holds that \(n > 0\) [Positive argument capacity].

  3. 3.

    For any \((a, n) \in S\), there is no \(m \not = n\) such that \((a, m) \in S\) [Unique argument identity].

  4. 4.

    R is undefined for \((\emptyset , s)\) for any \(s \in \mathcal {S}\) [Attack coherence].

  5. 5.

    For any \(S_1 \subseteq S\) and for any \(s \in S\), if R is defined for \((S_1, s)\), then R is defined for any \((S_2, s)\) for \(\emptyset \subset S_2 \subseteq S_1\). [Quasi-closure by subset relation].

  6. 6.

    For any \(S_1, S_2 \subseteq S\) and for any \(s \in S\), if R is defined both for \((S_1, s)\) and for \((S_2, s)\), then R is defined also for \((S_1 \cup S_2, s)\) [Closure by set union].

  7. 7.

    For any \(S_1 \subseteq S\) and for any \(s \in S\) such that R is defined for \((S_1, s)\), it holds that \(R(S_1, s) > 0\) [Attack with a positive strength].

  8. 8.

    For any \((a, n), (a, m) \in \mathcal {S}\) such that \(n \le m\), if \(R(S_1, s)\) - for some \(s \in \mathcal {S}\) and for some \(S_1 \subseteq _{\text {fin}} \mathcal {S}\) such that \((a, n) \in S_1\) - is defined, then \(R(S_2, s)\) for \(S_2 = (S_1 \backslash (a, n)) \cup (a, m)\) is defined, which is furthermore such that \(R(S_1, s) \le R(S_2, s)\) [Attack monotonicity 1 (source)].

  9. 9.

    For any \(S_1, S_2 \subseteq S \subseteq _{\text {fin}} \mathcal {S}\) and for any \(s \in S\), if R is defined for \((S_1, s)\), \((S_2, s)\) and \((S_1 \cap S_2, s)\), then \(R(S_1 \cap S_2, s) \le R(S_i, s)\) for both \(i = 1\) and \(i = 2\) [Attack monotonicity 2 (source)].

  10. 10.

    For any \((a, n), (a, m) \in \mathcal {S}\) such that \(n \le m\), it holds that if R is defined for \((S_1, (a, n))\) for some \(S_1 \subseteq _{\text {fin}} \mathcal {S}\) such that \(S_1 \cap \bigcup _{l \in \mathbb {N}}\{(a, l)\} = \emptyset \), then it is defined for \((S_1, (a, m))\), and, moreover, \(R(S_1, (a, n)) \le R(S_1, (a, m))\) [Attack monotonicity 3 (target)].

  11. 11.

    R is undefined for \((S_1, s)\) if \(S_1 \subseteq _{\text {fin}} \mathcal {S}\) \( \textsf {and}\) \(s \in S_1\) [No self attacks].

Here and everywhere we may use \( \textsf {and}\) to emphasize truth-value comparisons. The expression ‘\(S_1 \subseteq _{\text {fin}} \mathcal {S}\) \( \textsf {and}\) \(s \in S_1\)’ is basically: ‘it is the case that \(S_1 \subseteq _{\text {fin}} \mathcal {S}\) and it is also the case that \(s \in S_1\)’.

The first three conditions are for \(\pi (1, (S, R))\). The finiteness condition is assumed in many practical situations. The third condition enforces that each argument identified with an argument identity appears once in S. The second condition reflects an assumption that an argument capacity is proportional to meaningfulness of an argument, the greater the more meaningful, and 0 meaningless and not to be considered. Although the capacity is an abstract entity, it can be simplistically the number of sub-arguments of the argument : in the earlier example with A(1), B and A(2), we could give 1 to A(1), 2 to B, and 2 to A(2). The remaining conditions are for \(\pi (2, (S, R))\). We visualise important points about them with a drawing. We assume that R is defined for \((\{s_1\}, s_2)\) if there is an arrow from \(s_1\) into \(s_2\).

figure a

There are five arrows. Among them, two are red, and they are not permitted in this argumentation framework. The red arrow to the left of \((a_1, 2)\) signifies that an attack would be possible without any attacking argument, which [Attack coherence] prohibits. The other red arrow indicates that there may be an argument that attacks itself. Such an argument should not be taken seriously. [No self attacks] prevents it from appearing in the argumentation framework. [Closure by set union] is perhaps intuitive enough. [Quasi-closure by subset relation] precludes the following situation: a group of arguments attacks some argument, but no subgroups of the group attack it. These two conditions may not be so adequate when a group of arguments collectively mean more (or less) than when they are taken individually [14]. We do not deal with this problem of argument accrual. The three attack monotonicity conditions reflect the following observations. Suppose \(R(S_1, s)\) is defined for some \(S_1 \subseteq S\) and an argument \(s \in S\). Now, let us increase argument capacity of some argument \(s_1 \in S_1\) into \(s'_1 \in \mathcal {S}\) so that we have \(S_2 = (S_1 \backslash \{s_1\})\cup \{s_1'\}\). An argument with a greater capacity is considered more meaningful, having a greater impact on attacking other arguments. For instance, if we regard the capacity of an argument representative of the number of sub-arguments of the argument, it says more with a greater capacity. Consequently:

  1. 1.

    If R is defined for \((S_1, s)\) for some \(S_1 \subseteq S\) and any \(s \in S\), then if the capacity of some argument \(s_1 \in S_1\) increases into \(s'_1 \in \mathcal {S}\), then, all else unchanged, the attack strength of \(S'_1 = (S_1 \backslash \{s_1\}) \cup \{s'_1\}\) on s should not be weaker, and, of course, \(S'_1\) should still be attacking s.

  2. 2.

    Also, if R is defined for \((S_1, s)\) then if R is also defined for \((S_2, s)\) such that \(S_1 \subseteq S_2\), then the attack by \(S_2\) on s should not be weaker than by \(S_1\) on s.

