<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Embedding Defeasible Logic Programs into Generalized Logic Programs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Baláž</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jozef Frtús</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Homola</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ján Šefránek</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giorgos Flouris</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Comenius Unversity in Bratislava</institution>
          ,
          <country country="SK">Slovakia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>FORTH-ICS</institution>
          ,
          <country country="GR">Greece</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>A novel argumentation semantics of defeasible logic programs (DeLP) is presented. Our goal is to build a semantics, which respects existing semantics and intuitions of “classical” logic programming. Generalized logic programs (GLP) are selected as an appropriate formalism for studying both undermining and rebutting. Our argumentation semantics is based on a notion of conflict resolution strategy (CRS), in order to achieve an extended flexibility and generality. Our argumentation semantics is defined in the frame of assumption-based framework (ABF), which enables a unified view on different non-monotonic formalisms. We present an embedding of DeLP into an instance of ABF. Consequently, argumentation semantics defined for ABF are applicable to DeLP. Finally, DeLP with CRS is embedded into GLP. This transformation enables to commute argumentation semantics of a DeLP via semantics of the corresponding GLP.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Defeasible Logic Programs (DeLPs) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] combine ideas from Defeasible Logic
[
        <xref ref-type="bibr" rid="ref12 ref13">13,12</xref>
        ] and Logic Programming. While classically, logic programs (LPs) feature
default negation, which enables to express default assumptions (i.e., propositions
which are supposed to hold unless we have some hard evidence against them),
DeLPs additionally introduce defeasible rules (i.e., rules which are supposedly
applicable unless we have some hard evidence opposing them). Strict rules (i.e.,
regular LP rules) are denoted by ! and defeasible rules by ). Let us illustrate
this with an example.
      </p>
      <p>Example 1. Brazil is the home team, and has a key player injured. Home teams
tend to work the hardest, and who works the hardest usually wins. The team
who has a key player injured does not usually win. The program is formalized
into the DeLP:
! home
r1 : home ) works_hard
r2 : works_hard ) wins
! key _player _injured</p>
      <p>r3 : key _player _injured ) not wins</p>
      <p>In the program from Example 1 there are two strict and three defeasible
rules. The strict rules are facts, hence home and key _player _injured should
always be true. Based on the first fact we are able to derive that Brazil should
win, using the two defeasible rules r1 and r2, while based on the second fact we
are able to derive that Brazil should not win, again relying on a defeasible rule,
in this case r3. Hence there is a conflict which somehow should be resolved.</p>
      <p>Various approaches to DeLP typically rely on argumentation theory in
order to determine which rules should be upheld and which should be defeated.
However, as it can be perceived from Example 1, it is not always immediately
apparent how this should be decided.</p>
      <p>
        According to García and Simari [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], both rules immediately causing the
conflict (r2 and r3) would be undecided, accepting home, key _player _injured and
works_hard as valid derivations while taking both wins and not wins as
undecided. ASPIC+ [
        <xref ref-type="bibr" rid="ref11 ref14">14,11</xref>
        ], on the other hand, allows two additional solutions,
one with r2 undefeated, r3 defeated, and wins valid; and the other one with r2
defeated, r3 undefeated, and not wins valid.
      </p>
      <p>Some approaches, like ASPIC+, allow to specify a preference relation on
rules. In such a case conflict resolution may take this into account. Specifically,
ASPIC+ has two built-in conflict resolution strategies, weakest-link principle by
which the rule with smallest preference is defeated among those involved in each
conflict, and last-link principle by which only the rules immediately causing the
conflict are considered and the least preferred is defeated.</p>
      <p>We observe that more ways to resolve conflicts may be needed. This is due to
the fact that defeasible rules are domain specific, a different conflict resolution
strategy may be needed for a different domain, or in distinct application. We
therefore argue that the conflict resolution strategy should be a user-specified
parameter of the framework, and any DeLP framework should allow a generic
way how to specify it (alongside some predefined strategies).</p>
      <p>
        Some of the semantics proposed for DeLP satisfy the well accepted rationality
properties for defeasible reasoning, such as consistency (extensions should be
conflict-free) and closure (extensions should be closed w.r.t. the strict rules),
as defined by Caminada and Amgoud [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. While these properties are important,
DeLP is an extension of LP, and some attention should be also devoted to keeping
it in line with it. Specifically, we would like to have the semantics
backwardcompatible with the underlying language of logic programs – if no defeasible
rules are present, the extensions should be in line with the respective class of
models.
      </p>
      <p>
        In our previous work [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] we have formalized the notion of conflict resolution
strategy (CRS) and we have proposed a DeLP framework which allows to use
any such strategy. The relationship with the underlying class of LPs was not
investigated though. In the current paper we extend this work as follows:
– We rebuild the argumentation semantics (including the notion of conflict
resolution strategy) using the Assumption Based Framework (ABF), an
argumentation formalism very close in spirit to logic programming.
– We show that the semantics satisfies the closure and consistency properties
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and we also show two additional properties which govern the handling
of defeasible rules.
– We provide an alternative transformational semantics, which translates the
DeLP and the given CRS into a regular logic program. We show that both
semantics are equivalent. Thanks to the transformational semantics we also
show full backward compatibility with the underlying class of generalized
logic programs. What is more, the semantics of DeLP can now be computed
using existing LP solvers.
