Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

1 Introduction

Assumption-Based Argumentation (ABA) [1, 9] is a general-purpose argumentation framework whose arguments are structured. It does not have a mechanism to deal with the given explicit preferences though explicit preferences are often required to resolve conflicts between arguments in human argumentation.

Recently to overcome difficulties of the existing approaches that map the explicit preferences into ABA, we proposed an assumption-based argumentation framework equipped with preferences (p_ABA) [22, 23], which incorporates explicit preferences over sentences into ABA. As discussed in [23], our approach introducing preferences over sentences in the framework is inspired by prioritized circumscription [15, 16], namely, the most well-established formalization for commonsense reasoning with preferences that enables us to represent various preferences by means of priorities over its minimized predicates. In regard to the semantics of p_ABA, we provide a method to ‘lift’ a sentence ordering given in p_ABA to the argument ordering. Accordingly we can freely give any semantics to the proposed p_ABA based on either an argument ordering or a sentence ordering. W.r.t. other frameworks (e.g. \({ASPIC}^{+}\) [17, 18]), the lift from preferences to argument orderings is also performed. However based on their argument orderings, the altered argumentation framework with a modified successful attacks (i.e. defeat) is constructed, to which Dung’s argument-based semantics is applied. This denotes that the extension of the altered argumentation framework is not always an extension of the initial argumentation framework without preferences but a modified one, which is in conflict with our philosophy based on the idea to treat preferences in prioritized circumscription [15, 16]. Now recall that, when every model is a Herbrand model, a model of prioritized circumscription expressed by \(Circum(T;P^{1}\!>\!\cdots >\!P^{k};\!Z)\) is a minimal one among Herbrand models of the first order theory T w.r.t. the model (i.e. structure) ordering \(\le ^{P^{1}> \cdots >P^{k};Z}\) lifted from the given predicate ordering \(P^{1}\!>\! \cdots \!>\!P^{k}\). Thus in a similar way, we presented a method to lift a sentence ordering (resp. an argument ordering) to the extension ordering (\(\sqsubseteq _{ex}\)). Thanks to the extension ordering, the semantics of p_ABA is given by \(\mathcal {P}\)-argument extensions along with \(\mathcal {P}\)-assumption extensions which are maximal ones w.r.t. the extension ordering \(\sqsubseteq _{ex}\) among extensions of its underlying ABA. Thus in a special case of \(Circum(T; P^{1}\!>\!\cdots >\!P^{k}\!;\!Z)\) where T has a unique model, \(Circum(T;P^{1}\!>\!\cdots >\!P^{k};\!Z)\) has a unique model which coincides with the model of T since the unique model of T is always minimal w.r.t. \(\le ^{P^{1}> \cdots >P^{k};Z}\) regardless of the given \(P^{1}>\cdots >P^{k}\). This means that when T has a unique model, any of other interpretations of T which are inevitably inconsistent is never selected as a model of \(Circum(T;P^{1}\!>\!\cdots \!>\!P^{k};\!Z)\) by taking account of priorities. Hence inheriting the same property, in a special case of p_ABA such that its underlying ABA (which satisfies rationality postulates [10]) has a unique extension, p_ABA \(\mathcal {\langle L, R, A, C, \preceq \rangle }\) has a unique \(\mathcal {P}\) extension which coincides with the extension of its underlying ABA since the unique argument extension of such ABA is maximal w.r.t. \(\sqsubseteq _{ex}\) regardless of the given \(\preceq \).

As for this property, \(\check{C}\)yras and Toni claimed that a p_ABA framework cannot solve two examples (i.e. [5, Example 1], [4, Example 1]) since the given preferences don’t work in p_ABAs encoded by them whose underlying ABAs have a unique extension, and hence they proposed \(\mathrm {ABA}^+\) [5]. However in their p_ABAs, we found that they mistook hypotheses contained in [5, Example 1] for assumptions, while \(\check{C}\)yras ignored some constrains contained in another one [4, Example 1]. Hence against their claim, first we show that p_ABAs in which we expressed the respective knowledge correctly give us solutions of them without any difficulties, and the given preferences work well in the p_ABAs where the underlying ABAs have the multiple extensions. Second we present the technique to represent hypotheses in ABA as well as a method to incorporate some kind of constraints in ABA and p_ABA. Finally, and perhaps most importantly, we show a famous non-monotonic reasoning example involving the use of preferences that \(\mathrm {ABA}^+\) leads to incorrect results, while p_ABA avoids this problem.

This paper is organized as follows. Section 2 gives preliminaries. Section 3 presents how to represent hypotheses in ABA. Section 4 presents an ABA equipped with preferences and constrains. Section 5 discusses related work. Section 6 concludes this paper while showing a counterexample to \(\mathrm {ABA}^+\).

2 Preliminaries

Definition 1

(ABA). An assumption-based argumentation framework (an ABA framework, or an ABA, for short) [1, 9, 13] is a tuple \(\mathcal {\langle L, R, A, C \rangle }\), where

  • \(\mathcal { (L, R)}\) is a deductive system, with \(\mathcal { L}\) a language consisting of countably many sentences and \(\mathcal{R}\) a set of inference rules of the form \(b_0 \leftarrow b_1, \ldots , b_m (m \ge 0\)), where \(b_0\) (resp. \(b_1, \ldots , b_m\)) is called the head (resp. the body) of the rule.

  • \(\mathcal{A} \subseteq \mathcal{L}\), is a (non-empty) set, referred to as assumptions.

  • \(\mathcal{C}\) is a total mapping from \(\mathcal {A}\) into \(2^\mathcal{L}\setminus \{\emptyset \}\), where each \(c \in \mathcal{C}({\alpha })\) is a contrary of \(\alpha \in \mathcal{A}\).

We enforce that ABA frameworks are flat, namely assumptions do not occur as the heads of rules. For a special case such that each assumption has the unique contrary sentence (i.e. \(\vert \mathcal{C}({\alpha })\vert \)=1 for \(\forall \alpha \in \mathcal{A}\)), an ABA framework is usually defined as , where a total \(\mathcal {A}\) into \(\mathcal {L}\) is used.

In ABA, an argument for (the claim) \(c \in \mathcal { L}\) supported by \(K \subseteq \) \(\mathcal {A}\) (\(K \vdash c\) in short) is a (finite) tree with nodes labelled by sentences in \(\mathcal {L}\) or by \(\tau \), and attacks against arguments are directed at the assumptions in their supports as follows.

  • An argument \(K \vdash c\) attacks an assumption \(\alpha \) iff \(c\in \mathcal{C}({\alpha })\).

  • An argument \(K_1 \vdash c_1\) attacks an argument \(K_2 \vdash c_2\) iff \(c_1\in \mathcal{C}({\alpha })\) for \(\exists \alpha \in K_2\).

Corresponding to ABA \(\mathcal {F=\langle L, R, A, C\rangle }\), the abstract argumentation framework \(AF_\mathcal {F}=(AR, {attacks})\) is constructed based on arguments and attacks addressed above, and all argumentation semantics [7] can be applied to \(AF_\mathcal {F}\). For a set \(\mathcal{A}rgs\) of arguments, let \(\mathcal {A}rgs^+\!=\! \{ A \vert \) \(\mathrm {there \ exists \ an \ argument \ in} \ \mathcal {A}rgs \ \mathrm {that} \ {attacks}\ A \}\). \(\mathcal {A}rgs\) is conflict-free iff \(\mathcal {A}rgs \cap \mathcal {A}rgs^{+}=\emptyset \). \(\mathcal {A}rgs\) defends an argument A iff each argument that attacks A is attacked by an argument in \(\mathcal {A}rgs\).