Also, if R is defined for \((S_1, s)\) for any \(S_1 \subseteq S\) and any \(s \in S\), and if the argument capacity of s increases into \(s' \in \mathcal {S}\), then the attack strength of \(S_1\) on \(s'\) should not be weaker than that of \(S_1\) on s, for an argument with a large argument capacity has more materials for other arguments to attack.

Attacks and Conflict-Eliminable Sets. Assume an abstract argumentation framework (SR). We say that \(S_1 \subseteq S\) attacks \(s \in S\) iff there exists \(S_2 \subseteq S_1\) such that R is defined for \((S_2, s)\). We say that \(S_1 \subseteq S\) defeats \(s \in S\) iff \(S_1\) attacks s \( \textsf {and}\) there exists \(S_2 \subseteq S_1\) such that \(R(S_2, s) \ge \pi (2, s)\). We define \(\textsf {Attacker}: 2^{\mathcal {S}} \rightarrow 2^{\mathcal {S}}\) to be such that \(\textsf {Attacker}(S_1) = \{s \in S \ | \ \text {there exists } s_1 \in S_1 \text { such that } s \ \text {attacks}\ s_1.\}\). We say that \({S_1 \subseteq S}\) is conflict-eliminable iff there exists no \(s \in S_1\) such that \(S_1\) defeats s.

A conflict-eliminable set is associated with its intrinsic arguments. Let \(\alpha : 2^{\mathcal {S}} \rightharpoonup 2^{\mathcal {S}}\) be such that it is defined for \(S_1 \subseteq S\) iff \(S_1\) is conflict-eliminable. If \(\alpha \) is defined for \(S_1 \subseteq S\), then we define that \(\alpha (S_1) = \{(\pi (1, s), n) \ | s \in S_1 \ \textsf {and}\ n = \pi (2, s) - V^{\text {max}}(S_1, s)\}\) where \(V^{\text {max}}(S_1, s)\) is either 0 in case \(S_1\) does not attack s, or else \(R(S_2, s)\) for some \(S_2 \subseteq S_1\) such that (1) R is defined for \((S_2, s)\); and (2) if R is defined for \((S_x, s)\) for \(S_x \subseteq S_1\), then \(R(S_x, s) \le R(S_2, s)\). We say that \(\alpha (S_1)\) are intrinsic arguments of \(S_1\) if \(\alpha \) is defined for \(S_1\).

A conflict-eliminable set of arguments has its own view of (SR). Let \(\textsf {Del}_R(S, S_x)\) be \(\{(S_y, s) \ | \ s \in S_x\ \textsf {and}\ S_y \subseteq S_x \ \textsf {and}\ R(S_y, s) \text {is defined.} \}\), which is the set of attack relations within \(S_x\). Now, let \(S_1\) be a subset of S. If \(\alpha \) is defined for \(S_1\), then we say that \(((S \backslash S_1) \cup \alpha (S_1), R\backslash \textsf {Del}(S, S_1))\) is \(S_1\)’s view of S, which we denote by \(\textsf {View}_R(S, S_1)\).

Conflict-Eliminable Sets’ Attacks and Admissibility. We say that \(S_1 \subseteq S\) c-attacks \(s \in S\) iff \(\alpha \) is defined for \(S_1\) \( \textsf {and}\) there exists some \(S_2 \subseteq \alpha (S_1)\) such that \(\pi (2, \textsf {View}_R(S, S_1))\) is defined for \((S_2, s)\). We say that \(S_1\) c-defeats \(s \in S\) iff \(S_1\) c-attacks s \( \textsf {and}\) \(\pi (2, \textsf {View}_R(S, S_1))(\alpha (S_1), s) \ge \pi (2, s)\). These notions are similar to attacks and defeats, but are from the point of view of a conflict-eliminable set of arguments. Hence, if \(\alpha \) is defined for \(S_1 \subseteq S\), then for any \(s \in S\), \(\alpha (S_1)\) does not c-attack s, as can be straightforwardly verified. We say that \(S_1 \subseteq S\) is c-admissible iff \(\alpha \) is defined for \(S_1\) \( \textsf {and}\) if \(S_2 \subseteq \pi (1, \textsf {View}_R(S, S_1))\) attacks \(s \in S_1\) and if \(S_x \subseteq S_2\) is such that \(R(S_x, s)\) is defined, then there exists some \(S_3 \subseteq \alpha (S_1)\) such that \(S_3\) c-defeats some \(s_x \in S_x\). We say that \(S_1 \subseteq S\) is c-preferred iff \(S_1\) is c-admissible \( \textsf {and}\) there exists no \(S_1 \subset S_y \subseteq S\) such that \(S_y\) is c-admissible. Now, in order that a conflict-eliminable set \(S_1\) be coherent in its attacks, it must only attack external arguments with its intrinsic arguments. In comparison, attacks into \(S_1\) are not bound by the restriction: an external argument can attack the conflict-eliminable set \(S_1\) by attacking any \(s_1 \in S_1\). Let \(S_1 \subseteq S\) be such that \(\alpha (S_1)\) is defined. We say that a conflict-eliminable set \(S_1\) is one-directionally attacked iff there exists \(S_x \subseteq \pi (1, \textsf {View}_R(S, S_1))\) such that \(S_x\) attacks \(s \in S_1\) \( \textsf {and}\) \(S_1\) does not c-attack any \(s_x \in S_x\).

Coalition Profitability and Formability Semantics. We say that \(S_2\) is in at least as good a state as \(S_1\) is, of which we state \(S_1 \preceq S_2\), iff \(\alpha \) is defined both for \(S_1\) and \(S_2\) \( \textsf {and}\) any of the three conditions below is satisfied: (1) \(S_2\) is c-admissible; (2) \(S_1\) is one-directionally attacked; or (3) neither \(S_1\) nor \(S_2\) is c-admissible or one-directionally attacked. We say that coalition is permitted between \(S_1, S_2 \subseteq S\) iff \(S_1 \cap S_2 = \emptyset \) \( \textsf {and}\) \(\alpha \) is defined for \(S_1 \cup S_2\). We define profitability relation \(\unlhd : 2^{\textsf {S}} \times 2^{\textsf {S}}\) to be such that \(S_1 \unlhd S_2\) satisfies three axioms below.

