1 Introduction

Admissibility is an importance semantic property of argumentation frameworks. It lies in the heart of all semantics discussed in [8], and is shared by many more recent proposals [2]. Under Dung’s argumentation framework [8], a set of arguments satisfies admissibility if it defends all its members in the sense that for any argument A in the set, either A is un-attacked, or if attacked by some argument B, then there is an argument in the set that attacks B, and it does not contain internal attacks.

When a group of agents are confronted with the same abstract argumentation framework, and each of them chooses an extension, we may wish to aggregate such extensions into a collective one, which represents the consensus of the group. Similar question has been received attention in the last decades or so (see, e.g., [1, 4,5,6, 17]). In this paper, we address the question of in what circumstances, an aggregation rule will guarantee admissible outputs during aggregation of extensions of abstract argumentation framework. In existing work, mention that Chen and Endriss [6] have shown that no aggregation rule preserves Dung’s admissibility in general. Under their settings, all agents report extensions that are admissible, and they aggregate such extensions by making use of a set of conceptually and computationally simple aggregation rules, quota rules, which have been studied in depth in judgment aggregation [7].

The graded semantics is a new theory of justification of arguments developed by Grossi and Modgil [13], in which the degree of acceptance of arguments can be weakened or strengthened. In the graded semantics, the number of attackers and defenders are given a fine-grained assignment when deciding whether a specific argument is acceptable. The notion of admissibility is extended to mn-admissibility. Such notion has the potential to require that if a set of arguments \(\varDelta \) is admissible, then any attacker of \(A \in \varDelta \) is attacked by more than one argument in \(\varDelta \). While preserving Dung’s admissibility is difficult, there is still no good news for the preservation of graded admissibility. Using the model proposed by Chen and Endriss [6], our results show that no quota rule can guarantee admisible outcomes on graded admissble sets. Thus, preserving graded admissibility is difficult as well.

In this paper, we introduce the concept of concrete admissibility and a new model for extension aggregation. When we consider whether an argument A is acceptable with respect to a set of arguments \(\varDelta \), graded admissibility only considers the number of A’s defenders in \(\varDelta \), while in concrete admissibility, \(\varDelta \) included all defenders of A, i.e., for any attacker B of argument A, \(\varDelta \) includes all attacker of B.

For the model, we point out that in nearly all existing work on extension aggregation, there is only one single type of constraint (see, e.g., [6, 17]). Such constraint is explicitly represented or left implicit. Following the model proposed by Endriss [10] for judgment aggregation [9, 14], we introduce a model for extension aggregation that allows the constraints assumed to be satisfied by the individual agents can be different from the constraints met by the collective decision returned by the aggregation rule. Using this model, we show that the majority rule guarantees admissible outcomes on concretely admissible sets.

The paper is organized as follows. In Sect. 2, we review some of Dung’s basic concepts of the theory of abstract argumentation. Section 3 recalls the preservation results of Dung’s semantics introduced by Chen and Endriss [6]. In Sect. 4 we show that preserving new graded semantics yields similar impossibility results. In Sect. 5, we introduce concrete admissibility and a new model with integrity and feasibility constraints, and illustrates a positive result with majority rule. We conclude in Sect. 6 outlining some future research directions.

2 Abstract Argumentation

2.1 Abstract Argumentation Framework

In this section, we recall some of the basic concepts of the theory of abstract argumentation first introduced by [8]. An argumentation framework is a pair \({ AF}=\langle { Arg},\rightharpoonup \rangle \), in which \({ Arg}\) is a finite set of arguments and \(\rightharpoonup \) is a binary relation on \({ Arg}\). We say that A attacks B, if \(A\rightharpoonup B\) holds for two arguments \(A,B\in { Arg}\). For \(\varDelta \subseteq { Arg}\) and \(B\in { Arg}\), we write \(\varDelta \rightharpoonup B\) (namely \(\varDelta \) attacks B) in case \(A\rightharpoonup B\) for at least one argument \(A\in \varDelta \). For \(\varDelta \subseteq { Arg}\) and \(C\in { Arg}\) we say that \(\varDelta \) defends C in case \(\varDelta \) attacks all arguments \(B\in { Arg}\) with \(B\rightharpoonup C\). We write \(2^{ Arg}\) for the powerset of \({ Arg}\).

Given an argumentation framework \({ AF}=\langle { Arg},\rightharpoonup \rangle \), the question arises which subset \(\varDelta \) of the set of arguments \({ Arg}\) one should accept. Any such set \(\varDelta \subseteq { Arg}\) is called an extension of \({ AF}\). Different criteria have been put forward for choosing an extension. While Dung has defined several semantic, notably complete, grounded, preferred, and stable semantics [8], it is worth mentioning that conflict-freeness, being self-defending, and admissibility are fundamental properties supposed to be satisfied by extensions of semantics.