Definition 2

[2, 7, 9, 13]. Let \(\mathcal {\langle L, R, A, C\rangle }\) be an ABA framework, and AR the associated set of arguments. Then \(\mathcal {A}rgs \subseteq AR\) is: admissible iff \(\mathcal {A}rgs\) is conflict-free and defends all its elements; a complete argument extension iff \(\mathcal {A}rgs\) is admissible and contains all arguments it defends; a preferred (resp. grounded) argument extension iff it is a (subset-)maximal (resp. (subset-)minimal) complete argument extension; a stable argument extension iff it is conflict-free and \(\mathcal{A}rgs \cup \mathcal{A}rgs^{+}=AR\); an ideal argument extension iff it is a (subset-)maximal complete argument extension that is contained in each preferred argument extension.

The various ABA semantics [1] is also described in terms of sets of assumptions.

  • A set of assumptions \(\mathcal {A}sms\) attacks an assumption \(\alpha \) iff \(\mathcal {A}sms\) enables the construction of an argument for the claim \(\exists c \in \mathcal{C}(\alpha )\).

  • A set of assumptions \(\mathcal{A}sms_1\) attacks a set of assumptions \(\mathcal{A}sms_2\) iff \(\mathcal{A}sms_1\) attacks some assumption \(\alpha \in \mathcal{A}sms_2\).

For a set of assumptions \(\mathcal{A}sms\), let \(\mathcal{A}sms^+=\{\alpha \in \mathcal{A} \vert \mathcal{A}sms \ \mathrm{attacks} \ \alpha \}\). \(\mathcal{A}sms\) is conflict-free iff \(\mathcal{A}sms \cap \mathcal{A}sms^+=\emptyset \). \(\mathcal{A}sms\) defends an assumption \(\alpha \) iff each set of assumptions that attacks \(\alpha \) is attacked by \(\mathcal{A}sms\). Assumption extensions are defined like argument extensions as follows.

Definition 3

[2, 9, 13]. Let \(\mathcal {\langle L, R, A, C\rangle }\) be an ABA framework. Then \(\mathcal{A}sms\) is:

admissible iff \(\mathcal {A}sms\) is conflict-free and defends all its elements; a complete assumption extension iff \(\mathcal{A}sms\) is admissible and contains all assumptions it defends; a preferred (resp. grounded) assumption extension iff it is a (subset-)maximal (resp. (subset-)minimal) complete assumption extension; a stable assumption extension iff it is is conflict-free and \(\mathcal{A}sms \cup \mathcal{A}sms^{+}=\mathcal{A}\); an ideal assumption extension iff it is a (subset-)maximal complete assumption extension that is contained in each preferred assumption extension.

Let \({Sname} \in \{{complete, preferred, grounded, stable, ideal}\}\). It is shown that there is a one-to-one correspondence between assumption extensions and argument extensions of a given ABA \(\mathcal {\langle L, R, A, C} \rangle \) under the Sname semantics as follows.

Theorem 1

[2, 22, 23]. Let \(\mathcal {\langle L, R, A, C\rangle }\) be an ABA framework, AR be the set of all arguments that can be constructed using this ABA framework, and \(\mathtt {Asms2Args}\! : \! 2^\mathcal {A} \rightarrow 2^{AR}\) and \(\mathtt {Args2Asms}\! :\! 2^{AR} \rightarrow 2^\mathcal{A}\) be functions such that,

$$\begin{aligned}&\mathtt {Asms2Args}(\mathcal {A}sms) = \{ K \vdash c \in AR \ \vert \ K \subseteq \mathcal {A}sms \}, \\&\mathtt {Args2Asms}(\mathcal {A}rgs) = \{ \alpha \in \mathcal {A} \ \vert \ \alpha \in K \ \mathrm {for \ an\ argument} \ K \vdash c \in \mathcal {A}rgs \}. \end{aligned}$$

Then if \(\mathcal {A}sms \subseteq \mathcal {A}\) is a Sname assumption extension, then \(\mathtt {Asms2Args}(\mathcal {A}sms)\) is a Sname argument extension, and if \(\mathcal {A}rgs \subseteq AR\) is a Sname argument extension, then \(\mathtt {Args2Asms}(\mathcal {A}rgs)\) is a Sname assumption extension.

Proof. In [23], proofs for \({Sname} \in \{{complete, preferred, grounded, stable}\}\) are given. For \({Sname}=ideal\), it is also easily proved like [2, 8]. \(\Box \)

For notational convenience, let claim(Ag) stand for the claim c of an argument Ag such that \(K \vdash c\), and \( \mathtt{Concs}(E)=\{ c \in \mathcal{L} \ \vert \ K \vdash c \in E \}\) for an extension E.

Definition 4

(ABA equipped with preferences [22, 23]). An assumption-based argumentation framework equipped with preferences (a p_ABA framework, or p_ABA for short) is a tuple \(\mathcal {\langle L, R, A, C, \preceq \rangle }\), where

  • \(\mathcal {\langle L, R, A, C\rangle }\) is an ABA framework,

  • \(\preceq \subseteq \mathcal {L}\times \mathcal {L} \) is a sentence ordering called a priority relation, which is a preorder, that is, reflexive and transitive. As usual, \(c' \prec c\) iff \(c' \preceq c\) and \(c \not \preceq c'\). For any sentences \(c, c' \in \mathcal {L}\), \(c' \preceq c\) (resp. \(c' \prec c\)) means that c is at least as preferred as \(c'\) (resp. c is strictly preferred to \(c'\)).

For a special case such that each assumption has the unique contrary sentence (i.e. \(\vert \mathcal{C}({\alpha })\vert \)=1 for \(\forall \alpha \in \mathcal{A}\)), a p_ABA framework may be represented as instead of \(\mathcal {\langle L, R, A, C, \preceq \rangle }\), where a total \(\mathcal {A}\) into \(\mathcal {L}\) is used instead of a total mapping \(\mathcal{C}\) from \(\mathcal {A}\) into \(2^\mathcal{L}\setminus \{\emptyset \}\) like ABA.

For p_ABA \(\mathcal {\langle L, R, A, C, \preceq \rangle }\), let \(\mathcal {F}= \mathcal {\langle L, R, A, C\rangle }\) be the associated ABA and \(AF_\mathcal {F}=(AR, {attacks})\). Then \(\le \subseteq AR \times AR\) is the argument ordering over AR constructed from \(\preceq \) as follows.

For any arguments \(Ag_1, Ag_2 \in AR\) such that \(K_1 \vdash c_1\) and \(K_2 \vdash c_2\),

$$Ag_1 \le Ag_2 \quad \mathrm {iff} \quad c_1 \preceq c_2 \qquad \mathrm {for} \ c_i\!=\!claim(Ag_i)\ (1 \le i \le 2) $$

Definition 5

(Preference relations \(\sqsubseteq _{ex}\) ). Given p_ABA \(\mathcal {\langle L, R, A, C, \preceq \rangle }\), let \(\mathcal {E}\) be the set of Sname argument extensions of the AA framework \(AF_\mathcal {F}=(AR, {attacks})\) corresponding to the ABA framework \(\mathcal {F=\langle L, R, A, C\rangle }\) under Sname semantics and \(f:2^{AR}\times 2^{AR} \rightarrow 2^{AR}\) be the function s.t. \(f(U, V)=\{X \vert \ claim(X)=claim(Y) \ \mathrm{for}\ X \in U, \ Y \in V \}\). Then \(\sqsubseteq _{ex}\) over \(\mathcal {E}\) (i.e. \(\sqsubseteq _{ex} \subseteq \mathcal {E}\times \mathcal {E}\)) is defined as follows [22, 23]. For any Sname argument extensions, \(E_{1}\), \(E_{2}\) and \(E_{3}\) from \(\mathcal {E}\),

  1. 1.

