<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Valid attacks in Argumentation Frameworks with Recursive Attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>C. Cayrol</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>J. Fandinno</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>L. Farin˜as del Cerro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M-C. Lagasquie-Schiex</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IRIT, Universit ́e de Toulouse</institution>
          ,
          <addr-line>CNRS, Toulouse</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The purpose of this work is to study a generalisation of Dung's abstract argumentation frameworks that allows representing recursive attacks, that is, a class of attacks whose targets are other attacks. We do this by developing a theory of argumentation where the classic role of attacks in defeating arguments is replaced by a subset of them, which is extension dependent and which, intuitively, represents a set of “valid attacks” with respect to the extension. The studied theory displays a conservative generalisation of Dung's semantics (complete, preferred and stable) and also of its principles (conflictfreeness, acceptability and admissibility). Furthermore, despite its conceptual differences, we are also able to show that our theory agrees with the AFRA interpretation of recursive attacks for the complete, preferred and stable semantics.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Argumentation has become an essential paradigm for
Knowledge Representation and, especially, for reasoning
from contradictory information [1; 11] and for
formalizing the exchange of arguments between agents in, e.g.,
negotiation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Formal abstract frameworks have greatly
eased the modelling and study of argumentation. For
instance, a Dung’s argumentation framework (AF) [
        <xref ref-type="bibr" rid="ref14">11</xref>
        ]
consists of a collection of arguments interacting with
each other through an attack relation, enabling to
determine “acceptable” sets of arguments called extensions.
      </p>
      <p>A natural generalisation of Dung’s argumentation
frameworks consists in allowing high-order attacks that
target other attacks. Here is an example in the legal
field, borrowed from [3].</p>
      <p>Example 1. The lawyer says that the defendant did
not have intention to kill the victim (Argument b). The
∗The second author is funded by the Centre
International de Math´ematiques et d’Informatique de Toulouse
(CIMI) through contract ANR-11-LABEX-0040-CIMI within
the program ANR-11-IDEX-0002-02.
prosecutor says that the defendant threw a sharp knife
towards the victim (Argument a). So, there is an
attack from a to b. And the intention to kill should be
inferred. Then the lawyer says that the defendant was in
a habit of throwing the knife at his wife’s foot once drunk.
This latter argument (Argument c) is better considered
attacking the attack from a to b, than argument a itself.
Now the prosecutor’s argumentation seems no longer
sufficient for proving the intention to kill. This example is
represented as a recursive framework in Fig. 1.</p>
      <p>Another example, borrowed from [4; 9], will be taken
as a running example.</p>
      <p>Example 2. Suppose Bob is making decisions about
his Christmas holidays, and is willing to buy cheap last
minute offers. He knows there are deals for travelling to
Gstaad (g) or Cuba (c). Suppose that Bob has a
preference for skiing (p) and knows that Gstaad is a renowned
ski resort. However, the weather service reports that it
has not snowed in Gstaad (n). So it might not be
possible to ski there. Suppose finally that Bob is informed
that the ski resort in Gstaad has a good amount of
artificial snow, that makes it anyway possible to ski there (a).
The different attacks are represented on Fig. 2.</p>
      <p>
        A semantics for these classes of recursive frameworks
has been first introduced in [
        <xref ref-type="bibr" rid="ref7">14</xref>
        ] in the context of
preferences in argumentation frameworks, and latter studied
in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] under the name of AFRA (Argumentation
Framework with Recursive Attacks). This version describes
abstract argumentation frameworks in which the
interactions can be either attacks between arguments or
attacks from an argument to another attack. A
translation of an AFRA into an AF is defined by the addition
of some new arguments and the attacks they produce or
they receive. Note that AFRA have been extended in
order to handle recursive support interactions together
with recursive attacks [9; 10]. However, when supports
are removed, these approaches go back to AFRA.