      </p>
      <p>All proofs can be found in a technical report which appears at http://
kedrigern.dcs.fmph.uniba.sk/reports/download.php?id=58.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>Generalized logic programs and assumption-based frameworks provide a
background for our investigation. We are aiming at a computation of our
argumentation semantics of DeLP in the frame of classical logic programs. Generalized logic
programs (with default negations in the heads of rules) are selected as a simplest
LP-formalism, which enables to consider both undermining and rebutting.</p>
      <p>Assumption-based frameworks are used in our paper as a basis for building a
semantics of DeLP. ABF is a general and powerful formalism providing a unified
view on different non-monotonic formalisms using argumentation semantics.
2.1</p>
      <sec id="sec-2-1">
        <title>Generalized Logic Programs</title>
        <p>We will consider propositional generalized logic programs (GLPs) in this paper.</p>
        <p>Let At be a set of atoms and not At = fnot A j A 2 At g be a set of default
literals. A literal is an atom or a default literal. The set of all literals is denoted
by LAt . If L = not A and A 2 At , then by not L we denote A. If S LAt , then
not S = fnot A j A 2 S g.</p>
        <p>A rule over LAt is an expression r of the form L1; : : : ; Ln ! L0 where 0 n
and Li 2 LAt for each 0 i n. The literal head (r ) = L0 is called the head of
r and the set of literals body (r ) = fL1; : : : ; Lng is called the body of r .</p>
        <p>A generalized logic program is a finite set of rules. We will often use only the
term program. If At is the set of all atoms used in a program P, it is said that
P is over At . If heads of all rules of a program P are atoms, it is said that P is
normal. A program P is called positive if the head of every rule is an atom and
the body of every rule is a set of atoms or propositional constants t; u; f .</p>
        <p>Note that a GLP P can be viewed as consisting of two parts, a normal logic
program P+ = fr 2 P j head (r ) 2 At g (also called the positive part of P) and
a set of “constraints” P = P n P+ (also called the negative part of P).</p>
        <p>
          Our definitions of some basic semantic notions follow the ideas of
Przymusinski [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] (see also [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]); however, an adaptation to the case of rules with default
negations in head is needed. In our approach we will use the positive part P + of
the program as a generator of a broad set of candidate models and consecutively
we will use the negative part P to filter out some of the models.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Definition 1 (Partial and Total Interpretation). A set of literals S is con</title>
        <p>sistent, if it does not contain a pair A; not A where A 2 At . A partial
interpretation is a consistent set of literals. A total interpretation is a partial interpretation</p>
        <sec id="sec-2-2-1">
          <title>I such that for every A 2 At either A 2 I or not A 2 I .</title>
          <p>Each interpretation can be viewed as a mapping I : At 7! f0; 21 ; 1g where
I (A) = 0 if not A 2 I , I (A) = 12 if A 62 I and not A 62 I , and I (A) = 1 if A 2 I .
A valuation given by an interpretation I is a mapping ^I : LAt 7! f0; 12 ; 1g where
^I(A) = I (A) and ^I(not A) = 1 I (A) for each atom A 2 At , and ^I(t) = 1,
^I(u) = 12 , ^I(f ) = 0. An interpretation I satisfies a rule r (denoted I j= r ) iff
^I(head (r )) ^I(body (r )) = minf^I(L) j L 2 body (r )g.</p>
          <p>Definition 2 (Model). An interpretation I is a model of a generalized logic
program P iff I satisfies each rule in P.</p>
          <p>As usual in logic programming, “classical” model, as defined above, are too
broad and a number of more fine-grained semantics, based on certain notion
of minimality are used. We proceed by defining these semantics summarily for
GLPs. Not all of them were thoroughly investigated in literature, however we use
analogy with other classes of logic programs, especially normal logic programs.</p>
          <p>The notions of truth ordering and knowledge ordering on partial
interpretations will be needed. For a partial interpretation I , let T (I ) = fA 2 At j I (A) =
1g and F (I ) = fA 2 At j I (A) = 0g.</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>Definition 3 (Truth and Knowledge Ordering). If I ; J are partial inter</title>
        <p>pretations, then
– I
– I
t J iff T (I )
k J iff T (I )</p>
        <p>T (J ) and F (I )
T (J ) and F (I )</p>
        <p>F (J ),
F (J ).</p>
        <p>Definition 4 (Program Reduct). Let I be an interpretation. The reduct of
a normal logic program P is a positive logic program PI obtained from P by
replacing in every rule of P all default literals which are true (resp. unknown,
resp. false) in I by propositional constant t (resp. u, resp. f ).</p>
        <p>Finally a fixed-point condition is expressed on a reduced program, which is
formally captured by the operator P .</p>
        <sec id="sec-2-3-1">
          <title>Definition 5 (Operator P ). Let P be a normal logic program and I be an</title>
          <p>interpretation. By P (I ) we denote the t-least model of PI .</p>
          <p>Definition 6 (Semantics Family for GLPs). Let P be a generalized logic
program and I be a model of P. Then
– I is a partial stable model of P iff P+ (I ) = I
– I is a well-founded model of P iff I is a k-minimal partial stable model of P
– I is a maximal stable model of P iff I is a k-maximal partial stable model
of P
– I is a least-undefined stable model of P iff I is a partial stable model of P
with subset-minimal fA 2 At j I (A) = 12 g
– I is a total stable model of P iff I is a partial stable model of P which is
total</p>
          <p>The produced semantics properly generalize existing semantics for normal
logic programs.</p>
          <p>
            Proposition 1. If P is a normal logic program, the notion of partial stable
model in Definition 6 coincides with the definition of partial stable models in [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ],
the notion of total stable model in Definition 6 coincides with the definition of
stable models in [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], the notion of well-founded model in Definition 6 coincides
with the definition of well-founded model in [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ], and the notions of maximal
and least-undefined stable model in Definition 6 coincides with the definition of
maximal and least-undefined stable models in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-3-2">
          <title>If P is a generalized logic program, the definition of stable models in Defini</title>
          <p>
            tion 6 coincides with the definition of stable models in [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ].