Definition 1

Let \({ AF}=\langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varDelta \subseteq { Arg}\) be a set of arguments. We adopt the following terminology:

  • \(\varDelta \) is called conflict-free if there are no arguments \(A,B\in \varDelta \) such that \(A\rightharpoonup B\).

  • \(\varDelta \) is called self-defending if \(\varDelta \subseteq \{C\mid \varDelta \ \text {defends}\ C\}\).

  • \(\varDelta \) is called admissible if it is both conflict-free and self-defending.

Thus, a set of arguments is admissible if it is conflict-free and being self-defending. In the original paper, Dung defines some other semantics, including complete, grounded, preferred, and stable semantics [8]. All of them are admissibility-based in the sense that every extension of such semantics is admissible.

2.2 Abstract Argumentation Semantics and Propositional Logic

Following the work by Besnard and Doutre [3] and Chen and Endriss [6], we represent the properties of extensions in a purely syntactic manner, using a logical language. So fix an argumentation framework \({ AF}\!=\! \langle { Arg},\rightharpoonup \rangle \), think of \({ Arg}\) as a set of propositional variables, and let \(\mathcal {L}_{ AF}\) be the corresponding propositional language. Now extensions \(\varDelta \subseteq { Arg}\) correspond to models of formulas in \(\mathcal {L}_{ AF}\):

  • \(\varDelta \models A\) for \(A\in { Arg}\) if and only if \(A\in \varDelta \)

  • \(\varDelta \models \lnot \varphi \) if and only if \(\varDelta \models \varphi \) is not the case

  • \(\varDelta \models \varphi \wedge \psi \) if and only if both \(\varDelta \models \varphi \) and \(\varDelta \models \psi \)

Given a formula \(\varphi \), we use \(\mathrm{Mod}(\varphi ) = \{\varDelta \subseteq { Arg}\mid \varDelta \models \varphi \}\) to denote the set of all models of \(\varphi \). Every formula \(\varphi \) identifies a property of extensions of \({ AF}\), namely \(\sigma =\mathrm{Mod}(\varphi )\). When using a formula \(\varphi \) to describe such a property of extensions, we usually refer to \(\varphi \) as an integrity constraint. The following simple result characterise the properties of being conflict-free and self-defending in terms of integrity constraints expressed in \(\mathcal {L}_{ AF}\).

Proposition 1

Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varDelta \subseteq { Arg}\) be an extension. Then \(\varDelta \) is conflict-free if and only if:

$$\begin{array}{rcl} \varDelta \models \mathrm{IC}_{\text { CF}}\ \;\;\; \text {where}\ \;\;\; \mathrm{IC}_{\text { CF}}\;\;= & {} \displaystyle \bigwedge _{{A,B\in { Arg}} \atop {A\rightharpoonup B}} ( \lnot A \vee \lnot B ) \end{array}$$

That is, Proposition 1 states that \(\mathrm{Mod}(\mathrm{IC}_{\text { CF}}) = \{\varDelta \subseteq { Arg}\mid \varDelta \ \text { is conflict-free}\}\).

Proposition 2

Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varDelta \subseteq { Arg}\) be an extension. Then \(\varDelta \) is self-defending if and only if:

$$\begin{array}{rcl} \varDelta \models \mathrm{IC}_{\text { SD}}\ \;\;\; \text {where}\ \;\;\; \mathrm{IC}_{\text { SD}}\;\;= & {} \displaystyle \bigwedge _{C\in { Arg}} [ C\; \rightarrow \bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} \bigvee _{{A\in { Arg}} \atop {A\rightharpoonup B}} A ] \end{array}$$

We can now use the integrity constraints defined above to construct integrity constraints for the property of admissibility:

  • \(\varDelta \) is admissible if and only if \(\varDelta \models \mathrm{IC}_{\text { AD}}\) where \(\mathrm{IC}_{\text { AD}}=\mathrm{IC}_{\text { CF}}\wedge \mathrm{IC}_{\text { SD}}\).

Example 1

Consider the argumentation framework \({ AF}= \langle \{A,B,C,D\}, \{A \rightharpoonup C, B \rightharpoonup C, C \rightharpoonup D\} \rangle \), as illustrated in Fig. 1. Then \(\mathrm{IC}_{\text { SD}} = (\lnot D \vee A \vee B) \wedge (\lnot C)\), \(\mathrm{IC}_{\text { AD}} = (\lnot D \vee A \vee B) \wedge (\lnot C) \wedge (\lnot A \vee \lnot C) \wedge (\lnot B \vee \lnot C) \wedge (\lnot C \vee \lnot D)\).

Fig. 1.
figure 1

An \({ AF}\) with four arguments

3 Preservation of the Dung’s Admissibility

3.1 Extension Aggregation

In this section, we recall a model for extension aggregation defined by Chen and Endriss [6]. Such model allows a single type of constraint. Fix an argumentation framework \({ AF}= \langle { Arg},\rightharpoonup \rangle \). Let \(U=\{1,\ldots ,u\}\) be a finite set of agents. Suppose each agent \(i\in U\) supplies us with an extension \(\varDelta _i\subseteq { Arg}\), reflecting her individual views of what constitutes an acceptable set of arguments in the context of \({ AF}\). Thus, we are supplied with a profile \({\varvec{\varDelta }} = (\varDelta _1,\ldots ,\varDelta _u)\), a vector of extensions, one for each agent. An aggregation rule is a function \(F : (2^{ Arg})^u \rightarrow 2^{ Arg}\), mapping any given profile of extensions to a single extension.