      </p>
      <p>A similar work is described in [7] using the addition
of meta-arguments that enable to encode the notions of
“grounded attack” and “valid attack”. The notion of
grounded attack is about the source of the attack and
the notion of valid attack is about the link between the
source and the target of the attack (i.e. the role of
the interaction itself). Despite the intuitive results
obtained by these approaches regarding complete, stable or
grounded extensions, it somehow changes the role that
attacks play in Dung’s frameworks.</p>
      <p>Example 3. Consider the argumentation framework
corresponding to Fig. 3. According to Dung’s theory, this
a
α</p>
      <p>b
framework has three conflict-free sets: ?, {a} and {b}.
On the other hand, {a, b} is a conflict-free set
according to AFRA because the attack α is not in the set. In
fact, in AFRA, such an argumentation framework can
be turned into an AF by converting α into a new
argument as in Fig. 4. In this new framework, it is easy to
observe that {a, b} is considered conflict-free in AFRA
because there is no attack between a and b. In some
sense, the connection between an attack and its source
has been lost. As another example of this behaviour, the
set {α, b} is not AFRA-conflict-free despite the fact that
the source of α, the argument a, is not in the set.</p>
      <p>In this paper, we study an alternative semantics for
argumentation frameworks with recursive attacks based
on the following intuitive principles:
P1 The role played in Dung’s argumentation
frameworks by attacks in defeating arguments is now
played by a subset of these attacks, which is
extension dependent and represents the “valid attacks”
with respect to that extension.</p>
      <p>P2 It is a conservative generalisation of Dung’s
framework for the definitions of conflict-free, admissible,
complete, preferred, and stable extensions.</p>
      <p>For instance, in the proposed semantics, the
conflictfree extensions of the framework of Fig. 3 are precisely
Dung’s conflict-free extensions: ?, {a} and { }
b . Besides,
as we will see later, the attack α is valid with respect
to all three extensions because it is not the target of
any attack. It is worth noting that, despite its
conceptual difference with respect to AFRA, we are able to
prove an one-to-one correspondence between our
complete, preferred and stable extensions and the
corresponding AFRA extensions, in which the set of
“acceptable” arguments are the same. This offers an alternative
view for the semantics of recursive attacks that we
believe to be closer to Dung’s intuitive understanding.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>Definition 1. A Dung’s abstract argumentation
framework (D-framework for short) is a pair AF = hA,Ri
where A is a set of arguments and R ⊆ A × A is a
relation representing attacks over arguments.</p>
      <p>For instance, the graph depicted in Fig. 3 corresponds
to the D-framework AF3 = hA3, R3i with the set of
arguments A3 = {a, b} and the attack relation R3 = {(a, b)}.
Definition 2. Given some D-framework AF = hA,Ri
and some set of arguments S ⊆ A, an argument a ∈ A
is said to be
i) defeated w.r.t. S iff ∃b ∈ S such that (b, a) ∈ R, and
ii) acceptable w.r.t. S iff for every argument b ∈ A with
(b, a) ∈ R, there is c ∈ S such that (c, b) ∈ R.
To obtain shorter definitions we will also use the
following notations:
Def (S) d=ef { a ∈ A
Acc(S) d=ef { a ∈ A
∃b ∈ S s.t. (b, a) ∈ R }
∀b ∈ A, (b, a) ∈ R implies b ∈ Def (S) }
respectively denote the set of all defeated and acceptable
arguments w.r.t. S.</p>
      <p>
        Definition 3. Given a D-framework AF = hA, Ri, a
set of arguments S ⊆ A is said to be
i) conflict-free iff S ∩ Def (S) = ?,
ii) admissible iff it is conflict-free and S ⊆ Acc(S),
iii) complete iff it is conflict-free and S = Acc(S),
iv) preferred iff it is ⊆-maximal1 admissible,
v) stable iff it is conflict-free and S ∪ Def (S) = A.
Theorem 1 ([
        <xref ref-type="bibr" rid="ref14">11</xref>
        ]). Given a D-framework AF = hA, Ri,
the following assertions hold:
i) every complete set is also admissible,
ii) every preferred set is also complete, and
iii) every stable set is also preferred.