    \(E_{1}\sqsubseteq _{ex} E_{1}\),

  2. 2.

    \(E_{1}\sqsubseteq _{ex} E_{2}\) if for some argument \(Ag_2 \in E_{2}\setminus \varDelta _2\),

    1. (i)

      there is an argument \(Ag_1 \in E_{1}\setminus \varDelta _1\) s.t. \(claim(Ag_{1}) \preceq claim(Ag_{2})\) and,

    2. (ii)

      there is no argument \(Ag_{3}\in E_{1}\setminus \varDelta _1\) s.t. \(claim(Ag_{2}) \prec claim( Ag_{3})\),

      where \(\varDelta _1=f(E_1,E_2)\) and \(\varDelta _2=f(E_2,E_1)\),

  3. 3.

    if \(E_{1}\sqsubseteq _{ex} E_{2}\) and \(E_{2}\sqsubseteq _{ex} E_{3}\), then \(E_{1}\sqsubseteq _{ex} E_{3}\);

\(\sqsubseteq _{ex}\) is a preorder. We write \(E_{1}\sqsubset _{ex} E_{2}\) if \(E_{1}\sqsubseteq _{ex} E_{2}\) and \(E_{2}\not \sqsubseteq _{ex} E_{1}\) as usual.

The preference relation \(\sqsubseteq _{ex}\) can be also defined by using the argument ordering \(\le \) in a way that \(claim(Ag_1) \preceq claim(Ag_2)\) and \(claim(Ag_2) \prec claim(Ag_3)\) is replaced with \(Ag_1 \le Ag_2\) and \(Ag_2 < Ag_3\) in item no. 2 of Definition 5 [22, 23].

Let \(Sname \in \{complete, preferred, grounded, stable,ideal\}\). The semantics of p_ABA is given by Sname \(\mathcal {P}\) extensions which are the maximal ones w.r.t. \(\sqsubseteq _{ex}\) among Sname extensions as follows.

Definition 6

( \(\mathcal {P}\) -extensions [22, 23]). Given a p_ABA framework \(\mathcal {\langle L, R, A,} \mathcal {C, \preceq \rangle }\), let \(\mathcal {E}\) be the set of Sname argument extensions of \(AF_\mathcal {F}=(AR, {attacks})\) corresponding to the ABA framework \(\mathcal {\langle L, R, A, C\rangle }\) under Sname semantics. Then a Sname argument extension \(E \in \mathcal {E}\) is called a Sname \(\mathcal {P}\)-argument extension of the p_ABA framework if \(E \sqsubseteq _{ex} E'\) implies \(E' \sqsubseteq _{ex} E\) (with respect to \(\preceq \)) for any \(E' \in \mathcal {E}\). In other words, E is a Sname \(\mathcal {P}\)-argument extension of a p_ABA iff there is no Sname argument extension \(E' \in \mathcal {E}\) such that \(E \sqsubset _{ex} E'\). For a Sname \(\mathcal {P}\)-argument extension E, \(\mathtt{Args2Asms}(E)\) is called a Sname \(\mathcal {P}\)-assumption extension. Both a Sname \(\mathcal {P}\)-argument extension and a \(\mathcal {P}\)-assumption extension may be called a Sname \(\mathcal {P}\) extension for short.

3 Representing Hypotheses in ABA

In logic programming, NAF literals are used to perform non-monotonic and default reasoning, while hypotheses (i.e. abducibles, abducible facts) are used to perform abductive reasoning or hypothetical reasoning. In [14, 20], it is shown that an abductive logic program (or an abductive program) can be transformed into a logic program without abducibles, where for each abducible a, a new atom \(a'\) is introduced representing the complement of a and a new pair of rules:

$$a \leftarrow not\ a', \qquad a' \leftarrow not\ a $$

is added to the program. Such transformation for hypotheses was also used to compute abductive argumentation [21].

In ABA, hypotheses are different from assumptions as abducible literals are different from NAF literals in logic programming. Hence when hypotheses (or abducible facts) are contained in the knowledge, each one, say a, can be also expressed by a new pair of rules in ABA as follows:

$$ a \leftarrow \delta , \qquad \ a' \leftarrow \delta ' $$

where \(a'\) is a newly introduced sentence representing the complement of a, while \(\delta , \delta '\) are newly introduced assumptions such that \(\overline{\delta }=a'\), \(\overline{\delta '}=a \).

Example 1

Consider the example shown in [5, Example 1] as follows:

“Zed wants to go out and two of his friends, Alice and Bob, are available. Best, Zed would take them both, but as far as he knows, Bob does not like Alice, although she does not have anything against Bob. If Zed offers to both of them at the same time, Bob may be in the awkward position to refuse Alice’s company. Offering separately, Alice is up for all three going, while Bob insists on cutting Alice out. Zed may opt for the latter option. However, had Zed a preference between the two, - say Alice were a better friend of his - then he would go out with her.”     \(\Box \)

In what follows, a (resp. b) denotes that Alice (resp. Bob) might go out with Zed, while \(\lnot a\) (resp. \(\lnot b\)) denotes the negation of a (resp. b). Since Alice (resp. Bob) might go out with Zed or might not, a and b are not assumptions but hypotheses. Hence the situation about them is expressed by the following rules:

$$ a \leftarrow \alpha , \qquad \lnot a \leftarrow \alpha ', \qquad b \leftarrow \beta , \qquad \lnot b \leftarrow \beta ',$$

where \(\mathcal{A}=\{\alpha ,\alpha ', \beta , \beta ' \}\), \(\overline{\alpha }=\lnot a\), \(\overline{\alpha '}=a\), \(\overline{\beta }=\lnot b\) and \(\overline{\beta '}=b\). The opted option such that Bob insists on cutting Alice out is expressed by \(\lnot a \leftarrow b\). Preferences such that best, Zed would take them both, but he prefers Alice to Bob are expressed by:

$$\begin{aligned} \{\lnot a, \lnot b\} \preceq \{b\} \preceq \{a\}\preceq \{a, b\} \end{aligned}$$
(1)

According to [23, Definition 25], preferences between conjunctive knowledge shown above can be encoded in p_ABA by introducing new rules:

$$ c_1 \leftarrow a, b, \qquad \qquad \quad c_2 \leftarrow \lnot a, \lnot b, $$

along with preferences:

$$\begin{aligned} c_2 \preceq b \preceq a \preceq c_1 \qquad (a, b, c_1, c_2 \in \mathcal {L}\setminus \mathcal {A}) \end{aligned}$$
(2)