Definition 2

A quota rule \(F_q\) with quota q is the aggregation rule mapping any given profile of extensions to the extension including exactly those arguments accepted by at least q agents.

The quota rules have low computational complexity in the sense that it is straightforward to compute outputs [11]. The nomination rule is the quota rule with quota \(q = 1\). The majority rule is another example of quota rules for which its quota \(q = \lceil \frac{u+1}{2} \rceil \).

3.2 Preservation of Dung’s Admissibility

Chen and Endriss [6] have considered the problem of aggregation of alternative extensions by making use of quota rules. They exploit known encodings of argumentation semantics in propositional logic. They study the preservation of semantic properties of extensions, including conflict-freeness, self-defending, reinstating, admissibility, and I-Maximal properties. Our focus is admissibility.

Proposition 3

(Chen and Endriss, 2018). Every quota rule \(F_q\) for u agents with a quota \(q>\frac{u}{2}\) preserves admissibility for all argumentation frameworks \({ AF}\) with \(\mathrm{MaxDef}({ AF}) \leqslant 1\).

Note that \(\mathrm{MaxDef}({ AF})\) is the maximum number of attackers of an argument that itself is the source of an attack.

Theorem 1

(Chen and Endriss, 2018). No quota rule preserves admissibility for all argumentation frameworks.

Thus, no quota rule can guarantee the preservation of admissibility in general.

4 Preservation of Graded Admissibility

4.1 Graded Semantics

In this part, we present the graded semantics introduced by Grossi and Modgil [13]. The graded semantics can be seen as a generalisation of Dung’s semantics. Extensions of the graded semantics are weakened or strengthened depending on level of self-defending and conflict-freeness they meet.

An argument A is defended by a set of arguments \(\varDelta \) whenever A is attacked by some argument B, there at least one argument in \(\varDelta \) that attacks B. Grossi and Modgil generalize the notion of defense to obtain the notion of graded defense [13].

Definition 3

The defense function is defined as follows. For any \(\varDelta \subseteq { Arg}\):

$$\begin{aligned} d(\varDelta ) = \{X \in \mathrm {{ Arg}} \mid \forall Y \in { Arg}:\, \mathrm{\small {IF}}\, Y\rightharpoonup X\, \mathrm{\small {THEN}} \,\varDelta \rightharpoonup Y\} \end{aligned}$$
(1)

Definition 4

Let \({ AF}=\langle { Arg}, \rightharpoonup \rangle \) be an argumentation framework, and m and n be two positive integers \((m, n >0)\). The graded defense function for \(\varDelta \) is defined as follows. For any \(\varDelta \subseteq { Arg}\):

$$\begin{aligned} d_n^m(\varDelta )=\left\{ X\in \mathrm {{ Arg}} \text{ s.t. } | \{ Y \in \overline{X} \text{ s.t. } | \overline{Y} \cap \varDelta |< n \} | < m \right\} \end{aligned}$$
(2)

where \(\bar{X}\) denotes \(\{Y \in { Arg}\mid Y \rightharpoonup X\}\).

So, \(d^m_n(\varDelta )\) denotes the set of arguments that have at most \(m-1\) attackers that are not counter-attacked by at least n arguments in \(\varDelta \).

Example 2

Let us consider the argumentation framework depicted below.

figure a

Let \(\varDelta = \{A,D\}\), it is easy to verify that \(D \in d^1_1(\varDelta )\) but \(D \notin d^1_2(\varDelta )\).

Definition 5

A set of arguments \(\varDelta \) is said to be acceptable at grade mn(or, mn-acceptable) whenever all of its arguments are such that at most \(m-1\) of their attackers are not counter-attacked by at least n arguments in \(\varDelta \).

Definition 6

A set of arguments \(\varDelta \) is said to be mn-self-defending whenever all of its arguments are such that at most \(m-1\) of their attackers are not counter-attacked by at least n arguments in \(\varDelta \).

Definition 7

A set of arguments \(\varDelta \) is said to be at grade mn-admissible whenever \(\varDelta \) is mn-acceptable and being conflict-free.

In fact, when \(m=n=1\), we recover the standard definition of being self-defending, admissibility. It is worth mentioning that Grossi and Modgil define graded admissibility as mn-acceptability plus l-conflict-freeness (a set of arguments \(\varDelta \) is said to be l-conflict-free whenever no arguments \(A \in \varDelta \) such that A is attacked by at least l arguments in \(\varDelta \) [13]). But for the sake of simplicity, we define graded admissibility as mn-acceptability plus Dung’s notion of conflict-freeness.