2.2
          </p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Assumption-based Framework</title>
        <p>
          Assumption-based frameworks (ABF) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] enable to view non-monotonic
reasoning as a deduction from assumptions. Argumentation semantics of [
          <xref ref-type="bibr" rid="ref5 ref7">7,5</xref>
          ] were
applied to sets of assumptions. As a consequence, a variety of semantic
characterizations of non-monotonic reasoning has been provided.
        </p>
        <p>An ABF is constructed over a deductive system. A deductive system is a pair
(L; R) where L is a language and R is a set of inference rules over L. A language
is a set L of all well-formed sentences. Each inference rule r over L is of the
form '1; : : : ; 'n ! '0 where 0 n and 'i 2 L for each 0 i n. The
sentence head (r ) = '0 is called the head of r and the set of sentences body (r ) =
f'1; : : : ; 'ng is called the body of r .</p>
        <p>A theory is a set S L of sentences. A sentence ' is an immediate
consequence of a theory S iff there exists an inference rule r 2 R with head (r ) = '
and body (r ) S . A sentence ' is a consequence of a theory S iff there is a
sequence '1; : : : ; 'n, 0 &lt; n, of sentences such that ' = 'n and for each 0 &lt; i n
holds 'i 2 S or 'i is an immediate consequence of f'1; : : : ; 'i 1g. By CnR(S )
we denote the set of all consequences of S .</p>
        <p>An assumption-based framework is a tuple F = (L; R; A; ) where (L; R) is
a deductive system, A L is a set of assumptions, and : A 7! L is a mapping
called contrariness function. We say that is the contrary of an assumption .</p>
        <p>A context is a set A of assumptions. We say that is conflict-free
iff f ; g * CnR( ) for each assumption . A context is closed iff =
CnR( ) \ A, i.e., only such assumptions, which are members of , are derivable
from . A context attacks an assumption iff 2 CnR( ). A context
defends an assumption iff each closed context attacking contains an
assumption attacked by .</p>
        <p>ABFs enable to apply argumentation semantics to sets of assumptions and,
consequently, subtle and rich semantic characterizations of sets of assumptions
(and of their consequences) can be specified. A closed context is
– attack-free iff does not attack an assumption in ;
– admissible iff is attack-free and defends each assumption in ;
– complete iff is admissible and contains all assumptions defended by ;
– grounded iff is a subset-minimal complete context;
– preferred iff is a subset-maximal admissible context;
– semi-stable iff is a complete context such that [ f 2 A j attacks g
is subset-maximal;
– stable iff is attack-free and attacks each assumption which does not belong
to .
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Defeasible Logic Programs</title>
      <p>
        Our knowledge can be divided according to its epistemological status into two
categories: on the one hand, one that is gained by deductively valid reasoning
and on the other hand, knowledge that is reached by defeasible reasoning [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Defeasible logic programs (DeLPs) [
        <xref ref-type="bibr" rid="ref11 ref14 ref15 ref8">15,8,14,11</xref>
        ] consider two kinds of rules: strict
and defeasible. Strict rules represent deductive reasoning: whenever their
preconditions hold, we accept the conclusion. Defeasible rules formalize tentative
knowledge that can be defeated and validity of preconditions of a defeasible rule
does not necessarily imply the conclusion. Given a set of literals LAt , a strict
(resp. defeasible) rule is an expression L1; : : : ; Ln ! L0 (resp. L1; : : : ; Ln ) L0)
where 0 n and Li 2 LAt for each 0 i n. We will use to denote
either a strict or a defeasible rule. Each defeasible rule r has assigned its name
name(r ). The name of r is a default literal from separate language LN . The
intuitive meaning of name(r ) = not A is “by default, the defeasible rule r can
be used”, and consequently, the intuitive meaning of not name(r ) = A is “the
defeasible rule r can not be used”. In the following, we will denote the defeasible
rule r = L1; : : : ; Ln ) L0 with name(r ) = not A as A : L1; : : : ; Ln ) L0.
Definition 7 (Defeasible Logic Program). Let At be a set of atoms, N be
a set of names, and At \ N = ;. A defeasible logic program is a tuple P =
(S; D; name) where S is a set of strict rules over LAt , D is a set of defeasible
rules over LAt , and name : D 7! not N is an injective naming function.