  1. 1.

    \(S_1 \subseteq S_2\) (larger set).

    Explanation: A larger set is a better set.

  2. 2.

    \(S_1 \preceq S_2\) (better state).

    Explanation: A set that is in a better state is a better set.

  3. 3.

    \(|\{s \in \textsf {Attacker}(S_1) \ | \ S_1 \text { does not c-defeat } s \ \textsf {and}\ s \not \in S_1\}| \ge \)

    \(|\{s \in \textsf {Attacker}(S_1) \ | \ S_2 \text { does not c-defeat}\ s \ \textsf {and}\ s \not \in S_2\}|\)

    (fewer attackers).

    Explanation: A set that is attacked by a fewer number of attackers is better.

We say that \(S_2\) is at least as profitable for \(S_1\) as \(S_1\) is for itself iff \(S_1 \unlhd S_2\). By profitability discontinuation theorem [3], satisfaction of the three conditions: (1) \(S_1 \unlhd S_2\); (2) \(S_1 \unlhd S_3\); and (3) \(S_2 \subseteq S_3\), does not guarantee \(S_2 \unlhd S_3\).

Suppose we denote by \(\textsf {Max}(S_1)\) the set of all \(S_x \subseteq S\) that satisfy the conditions: (1) \(S_1 \unlhd S_x\); and (2) if \(S_x \subset S_y \subseteq S\), then it is not the case that \(S_1 \unlhd S_y\). Then, if \(S_1\) forms a coalition with \(S_2\) satisfying \(S_1 \unlhd S_1 \cup S_2\), \(\textsf {Max}(S_1) \backslash \textsf {Max}(S_1 \cup S_2)\) is no longer reachable from \(S_1 \cup S_2\). Then suppose that some \(S_x \in \textsf {Max}(S_1)\) is a maximal element in \(\textsf {Max}(S_1)\) under some criteria, it may become unreachable from \(S_1 \cup S_2\) by \(\unlhd \), depending on which conflict-eliminable set \(S_2\) is. From \(S_1\), if such maximal \(S_x\) is to be formed potentially incrementally: first with some \(S_y \subseteq (S_x \backslash S_1)\) such to obtain \(S_1 \unlhd S_1 \cup S_y\); then with some \(S_z \subseteq ((S_x \backslash S_1) \backslash S_y)\) such to obtain \(S_1 \cup S_y \unlhd S_1 \cup S_y \cup S_z\), and so on, it is clear that \(S_y\), \(S_z\) and so on should be such that \(S_x \in \textsf {Max}(S_1 \cup S_y)\), \(S_x \in \textsf {Max}(S_1 \cup S_y \cup S_z)\), and so on. We shall define a stronger relation: \(\unlhd _{\text {m}}\), which is such that if \(S_1 \unlhd _{\text {m}} S_2\), then there exists some \(S_a \in \textsf {Max}(S_2)\) which is a maximal element of \(\textsf {Max}(S_1)\). Formally, let \(\le _{l}, \le _{b}, \le _{f}: 2^{\mathcal {S}} \times 2^{\mathcal {S}}\) be such that they satisfy all the following:

  1. 1.

    \(S_1 \le _l S_2\) iff \(|S_1| \le |S_2|\).

  2. 2.

    \(S_1 \le _b S_2\) iff \(S_2\) is at least as good by (better state) as \(S_1\).

  3. 3.

    \(S_1 \le _f S_2\) iff \(S_2\) is at least as good by (fewer attackers) as \(S_1\).

and let \(S_1 <_{\beta } S_2\) for each \(\beta \in \{l,b,f\}\) hold just when \(S_1 \le _{\beta } S_2\) but not \(S_2 \le _{\beta } S_1\). Then we define \(\unlhd _{\text {m}}: 2^{\mathcal {S}} \times 2^{\mathcal {S}}\) to be such that if \(S_1 \unlhd _{\text {m}} S_2\), then both of the following conditions satisfy:

  1. 1.

    \(S_1 \unlhd S_2\).

  2. 2.

    Some \(S_x \in \textsf {Max}(S_2)\) is such that, for all \(S_y \in \textsf {Max}(S_1)\), if \(S_x <_{\beta } S_y\) for some \(\beta \in \{l, b, f\}\), then there exists \(\gamma \in (\{l,b,f\} \backslash \beta )\) such that \(S_y <_{\gamma } S_x\).

The second condition is giving a definition to maximality of an element in \(\textsf {Max}(S)\). We have four coalition formability semantics as follows.

$$\begin{aligned} \textsf {W}(S_1)&= \{S_2 \subseteq S \ | \ S_1 \unlhd S_1 \cup S_2 \ \textsf {or}\ S_2 \unlhd S_1 \cup S_2\}.\\ \textsf {M}(S_1)&= \{S_2 \subseteq S \ | \ S_1 \unlhd S_1 \cup S_2 \ \textsf {and}\ S_2 \unlhd S_1 \cup S_2\}.\\ \textsf {WS}(S_1)&= \{S_2 \subseteq S \ | \ S_1 \unlhd _{\text {m}} S_1 \cup S_2 \ \textsf {or}\ S_2 \unlhd _{\text {m}} S_1 \cup S_2 \}.\\ \textsf {S}(S_1)&= \{S_2 \subseteq S \ | \ S_1 \unlhd _{\text {m}} S_1 \cup S_2 \ \textsf {and}\ S_2 \unlhd _{\text {m}} S_1 \cup S_2\}. \end{aligned}$$

Here and everywhere the semantics of classical logic disjunction is assumed for \(\textsf {or}\). Assume three utility postulates:

  1. I

    Coalition is good when it is profitable at least to one party.

  2. II

    Coalition is good when it is profitable to both parties.

  3. III

    Coalition is good when maximal potential future profits are expected from it.

W (, M, WS, S) respects I (, II, I + III, II + III).