      </p>
      <p>For instance, in Example 3, the argument a is accepted
w.r.t. any set S because there is no argument x ∈ A such
1With ⊆ denoting the standard set inclusion relation.
that (x, a) ∈ R. Furthermore, b is defeated and
nonacceptable w.r.t. the set { }</p>
      <p>a . Then, it is easy to check
that {a} is stable (and, thus, conflict-free, admissible,
complete and preferred). The empty set ? is admissible,
but not complete; and the set {b} is conflict-free, but not
admissible.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Semantics for recursive attacks</title>
      <p>Definition 4. A recursive argumentation framework
RAF = hA,K,s,ti is a quadruple where A and K are
(possibly infinite) disjunct sets respectively representing
arguments and attack names, and where s : K −→ A
and t : K −→ A ∪ K are functions respectively mapping
each attack to its source and its target.</p>
      <p>For instance, the argumentation framework of
Example 3 corresponds to RAF3 = hA3, K3, s3, t3i where
A3 = {a, b}, K3 = {α}, s3(α) = a and t3(α) = b.
In general, given any D-framework AF = hA,Ri, we
may obtain its corresponding argumentation framework
RAF = hA,K,s,ti by defining a set of attack names
K = { α(a,b) (a, b) ∈ R }. Functions s and t are
straightforwardly defined by mapping each attack (a, b) ∈ R as
follows: s(α(a,b)) = a and t(α(a,b)) = b.</p>
      <p>It is worth noting that our definition allows the
existence of several attacks between the same arguments.
Though this does not make any difference for frameworks
without recursive attacks, for recursive ones, it allows
representing attacks between the same arguments that
are valid in different contexts. For instance, in the
example of Figure 5, there are two attacks between a and b,
c
d
γ
a
δ
α
β
b
namely α and β, which represent different contexts as
they are attacked by different arguments.</p>
      <p>Definition 5 (Structure). A pair A = hS, Γi is said to
be a structure of some RAF = hA,K,s,ti iff it satisfies:
S ⊆ A and Γ ⊆ K.</p>
      <p>Intuitively, the set S represents the set of “acceptable”
arguments w.r.t. the structure A, while Γ represents the
set of “valid attacks” w.r.t. A. Any attack2 α ∈ Γ is
understood as non-valid and, in this sense, it cannot defeat
the argument or attack that it is targeting.</p>
      <p>For the rest of this section we assume that all
definitions and results are relative to some given
framework RAF = hA,K,s,ti. We extend now the definition
2By Γ d=ef K\Γ we denote the set complement of Γ.
of defeated arguments (Definition 2) using the set Γ
instead of the attack relation R: given a structure of the
form A = hS, Γi, we define:</p>
      <p>Def (A) d=ef { a ∈ A</p>
      <p>∃α ∈ Γ, s(α) ∈ S and t(α) = a } (1)
In other words, an argument a ∈ A is defeated w.r.t. A
iff there is a “valid attack” w.r.t. A that targets a and
whose source is “acceptable” w.r.t. A. It is interesting to
observe that we may define the attack relation associated
with some structure A = hS, Γi as follows:</p>
      <p>def
RA = { (s(α), t(α))
α ∈ Γ }
(2)
and that, using this relation, we can rewrite (1) as:
Def (A) d=ef { a ∈ A</p>
      <p>∃b ∈ S s.t. (b, a) ∈ RA } (3)
Now, it is easy to see that our definition can be obtained
from Dung’s definition of defeat (Definition 2) just by
replacing the attack relation R by the attack relation
RA associated with the structure A, or in other words,
by replacing the set of all attacks in the argumentation
framework by the set of the “valid attacks” w.r.t. the
structure A, as stated in P1. Analogously, by
Inh(A) d=ef { α ∈ K</p>
      <p>∃b ∈ S s.t. (b, α) ∈ RA } (4)
we denote a set of attacks that, intuitively, represents
the “inhibited attacks3” w.r.t. A.</p>