3.1
      </p>
      <sec id="sec-3-1">
        <title>From Arguments to Conflict Resolutions</title>
        <p>
          The argumentation process usually consists of five steps [
          <xref ref-type="bibr" rid="ref11 ref14 ref15 ref16 ref8">15,16,8,14,11</xref>
          ]. At the
beginning, a knowledge base is described in some logical language. The notion of
an argument is then defined within this language. Then conflicts between
arguments are identified. The resolution of conflicts is captured by an attack relation
(also called “defeat relation” in some literature) among conflicting arguments.
The status of an argument is then determined by the attack relation. In this
paper, conflicts are not resolved by attacking some of the conflicting arguments,
but by attacking some of the weak parts of an argument called vulnerabilities.
This helps us to satisfy argumentation rationality postulates [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] and to keep the
semantics aligned with LP intuitions.
        </p>
        <p>Two kinds of arguments can usually be constructed in the language of
defeasible logic programs. Default arguments correspond to default literals. Deductive
arguments are constructed by chaining of rules.</p>
        <p>We define several functions prems, rules and vuls denoting premises (i.e.
default literals) and rules occurring in an argument. Intended meaning of vuls(A) is
a set of vulnerabilities of an argument A (i.e., weak parts which can be defeated)
consisting of premises and names of defeasible rules of an argument A.
Definition 8 (Argument). Let P = (S; D; name) be a defeasible logic
program. An argument A for a literal L is
1. a default argument L where L is a default literal.</p>
        <p>prems(A) = fLg
rules(A) = ;
2. a deductive argument [A1; : : : ; An L] where 0
an argument for a literal Li, and r = L1; : : : ; Ln
n, each Ai, 0 &lt; i</p>
        <sec id="sec-3-1-1">
          <title>L is a rule in P.</title>
          <p>n, is
prems(A) = prems(A1) [
rules(A) = rules(A1) [
[ prems(An)
[ rules(An) [ fr g
For both kinds of an argument A,</p>
          <p>vuls(A) = prems(A) [ name(rules(A) \ D)
Example 2. Consider a defeasible logic program consisting of the only
defeasible rule r : not b ) a. Two default arguments A1 = [not a], A2 = [not b] and
one deductive argument A3 = [A2 ) a] can be constructed. We can see that
vuls(A1) = fnot ag, vuls(A2) = fnot bg, vuls(A3) = fnot b; not r g.</p>
          <p>
            The difference between a default and a deductive argument for a literal not A
is in the policy of how the conflict is resolved. Syntactical conflict between
arguments is formalized in the following definition. As usual in the literature [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ],
we distinguish two kinds of conflicts: undermining 3 and rebutting. While an
undermining conflict is about a falsification of a hypothesis (assumed by default),
a rebutting conflict identifies a situation where opposite claims are derived.
Definition 9 (Conflict). Let P be a defeasible logic program. The pair of
arguments C = (A; B ) is called a conflict iff
– A is a deductive argument for a default literal not L and B is a deductive
argument for the literal L; or
3 Also called undercutting in [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ].
– A is a default argument for a default literal not L and B is a deductive
argument for the literal L.
          </p>
          <p>The first kind is called a rebutting conflict and the second kind is called an
undermining conflict.</p>
          <p>
            The previous definition just identifies the conflict, but does not say how to
resolve it; the notion of conflict resolution (to be formalized below) captures a
possible way to do so. In our paper, conflicts are not resolved through attack
between arguments as in [
            <xref ref-type="bibr" rid="ref11 ref14 ref15 ref8">8,15,14,11</xref>
            ], but by attacking some of the vulnerabilities
in the conflicting arguments. Since our goal is to define semantics for DeLP
respecting existing semantics and intuitions in LP, we assume that all undermining
conflicts are resolved in a fixed way as in LP: by attacking the default argument.
On the other hand, rebutting conflict is resolved by attacking some defeasible
rule. Since, in general, there can be more reasonable ways how to choose which
defeasible rules to attack, resolving of all rebutting conflicts is left as domain
dependent for the user as an input. Note, that an attack on a defeasible rule r
is formalized as an attack on the default literal name(r ) which is interpreted as
“a defeasible rule r can be used”.