2.2 Rational Contraction

We assume propositional logic. Our languages consist of: (1) a fixed number of logical symbols: \(\top , \bot , \wedge , \vee , \lnot \), as well as parentheses and brackets; and (2) a finite number of propositional variables, each of which is referred to by p with or without a subscript. We denote each language by \(\mathbf {K}\) with or without a subscript, but dedicate \(\mathbf {K}_0\) to the language having the largest number of propositional variables. We denote the class of sentences constructable in each \(\mathbf {K}\) by \(\mathcal {P}_{\mathbf {K}}\), and refer to a sentence by F with or without a subscript. We define \(\mathsf {L}: 2^{\mathcal {P}_{\mathbf {K_0}}} \rightarrow 2^{\mathcal {P}_{\mathbf {K_0}}}\) to be such that \(F \in \mathsf {L}(\{F_1, F_2, \ldots \})\) iff F is a logical consequence of a finite subset of \(\{F_1, F_2, \ldots \}\). We say that a set of sentences \(\varGamma \) is consistent iff \(\mathsf {L}(\varGamma ) \not = \mathcal {P}_{\mathbf {K_0}}\). Among three common binary operations: expansion, contraction and revision [1, 9] in belief revision theories, we will require just contraction \(\div \) which minimally removes some set of sentences off a larger set of sentences. This operator satisfies the following axioms.

  1. 1.

    \(\mathsf {L}(\varGamma _1) \div \varGamma _2 = \mathsf {L}(\mathsf {L}(\varGamma _1) \div \varGamma _2)\) (Closure).

  2. 2.

    \(\mathsf {L}(\varGamma _1) \div \varGamma _2 \subseteq \mathsf {L}(\varGamma _1)\) (Inclusion).

  3. 3.

    \(\mathsf {L}(\varGamma _1) \div \varGamma _2 = \mathsf {L}(\varGamma _1) \div \varGamma _3\) if \(\mathsf {L}(\varGamma _2) = \mathsf {L}(\varGamma _3)\) (Extensionality).

  4. 4.

    \(\mathsf {L}(\varGamma _1) \div \varGamma _2 = \mathsf {L}(\varGamma _1)\) if, for each \(F \in \varGamma _2\), either \(\mathsf {L}(\{F\}) = \mathsf {L}(\{\top \})\) or else \(F \not \in \mathsf {L}(\varGamma _1)\) (Vacuity).

  5. 5.

    For each \(F \in \varGamma _2\), \(F \not \in \mathsf {L}(\varGamma _1) \div \varGamma _2\) if \(\mathsf {L}(\{F\}) \not = \mathsf {L}(\{\top \})\) (Success).

  6. 6.

    \(\mathsf {L}(\varGamma _1) \subseteq (\mathsf {L}(\varGamma _1) \div \varGamma _2) \cup \varGamma _2\) (Recovery).

The condition (Vacuity) says firstly that no tautological sentence is removed, and secondly that it is always a sentence in \(\mathsf {L}(\varGamma _1)\) that is to be removed. The condition (Recovery) ensures a minimal change of \(\mathsf {L}(\varGamma _1)\).

3 Rational Argumentation Frameworks

Our rational argumentation framework is a tuple \((\varGamma , \div )\) where \(\varGamma \) is a finite non-empty set of sentences.

Definition 1

(Coherence). We say that \((\varGamma , \div )\) is coherent iff (1) no \(F \in \varGamma \) is such that \(\mathsf {L}(\{F\}) = \mathsf {L}(\{\top \})\) or that \(\mathsf {L}(\{F\}) = \mathcal {P}_{\mathbf {K_0}}\) and (2) no \(F_1, F_2 \in \varGamma \) are such that \(\mathsf {L}(\{F_1\}) = \mathsf {L}(\{F_2\})\).

A coherent rational argumentation framework \((\varGamma , \div )\) will be assumed in the rest. It is clear from the above definition that no \(F \in \varGamma \) is a tautology which is a vacuous argument or an inconsistent sentence which is not to be taken seriously. Now, it is certainly possible to define conflict-freeness in a set of arguments: let \(\varGamma _1\) be a non-empty subset of \(\varGamma \), then \(\varGamma _1\) is conflict-free iff \(\mathsf {L}(\{F_1\} \cup \{F_2\}) \not = \mathcal {P}_{\mathbf {K_0}}\) for all \(F_1, F_2 \in \varGamma _1\).Footnote 2 This notion, however, gives away very useful information of relative strength of attacks. We will instead rely upon conflict-eliminability.

Definition 2

(Opposition Force). Let \(\mathsf {O}: 2^{\mathcal {P}_{\mathbf {K_0}}} \times \mathcal {P}_{\mathbf {K_0}} \rightarrow 2^{\mathcal {P}_{\mathbf {K_0}}}\) be such that \(\mathsf {O}(\varGamma _1, F_2) = \{F_1 \in \varGamma _1 \ | \ F_2 \in \varGamma \ \textsf {and}\ \mathsf {L}(\{F_1, F_2\}) = \mathcal {P}_{\mathbf {K_0}} \ \textsf {and}\ \varGamma _1 \subseteq \varGamma \}\). We say that \(\mathsf {O}(\varGamma _1, F_2)\) is the opposition force in \(\varGamma _1\) against \(F_2 \in \varGamma \).

\(\mathsf {O}(\varGamma _1, F_2)\) may be empty. We denote \(\{\lnot F \ | \ F \in \mathsf {O}(\varGamma _1, F_2)\}\) by \(\mathsf {O}^-(\varGamma _1, F_2)\).

Example 1

Suppose a set of sentences:\(\{F_1, F_2, \lnot F_1 \wedge \lnot F_2\}\). We have \(\mathsf {O} (\{F_1, F_2\}, \lnot F_1 \wedge \lnot F_2) = \{F_1, F_2\}\). Then, \(\mathsf {O}^-(\{F_1, F_2\}, \lnot F_1 \wedge \lnot F_2) = \{\lnot F_1, \lnot F_2\}\).