      <p>We are now ready to extend the definition of
acceptable argument w.r.t. a set (Definition 2):
Definition 6 (Acceptability). An element x ∈ (A ∪ K)
is said to be acceptable w.r.t. some structure A iff every
attack α ∈ K with t(α) = x satisfies one of the following
conditions: (i) s(α) ∈ Def (A) or (ii) α ∈ Inh(A).</p>
      <p>By Acc(A), we denote the set containing all acceptable
arguments and attacks with respect to A. We also define
the following order relations that will help us defining
preferred structures: for any pair of structures A = hS, Γi
and A0 = hS0, Γ0i, we write A v A0 iff (S ∪ Γ) ⊆ (S0 ∪ Γ0)
and we write A var A0 iff S ⊆ S0. As usual, we say that a
structure A is v-maximal (resp. var-maximal) iff every
A0 that satisfies A v A0 (resp. A var A0) also satisfies
A0 v A (resp. A0 var A).</p>
      <p>Definition 7. A structure A = hS, Γi is said to be:
i) conflict-free iff S ∩Def (A) = ? and Γ∩Inh(A) = ?,
ii) admissible iff it is conflict-free and</p>
      <p>(S ∪ Γ) ⊆ Acc(A),
iii) complete iff it is conflict-free and Acc(A) = (S ∪ Γ),
iv) preferred iff it is a v-maximal admissible structure,
v) arg-preferred iff it is a var-maximal preferred
structure,
vi) stable4 iff S = Def (A) and Γ = Inh(A).</p>
      <p>Example 1 (cont’d) Let RAF be the recursive
argumentation framework corresponding to Fig. 6 (Fig. 6 is
Fig. 1 completed with the attack names). It is easy to
check that this framework has a unique complete,
preferred and stable structure A = h{a, b, c}, {β}i.
Furthermore, there are nine admissible structures that are not
complete: h{a, c}, {β}i, h{b, c}, {β}i, h{a}, {β}i, h{c}, {β}i,
h?, {β}i, h{a, c}, ?i, h{a}, ?i, h{c}, ?i and h?, ?i. There are
also other conflict-free structures that are not
admissible: h?, {α, β}i, h{a}, {α, β}i, h{b}, {α, β}i, h{a, b}, {β}i,
h{b}, {β}i, h{a, c}, {α}i, h{b, c}, {α}i, h{a}, {α}i, h{b}, {α}i,
h{c}, {α}i, h?, {α}i, h{a, b}, ?i, h{a, b, c}, ?i, h{b, c}, ?i and
h{b}, ?i.</p>
      <p>It is worth to mention that preferred and arg-preferred
structures do not necessarily coincide, since there exist
preferred structures that do not contain a maximal set
of arguments as shown by the following example:
Example 4. Let RAF be the argumentation framework
corresponding to the the graph depicted in Figure 7. Both
a
α</p>
      <p>b
β
A = h{a, b}, {β}i and A0 = h{a}, {α, β}i are preferred
structures of RAF, but only the former contains a
maximal set of arguments and thus A is the unique
argpreferred structure.</p>
      <p>We show now5 that, as in Dung’s argumentation
theory, there is also a kind of Fundamental Lemma for
argumentation frameworks with recursive attacks. For
the sake of compactness, we will adopt the following
notations: Given a structure A = hS, Γi and a set
A ∪⊆T d(eAf ∪ K) containing arguments and attacks, by
T</p>
      <p>= hS ∪ (T ∩ A), Γ ∪ (T ∩ K)i we denote the result
of extending A with the elements in T .</p>
      <p>Lemma 1 (Fundamental Lemma). Let A = hS, Γi be
an admissible structure and x, y ∈ Acc(A) be any pair
3We will deepen about the intuition of inhibited attacks
in Section 6.</p>
      <p>4By Def (A) d=ef A\Def (A) we denote the non-defeated
arguments. Similarly, by Inh(A) d=ef K\Inh(A) we denote
the non-inhibited attacks. Note also that S = Def (A) and
Γ = Inh(A) already implies conflict-freeness.</p>
      <p>5The proofs of propositions, lemmas, theorems given in
this paper can be found in [8].
of acceptable elements. Then, (i) A0 = A ∪ {x} is an
admissible structure, and (ii) y ∈ Acc(A0).</p>
      <p>Moreover, admissible structures form a complete partial
order with preferred structures as maximal elements:
Proposition 1. The set of all admissible structures
forms a complete partial order with respect to v.