          </p>
          <p>Definition 10 (Conflict Resolution). Let P be a defeasible logic program. A
conflict resolution is a tuple = (A; B ; V ) where C = (A; B ) is a conflict, A is
an argument for not L, and V is a default literal
– not L if C is an undermining conflict; or
– name(r ) where r is a defeasible rule in rules(A)[rules(B ) if C is a rebutting
conflict.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>A conflict resolution strategy of P is a set R of conflict resolutions.</title>
          <p>Let = (A; B ; V ) be a conflict resolution. The contrary of V is called the
resolution of , and denoted by res( ). The set of vulnerabilities of , denoted
by vuls( ), is defined as:
vuls( ) =
(vuls(A) [ vuls(B )) whenever V 2 vuls(A) \ vuls(B )
(vuls(A) [ vuls(B )) n fV g otherwise</p>
          <p>Usually, there may be more ways how to resolve a conflict and a conflict
resolution may resolve other conflicts as well, thus causing other conflict
resolutions to be irrelevant or inapplicable. Intuitively, if all vulnerabilities in vuls( )
are undefeated (i.e. true), then in order to resolve the conflict in , the contrary
res( ) of the chosen vulnerability in should be concluded (i.e. true). Notions
of vuls( ) and res( ) will be used for definition of the argumentation semantics
in the next subsection.</p>
          <p>Example 3. Consider the defeasible logic program P = fnot a ! ag and
undercutting arguments A = [not a] and B = [[not a] ! a]. Then = (A; B ; not a)
is a conflict resolution with res( ) = a and vuls( ) = fnot ag. Please note that
although not a has to be removed to resolve conflict between A and B , it remains
a vulnerability of since not a is self-attacking.</p>
          <p>Example 4. Consider the following defeasible logic program P
r1 : ) a
r2 : ) b
a ! not c
b ! c
and arguments A = [[ ) a] ! not c] and B = [[ ) b] ! c]. The rebutting conflict
(A; B ) can be resolved in two different ways, namely 1 = (A; B ; not r1) is a
conflict resolution with res( ) = r1 and vuls( ) = fnot r2g, and 2 = (A; B ; not r2)
is another conflict resolution with res( ) = r2 and vuls( ) = fnot r1g.</p>
          <p>
            The previous example shows that there are more reasonable ways how to
resolve rebutting conflicts. We show two examples of different conflict
resolution strategies – the weakest-link and the last-link strategy inspired by ASPIC+
[
            <xref ref-type="bibr" rid="ref14">14</xref>
            ]. In both strategies, a user-specified preference order on defeasible rules is
assumed. In the last-link strategy, all last-used defeasible rules of conflicting
arguments are compared and -minimal defeasible rules are chosen as resolutions
of the conflict. In the weakest-link strategy, each -minimal defeasible rule of
conflicting arguments is a resolution of the conflict.
          </p>
          <p>Example 5. Given the defeasible logic program
r1 : ) b
r2 : b ) a
r3 : ) not a
and the preference order r1
r3, r1
r2, r2</p>
          <p>r3, deductive arguments are
A1 = [ ) b]</p>
          <p>A2 = [A1 ) a]</p>
          <p>A3 = [ ) not a]
Then R1 = f(A3; A2; not r3)g is the last-link strategy and R2 = f(A3; A2; not r1)g
is the weakest-link strategy.</p>
          <p>
            In the weakest-link strategy from Example 5, a non-last defeasible rule r1 is
used as a resolution of the conflict. Please note that in [
            <xref ref-type="bibr" rid="ref11 ref14 ref15 ref8">15,8,14,11</xref>
            ], such conflict
resolutions are not possible, which makes our approach more flexible and general.
3.2
          </p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Argumentation Semantics</title>
        <p>In the previous subsection, definition of an argument structure, conflicts
identification and examples of various conflict resolutions were discussed. However,
the status of literals and the actual semantics has not been stated.</p>
        <p>
          Argumentation semantics for defeasible logic programs will be formalized
within ABF – a general framework, where several existing non-monotonic
formalisms have been embedded [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. In order to use some of the existing
argumentation semantics, we need to specify ABF’s language L, set of inference rules
R, set of assumptions A, and the contrariness function . Since ABF provides
only one kind of inference rules (i.e. strict), we need to transform defeasible rules
into strict. We transform defeasible rule r by adding a new assumption name(r )
into the preconditions of r . Furthermore, chosen conflict resolutions R
determining how rebutting conflicts will be resolved are transformed into new inference
rules. Intuitively, given a conflict resolution , if all assumptions in vuls( ) are
accepted, then, in order to resolve the conflict in , the atom res( ) should be
concluded. To achieve this, an inference rule vuls( ) ! res( ) for each conflict
resolution 2 R is added to the set of inference rules R.
        </p>
        <p>Definition 11 (Instantiation). Let P = (S; D; name) be a defeasible logic
program built over the language LAt and R be a set of conflict resolutions. An
assumption based framework respective to P and R is (L; R; A; ) where
– L = LAt [ LN ,
– R = S [ fbody (r ) [ fname(r )g ! head (r ) j r 2 Dg [ fvuls( ) ! res( ) j</p>
        <p>Rg,
– A = not At [ not N ,
– not A = A for each atom A 2 At [ N .
2
Example 6. Consider the defeasible logic program P and the conflict resolution
strategy R = f 1; 2g from Example 4. Assumption-based framework respective
to P and R is following:
– L = fa; not a; b; not b; c; not cg [ fr1; not r1; r2; not r2g
– R = fb ! not c; a ! cg [ fnot r1 ! b; not r2 ! ag [ fnot r1 ! r2; not r2 !