Definition 3

(Attacks and Defeats). For \(F \in \mathcal {P}_{\mathbf {K_0}}\), let \(\textsf {Lang}(F)\) be the smallest language \(\mathbf {K}\) that recognises F. We say that \(\varGamma _1 \subseteq \varGamma \) attacks \(F \in \varGamma \) iff \(\mathsf {O}(\varGamma _1, F) \not = \emptyset \). We say that \(\varGamma _1 \subseteq \varGamma \) defeats \(F \in \varGamma \) iff \(\varGamma _1\) attacks F \( \textsf {and}\) \((\mathsf {L}(\{F\}) \div \mathsf {O}^-(\varGamma _1, F)) \cap \mathcal {P}_{\textsf {Lang}(F)} = \mathsf {L}(\{\top \}) \cap \mathcal {P}_{\textsf {Lang}(F)}\).

Example 2

Suppose \(\{p_1, \lnot p_1 \wedge p_2\}\) where \(p_1\) and \(p_2\) are propositional variables. Both \(\mathsf {O}(\{p_1\}, \lnot p_1 \wedge p_2)\) and \(\mathsf {O}(\{\lnot p_1 \wedge p_2\}, p_1)\) are non-empty, and so each element of the set is attacking the other. However, while \((\mathsf {L}(\{p_1\}) \div \{p_1 \vee \lnot p_2\}) \cap \mathcal {P}_{\textsf {Lang}(p_1)} = \mathsf {L}(\{\top \}) \cap \mathcal {P}_{\textsf {Lang}(p_1)}\), \((\mathsf {L}(\{\lnot p_1 \wedge p_2\}) \div \{\lnot p_1\}) \cap \mathcal {P}_{\textsf {Lang}(\lnot p_1 \wedge p_2)} \not = \mathsf {L}(\{\top \}) \cap \mathcal {P}_{\textsf {Lang}(\lnot p_1 \wedge p_2)}\), as it contains \(p_2\) for instance. Hence, \(\{\lnot p_1 \wedge p_2\}\) defeats \(p_1\), but \(\{p_1\}\) does not defeat \(\lnot p_1 \wedge p_2\).

Some explanations concerning ‘\((\mathsf {L}(\{F\}) \div \mathsf {O}^-(\varGamma _1, F)) \cap \mathcal {P}_{\mathbf {K_0}}\)’ in the above definition may be helpful. Notice in the left operand, i.e. ‘\((\mathsf {L}(\{F\}) \div \mathsf {O}^-(\varGamma _1, F))\)’, that we require ‘\(\mathsf {L}(\{F\})\)’ instead of \(\{F\}\). If, say, F is some propositional variable \(p_1\), then \(\mathsf {L}(\{F\})\) contains \(p_1 \vee p_3, p_1 \vee p_4, \ldots \). Suppose \(\mathsf {O}^-(\varGamma _1, F) = \{p_1\}\), then certainly \(p_1 \not \in \mathsf {L}(\{p_1\}) \div \{p_1\}\), but it may be that some of \(p_1 \vee p_3, p_1 \vee p_4, \ldots \) are in \(\mathsf {L}(\{p_1\}) \div \{p_1\}\), even though \(p_3, p_4, \ldots \) is not in \(\textsf {Lang}(F)\). The set intersection ensures that the result of belief contraction is relevant to \(\textsf {Lang}(F)\).

Definition 4

(Conflict-Eliminable Sets). We say that \(\varGamma _1 \subseteq \varGamma \) is conflict-eliminable iff \(\varGamma _1\) does not defeat any \(F \in \varGamma _1\).

The following notion will come in handy. We assume that the length of a sentence is proportional to the number of symbols occurring in the sentence.

Definition 5

(Minimal Support). Let \(\varGamma _1\) be such that \(\varGamma _1 = \mathsf {L}(\varGamma _1)\). We say that \(F_1\) is a support of \(\varGamma _1\) iff \(\varGamma _1 = \mathsf {L}(\{F_1\})\). We say that \(F_1\) is a minimal support of \(\varGamma _1\) iff there exists no support \(F_2\) of \(\varGamma _1\) that is shorter than \(F_1\) in length. We denote some minimal support of \(\varGamma _1 = \mathsf {L}(\varGamma _1)\) by \(\textsf {minS}(\varGamma _1)\). We define that \(\textsf {minS}(\varGamma _1) = \textsf {minS}(\varGamma _2)\) if \(\varGamma _1 = \mathsf {L}(\varGamma _2)\). For later convenience, we shall assume that \(F = \textsf {minS}(\mathsf {L}(\{F\}))\) for a coherent rational framework \((\varGamma , \div )\) and for any \(F \in \varGamma \).

Proposition 1

(Existence of a Minimal Support). Let \(F_1\) be a member of \(\varGamma \). Then, if \(\varGamma _2 = \mathsf {L}(\{F_1\}) \div \varGamma _1\) for some \(\varGamma _1 \subseteq \varGamma \), there exists some \(F_2\) such that \(F_2 = \textsf {minS}(\varGamma _2)\).

Proof

\(\varGamma \) in the assumed rational argumentation framework is finite. Also a sentence is necessarily of a finite length.    \(\Box \)

The purpose of \(\textsf {minS}\) is linked closely to our need of referring to a contracted argument. Let us be specific. Suppose a non-defeating attack of \(\{p_1\}\) on \(\lnot p_1 \wedge \lnot p_2\). We have \(\mathsf {L}(\{\lnot p_1 \wedge \lnot p_2\}) \div \{\lnot p_1\}\) which is nominally an infinite set not as easily treated as a sentence. However, it is actually sufficient if we have \(\lnot p_2\) for the representation of the infinite set, since \(\mathsf {L}(\{\lnot p_1 \wedge \lnot p_2\}) \div \{\lnot p_1\} = \mathsf {L}(\{\lnot p_2\})\). With \(\textsf {minS}\), we have \(\lnot p_2 = \textsf {minS}(\mathsf {L}(\{\lnot p_1 \wedge \lnot p_2\}) \div \{\lnot p_1\})\). Generally, \(\textsf {minS}(\mathsf {L}(\{F\}) \div \{F_1\})\) is minimal information (as a sentence) about \(\mathsf {L}(\{F\}) \div \{F_1\}\) we need.