Then based on p_ABA consisting of \(\mathcal{R}\)= \(\{\lnot a \leftarrow b,\ a \leftarrow \alpha ,\ \lnot a \leftarrow \alpha ',\ b \leftarrow \beta , \ \lnot b \leftarrow \beta ', \ c_1 \leftarrow a, b,\ c_2 \leftarrow \lnot a, \lnot b\}\), \(\mathcal{A}=\{\alpha ,\alpha ', \beta , \beta ' \}\), \(\overline{\alpha }=\lnot a\), \(\overline{\alpha '}=a\), \(\overline{\beta }=\lnot b\), \(\overline{\beta '}=b\) and \(c_2 \preceq b \preceq a \preceq c_1\), arguments and attacks are constructed as follows:

\(\bullet \) \(A: \{\alpha \} \vdash a\)       \(\bullet \) \(A': \{\alpha '\} \vdash \lnot a\)    \(\bullet \) \(B: \{\beta \} \vdash b\)          \(\bullet \) \(B': \{\beta '\} \vdash \lnot b\)   

\(\bullet \) \(X: \{\beta \} \vdash \lnot a\)     \(\bullet \) \(C_1: \{\alpha ,\beta \} \vdash c_1\) \(\bullet \) \(C_2: \{\alpha ',\beta '\} \vdash c_2\)   \(\bullet \) \(\xi : \{\alpha \} \vdash \alpha \)    

\(\bullet \) \(\xi ': \{\alpha '\} \vdash \alpha '\)     \(\bullet \) \(\eta : \{\beta \} \vdash \beta \)        \(\bullet \) \(\eta ': \{\beta '\} \vdash \beta '\)

$$\begin{aligned} {attacks}=&\{(A,A'),(A,\xi '),(A,C_2), (A',A),(A',\xi ),(A',C_1),(X,A),(X,\xi ),(X,C_1),\\&\;\;(B,B'),(B,\eta '),(B,C_2), (B',B),(B',\eta ),(B',X),(B',C_1)\}. \end{aligned}$$

The underlying ABA has the preferred (resp. stable) argument extensions \(E_i\) \((1 \le i \le 3)\) as follows:

$$\begin{aligned} \begin{array}{ll} E_1=\{A', B, X, \xi ', \eta \}, \qquad &{} \text {with } \mathtt{Concs}(E_1)=\{\lnot a, b, \alpha ', \beta \},\\ E_2=\{A, B', \xi , \eta '\}, \qquad &{} \text {with } \mathtt{Concs}(E_2)=\{a, \lnot b, \alpha , \beta '\},\\ E_3=\{A', B', C_2, \xi ', \eta '\},\qquad &{} \text {with } \mathtt{Concs}(E_3)=\{\lnot a, \lnot b, c_2, \alpha ', \beta '\}. \end{array} \end{aligned}$$

Due to \(E_3 \sqsubseteq E_1 \sqsubseteq E_2\) derived from (2), \(E_2\) is the unique preferred (resp. stable) \(\mathcal {P}\)-argument extension in the p_ABA. Hence against \(\check{C}\)yras and Toni’s claim [5], \(E_2\) gives us the solution that Zed would go out with Alice and without Bob.

Remark: In [5], \(\check{C}\)yras and Toni expressed this example by p_ABA consisting of \(\mathcal {R}=\{\overline{\alpha }\leftarrow \beta \}\), \(\mathcal {A}=\{\alpha , \beta \}\), \(\beta \preceq \alpha \). Then they claimed that regarding arguments \(\mathtt{A}\) for Alice and \(\mathtt{B}\) for Bob, \(\mathtt{A}\) for Alice cannot be obtained from the extension of p_ABA encoded by them since its underlying ABA has the unique extension \(\{\mathtt{B}\}\), where \( {attacks}=\{(\mathtt{B}, \mathtt{A})\}\) and \(\mathtt{B} < \mathtt{A}\). Therefore the reason why they could not obtain the solution based on p_ABA is that they mistook the hypothetical knowledge a, b for assumptions \(\alpha \), \(\beta \); and it is not due to the property of p_ABA.

4 Assumption-Based Argumentation Equipped with Preferences and Constraints

4.1 Problematic Knowledge Representation

As addressed in introduction, \(\check{C}\)yras [4] claimed that p_ABA cannot solve the example called “Cakes” presented by him, whose scenario is shown as follows.

Example 2

(Cakes [4, Example 1]). There are three pieces of cakes on a table: a piece of Almond cake, a Brownie, and a piece of Cheesecake. You want to get as many cakes as possible, and the following are the rules of the game.

  1. 1.

    You can take cakes from the table in two ‘rounds’:

    1. (a)

      In the first round you can take at most two cakes;

    2. (b)

      In the second round you can take at most one cake.

  2. 2.

    If you take Almond cake and Cheesecake in the first round, Brownie will not be available in the second round. (Nothing is known about other possible combinations.)

  3. 3.

    Finally, very importantly, suppose that you prefer Brownie over Almond cake. (No other preferences.)

Which pair(s) of cakes would you choose in the first round?     \(\Box \)

The solution of Cakes is that “either a pair of Brownie cake and Cheesecake or a pair of Almond and Brownie cakes is chosen in the first round”.

In [4], \(\check{C}\)yras expressed the knowledge of \({ Cakes}\) in p_ABA consisting of inference rules \(\mathcal {R}\)= \(\{ \overline{\mathtt{b}}\leftarrow \mathtt{a,c}\}\), assumptions \(\mathcal {A}=\{\mathtt{a, b, c}\}\) and preference \(\mathtt{a <b}\), and claimed that p_ABA cannot obtain its solution since the given preference doesn’t work in his p_ABA whose underlying ABA has a unique extension. On the other hand, he expressed the knowledge in \({ASPIC}^+\) consisting of the strict rules \(\mathcal {R}_s=\{\mathtt{a, c\rightarrow \lnot b,}\) \(\mathtt{a,b \rightarrow \lnot c,}\) \(\mathtt{b,c \rightarrow \lnot a} \}\), premises \(\mathcal {K}_p =\{\mathtt{a, b, c}\}\) and preference \(\mathtt{a < b}\), and concluded that the \({ASPIC}^+\) cannot obtain the solution since three extensions exist under the Elitist comparison (resp. the Democratic comparison). Now recall the Prakken and Modgil’s result [17, 18] that ABA is a special case of \({ASPIC}^+\) with only strict inference rules \(\mathcal {R}_s\), premises \(\mathcal {K}_p\) [17] (or assumptions \(\mathcal {K}_a\) [18]) and no preferences. However for Cakes, there is no correspondence between his \({ASPIC}^+\) except preferences (i.e. \(\mathcal {R}_s\)) and the underlying ABA of his p_ABA (i.e. \(\mathcal {R}\)). This indicates that \(\check{C}\)yras’ knowledge representation for Cakes is problematic. Thereby for Cakes, let us construct the p_ABA from his \({ASPIC}^+\) according to Prakken and Modgil’s result. Then we obtain p_ABA , where \(\mathcal {R}=\{\lnot \mathtt{b}\leftarrow \mathtt{a,c}\), \( \lnot \mathtt{c}\leftarrow \mathtt{a,b}\), \( \lnot \mathtt{a}\leftarrow \mathtt{b,c}\}\), \(\mathcal {A}=\{\mathtt{a, b, c}\}\), \(\overline{\mathtt{a}}=\lnot \mathtt{a}\), \(\overline{\mathtt{b}}=\lnot \mathtt{b}\), \(\overline{\mathtt{c}}=\lnot \mathtt{c}\) and \(\mathtt{a} \preceq \mathtt{b}\). We can construct arguments \(\mathtt{A}\): \(\{\mathtt{a} \} \vdash \mathtt{a}\), \(\mathtt{B}\): \(\{\mathtt{b} \} \vdash \mathtt{b}\), \(\mathtt{C}\): \(\{\mathtt{c} \} \vdash \mathtt{c}\), \(\mathtt{A'}\): \(\{\mathtt{b,c} \} \vdash \lnot \mathtt{a}\), \(\mathtt{B'}\): \(\{\mathtt{a,c} \} \vdash \lnot \mathtt{b}\), \(\mathtt{C'}\): \(\{\mathtt{a,b} \} \vdash \lnot \mathtt{c}\), and obtain \( {attacks}=\{\mathtt{(C', C), (C',A'), (C',B') }\), \(\mathtt{(B',B)}\), \(\mathtt{(B',A'), (B',C'),(A', A),(A',B'),}\) \(\mathtt{(A',C')}\}\). Its associated ABA has three extensions: \(\mathtt{E}_1=\{\mathtt{C, A, B'}\}\), \(\mathtt{E}_2=\{\mathtt{B, C,}\) \(\mathtt{A'}\}\), \(\mathtt{E}_3=\{\mathtt{A, B, C'}\}\). Since \(\mathtt{E}_1 \sqsubseteq _{ex} \mathtt{E}_2\) is derived due to \(\mathtt{a \preceq b}\), both \(\mathtt{E}_2\) and \(\mathtt{E}_3\) (resp. \(\mathtt {Args2Asms}(\mathtt{E}_2)=\{ \mathtt{b,c}\}\), \(\mathtt {Args2Asms}(\mathtt{E}_3)=\{ \mathtt{a,b}\}\)) is obtained as the preferred and stable \(\mathcal {P}\)-argument extensions (resp. \(\mathcal {P}\)-assumption extensions). This means that the solution is obtained based on the p_ABA reconstructed from his \({ASPIC}^+\).