Furthermore, for every admissible structure A, there exists
an (arg-)preferred one A0 such that A v A0.</p>
      <p>The following result shows that the usual relation
between extensions also holds for structures.</p>
      <sec id="sec-3-1">
        <title>Theorem 2. The following assertions hold:</title>
        <p>i) every complete structure is also admissible,
ii) every preferred structure is also complete, and
iii) every stable structure is also preferred.</p>
        <p>Example 5. As a further example, consider the
framework RAF corresponding to Fig. 8. This framework
a
α
β
c
b
γ
has a unique complete and (arg-)preferred structure A =
h{a, c}, {γ}i, but no stable one. Note that α and β are
neither acceptable nor inhibited w.r.t. A: β is not
inhibited because b is not in the structure, so α is not
acceptable. α is not inhibited because β is not in the structure.
And β is not acceptable because b is not defeated (as α
is not in the structure).</p>
        <p>Example 2 (cont’d) Consider the framework RAF
represented in Fig. 2. This framework has a unique
complete, preferred and stable structure: A0 =
h{a, g, p}, {α, , γ, δ}i. Among the 63 admissible
structures, we find A1 = h{a}, { }i, A2 = h{a}, { , δ}i, and
A3 = h{a}, {α, , γ, δ}i.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Relation with AFRA</title>
      <p>
        In this section, we establish correspondences between
our semantics for recursive attacks and the semantics
for AFRA. In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] a recursive framework is turned into a
Dung’s framework by adding new arguments and attacks
using the following notion of defeat:
Definition 8 (Defeat). Let RAF = hA,K,s,ti. An attack
α ∈ K is said to directly defeat x ∈ A ∪ K iff t(α) = x.
It is said to indirectly defeat β ∈ K iff α directly defeats
s(β). Then, α is said to defeat x ∈ A ∪ K iff α directly
defeats x or α indirectly defeats x.
      </p>
      <p>
        For instance, in Example 5, it is easy to see that α
directly defeats b and indirectly defeats γ. Hence, α defeats
both b and γ. Attacks β and γ directly defeat α and β,
respectively. It has been shown in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] that AFRA
extensions can be characterized as the extensions of a Dung’s
framework whose new set of arguments contains both
arguments and attacks and whose new attack relation is
the defeat relation of Definition 8. In this sense, under
AFRA, the argumentation framework of Example 5 is
turned into the one in Fig. 9 and it can be checked that
it has a unique complete and preferred extension {a, c}
and no stable one. We recall next the formal definitions
of AFRA from [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
Definition 9. Let RAF = hA,K,s,ti and E ⊆ (A ∪ K).
Then, an element x ∈ (A ∪ K) is said to be
AFRAacceptable w.r.t. E iff for every α ∈ K that defeats x,
there is β ∈ E that defeats α.
      </p>
      <p>Definition 10 (AFRA-extensions). Let RAF =
hA,K,s,ti and a set E ⊆ (A ∪ K), E is said to be:
i) AFRA-conflict-free iff @α, x ∈ E s.t. α defeats x,
ii) AFRA-admissible iff E is AFRA-conflict-free and
each element of E is AFRA-acceptable w.r.t. E ,
iii) AFRA-complete iff it is AFRA-admissible and
every x ∈ (A ∪ K) which is AFRA-acceptable w.r.t. E
belongs to E ,
iv) AFRA-preferred iff it is a ⊆-maximal</p>
      <p>AFRA-admissible extension,
v) AFRA-stable iff it is AFRA-conflict-free and, for
every x ∈ (A ∪ K), x &lt; E implies that x is defeated
by some α ∈ E .</p>
      <p>As illustrated by Example 3, AFRA does not preserve
Dung’s notion of conflict-freeness.</p>
      <p>Observation 1. AFRA is not a conservative
generalisation of Dung’s approach.</p>
      <p>In order to characterize the relation between our
approach and AFRA, we will need the following notation.