Definition 6

(Intrinsic Arguments). Let \(\varGamma _1 \subseteq \varGamma \) be a conflict-eliminable set. We define intrinsic arguments of \(\varGamma _1\), denoted \(\varGamma _1^{\star }\) with a super-script \(\star \), to be \(\{F \in \varGamma _1 \ | \ \mathsf {O}(\varGamma _1, F) = \emptyset \} \cup \{F_1 \ | \ {F \in \varGamma _1} \ \textsf {and}\ \mathsf {O}(\varGamma _1, F) \not = \emptyset \ \textsf {and}\ F_1 = \textsf {minS}(\mathsf {L}(\{F\}) \div \mathsf {O}^-(\varGamma _1, F))\}\).

Intrinsic arguments of a set of arguments are those sentences that are left after all non-defeating attacks have weakened their targets.

Example 3

Suppose \(\varGamma _1 = \{p_1 \wedge \lnot p_2, \lnot p_1 \wedge p_3, p_4\}\), and suppose that each propositional letter is distinct. \(\varGamma _1^{\star }\) is: \(\{\lnot p_2, p_3, p_4\}\).

Proposition 2

(No Conflicts). Let \(\varGamma _1 \subseteq \varGamma \) be a conflict-eliminable set. Then \(\mathsf {L}(\{F_1\} \cup \{F_2\}) \not = \mathcal {P}_{\mathbf {K_0}}\) for any \(F_1, F_2 \in \varGamma _1^{\star }\).

Characterisation of Attacks by a Conflict-Eliminable Set. As we stated in Sect. 2, there is an asymmetry in attacks to and from a conflict-eliminable set. While arguments outside it could attack any argument in the conflict-eliminable set, the conflict-eliminable set of arguments may attack the external arguments at most by its intrinsic arguments. We define this coalition attack and then admissible/preferred coalition sets.

Definition 7

(C-Opposition Force). Let \(\mathsf {O}_C: 2^{\mathcal {P}_{\mathbf {K_0}}} \times \mathcal {P}_{\mathbf {K_0}} \rightarrow 2^{\mathcal {P}_{\mathbf {K_0}}}\) be such that \(\mathsf {O}_C(\varGamma _1, F_2)\) is: empty if \(\varGamma _1\) is not conflict-eliminable; or else \(\{F_1 \in \varGamma _1^{\star } \ | \ \varGamma _1 \subseteq \varGamma \ \textsf {and}\ F_2 \in \varGamma \ \textsf {and}\ \mathsf {L}(\{F_1\} \cup \{F_2\}) = \mathcal {P}_{\mathbf {K_0}}\}\). We say that \(\mathsf {O}_C(\varGamma _1, F_2)\) is the c-opposition force in \(\varGamma _1\) against \(F_2 \in \varGamma \).

We denote \(\{\lnot F \ | F \in \mathbf {O}_C(\varGamma _1, F_2)\}\) by \(\mathsf {O}_C^-(\varGamma _1, F_2)\).

Definition 8

(C-Attacks and c-Defeats). We say that \(\varGamma _1 \subseteq \varGamma \) c-attacks \(F \in \varGamma \) iff \(\mathsf {O}_C(\varGamma _1, F) \not = \emptyset \). We say that \(\varGamma _1 \subseteq \varGamma \) c-defeats \(F \in \varGamma \) iff \(\varGamma _1\) c-attacks F \( \textsf {and}\) \((\mathsf {L}(\{F\}) \div \mathbf {O}^-_C(\varGamma _1, F)) \cap \textsf {Lang}(F) = \mathsf {L}(\{\top \}) \cap \textsf {Lang}(F)\).

Proposition 3

(No c-Self Attacks). Let \(\varGamma _1 \subseteq \varGamma \) be conflict-eliminable, and let F be a member of \(\varGamma _1^{\star }\). Then \(\mathsf {O}_C(\varGamma _1, F) = \emptyset \).

Proof

Obvious by the definition of c-opposition force and by Proposition 2.    \(\Box \)

Definition 9

(One-Directional Attacks). Assume that \(\varGamma _1\) is a conflict-eliminable set. We say that \(\varGamma _1\) is one-directionally attacked by \(F \in \varGamma \backslash \varGamma _1\) iff \(\mathsf {O}_C(\varGamma _1, F) = \emptyset \) \( \textsf {and}\) there exists some \(F_1 \in \varGamma _1\) such that \(\{F\}\) attacks \(F_1\).

Example 4

Suppose \(\varGamma = \{p_1 \wedge \lnot p_2, \lnot p_1 \wedge p_3, p_4, p_1\}\). \(\varGamma _1 = \{{p_1 \wedge \lnot p_2},\) \( {\lnot p_1 \wedge p_3}, p_4\}\) is a conflict-eliminable set. And \(p_1\) is the only external argument to the set. Because \(\varGamma _1^{\star } = \{\lnot p_2, p_3, p_4\}\), it is not c-attacking \(p_1\). But \(p_1\) is (c-)attacking \(\lnot p_1 \wedge p_3\) in the set.

Definition 10

(C-Acceptance). We say that \(\varGamma _1 \subseteq \varGamma \) c-accepts \(F \in \varGamma \) iff \(\varGamma _1\) does not defeat F \( \textsf {and}\) if \(\mathsf {O}(\varGamma \backslash \varGamma _1, F) \not = \emptyset \), then \(\varGamma _1\) c-defeats each \(F_1 \in \mathsf {O}(\varGamma \backslash \varGamma _1, F)\).

Definition 11

(C-Admissible and c-Preferred Sets). We say that \(\varGamma _1 \subseteq \varGamma \) is c-admissible iff \(\varGamma _1\) is conflict-eliminable \( \textsf {and}\) \(\varGamma _1\) c-accepts all its members. We say that a c-admissible set \(\varGamma _1 \subseteq \varGamma \) is also a c-preferred set iff there exists no \(\varGamma _1 \subset \varGamma _2 \subseteq \varGamma \) such that \(\varGamma _2\) is c-admissible.