However it should be noted that the constraints no. 2 and no. 1 (b) in Cakes are not expressed in \(\mathcal {R}_s\) of his \({ASPIC}^+\), while constraints no. 1 (a) and no. 1 (b) are not expressed in \(\mathcal {R}\) of his p_ABA. In the following, we show that the solution of Cakes can be obtained from each of three different p_ABAs respectively where the knowledge of Cakes is expressed in three different ways.

4.2 Solving Cakes Example Based on the Semantics of P_ABA

p_ABA with the contrary function \(\mathcal{C}\) gives us the solution of Cakes as follows.

Example 3

(Cont. Example 2). Suppose that abc stand for a piece of Almond cake, a piece of Brownie, and a piece of Cheesecake respectively, while \(a_i\) (resp. \(b_i\), \(c_i\)) (\(1 \le i \le 2\)) stands for the solution of the problem such that Almond cake (resp. Brownie cake, Cheesecake) is taken at i-th round, where \(\mathcal {A}=\{a_1, b_1, c_1, a_2, b_2, c_2\}\). Moreover the symbol \(t\_x1\) (resp. \(t\_x2\)) denotes the operation such that \(x \in \{a, b, c\}\) is taken in the first (resp. second) round, and the symbol \(t\_xy1\) denotes the operation such that both \(x \in \{a, b, c\}\) and \(y \in \{a, b, c\}\) where \(x \ne y\) are taken in the first round according to the rules of the game. Then the cake example is modeled in p_ABA \(\mathcal{F}_\mathtt{pABA}=\mathcal {\langle L, R, A, C,\preceq \rangle }\), where

  • \(\mathcal {R}\)= \(\{ t\_ab1 \leftarrow a_1, b_1, \quad t\_bc1 \leftarrow b_1, c_1, \quad t\_ca1 \leftarrow c_1, a_1,\)    \(t\_a1 \leftarrow a_1,\)        \( t\_b1 \leftarrow b_1, \quad t\_c1 \leftarrow c_1,\)    \(t\_a2 \leftarrow a_2, \quad t\_b2 \leftarrow b_2, \quad t\_c2 \leftarrow c_2\}\)

  • \(\mathcal {A}=\{a_1, b_1, c_1, a_2, b_2, c_2\}\),

  • \(\mathcal {C}(a_1)=\{t\_a2, t\_bc1\}\),   \(\mathcal {C}(b_1)=\{t\_b2, t\_ca1\}\),   \(\mathcal {C}(c_1)=\{t\_c2, t\_ab1\}\), \(\mathcal {C}(a_2)=\{t\_a1, t\_b2, t\_c2\}\),   \(\mathcal {C}(b_2)=\{t\_b1, t\_a2, t\_c2, t\_ca1\}\),    \(\mathcal {C}(c_2)=\{t\_c1, t\_a2, t\_b2\}\) and \(a_i \preceq b_j\), \(a_i \preceq a_i\), \(b_j \preceq b_j\) (\(1 \le i,j \le 2\)).

15 arguments are constructed in \(\mathcal{F}_\mathtt{pABA}\) as follows.

\(\bullet \) \(A_1: \{a_1\} \vdash t\_a1\)       \(\bullet \) \(A_2: \{a_2\} \vdash t\_a2\)       \(\bullet \) \(B_1: \{b_1\} \vdash t\_b1\)       

\(\bullet \) \(B_2: \{b_2\} \vdash t\_b2\)       \(\bullet \) \(C_1: \{c_1\} \vdash t\_c1\)        \(\bullet \) \(C_2: \{c_2\} \vdash t\_c2\)       

\(\bullet \) \( {AB}: \{a_1, b_1\} \vdash t\_ab1\)    \(\bullet \) \( {BC}: \{b_1, c_1\} \vdash t\_bc1\)    \(\bullet \) \( {CA}: \{c_1, a_1\} \vdash t\_ca1\)

\(\bullet \) \(\alpha _1: \{a_1\} \vdash a_1\)    \(\bullet \) \(\alpha _2: \{a_2\} \vdash a_2\)    \(\bullet \) \(\beta _1: \{b_1\} \vdash b_1\)    \(\bullet \) \(\beta _2: \{b_2\} \vdash b_2\)    

\(\bullet \) \(\gamma _1: \{c_1\} \vdash c_1\)     \(\bullet \) \(\gamma _2: \{c_2\} \vdash c_2\)    

Then the associated ABA of \(\mathcal{F}_\mathtt{pABA}\) has preferred and stable extensions as follows:

      \(E_1=\{A_1, C_1, \alpha _1, \gamma _1, {CA} \} \),           with \(\mathtt{Args2Asms}(E_1)=\{ a_1, c_1\}\)

      \(E_2=\{A_2, B_1, C_1, \alpha _2, \beta _1, \gamma _1, {BC} \} \), with \(\mathtt{Args2Asms}(E_2)=\{ a_2, b_1, c_1\}\)

      \(E_3=\{A_1, B_1, C_2, \alpha _1, \beta _1, \gamma _2, {AB} \} \), with \(\mathtt{Args2Asms}(E_3)=\{a_1, b_1, c_2\}\)

Since \(E_{1}\sqsubseteq _{ex} E_{2}\) is derived due to \(\alpha _i \le \beta _j \) or \(a_i \preceq b_j\) (\(1 \le i,j \le 2\)), both \(E_2\) and \(E_3\) (resp. \(\{ a_2, b_1, c_1\}\) and \(\{a_1, b_1, c_2\}\)) are obtained as preferred and stable \(\mathcal {P}\)-argument extensions (resp. \(\mathcal {P}\)-assumption extensions) in \(\mathcal{F}_\mathtt{pABA}\). Hence \(E_2\) and \(E_3\) give us solution of Cakes that either a pair of Brownie cake and Cheesecake or a pair of Almond and Brownie cakes is chosen in the first round.