4.2 Preservation Result for Graded Admissibility

In this section, we start with encoding the property of being graded self-defending in propositional logic and show a preservation result for such property. We then present a result for the property of graded admissibility. The following simple result characterises the property of being graded self-defending in terms of the integrity constraint expressed in \(\mathcal {L}_{ AF}\).

Proposition 4

Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varDelta \subseteq { Arg}\) be an extension. Then \(\varDelta \) is mn-self-defending if and only if:

$$\begin{aligned} \varDelta \models \mathrm{IC}_{\text { mnSD}}\ \;\;\; \text {where}\ \;\;\; \mathrm{IC}_{\text { mnSD}}\;\; = \displaystyle \bigwedge _{C\in { Arg}} [ C\; \rightarrow \nonumber \\ \bigvee _{\{B_1,\ldots ,B_{(|\bar{C}| -m +1)}\}\in {\left( {\begin{array}{c}|\bar{C}|\\ |\bar{C}| -m +1\end{array}}\right) }}(\bigwedge _{i=1}^{|\bar{C}| -m +1} (\bigvee _{\{A_1,\ldots ,A_n\}\in {\left( {\begin{array}{c}|B_i|\\ n\end{array}}\right) }} (\bigwedge _{j=1}^n{A_j})))] \end{aligned}$$
(3)

To get the preservation results for being graded self-defending, we need a result regarding binary aggregation with integrity constraints [12], a variant of judgment aggregation.

Lemma 1

(Grandi and Endriss, 2013). Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varphi \) be a clause in \(\mathcal {L}_{ AF}\) with \(k_1\) positive literals and \(k_2\) negative literals. Then a quota rule \(F_q\) for u agents preserves the property \(\mathrm{Mod}(\varphi )\) if and only if:

$$\begin{aligned} q\cdot (k_2-k_1) > u\cdot (k_2-1) - k_1 \end{aligned}$$
(4)

Note that a clause is a disjunction of literals, all integrity constraints can be translated into conjunctions of clauses. The following result shows that if we know the preservation result for some clauses, then we know results for the conjunction of such clauses.

Lemma 2

(Grandi and Endriss, 2013). Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework, let \(\varphi _1\) and \(\varphi _2\) be integrity constraints in \(\mathcal {L}_{ AF}\), and let F be an aggregation rule that preserves both \(\mathrm{Mod}(\varphi _1)\) and \(\mathrm{Mod}(\varphi _2)\). Then F also preserves \(\mathrm{Mod}(\varphi _1\wedge \varphi _2)\).

Thus, given a quota rule \(F_q\) and some clauses \(\varphi _1, \ldots \varphi _l\), if \(F_q\) satisfies all clause \(\varphi _i\), then it preserves \(\mathrm{Mod}(\varphi _1 \wedge \cdots \wedge \varphi _l)\).

Example 3

Given an integrity constraint \(\varphi = (\lnot A \vee \lnot B) \wedge C\). By Lemma 1, a quota rule preserves \(\lnot A \vee \lnot B\) only if \(q\cdot (2-0) > u\cdot (2-1)-0\), i.e., only if \(q> \frac{u}{2}\). A quota rule preserves C only if \(q\cdot (0-1) > u\cdot (0-1)-1\), which is always the case, thus, C is preserved by every quota rule. Thus, by Lemma 2, a quota rule preserves \(\varphi \) only if \(q> \frac{u}{2}\).

Recall that the nomination rule is the quota rule for which its quota is 1.

Proposition 5

The nomination rule preserves the property of being a mn-self-defending set.

Proof

Recall that \(\mathrm{IC}_{\text { mnSD}}\) is a conjunction of formulas of the form

$$\begin{aligned} \displaystyle C\; \rightarrow \bigvee _{\{B_1,\ldots ,B_{(|\bar{C}| -m +1)}\}\in {\left( {\begin{array}{c}|\bar{C}|\\ |\bar{C}| -m +1\end{array}}\right) }}(\bigwedge _{i=1}^{|\bar{C}| -m +1} (\bigvee _{\{A_1,\ldots ,A_n\}\in {\left( {\begin{array}{c}|B_i|\\ n\end{array}}\right) }} (\bigwedge _{j=1}^n{A_j}))) \end{aligned}$$

which can be rewritten as

$$\begin{aligned} C\; \rightarrow \bigwedge _{{{{B_1,\ldots ,B_m}\in {\left( {\begin{array}{c}|\bar{C}|\\ m\end{array}}\right) }}}} [\bigvee _{i=1}^{c_1}(A_{\pi _i(1)} \wedge \cdots \wedge A_{\pi _i(n)})_1] \vee \cdots \vee [\bigvee _{i=1}^{c_m}(A_{\pi _i(1)} \wedge \cdots \wedge A_{\pi _i(n)})_m], \end{aligned}$$
(5)