Given some structure A = hS, Γi, by</p>
      <p>EA
def
=</p>
      <p>S ∪ { α ∈ Γ
s(α) ∈ S }
we denote its corresponding AFRA-extension.</p>
      <p>Note that the AFRA-extension corresponding to a
given structure only contains the attacks of the
structure whose source belongs to the structure. The other
attacks of the structure do not appear in the
AFRAextension. Intuitively, this selection is motivated by the
fact that any attack in an AFRA-extension directly
carries a conflict against its target, even if its source is not
accepted, something which we avoid in our framework.
Proposition 2. Let RAF = hA,K,s,ti and a
structure A = hS, Γi, the following assertions hold:
i) if A is conflict-free, then EA is AFRA-conflict-free,
ii) if A is admissible, then EA is AFRA-admissible,
iii) if A is complete, then EA is AFRA-complete,
iv) if A is preferred, then EA is AFRA-preferred,
v) if A is stable, then EA is AFRA-stable.</p>
      <p>For the converse of Prop. 2, we need to introduce some
extra notation: Given some set E ⊆ (A ∪ K), by
SE d=ef (E ∩ A), we denote the set of arguments of E .
Then, considering the structure A0 = hSE , (E ∩ K)i, by
ΓE d=ef (E ∩K) ∪ { α ∈ (Acc(A0)∩K) s(α) &lt; E } (5)
we denote the set of “valid attacks” with respect to E .
Finally, by AE d=ef hSE , ΓE i, we denote the structure
corresponding to some AFRA-extension E . Here, we have to
add attacks that do not belong to the AFRA-extension.
Intuitively, this is due to the fact that, in AFRA, an
attack is not acceptable whenever its source is not
acceptable [4, Lemma 1]. Hence, we need to add to the
structure all those attacks that are non-AFRA-acceptable
only because of attacks towards their source.
Proposition 3. Given a RAF = hA,K,s,ti and a set
E ⊆ (A ∪ K), the following assertions hold:
i) if E is AFRA-conflict-free, then AE is conflict-free,
ii) if E is AFRA-admissible, then AE is conflict-free,
iii) if E is AFRA-complete, AE is a complete structure,
iv) if E is AFRA-preferred, AE is a preferred structure,
v) if E is AFRA-stable, AE is a stable structure.
It is worth to emphasise that for an AFRA-admissible
extension, Proposition 3 only ensures that the
corresponding structure AE is a conflict-free structure. In fact, there
exist AFRA-admissible extensions, whose corresponding
structures are not admissible. For instance,
considera
α
b
β
c
ing the argumentation framework of Fig. 10, the set
{α, c} is AFRA-admissible, but the corresponding
structure h{c}, {α, β}i is not an admissible structure (since a
is not in the structure). This discrepancy follows from
the fact that, in AFRA, α defeats β despite of the
absence of a while in our approach attacks whose source is
not accepted cannot defeat other arguments or attacks.
This difference disappears if we consider what we call
closed sets. We say that E ⊆ (A ∪ K) is closed iff every
attack α ∈ (E ∩ K) satisfies s(α) ∈ E .</p>
      <p>Proposition 4. Let E be a closed AFRA-admissible
extension. Then, AE is an admissible structure.</p>
      <p>Note that for conflict-freeness and admissibility, the
correspondence is not necessarily one-to-one. For
instance, A = h{a, c}, {α}i and A0 = h{a, c}, {α, β}i are
both admissible structures of the framework of Fig. 10
and both of them correspond to the same
AFRAadmissible extension EA = EA0 = {a, c, α}. Recall that β
is acceptable w.r.t. A0 because it is not attacked.
However, it is not AFRA-acceptable w.r.t. {a, c, α, β}
because, in AFRA, α defeats β and α is not itself defeated
(in fact, {a, c, α, β} is not even AFRA-conflict-free). On
the other hand, note that only A0 is a complete
structure. In fact, for complete structures the correspondence
is one-to-one.</p>
      <p>Let us denote by Afra(·) the function mapping each
structure A to its corresponding AFRA-extension EA.
Proposition 5. The following assertions hold:
i) if E is AFRA-complete (or just a closed
AFRAconflict-free extension), then Afra(AE ) = E , and
ii) if A is a complete structure, then AAfra(A) = A.