4.3 Assumption-Based Argumentation Equipped with Preferences and Constraints

In this subsection, we present a general method to express some kind of constraints in ABA as well as p_ABA . Moreover we show that the solution of Cakes is also obtained by applying the method to p_ABA.

Definition 7

(Constraints). Given an ABA framework , a rule without head of the form:

$$\leftarrow a_1, \ldots , a_m \qquad (\mathrm {or\ equivalently}\ \leftarrow \{ a_1, \ldots , a_m \})$$

is called a constraint, where \(a_i \in \mathcal{A}\ (1 \le i \le m )\).

In general, let \(b_i\! \in \! \mathcal{L}\) such that there exists an argument \(B_i \vdash b_i \) where \(B_i \ne \emptyset \). Then \(\leftarrow \! b_1, \ldots , b_m\), or equivalently \(\leftarrow \bigcup _{i=1}^m \{ b_i\}\) stands for a set of the constraints \(\leftarrow \bigcup _{i=1}^m B_i\) obtained by replacing \(\{b_i\}\) with \(B_i\! \subseteq \! \mathcal{A}\) in every possible way.

Satisfaction of constraints is defined as follows.

Definition 8

(Satisfaction).

  • A set of assumptions \(\mathcal{A}sms \subseteq \mathcal{A}\) satisfies a constraint \(\leftarrow a_1, \ldots , a_m\) iff \(\{ a_1, \ldots , a_m \} \not \subseteq \mathcal{A}sms \) holds.

  • A set of assumptions \(\mathcal{A}sms \subseteq \mathcal{A}\) satisfies a set of constraints \(\mathtt{C}\) iff \(\{ a_1, \ldots , a_m \} \not \subseteq \mathcal{A}sms \) holds for \(\forall \) \(\leftarrow a_1, \ldots , a_m \in \mathtt{C}\).

Definition 9

(ABA equipped with constraints). Given an ABA framework and a set of constraints \(\mathtt{C}\), an ABA framework \(\mathcal{F}_\mathtt{C}\) equipped with constraints is defined as

\(\mathcal{R}_\mathtt{C}=\{ \lnot a_i \leftarrow a_1, \ldots ,a_{i-1}, a_{i+1}, \ldots , a_m \vert \leftarrow a_1, \ldots , a_m \in \mathtt{C},\ \bar{a_i}=\lnot a_i, 1 \le i \le m \}.\)

Constrains defined in Definition 7 help users in expressing knowledge. And furthermore they are useful to eliminate undesirable Sname extensions in ABA just as integrity constraints are used to eliminate undesirable answer sets in answer set programming [19, 20]. (Details are omitted due to limitations of space.)

The following properties hold for \(\mathcal{F}_c\).

Theorem 2

\(\mathcal{A}sms \subseteq \mathcal{A}\) is conflict-free in if and only if \(\mathcal{A}sms\) is conflict-free in and satisfies a set of constraints \(\mathtt{C}\), namely \(\{ a_1, \ldots , a_m \} \not \subseteq \mathcal{A}sms \) for \(\forall \) \(\leftarrow a_1, \ldots , a_m \in \mathtt{C}\).

Proof

See Appendix. \(\Box \)

Theorem 3

A conflict-free set \(\mathcal{A}sms\) in satisfies a set of constraints \(\mathtt{C}\).

Proof

See Appendix.\(\Box \)

Proposition 1

In , every Sname assumption extension \(\mathcal{A}sms \subseteq \mathcal{A}\) satisfies a set of constraints \(\mathtt{C}\).

Proof

This is obviously proved based on Theorem 3. \(\Box \)

Example 4

(Cont. Example 2). Let us express the knowledge of Cakes except preferences (i.e. the game rule no. 3) in ABA. Suppose that \(a_i\) (resp. \(b_i\), \(c_i\)) (\(1 \le i \le 2\)) stands for the solution of the problem such that Almond cake (resp. Brownie cake, Cheesecake) is taken at i-th round. Let \(\mathcal {A}=\{a_1, b_1, c_1, a_2, b_2, c_2\}\) and \(\bar{a_i}=\lnot a_i\), \(\bar{b_i}=\lnot b_i\), \(\bar{c_i}=\lnot c_i\), where \( \lnot a_i\) (resp. \(\lnot b_i\), \(\lnot c_i\)) denotes the negation of \(a_i\) (resp. \(b_i\), \(c_i\)). Then

  • the game rule no. 1 (a) is expressed by four constraints as follows:

          \(\leftarrow a_1, b_1, c_1\)    \(\leftarrow a_1, a_2\)       \(\leftarrow b_1, b_2\)      \(\leftarrow c_1, c_2\)

  • The game rule no. 1 (b) is expressed by three constraints as follows:

          \(\leftarrow a_2, b_2\)       \(\leftarrow b_2, c_2\)      \(\leftarrow c_2, a_2\)

  • The game rule no. 2 is expressed by the rule as follows:

       \( \lnot b_2 \leftarrow c_1, a_1\)

Cakes except preferences is modeled in ABA , where

  • \(\mathcal {R}=\{\lnot b_2 \leftarrow c_1, a_1 \}\)

  • \(\mathcal {R}_\mathtt{C}\) = \(\{\lnot c_1 \leftarrow a_1, b_1,\quad \lnot a_1 \leftarrow b_1, c_1, \quad \lnot b_1 \leftarrow c_1, a_1,\)    \( \lnot a_2 \leftarrow a_1\),        \( \lnot a_1 \leftarrow a_2\),    \( \lnot b_2 \leftarrow b_1\),    \( \lnot b_1 \leftarrow b_2\),    \( \lnot c_2 \leftarrow c_1\),    \( \lnot c_1 \leftarrow c_2\),        \( \lnot b_2 \leftarrow a_2\),    \( \lnot a_2 \leftarrow b_2\),    \( \lnot c_2 \leftarrow b_2\), \( \lnot b_2 \leftarrow c_2\), \( \lnot a_2 \leftarrow c_2\), \( \lnot c_2 \leftarrow a_2 \}\)

  • \(\mathcal {A}=\{a_1, b_1, c_1, a_2, b_2, c_2\}\), and \(\bar{a_i}=\lnot a_i\), \(\bar{b_i}=\lnot b_i\), \(\bar{c_i}=\lnot c_i\) \((i=1, 2)\).

22 arguments are constructed in \(\mathcal{F}_\mathtt{C}\) as follows.