where \(c_i\) = \(\left( {\begin{array}{c}|\bar{B}_i|\\ n\end{array}}\right) \) for \(i = 1,\cdots ,m\), respectively. We take one such clause

$$\begin{aligned} C\; \rightarrow [\bigvee _{i=1}^{c_1}(A_{\pi _i(1)} \wedge \cdots \wedge A_{\pi _i(n)})] \vee \cdots \vee [\bigvee _{i=1}^{c_m}(A_{\pi _i(1)} \wedge \cdots \wedge A_{\pi _i(n)})],\end{aligned}$$
(6)

which can be rewritten as

$$\begin{aligned} C\; \rightarrow \bigwedge _{j=1}^n[\bigvee _{i=1}^{m}(A_{\pi _i(j)} \vee \cdots \vee A_{\pi _{(|\bar{B}_j| -n)}(j)})].\end{aligned}$$
(7)

We take one such clause

$$\begin{aligned} C\; \rightarrow [\bigvee _{i=1}^{m}(A_{\pi _i(j)} \vee \cdots \vee A_{\pi _{(|\bar{B}_j| -n)}(j)})].\end{aligned}$$
(8)

Its number of positive literals is \((|\bar{B}_j| -n)\cdot m \), its number of negative literals is 1. Thus, according to Lemma 1, a uniform quota rule with quota q preserves it if and only if \(q < \frac{(|\bar{B}_j| -n)\cdot m}{(|\bar{B}_j| -n)\cdot m -1}\). As \(\mathrm{IC}_{\text { mnSD}}\) is a conjunction of such clauses, therefore we need to satisfy this inequality for all relevant m, n and \(B_j\). This requirement is most demanding for largest values of n, and smallest of m and \(B_j\). However, we point out that if \(q = 1\), then \(q < \frac{(|\bar{B}_j| -n)\cdot m}{(|\bar{B}_j| -n)\cdot m -1}\) is always the case. Thus, we have the proposition.

Theorem 2

No quota rule preserves mn-admissibility for all argumentation frameworks.

Proof

Recall that standard definition of admissibility is a special case of mn-admissibility for which \(m=n=1\). By Theorem 1, we get that no quota rule preserves 11-admissibility. Thus, we have the theorem.

Thus, we obtain a similar result for mn-admissibility.

5 Preservation Results for Concrete Admissbility

5.1 Concrete Admissibility

The graded semantics provides a theory of degree of justification of arguments. Under the graded semantics, the assignment of status of arguments are defined by the numbers of attackers and defenders. Theses graded semantics provide ways of strengthening or weakening the standard Dung semantics. While grade semantics appeals to the numbers of attackers and defenders to define acceptability of arguments, it is worth mentioning that, in some scenarios, given two arguments for which the numbers of attackers and defenders of such pair of arguments are different, but they share similar features. Consider the following example.

Fig. 2.
figure 2

Two argumentation frameworks

Example 4

Let us consider two sets of arguments \(\varDelta _1 = \{C,A\}\) in \({ AF}_1\), \(\varDelta _2 = \{C, A, D, E\}\) in \(AF_2\), as illustrated in Fig. 2. The numbers of defenders of C in \({ AF}_1\) and \({ AF}_2\) are different: C has one defender in \({ AF}_1\), and C has three defenders in \({ AF}_2\). But both of them are concretely defended in the sense that for every argument A, if C is defended by A, then A is included in \(\varDelta \). Argument C has one defender in \({ AF}_1\), namely A, and A is included in \(\varDelta _1\); Argument C have three defenders in \({ AF}_2\), namely A, D, E, and they are included in \(\varDelta _2\). The similarity of C between \(AF_1\) and \(AF_2\) is not captured by Modgil and Grossi’s graded semantics.

In above example, arguments share the same degree of justification of acceptability of arguments, can have different numbers of defenders.

Take an argument \(A \in { Arg}\) and a set of arguments \(\varDelta \subseteq { Arg}\), under Dung’s admissibility, we say that \(\varDelta \) defends A if for every attack \(B \in { Arg}\) of argument A, \(\varDelta \) accepts at least one attacker of B, we say that \(\varDelta \) is admissible if \(\varDelta \) defends all its members and being conflict-free. We introduce the concept of concrete admissibility. We say that \(\varDelta \) concretely defends A if for every attacker B of arguments A, \(\varDelta \) accepts all attackers of B, i.e, \(\varDelta \) includes all defenders of A, we say that \(\varDelta \) satisfies concrete admissibility if \(\varDelta \) concretely defends all its members and \(\varDelta \) is conflict-free. Note that the requirement of concrete acceptability of arguments is a strong requirement.

We use the notion of concrete defense to define concrete admissibility.

Definition 8

Take an argument \(A\in { Arg}\) and a set of arguments \(\varDelta \subseteq { Arg}\). We say that \(\varDelta \) concretely defends A if \(\varDelta \) for every attacker B of arguments A, \(\varDelta \) accepts all attackers of B.