r1g
– A = fnot a; not b; not cg [ fnot r1; not r2g
– not A = A for each A 2 fa; b; cg [ fr1; r2g</p>
        <p>Now we define the actual semantics for defeasible logic programs. Given an
ABF F = (L; R; A; ), by F + we denote its flattening – that is, F + is the ABF
(L; fr 2 R j head (r ) 2= Ag; A; ).</p>
        <p>Definition 12 (Extension). Let P = (S; D; name) be a defeasible logic
program, R be a set of conflict resolutions, and F = (L; R; A; ) an
assumptionbased framework respective to P and R. A set of literals E L is</p>
        <sec id="sec-3-2-1">
          <title>1. a complete extension of P with respect to R iff E is a complete extension of</title>
          <p>F + with CnR(E ) E and CnR(E 0) E 0;
2. a grounded extension of P with respect to R iff E is a subset-minimal
complete extension of P with respect to R;
3. a preferred extension of P with respect to R iff E is a subset-maximal
complete extension of P with respect to R;</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>4. a semi-stable extension of P with respect to R iff E is a complete extension</title>
          <p>of P with respect to R with subset-minimal E 0 n E ;</p>
        </sec>
        <sec id="sec-3-2-3">
          <title>5. a stable extension of P with respect to R iff E is a complete extension of P</title>
          <p>with respect to R and E 0 = E .
where E 0 = L n not E .</p>
          <p>Example 7. Consider the assumption-based framework from Example 6. Then
E1 = ;, E2 = fnot r1; r2; not a; b; not cg, and E3 = fr1; not r2; a; not b; cg are
complete extensions of P with respect to R. Furthermore, E1 is the grounded
extension and E2, E3 are preferred, semi-stable and stable extensions of P with
respect to R.
The argumentation semantics defined above allows us to deal with
conflicting rules and to identify the extensions of a DeLP, given a CRS, and hence
it constitutes a reference semantics. This semantics is comparable to existing
argumentation-based semantics for DeLP, and, as we show below, it satisfies
the expected desired properties of defeasible reasoning. In this section we
investigate on the relation of the argumentation-based semantics and classical
logic programming. As we show, an equivalent semantics can be obtained by
transforming the DeLP and the given CRS into a classical logic program, and
computing the respective class of models.</p>
          <p>In fact the transformation that is required is essentially the same which
we used to embed DeLPs with CRS into ABFs. The names of rules become
new literals in the language, intuitively if name(r ) becomes true it means that
the respective defeasible rule is defeated. By default name(r ) holds and so all
defeasible rules can be used unless the program proves otherwise. The conflict
resolution strategy R to be used is encoded by adding rules of the form vuls( ) !
res( ) for each conflict resolution 2 R, where the head of such rules is always
an atom and the body is a set of default literals.</p>
          <p>Formally the transformation is defined as follows:
Definition 13 (Transformation). Let P = (S; D; name) be a defeasible logic
program and R be a set of conflict resolutions. Transformation of P with respect
to R into a generalized logic program, denoted as T (P; R), is defined as
T (P; R) = S [ fbody (r ) [ fname(r )g ! head (r ) j r 2 Dg [</p>
          <p>fvuls( ) ! res( ) j 2 Rg</p>
          <p>Thanks to the transformation, we can now compute the semantics of each
DeLP, relying on the semantics of generalized logic programs. Given a DeLP P
and the assumed CRS R, the extensions of P w.r.t. R corresponds to the
respective class of models. Complete extensions correspond to partial stable models,
the grounded extension to the well-founded model, preferred extensions to
maximal stable models, semi-stable extensions to least-undefined stable models, and
stable extensions to total stable models.</p>
          <p>Proposition 2. Let P be a defeasible logic program and R be a set of conflict
resolutions. Then
1. E is a complete extension of P with respect to R iff E is a partial stable
model of T (P; R).</p>
          <p>A remarkable special case happens when the input program P does not
contain defeasible rules, and hence it is a regular GLP. In such a case our
argumentation-based semantics exactly corresponds to the respective class of
models for the GLP. This shows complete backward compatibility of our
semantics with the underlying class of logic programs.</p>
          <p>Proposition 3. Let S be a generalized logic program and P = (S; ;; ;) a
defeasible logic program with the empty set of conflict resolutions. Then
1. E is a complete extension of P iff E is a partial stable model of S.</p>
        </sec>
        <sec id="sec-3-2-4">
          <title>2. E is a grounded extension of P iff E is a well-founded model of S.</title>
        </sec>
        <sec id="sec-3-2-5">
          <title>3. E is a preferred extension of P iff E is a maximal partial stable model of S.</title>
        </sec>
        <sec id="sec-3-2-6">
          <title>4. E is a semi-stable extension of P iff E is a least-undefined partial stable</title>
          <p>model of S.</p>
        </sec>
        <sec id="sec-3-2-7">
          <title>5. E is a stable extension of P iff E is a total stable model of S.</title>
          <p>4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Properties</title>
      <p>In this section we will have a look on desired properties for defeasible
reasoning, and show that our semantics satisfies these properties. The properties are
formulated in general, that is, they should be satisfied for any a defeasible logic
program P, any set of conflict resolutions R, and any extension E of P w.r.t. R.</p>
      <p>
        The first two properties formulated below are well known, they were
proposed by Caminada and Amgoud [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The closure property originally requires
that nothing new can be derived from the extension using strict rules. We use
a slightly more general formulation, nothing should be derived using the
consequence operator Cn which applies all the strict rules and in addition also all the
defeasible rules which are not defeated according to R. The original property [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
is a straightforward consequence of this.