4 Logic-Based Coalition Profitability and Formability

Let us adapt some of the notations in Sect. 2. We define \(\textsf {Attacker}(\varGamma _1)\) to be \(\{F \in \varGamma \ | \ \text {there exists some}\ F_1 \in \varGamma _1 \ \text {such that}\ F \ \text {attacks}\ F_1.\}\). We say that coalition is approved between \(\varGamma _1 \subseteq \varGamma \) and \(\varGamma _2 \subseteq \varGamma \) iff \(\varGamma _1 \cap \varGamma _2 = \emptyset \) \( \textsf {and}\) \(\varGamma _1 \cup \varGamma _2\) is conflict-eliminable. We define \(\preceq : 2^{\mathcal {P}_{\mathbf {K_0}}} \times 2^{\mathcal {P}_{\mathbf {K_0}}}\) to be such that \(\varGamma _1 \preceq \varGamma _2\) iff \(\varGamma _1\) and \(\varGamma _2\) are conflict-eliminable \( \textsf {and}\) any of the three conditions: (1) \(\varGamma _2\) is c-admissible; (2) \(\varGamma _1\) is one-directionally attacked; or (3) neither \(\varGamma _1\) nor \(\varGamma _2\) is c-admissible or one-directionally attacked, satisfies. We define \(\unlhd : 2^{\mathcal {P}_{\mathbf {K_0}}} \times 2^{\mathcal {P}_{\mathbf {K_0}}}\) to be such that \(\varGamma _1 \unlhd \varGamma _2\) satisfies the following three conditions.

  1. 1.

    If \(\varGamma _1 \unlhd \varGamma _2\), then \(\varGamma _1 \subseteq \varGamma _2\) (inclusion).

  2. 2.

    If \(\varGamma _1 \unlhd \varGamma _2\), then \(\varGamma _1 \preceq \varGamma _2\) (better state).

  3. 3.

    \(|\{F \in \textsf {Attacker}(\varGamma _1) \ | \ \varGamma _1 \text { does not c-defeat}\ F \ \textsf {and}\ F \not \in \varGamma _1\}| \ge \)

    \(|\{F \in \textsf {Attacker}(\varGamma _1) \ | \ \varGamma _2\text { does not c-defeat }F \ \textsf {and}\ F \not \in \varGamma _2\}|\)

    (fewer attackers).

The meaning is the same as in abstract setting: if \(\varGamma _1 \unlhd \varGamma _2\) then \(\varGamma _2\) is at least as profitable for \(\varGamma _1\) as \(\varGamma _1\) is for itself. We denote by \(\textsf {Max}(\varGamma _1)\) the set of all \(\varGamma _x \subseteq \varGamma \) where \(\varGamma _1 \unlhd \varGamma _x\) \( \textsf {and}\) if \(\varGamma _x \subset \varGamma _y \subseteq \varGamma \), then not \(\varGamma _1 \unlhd \varGamma _y\). Let \(\le _l, \le _b, \le _f: 2^{\mathcal {P}_{\mathbf {K_0}}} \times 2^{\mathcal {P}_{\mathbf {K_0}}}\) be such that they satisfy the following three conditions:

  1. 1.

    \(\varGamma _1 \le _l \varGamma _2\) iff \(|\varGamma _1| \le |\varGamma _2|\).

  2. 2.

    \(\varGamma _1 \le _b \varGamma _2\) iff \(\varGamma _2\) is at least as good by (better state) as \(\varGamma _1\).

  3. 3.

    \(\varGamma _1 \le _f \varGamma _2\) iff \(\varGamma _2\) is at least as good by (fewer attackers) as \(\varGamma _1\).

We write \(\varGamma _1 <_{\beta } \varGamma _2\) for each \(\beta \in \{l,b,f\}\) just when \(\varGamma _1 \le _{\beta } \varGamma _2\) \( \textsf {and}\) not \(\varGamma _2 \le _{\beta } \varGamma _1\). We define \(\unlhd _m: 2^{\mathcal {P}} \times 2^{\mathcal {P}}\) to be such that if \(\varGamma _1 \unlhd _{\text {m}} \varGamma _2\), then:

  1. 1.

    \(\varGamma _1 \unlhd \varGamma _2\).

  2. 2.

    Some \(\varGamma _x \in \textsf {Max}(\varGamma _2)\) is such that, for all \(\varGamma _y \in \textsf {Max}(\varGamma _1)\), if \(\varGamma _x \le _{\beta } \varGamma _y\) for some \(\beta \in \{l, b, f\}\), then there exists \(\gamma \in (\{l,b,f\} \backslash \beta )\) such that \(\varGamma _y <_{\gamma } \varGamma _x\).

The four coalition formability semantics in this logic-based argumentation are as follows.

$$\begin{aligned} \textsf {W}(\varGamma _1)&= \{\varGamma _2 \subseteq \varGamma \ | \ \varGamma _1 \unlhd \varGamma _1 \cup \varGamma _2 \ \textsf {or}\ \varGamma _2 \unlhd \varGamma _1 \cup \varGamma _2\}.\\ \textsf {M}(\varGamma _1)&= \{\varGamma _2 \subseteq \varGamma \ | \ \varGamma _1 \unlhd \varGamma _1 \cup \varGamma _2 \ \textsf {and}\ \varGamma _2 \unlhd \varGamma _1 \cup \varGamma _2\}.\\ \textsf {WS}(\varGamma _1)&= \{\varGamma _2 \subseteq \varGamma \ | \ \varGamma _1 \unlhd _{\text {m}} \varGamma _1 \cup \varGamma _2 \ \textsf {or}\ \varGamma _2 \unlhd _{\text {m}} \varGamma _1 \cup \varGamma _2 \}.\\ \textsf {S}(\varGamma _1)&= \{\varGamma _2 \subseteq \varGamma \ | \ \varGamma _1 \unlhd _{\text {m}} \varGamma _1 \cup \varGamma _2 \ \textsf {and}\ \varGamma _2 \unlhd _{\text {m}} \varGamma _1 \cup \varGamma _2\}. \end{aligned}$$

4.1 The Relation Between Abstract and Logic-Based Argumentation Frameworks

There is a good reason behind the close correlation between the semantics in Sect. 2 and those for our rational argumentation frameworks. Let \(\varpi : \mathcal {P}_{\mathbf {K_0}} \rightarrow (\mathbb {N} \cup \{\infty \})\) be such that:

  1. 1.