\(\bullet \) \(A_1: \{a_1\} \vdash \lnot a_2\)       \(\bullet \) \(A_2: \{a_2\} \vdash \lnot a_1\)       \(\bullet \) \(B_1: \{b_1\} \vdash \lnot b_2\)       

\(\bullet \) \(B_2: \{b_2\} \vdash \lnot b_1\)       \(\bullet \) \(C_1: \{c_1\} \vdash \lnot c_2\)       \(\bullet \) \(C_2: \{c_2\} \vdash \lnot c_1\)       

\(\bullet \) \( {AB}: \{a_1, b_1\} \vdash \lnot c_1\)    \(\bullet \) \( {BC}: \{b_1, c_1\} \vdash \lnot a_1\)    \(\bullet \) \( {CA}: \{c_1, a_1\} \vdash \lnot b_1\)

\(\bullet \) \(\alpha _1: \{a_1\} \vdash a_1\)    \(\bullet \) \(\alpha _2: \{a_2\} \vdash a_2\)    \(\bullet \) \(\beta _1: \{b_1\} \vdash b_1\)    \(\bullet \) \(\beta _2: \{b_2\} \vdash b_2\)    

\(\bullet \) \(\gamma _1: \{c_1\} \vdash c_1\)       \(\bullet \) \(\gamma _2: \{c_2\} \vdash c_2\)       \(\bullet \) \( {CA2}: \{c_1, a_1\} \vdash \lnot b_2\)

\(\bullet \) \(P_1: \{a_2\} \vdash \lnot b_2\)       \(\bullet \) \(P_2: \{a_2\} \vdash \lnot c_2\)       \(\bullet \) \(Q_1: \{b_2\} \vdash \lnot a_2\)

\(\bullet \) \(Q_2: \{b_2\} \vdash \lnot c_2\)       \(\bullet \) \(R_1: \{c_2\} \vdash \lnot b_2\)       \(\bullet \) \(R_2: \{c_2\} \vdash \lnot a_2\)

Thus \(\mathcal{F}_\mathtt{C}\) has three preferred and stable argument extensions \(E_i\) (resp. assumption extensions \(asms_i=\mathtt {Args2Asms}(E_i)\) satisfying constraints) \((1 \le i \le 3)\) as follows:

      \(E_1=\{A_1, C_1, \alpha _1, \gamma _1, {CA}, {CA2} \} \),               with \(asms_1= \{a_1, c_1\}\)

      \(E_2=\{A_2, B_1, C_1, \alpha _2, \beta _1, \gamma _1, {BC}, {P_1}, {P_2} \} \),   with \(asms_2=\{a_2, b_1, c_1\}\)

      \(E_3=\{A_1, B_1, C_2, \alpha _1, \beta _1, \gamma _2, {AB}, {R_1}, {R_2}\} \), with \(asms_3=\{a_1, b_1, c_2\}\)

Note that \(E_1\) (resp. \(E_2\), \(E_3\)) as well as \(asms_1\) (resp. \(asms_2\), \(asms_3\)) denote that a pair of Almond and Cheesecake cakes (resp. a pair of Brownie cake and Cheesecake, a pair of Almond and Brownie cakes) is chosen in the first round.

Definition 10

(ABA equipped with preferences and constraints). Given an ABA framework , a set of constraints \(\mathtt{C}\) and a sentence ordering \(\preceq \subseteq \mathcal {L}\times \mathcal {L} \), an ABA framework \(\mathcal{F}_\mathtt{PC}\) equipped with preferences \(\preceq \) and constraints \(\mathtt{C}\) is defined as

\(\mathcal{R}_\mathtt{C}=\{ \lnot a_i \leftarrow a_1, \ldots ,a_{i-1}, a_{i+1},\ldots , a_m \vert \leftarrow a_1, \ldots , a_m \in \mathtt{C},\ \bar{a_i}=\lnot a_i, 1 \le i \le m \}.\)

Example 5

(Cont. Example 4). By incorporating the preferences given in Cakes, i.e. \(a_i \preceq b_j\) (\(1 \le i,j \le 2\)) into the ABA \(\mathcal{F}_\mathtt{C}\) shown in Example 4, we obtain p_ABA , where has three preferred (resp. stable) argument extensions \(E_1\), \(E_2\), \(E_3\) as shown in Example 4.

Since \(E_{1}\sqsubseteq _{ex} E_{2}\) is derived due to \(\alpha _i \le \beta _j \) or \(a_i \preceq b_j\) (\(1 \le i,j \le 2\)), both \(E_2\) and \(E_3\) (resp. \(\{ a_2, b_1, c_1\}\) and \(\{a_1, b_1, c_2\}\)) are obtained as preferred and stable \(\mathcal {P}\)-argument extensions (resp. \(\mathcal {P}\)-assumption extensions) in \(\mathcal{F}_\mathtt{PC}\). Accordingly we again obtain the solution of Cakes.

4.4 Prioritized Logic Programming As Argumentation Equipped with Preferences

In [23], we showed that p_ABA can capture Sakama and Inoue’s preferred answer sets of a prioritized logic program (PLP) [19]. Hence we show that the PLP expressing the knowledge of Cakes as well as the p_ABA instantiated with the PLP enable us to obtain its solution based on the respective semantics as follows.

Example 6

(Cont. Example 2). Let \(a_i\) (resp. \(b_i\), \(c_i\)) (\(1 \le i \le 2\)) be a propositional atom which means that Almond cake (resp. Brownie cake, Cheesecake) is taken at i-th round. Then

  • The game rule no. 1 (a) is expressed by rules of a normal logic program as follows: \(b_1 \leftarrow not\ a_1, \quad c_1 \leftarrow not\ a_1,\quad c_1 \leftarrow not\ b_1, \quad a_1 \leftarrow not\ b_1, \quad a_1 \leftarrow not\ c_1,\) \( b_1 \leftarrow not\ c_1\)

  • The game rules no. 1 (b) and no. 2 are expressed by rules as follows: \(a_2 \leftarrow not\ a_1, \quad b_2 \leftarrow not\ a_1,\ not\ c_1,\)    \(c_2 \leftarrow not\ c_1\)

  • The game rule no. 3 is expressed by \(a_i \preceq b_j\) (\(1 \le i,j \le 2\)).

These lead to PLP () as follows:

\(P=\{b_1 \leftarrow not\ a_1, \ \ c_1 \leftarrow not\ a_1,\ \ c_1 \leftarrow not\ b_1, \ \ a_1 \leftarrow not\ b_1, \ \ a_1 \leftarrow not\ c_1,\)

    \( b_1 \leftarrow not\ c_1,\ \ a_2 \leftarrow not\ a_1, \ \ b_2 \leftarrow not\ a_1, not\ c_1, \ \ c_2 \leftarrow not\ c_1 \}\)

.

P has three answer sets (i.e. stable models) \(S_i\) (\(1 \le i \le 3)\) as follows:

\(S_1=\{a_1, c_1\}\),    \(S_2=\{ b_1, c_1, a_2\}\),   \(S_3=\{a_1, b_1, c_2\}. \)

\(S_1 \sqsubseteq _{as} S_2\) is derived due to [19]. Hence \(S_2\) and \(S_3\) corresponding to \(asms_2\) and \(asms_3\) in Example 5 are obtained as preferred answer sets of the PLP (P,).

On the other hand, according to [23, Corollary 2] (i.e. [22, Theorem 2]), we can construct the p_ABA instantiated with this PLP, where \(\mathcal {A}=HB_{not}=\{not\ p \ \vert \ p \in HB_P\}\) for \(HB_P=\{a_1,b_1,c_1,a_2,b_2,c_2\}\), \(\mathcal {L}_P=HB_P \cup HB_{not}\), \(\overline{not \ p}=p\) for \(p\in HB_P\) and is the reflexive and transitive closure of . Then as indicated by [23, Corollary 2], we can obtain two stable \(\mathcal {P}\)-argument extensions \(\mathtt{E}_2\) and \(\mathtt{E}_3\) of \(\mathcal {F}_\mathtt{PLP}\) with

      \(\mathtt{Concs}(\mathtt{E}_2)=\{ b_1, c_1, a_2, not \ a_1, not \ b_2, not \ c_2\}\),

      \(\mathtt{Concs}(\mathtt{E}_3)=\{a_1, b_1, c_2, not \ c_1, not \ a_2, not \ b_2\}\)

corresponding to \(S_2\) and \(S_3\). As a result, we again obtain the solution of Cakes.