      </p>
      <p>Property 1 (Closure). Let R0 = S [ fbody (r ) [ fname(r )g ! head (r ) j r 2 Dg.
Then CnR0 (E ) E .</p>
      <p>
        The consistency property [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] formally requires that all conflicts must be
resolved in any extension.
      </p>
      <p>Property 2 (Consistency). E is consistent.</p>
      <p>In addition we propose two new desired properties which are concerned with
handling of the default assumptions. Reasoning with default assumptions is a
fixed part of the semantics of GLPs (and most other classes of logic programs),
and therefore in DeLPs it should be governed by similar principles. The first
property (dubbed positive defeat ) requires that for each default literal not A,
this literal should be always defeated in any extension E such that there is a
conflict resolution 2 R whose assumptions are all upheld by E ; and, in such a
case the opposite literal A should be part of the extension E .</p>
      <p>Property 3 (Positive Defeat). For each atom A 2 LN , if there exists a conflict
resolution 2 R with res( ) = A and vuls( ) E then A 2 E .</p>
      <p>The previous property handles all cases when there is an undefeated evidence
against not A and requires that A should hold. The next property (dubbed
negative defeat ) handles the opposite case. If there is no undefeated evidence against
not A, in terms of a conflict resolution 2 R whose assumptions are all upheld
by E , then not A should be part of the extension E .</p>
      <p>Property 4 (Negative Defeat). For each default literal not A 2 LN , if for each
conflict resolution 2 R with res( ) = A holds not vuls( ) \ E 6= ; then not A 2
E .</p>
      <p>Closure and consistency trivially hold for our semantics, as the semantics
was designed with these properties in mind. They are assured by the definition
of complete extension of a DeLP (Definition 12).</p>
      <sec id="sec-4-1">
        <title>Proposition 4. Each complete extension E of a defeasible logic program P with</title>
        <p>respect to a set of conflict resolutions R has the property of closure.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Proposition 5. Each complete extension E of a defeasible logic program P with</title>
        <p>respect to a set of conflict resolutions R is consistent.</p>
        <p>Satisfaction of a positive and a negative defeat properties follow from the
instantiation of an ABF (Definition 11), where an inference rule vuls( ) ! res( )
is added for every conflict resolution 2 R.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Proposition 6. Each complete extension E of a defeasible logic program P with</title>
        <p>respect to a set of conflict resolutions R has the property of positive defeat.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Proposition 7. Each complete extension E of a defeasible logic program P with</title>
        <p>respect to a set of conflict resolutions R has the property of negative defeat.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Related Work</title>
      <p>
        There are two well-known argumentation-based formalisms with defeasible
inference rules – defeasible logic programs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and ASPIC+ [
        <xref ref-type="bibr" rid="ref11 ref14">14,11</xref>
        ]. It is known
that the semantics in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] does not satisfy rationality postulates formalized in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
especially the closure property. Although ASPIC+ satisfies all postulates in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
it uses transposition or contraposition which violate directionality of inference
rules [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and thus violating LP intuitions. It also does not satisfy positive or
negative defeat property introduced in this paper.
      </p>
      <p>
        Francesca Toni’s paper [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] describes a mapping of defeasible reasoning into
assumption-based argumentation framework. The work takes into account the
properties [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] that we also consider (closedness and consistency), and it is
formally proven that the constructed assumption-based argumentation framework’s
semantics is closed and consistent. However no explicit connection with existing
LP semantics is discussed in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] does not deal with DeLP, but on how to encode defeasible
semantics inside logic programs. The main objective is on explicating a preference
ordering on defeasible rules inside a logic program, so that defeats (between
defeasible logic rules) are properly encoded in LP. This is achieved with a special
predicate defeated with special semantics.
      </p>
      <p>
        Caminada et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] investigated how abstract argumentation semantics and
semantics for normal logic programs are related. Authors found out that abstract
argumentation is about minimizing/maximizing argument labellings, whereas
logic programming is about minimizing/maximizing conclusion labellings.
Further, they proved that abstract argumentation semantics cannot capture the
least-undefined stable semantics for normal logic programs.
6
      </p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In this paper we investigated the question of how to define semantics for
defeasible logic programs, which satisfies both the existing rationality postulates from
the area of structured argumentation and is also aligned with LP semantics and
intuitions. To achieve these objectives, we diverged from the usual argumentation
process methodology. Most importantly, conflicts are not resolved by attacking
some of the conflicting arguments, but by attacking some of the weak parts of
an argument called vulnerabilities. Main contributions are as follows:
– We presented an argumentation semantics of defeasible logic programs, based
on conflict resolution strategies within assumption-based frameworks, whose
semantics satisfies desired properties like consistency and closedness under
the set of strict rules.
– We constructed a transformational semantics, which takes a defeasible logic
program and a conflict resolution strategy as an input, and generates a
corresponding generalized logic program. As a consequence, a computation of
argumentation semantics of DeLP in the frame of GLP is enabled.
– Equivalence of a transformational and an argumentation semantics is
provided.</p>
      <sec id="sec-6-1">
        <title>Acknowledgements</title>
        <p>This work resulted from the Slovak–Greek bilateral project “Multi-context
Reasoning in Heterogeneous environments”, registered on the Slovak side under no.