For example, in Fig. 2, \(\{A\}\) concretely defends C in \({ AF}_1\), \(\{A,D,E\}\) concretely defends C in \({ AF}_2\).

Definition 9

Take an argument \(A\in { Arg}\) and a set of arguments \(\varDelta \subseteq { Arg}\). We say that \(\varDelta \) is concretely admissible if \(\varDelta \) concretely defends all of its members, and \(\varDelta \) is conflict-free.

Recall that we use \(\varphi \) to refer a property of extensions, or an integrity constraint. The following simple result characterises the properties of being concrete defending in terms of the integrity constraint expressed in \(\mathcal {L}_{ AF}\).

Proposition 6

Let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework and let \(\varDelta \subseteq { Arg}\) be an extension. Then \(\varDelta \) is concrete defending if and only if:

$$\begin{array}{rcl} \varDelta \models \mathrm{IC}_{\text { CD}}\ \;\;\; \text {where}\ \;\;\; \mathrm{IC}_{\text { CD}}\;\;= & {} \displaystyle \bigwedge _{C\in { Arg}} \bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} \bigwedge _{{A\in { Arg}} \atop {A\rightharpoonup B}}[ C\; \rightarrow A ] \end{array}$$

We can now use the integrity constraint defined above to construct the integrity constraint for the property of concrete admissibility:

  • \(\varDelta \) is concretely admissible if and only if \(\varDelta \models \mathrm{IC}_{\text { CA}}\) where \(\mathrm{IC}_{\text { CA}}=\mathrm{IC}_{\text { CF}}\wedge \mathrm{IC}_{\text { CD}}\).

Example 5

Consider the argumentation framework \({ AF}= \langle \{A,B,C,D\}, \{A \rightharpoonup C, B \rightharpoonup C, C \rightharpoonup D\} \rangle \). Then \(\mathrm{IC}_{\text { SD}} = (\lnot D \vee A \vee B) \wedge (\lnot C)\), \(\mathrm{IC}_{\text { CD}} = (\lnot D \vee A) \wedge (\lnot D \vee B) \wedge (\lnot C)\). In this example, \(\{A,D\}\) and \(\{B,D\}\) are admissible, but they are not concretely admissible. \(\{A,B,D\}, \{A\}, \{B\}, \{A,B\} ,\emptyset \) are all admissible and concretely admissible sets.

figure b

5.2 Concrete Admissibility and Prime Implicates

In the section, we generalize the notion of prime implicate to our context, a clause \(\pi \in \mathcal L_{{ AF}}\) is a prime implicate of a formula \(\varGamma \in \mathcal L_{{ AF}}\) if (i) \(\varGamma \models \pi \) and (ii) for every clause \(\pi ' \in \mathcal L_{{ AF}}\) with \(\varGamma \models \pi '\) if \(\pi ' \models \pi \) then \(\pi = \pi '\) [16]. In other words, the prime implicates are the logically strongest clauses entailed by \(\varGamma \).

Recall that a clause is a disjunction of literals. A clause is simple if it has at most two literals, a clause is nonsimple if it cannot be simplified to a clause with less than three literals. A formula is simple if it logically equivalent to a conjunction of clauses with at most two literals (it is also called Krom formula). We first present three results concerning prime implicates.

Fact 3

A formula \(\varGamma \) is simple if and only if all its prime implicates are simple.

Lemma 3

(Marquis, 2000). If \(\varGamma \models \varGamma '\) is the case, then for every prime implicate \(\pi '\) of \(\varGamma '\) there exists a prime implicate \(\pi \) of \(\varGamma \) such that \(\pi \models \pi '\).

Definition 10

(Endriss, 2018). A pair of formulas \((\varGamma , \varGamma ')\) is simple, if for every nonsimple prime implicate \(\pi '\) of \(\varGamma '\) there exists a simple prime implicate \(\pi \) of \(\varGamma \) such that \(\pi \models \pi '\).

Using the results above, we are now ready to present some results concerning the relation between self-defending and concrete defending, and the relation between Dung’s admissibility and concrete admissibility.

Lemma 4

\(\mathrm{IC}_{\text { CD}}\models \mathrm{IC}_{\text { SD}}\).

Proof

Recall that \(\mathrm{IC}_{\text { SD}}\) is a conjunction of a collection of formulas of the form \(C \rightarrow \bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} \bigvee _{{A\in { Arg}} \atop {A\rightharpoonup B}}A\). We take the one indexed by \(C \in { Arg}\) and rewrite as \(\bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} (\lnot C \vee \bigvee _{{A\in { Arg}} \atop {A\rightharpoonup B}}A)\). This formula is a conjunction of a collection of clauses of the form \((\lnot C \vee \bigvee _{{A\in { Arg}} \atop {A\rightharpoonup B}}A)\). We take the one indexed by \(B \in { Arg}\) with \(B \rightharpoonup C\) and rewrite as \((\lnot C \vee A_1 \vee A_2 \vee \ldots \vee A_n)\), in which \(A_1, A_2, \ldots A_n\) defend C by attacking B. We denote it by \(\varphi '\). Obviously \(\varphi '\) is a clause of \(\mathrm{IC}_{\text { SD}}\). We are going to show that there is at least one clause \(\varphi \) of \(\mathrm{IC}_{\text { CD}}\) such that \(\varphi \models \varphi '\).