5 Related Work

\(\check{C}\)yras and Toni [5] proposed an \(\mathrm {ABA}^+\) framework: , where \(\langle \mathcal {L, R,}\) is an ABA framework and \(\leqslant \) is a preorder on \(\mathcal {A}\). They newly introduced <-\( {attacks}\subseteq \mathcal {P}(\mathcal {A})\times \mathcal {P}(\mathcal {A})\) consisting of two types depending on \(\leqslant \). Its semantics is given by a <-Sname extension \(E \subseteq \mathcal {A}\) as defined by replacing the notion of attacks with <- attacks in standard ABA. Compared \(\mathrm {ABA}^+\) with p_ABA, the form of \(\mathrm {ABA}^+\) is a special case of p_ABA \(\mathcal {\langle L, R, A, C, \preceq \rangle }\) as far as its underlying ABA is flat because \(\leqslant \subseteq \mathcal {A}\times \mathcal {A} \) is a subset of is a special case of \(\mathcal {C}\) s.t. \(\vert \mathcal{C}({\alpha })\vert \)=1 for \(\forall \alpha \in \mathcal{A}\). Hence none of preferences over hypotheses (e.g. (1), (2)), preferences over goals \(\mathtt{G} \subseteq \mathcal {L}\setminus \mathcal {A}\) which are often required in decision-making and practical reasoning, and preferences on (defeasible) rules for epistemic reasoning can be expressed in \(\mathrm {ABA}^+\). In contrast, p_ABA has a mechanism to represent and reason with all of these preferences in its framework [22, 23]. Therefore p_ABA has far much more expressive power than \(\mathrm {ABA}^+\).

Prakken proposed \({ASPIC}^+\) for structured argumentation with preferences [17, 18]. Comparison between \({ASPIC}^+\) and p_ABA is discussed in detail in [23].

Dung [11, 12] proposed a new approach of structured argumentation with priorities for \({ASPIC}^+\)-type argumentation formalisms. A novel attack relation (assignment) called regular [12] (resp. normal [11]) which takes account of priorities over defeasible rules is defined without constructing argument orderings.

Coste-Marquis et al. proposed constrained argumentation frameworks [3] where constraints on admissible arguments in abstract argumentation are considered. Instead in our approach, constraints on assumptions expressed by rules without head can be treated in ABA and p_ABA as shown in Subsect. 4.3.

6 Discussion and Conclusion

\(\check{C}\)yras and Toni claimed that p_ABA cannot solve two examples (i.e. [5, Example 1], [4, Example 1]) since the given preferences do not work in their p_As whose underlying ABAs have a unique extension, and proposed \(\mathrm {ABA}^{+}\). Against their claim, it is shown in Sects. 3 and 4 that p_ABAs in which we encoded the respective knowledge give us solutions of them without any difficulties. In conclusion, they could not obtain the solutions of these examples not due to the property of p_ABA but due to their incorrect knowledge encodings in p_ABA.

In what follows, we show that the semantics of \(\mathrm {ABA}^+\) has a serious problem as to treating preferences. As addressed in Example 1, \(\check{C}\)yras and Toni presented \(\mathrm {ABA}^+\) consisting of \(\mathcal {R}=\{\overline{\alpha }\leftarrow \beta \}\), \(\mathcal {A}=\{\alpha , \beta \}\), \(\beta \leqslant \alpha \). Based on its semantics, \(\{\alpha \}\) is selected as a unique <-complete extension due to \(\beta \leqslant \alpha \) though has a unique extension \(\{\beta \}\) [5]. Now consider a real world problem as follows.

Example 7

Usually the famous legal principle: “innocent until proven guilty” is applied to the suspect under no evidence.

It is expressed by ABA \(\mathcal {F}\) consisting of \(\mathcal {R}=\{innocent\! \leftarrow \! not\ guilty\}\), \(\mathcal {A}=\{\) \(not\ innocent\), \(not\ guilty\}\), \(\overline{not\ innocent}=innocent\), \(\overline{not\ guilty}\) =guilty.

Hereupon suppose that someone prefers “not innocent” to “not guilty” (since he prefers “guilty” to “innocent”) though there is no evidence proving the suspect is guilty. Obviously under this situation, the human legal reasoning result in court is “innocent” regardless of any preference for innocence or guilt because there is no evidence of “guilty”. On the other hand, given the preference s.t. “\(not\ guilty \leqslant not\ innocent\)” along with \(\mathcal {F}\), \(\mathrm {ABA}^+\) has \(\{ not\ innocent\}\) as its unique extension, whereas p_ABA has the unique \(\mathcal {P}\)-argument extension E with \(\mathtt{Concs}(E)=\{innocent\), \(not\ guilty\}\) regardless of preferences since the underlying ABA has the unique extension E. Thus p_ABA yields “innocent”, while \(\mathrm {ABA}^+\) yields “not innocent”. Hence thanks to the property discussed in the introduction, p_ABA gives us the human legal reasoning result, i.e. “innocent, whereas \(\mathrm {ABA}^+\) cannot perform such typical non-monotonic reasoning with preferences.

In contrast, according to the correspondence between \({ASPIC}^+\) and ABA [17, 18], this \(\mathrm {ABA}^+\) can be faithfully mapped to \({ASPIC}^+\) consisting of \(\mathcal {R}_s=\{\beta \rightarrow \lnot \alpha \}\), \(\mathcal {K}_p=\{\alpha ,\beta \}\) (or \(\mathcal {K}_a=\{\alpha ,\beta \}\)), \(\overline{\alpha }=\lnot \alpha \) and \(\beta \) \(\le ^{'}\) \(\alpha \). As for the case \(\mathcal {K}_p=\{\alpha ,\beta \}\), \( {defeat}=\emptyset \) is derived. Then the mapped \({ASPIC}^+\) has a unique complete extension \(E^+\) with \(\mathtt{concs}(E^+)=\{\alpha ,\beta ,\lnot \alpha \}\), which is not directly consistent [17, 18]. Similarly this \(\mathrm {ABA}^+\) may be also mapped to Dung’s rule-based system [11, 12], say \(\mathcal {R}_{\mathrm {dung}}\), which consists of \(d_0\): \(\Rightarrow \beta \quad d_1\): \(\Rightarrow \alpha \) \(r: \beta \rightarrow \lnot \alpha \) and \(d_0 \prec d_1\). Surprisingly when we replace the symbol \(\beta \) (resp. \(\alpha \)) with a (resp. b), \(\mathcal {R}_{\mathrm {dung}}\) coincides with the rule-based system shown in [12, Example 7] in which no regular attack relation assignment exists as discussed by Dung [12].

We are the first to show prioritized logic programming as argumentation equipped with preferences (cf. Subsect. 4.4) [23] as Dung showed logic programming as argumentation [7]. Nevertheless our future work is to explore the other types of the semantics for p_ABA so that it can capture the other types of prioritized logic programming such as Brewka and Eiter’s preferred answer sets, Delgrande, Schaub and Tompits’ preferred answer sets and so on [6].