SK-GR-0070-11 with the APVV agency and co-financed by the Greek General
Secretariat of Science and Technology and the European Union. It was further
supported from the Slovak national VEGA project no. 1/1333/12. Martin Baláž
and Martin Homola are also supported from APVV project no. APVV-0513-10.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alferes</surname>
            ,
            <given-names>J.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leite</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pereira</surname>
            ,
            <given-names>L.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przymusinska</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przymusinski</surname>
          </string-name>
          , T.C.:
          <article-title>Dynamic logic programming</article-title>
          .
          <source>In: APPIA-GULP-PRODE 1998</source>
          . pp.
          <fpage>393</fpage>
          -
          <lpage>408</lpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baláž</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frtús</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Homola</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Conflict resolution in structured argumentation</article-title>
          .
          <source>In: LPAR-19 (Short Papers)</source>
          .
          <source>EPiC</source>
          , vol.
          <volume>26</volume>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>34</lpage>
          . EasyChair (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bondarenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalski</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An abstract, argumentation theoretic approach to default reasoning</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>93</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>63</fpage>
          -
          <lpage>101</lpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>On the evaluation of argumentation formalisms</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <issue>5-6</issue>
          ),
          <fpage>286</fpage>
          -
          <lpage>310</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carnielli</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>Semi-stable semantics</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>22</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1207</fpage>
          -
          <lpage>1254</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sá</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alcântara</surname>
          </string-name>
          , J.:
          <article-title>On the equivalence between logic programming semantics and argumentation semantics</article-title>
          .
          <source>In: ECSQARU</source>
          <year>2014</year>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          ,
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>García</surname>
            ,
            <given-names>A.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.:</given-names>
          </string-name>
          <article-title>Defeasible logic programming: an argumentative approach</article-title>
          .
          <source>TPLP</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ),
          <fpage>95</fpage>
          -
          <lpage>138</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gelder</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schlipf</surname>
            ,
            <given-names>J.S.:</given-names>
          </string-name>
          <article-title>The well-founded semantics for general logic programs</article-title>
          .
          <source>J. ACM</source>
          <volume>38</volume>
          (
          <issue>3</issue>
          ),
          <fpage>619</fpage>
          -
          <lpage>649</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gelfond</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lifschitz</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The stable model semantics for logic programming</article-title>
          .
          <source>In: ICLP/SLP</source>
          . pp.
          <fpage>1070</fpage>
          -
          <lpage>1080</lpage>
          . MIT Press (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Modgil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prakken</surname>
          </string-name>
          , H.:
          <article-title>Revisiting preferences and argumentation</article-title>
          .
          <source>In: IJCAI 2001</source>
          . pp.
          <fpage>1021</fpage>
          -
          <lpage>1026</lpage>
          . AAAI Press (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Nute</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Defeasible reasoning and decision support systems</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ),
          <fpage>97</fpage>
          -
          <lpage>110</lpage>
          (
          <year>1988</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Pollock</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          :
          <article-title>Defeasible reasoning</article-title>
          .
          <source>Cognitive Science</source>
          <volume>11</volume>
          (
          <issue>4</issue>
          ),
          <fpage>481</fpage>
          -
          <lpage>518</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An abstract framework for argumentation with structured arguments</article-title>
          .
          <source>Argument &amp; Computation</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <fpage>93</fpage>
          -
          <lpage>124</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sartor</surname>
          </string-name>
          , G.:
          <article-title>Argument-based extended logic programming with defeasible priorities</article-title>
          .
          <source>Journal of Applied Nonclassical Logics</source>
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>25</fpage>
          -
          <lpage>75</lpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vreeswijk</surname>
          </string-name>
          , G.:
          <article-title>Logics for defeasible argumentation</article-title>
          . In: Gabbay,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Guenthner</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.) Handbook of Philosophical Logic, pp.
          <fpage>219</fpage>
          -
          <lpage>318</lpage>
          . Springer (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Przymusinski</surname>
          </string-name>
          , T.C.:
          <article-title>The well-founded semantics coincides with the three-valued stable semantics</article-title>
          .
          <source>Fundam. Inform</source>
          .
          <volume>13</volume>
          (
          <issue>4</issue>
          ),
          <fpage>445</fpage>
          -
          <lpage>463</lpage>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Saccà</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The expressive powers of stable models for bound and unbound DATALOG queries</article-title>
          .
          <source>J. Comput. Syst. Sci</source>
          .
          <volume>54</volume>
          (
          <issue>3</issue>
          ),
          <fpage>441</fpage>
          -
          <lpage>464</lpage>
          (
          <year>Jun 1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Assumption-based argumentation for closed and consistent defeasible reasoning</article-title>
          .
          <source>In: JSAI 2007. LNCS</source>
          , vol.
          <volume>4914</volume>
          , pp.
          <fpage>390</fpage>
          -
          <lpage>402</lpage>
          . Springer (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Wan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fodor</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Logic programming with defaults and argumentation theories</article-title>
          .
          <source>In: ICLP 2009. LNCS</source>
          , vol.
          <volume>5649</volume>
          , pp.
          <fpage>432</fpage>
          -
          <lpage>448</lpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>