Recall that \(\mathrm{IC}_{\text { CD}}\) is a conjunction of a collection of formulas of the form \(\bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} \bigwedge _{{A\in { Arg}} \atop {A\rightharpoonup B}}[ C\; \rightarrow A ]\). Let us consider one such formulas \(\bigwedge _{{B\in { Arg}} \atop {B\rightharpoonup C}} \bigwedge _{{A\in { Arg}} \atop {A\rightharpoonup B}}[ C\; \rightarrow A ]\) which indexed by \(C \in { Arg}\). This formula is a conjunction of a collection of formulas indexed by an argument \(B \in { Arg}\) with \(B \rightharpoonup C\). Let us consider one formula \(\bigwedge _{{A\in { Arg}} \atop {A\rightharpoonup B}}[ C\; \rightarrow A ]\) which indexed by \(B \in { Arg}\) with \(B \rightharpoonup C\). This formula can be rewritten as \((\lnot C \vee A_1) \wedge (\lnot C \vee A_2)\wedge \ldots \wedge (\lnot C \vee A_n)\) in which \(A_1, A_2, \ldots A_n\) defend C by attacking B as well. We denote it by \(\varphi _1 \wedge \varphi _2 \wedge \ldots \wedge \varphi _n\). Since \(A_1, A_2, \ldots A_n\) defending C by attacking B, we know that \((\lnot C \vee A_i) \models (\lnot C \vee A_1 \vee A_2 \vee \ldots \vee A_n)\) for \(i \in \{1,2,\ldots ,n\}\). Thus, \(\varphi _i \models \varphi '\) for \(i \in \{1,2,\ldots ,n\}\).

Using the same construction, we can show that for every clause \(\varphi '\) of \(\mathrm{IC}_{\text { SD}}\), there is at least one clause \(\varphi \) of \(\mathrm{IC}_{\text { CD}}\) such that \(\varphi \models \varphi '\). Thus, \(\mathrm{IC}_{\text { CD}} \models \mathrm{IC}_{\text { SD}}\).

Proposition 7

\((\mathrm{IC}_{\text { CD}},\mathrm{IC}_{\text { SD}})\) is simple.

Proof

From Lemma 4, we know that \(\mathrm{IC}_{\text { CD}} \models \mathrm{IC}_{\text { SD}}\). With Lemma 3, we know that for every prime implicate \(\pi '\) of \(\mathrm{IC}_{\text { SD}}\) there exists a prime implicate \(\pi \) of \(\mathrm{IC}_{\text { CD}}\) such that \(\pi \models \pi '\). Obviously \(\mathrm{IC}_{\text { CD}}\) is a conjunction of clauses with at most two literals. Thus, it is simple. By Fact 3, we have that every prime implicate of \(\mathrm{IC}_{\text { CD}}\) is simple.

Putting together the above facts we are able to conclude that for every (simple and nonsimple) prime implicate \(\pi '\) of \(\mathrm{IC}_{\text { SD}}\) there exists a simple prime implicate \(\pi \) of \(\mathrm{IC}_{\text { CD}}\) such that \(\pi \models \pi '\), and we are done.

Lemma 5

\(\mathrm{IC}_{\text { CA}}\models \mathrm{IC}_{\text { AD}}\).

Proof

Recall that \(\mathrm{IC}_{\text { CA}} = \mathrm{IC}_{\text { CD}} \wedge \mathrm{IC}_{\text { CF}}\), \(\mathrm{IC}_{\text { AD}}=\mathrm{IC}_{\text { SD}} \wedge \mathrm{IC}_{\text { CF}}\). By Lemma 4, we get that \(\mathrm{IC}_{\text { CD}} \models \mathrm{IC}_{\text { SD}}\). Thus, we have \(\mathrm{IC}_{\text { CA}}\models \mathrm{IC}_{\text { AD}}\).

Proposition 8

\((\mathrm{IC}_{\text { CA}},\mathrm{IC}_{\text { AD}})\) is simple.

Proof

Putting Lemma 5 and Lemma 3 together we get that for every prime implicate \(\pi '\) of \(\mathrm{IC}_{\text { AD}}\) there exists a prime implicate \(\pi \) of \(\mathrm{IC}_{\text { CA}}\) such that \(\pi \models \pi '\). Since \(\mathrm{IC}_{\text { CF}}\) is a conjunction of clauses with at most two literals, we know that \(\mathrm{IC}_{\text { CA}}\) is a conjunction of clauses with at most two literals as well, i.e., \(\mathrm{IC}_{\text { CA}}\) is simple. Thus, with Fact 3 we get that every (simple and nonsimple) prime implicate \(\pi '\) of \(\mathrm{IC}_{\text { AD}}\) there exists a simple prime implicate \(\pi \) of \(\mathrm{IC}_{\text { CA}}\) such that \(\pi \models \pi '\). We are done.