    \(\varpi (F) = \infty \) if \(\mathsf {L}(\{F\}) = \mathsf {L}(\{\bot \})\).

  2. 2.

    \(\varpi (F) = 0\) if \(\mathsf {L}(\{F\}) = \mathsf {L}(\{\top \})\).

  3. 3.

    \(\varpi (F_1) \le \varpi (F_2)\) if \(\mathsf {L}(\{F_1\}) \subseteq \mathsf {L}(\{F_2\})\).

Let \(\kappa : 2^{{\mathcal {P}_{\mathbf {K_0}}}} \times \{\div \} \rightharpoonup 2^{\textsf {S}} \times \{R\}\) be such that:

  1. 1.

    \(\kappa \) is defined for \((\varGamma , \div )\) iff \(\varGamma \) is finite.

  2. 2.

    Let \(\tau : 2^{\mathcal {P}_{\mathbf {K_0}}} \rightarrow 2^{2^{\mathcal {P}_{\mathbf {K_0}}}}\) be such that: \(\tau (\{F\}) = \{F_1 \ | \ \mathsf {L}(\{F_1\}) \subseteq \mathsf {L}(\{F\}) \ \textsf {and}\ F_1 = \textsf {minS}(\mathsf {L}(\mathsf {L}(\{F_1\}) \cap \textsf {Lang}(F))) \not = \top \}\); and \(\tau (\varGamma ) = \{\{\tau (F)\} \ | \ F \in \varGamma \}\). Assume that \(\tau (\varGamma )\) is an ordered set in the rest. If \(\kappa \) is defined for \((\varGamma , \div )\), then \(\pi (1, \kappa ((\varGamma , \div )))\) maps one-to-one to \(\tau (\pi (1, (\varGamma , \div )))\) in the following way: for any sentence F in the n-th set of \(\tau (\pi (1, (\varGamma , \div )))\) there is \((a_n, \varpi (F))\) in \(\pi (1, \kappa ((\varGamma , \div )))\). For each \(s \in \pi (1, \kappa ((\varGamma , \div )))\), we refer to the corresponding sentence in \(\tau (\pi (1, (\varGamma , \div )))\) by \(\rho (s)\).

  3. 3.

    If \(\kappa \) is defined for \((\varGamma , \div )\), then \(\pi (2, \kappa (\varGamma , \div ))\) - that is, R - is defined for any (Ss) as long as: (1) \(S' = S \cup \{s\}\) is a subset of \(\pi (1, \kappa (\varGamma , \div ))\) such that \(\pi (1, (a_i, n_i)) \not = \pi (1, (a_j, n_j))\) for any \((a_i, n_i), (a_j, n_j) \in S \cup \{s\}\); and (2) for each \(s_1 \in S\), \(\mathsf {L}(\{\rho (s_1)\} \cup \rho (s)) = \mathcal {P}_{\mathbf {K_0}}\). Further, for each such (Ss), we define R(Ss) to be: \(\varpi (\rho (s))\) if \(\bigcup _{s_1 \in S}\{\rho (s_1)\}\) defeats \(\rho (s)\); and \(\varpi (\rho (s)) - \varpi (\textsf {minS}(\mathsf {L}(\{\rho (s)\}) \div \bigcup _{s_1 \in S}\{\lnot \rho (s_1)\}))\), otherwise.

Perhpas no further explanations are needed for \(\kappa \) and \(\rho \). We mention that \(\tau \) obtains from \(\varGamma \) the set of all the formulas which are some \(F \in \varGamma \), or some \(F_1\) which is logically weaker than some \(F_2 \in \varGamma \) and which is a member of \(\textsf {Lang}(F_2)\).

Theorem 1

(Embedding). For any coherent rational argumentation framework \((\varGamma , \div )\), \(\kappa ((\varGamma , \div ))\) is an argumentation framework as defined in Sect. 2.

Proof

[Finite arguments] holds trivially. [Positive argument capacity] and [No self attacks] hold because a coherent rational framework does not contain a tautology or an inconsistent sentence. [Unique argument identity] holds by the way \(\varpi \) is defined. [Attack coherence] holds trivially. [Quasi-closure by subset relation] and [Closure by set union] hold by the way \(\pi (2, \kappa (\varGamma , \div ))\) is defined. [Attack with a positive strength] holds by the way \(\pi (2, \kappa (\varGamma , \div ))\) is defined. Note that a contracted argument maps into a smaller integer. The three monotonicity conditions hold by the way \(\kappa (\varGamma , \div )\) and \((\varGamma , \div )\) are related.    \(\Box \)

5 Conclusion

We showed how the abstract coalition profitability and formability semantics as mentioned in Sect. 2 may be defined in a minimalistic rational argumentation framework. Theorem 1 implies that the definition of the abstract argumentation framework, i.e. the 11 conditions in 2.1 [3], are logically grounded. Our rational framework is rational, provided that (1) representations of arguments in formal logic and (2) belief contraction are rational. The minimality of assumptions directly leads to minimality of logical incoherence.

Related Work. Instantiation of abstract argumentation with formal logic [2, 4, 10, 11, 15] is a fairly natural idea. Yet it is an important study to be undertaken if the knowledge of abstract argumentation is to be applied in practice. Dung’s abstract argumentation can be misused; adequate postulates will prevent the misuse. In the above-mentioned works an argument is divided into supports and a conclusion. We showed a way of attaining fair expressiveness in the absence of the insulation by utilising belief contraction. We believe the work by Gabbay and Garcez [10] to be the most relevant work to ours. They, too, observe shifts in attack strength. Compared to [10], we are focusing: on more static pictures of logic-based argumentation as our work does not step through sequences of attacks; on minimal argumentation; and on the relation between logic-based and abstract argumentation for coalition semantics.