5.3 A Model with Rationality and Feasibility Constraints

In nearly all existing work on judgment aggregation [12, 15] as well as some work on extension aggregation [6], only a single type of constraint, namely the integrity constraint is considered. Integrity constraints decide what is permissible for both the input and the output. As we have shown in Sects. 3 and 4, Dung’s admissibility and graded admissibility fail to be preserved under the model that allows for integrity constraints only. In this section, we propose a new model that allows for a distinction between rationality constraints and feasibility constraints. Let us illustrate the model with an example, adapted from [10]:

Example 6

A university council with 5 members needs to decide on the funding for three projects: (\(\varphi _1\)): refurbishing the university stadium, (\(\varphi _2\)): organising an international conference, (\(\varphi _3\)): building a new student dormitory. The budget is limited and it is not feasible to fund all three projects. However, the councilors are not required to keep this constraint in mind when casting their votes on the projects. Instead, they assumed to please at least one of the issues, i.e., it would be irrational for a councilor not to recommend any of the projects for funding. Suppose their votes are as follows:

Thus, every council’s vote meets the rationality constraint. However, the outcome of the majority rule violates the feasibility constraint (Table 1).

Table 1. Scenario used in Example 6

We reuse terminologies introduced in Sect. 3: let \({ AF}= \langle { Arg},\rightharpoonup \rangle \) be an argumentation framework, let U be a finite set of agents. Suppose that every agent provides an extension \(\varDelta _i\), which gives rise to a profile of extensions \({\varvec{\varDelta }}= \{\varDelta _1,\ldots ,\varDelta _u\}\). A profile is \(\varGamma \)-rational if \(\varDelta _i \models \varGamma \) for all \(i \in U\). Thus, we use \(\varGamma \) to define the permissible profiles of extensions, which is called a rationality constraint. An outcome is \(\varGamma '\)-feasible if the outcome satisfies such constraint. We call \(\varGamma '\) a feasibility constraint, which defines the acceptable outcomes.

Definition 11

An aggregation rule \(F : (2^{ Arg})^u \rightarrow 2^{ Arg}\) is said to guarantee \(\varGamma '\)-feasible on \(\varGamma \)-rational profiles if for every profile \({\varvec{\varDelta }} \in \mathrm{Mod}(\varGamma )^u\) it is the case that \(F({\varvec{\varDelta }}) \in \mathrm{Mod}(\varGamma ')\).

Thus, we say F guarantees \(\varGamma '\)-feasible outcomes on \(\varGamma \)-rational profiles if for any profile \({\varvec{\varDelta }}\) for which \(\varDelta _i \models \varGamma \) for all \(i \in U\) is the case, we have \(\varDelta \models \varGamma '\).

5.4 Preservation Results for Concrete Admissibility

In this section, we are ready to present a positive result for obtaining an admissible set on concretely admissible sets with rationality and feasibility constraints. Before going any further, we show a result from Endriss [10], which is needed to prove our main results.

Theorem 4

(Endriss, 2018). The majority rule guarantees \(\varGamma '\)-feasible outcomes on \(\varGamma \)-rational profiles if and only if \(\varGamma \models \varGamma '\) and \((\varGamma , \varGamma ')\) is simple.

Theorem 5

The majority rule guarantees \(\mathrm{IC}_{\text { SD}}\)-feasible outcomes on \(\mathrm{IC}_{\text { CD}}\)-rational profiles.

Proof

This theorem is a consequence of Lemma 4, Proposition 7, and Theorem 4.

In [6], we have shown that no uniform quota rule preserves admissibility for all argumentation frameworks. In contrast to this, we have a relatively positive result when the profiles we are considering are strengthened to concrete admissibility.

Theorem 6

The majority rule guarantees admissible outcomes on concretely admissible profiles.

Proof

This theorem is a consequence of Lemma 5, Proposition 8, and Theorem 4.

6 Conclusion

In this paper, we have explored the possibility of obtaining an admissible set of arguments during the aggregation of extensions of an abstract argumentation framework. We have introduced the concrete admissibility, which allows for strong assignments of status to arguments. To achieve this, we have proposed a model that allows for a clear distinction between integrity and feasibility constraints, which is supposed to be satisfied by individual decisions and collective decisions, respectively. We have shown the majority rule, a fair rule that is appealing on normative grounds, guarantees admissible sets on concrete admissible sets. In this paper, only admissibility is considered. Even though admissibility is a fundamental property of extension of argumentation framework, other properties are of particular interest as well. Thus, it is interesting to formulate variants for other semantics based on concrete admissibility, such as completeness, preferredness, stability, and consider the preservation of such semantic properties by making use of our new model. It would be natural to investigate whether it is possible to obtain positive results for such semantic properties using our new model.