Theorem 3. The function Afra(·) is a one-to-one
correspondence between the sets of all complete (resp.
preferred and stable) structures and the set of all
AFRAcomplete (resp. preferred and stable) extensions.</p>
      <p>Note that given the one-to-one correspondence
between preferred structures and AFRA-preferred
extensions, there are AFRA-preferred extensions that do not
correspond to arg-preferred ones and thus, they do not
contain a maximal set of arguments. For instance,
{a, b, β} and {a, α} are both AFRA-preferred extensions
in Example 4, but only the former contains a maximal
set of arguments.</p>
      <p>
        An interesting consequence of Theorem 3 and
Proposition 12 in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] is that complexity for RAFs’ semantics
does not increase w.r.t. Dung’s frameworks. That is,
credulous acceptance w.r.t. the complete, preferred and
the stable semantics is NP-complete. Sceptical
acceptance w.r.t. the preferred (resp. stable) semantics is
Π2P-complete (resp. coNP-complete) [
        <xref ref-type="bibr" rid="ref15">12</xref>
        ].
      </p>
      <p>Example 2 (cont’d) For the framework
represented in Fig. 2, there is a unique AFRA-complete,
AFRA-preferred and AFRA-stable extension: E =
{a, g, p, α, , γ}. Note that δ &lt; E whereas E = EA0 .
Indeed, no AFRA-admissible extension contains δ.
Analogously, we have EA1 = EA2 = EA3 = {a, }.
Moreover, among the AFRA-admissible extensions, we find
{a, g, , γ} which is not closed. The associated structure
A4 = h{a, g}, { , γ}i is not an admissible structure.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conservative generalisation</title>
      <p>
        As mentioned in the introduction, our theory aims to
be a conservative generalisation of Dung’s theory (P2).
Indeed, given the one-to-one correspondence between
complete, preferred and stable structures and their
corresponding AFRA-extensions and between the latter
and Dung’s extensions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in the case of non-recursive
frameworks, it immediately follows that there exists a
one-to-one correspondence between complete, preferred
and stable structures and their corresponding Dung’s
extensions.
      </p>
      <p>On the other hand, this is not the case when
we consider only conflict-freeness or admissibility.
As mentioned in the introduction, {a, b} is an
AFRA-conflict-free extension of the non-recursive
argumentation framework of Example 3. From Proposition 3,
this implies that the corresponding structure h{a, b}, ?i,
is a conflict-free structure.</p>
      <p>It is worth to note that, in Dung’s argumentation
frameworks, every attack is considered as “valid” in the
sense that it may affect its target. The following
definition strengthens the notion of structure by adding a kind
of reinstatement principle on attacks, that forces every
attack that cannot be defeated to be “valid”.
Definition 11 (D-structure). A d-structure A = hS, Γi
is a structure that satisfies (Acc(A) ∩ K) ⊆ Γ.
Definition 12. A conflict-free (resp. admissible,
complete, preferred, stable) d-structure is a conflict-free
(resp. admissible, complete, preferred, stable) structure
which is also a d-structure.</p>
      <p>As a direct consequence of Definition 7, we have:
Observation 2.
d-structure.</p>
      <sec id="sec-5-1">
        <title>Every complete structure is also a</title>
        <p>Observation 2 plus Theorem 3 immediately imply the
existence of a one-to-one correspondence between
complete (resp. preferred or stable) d-structures and their
corresponding AFRA and Dung’s extensions. In order
to establish a correspondence between conflict-free (resp.
admissible) d-structures and their corresponding Dung’s
extensions, we need to define what it means for a set of
arguments to be an extension of some recursive
framework.</p>
        <p>Definition 13 (Argument extensions). A set of
arguments S ⊆ A is conflict-free (resp. admissible,
complete, preferred, stable) iff there is some Γ ⊆ K such
that A = hS, Γi is a conflict-free (resp. admissible,
complete, preferred, stable) d-structure.</p>
        <p>Definition 13 allows us to talk about sets of
arguments instead of structures. Before formalising the fact
that Definition 13 characterizes a conservative
generalisation of Dung’s argumentation framework, we define
the attack relation associated with some framework in a
similar way to the attack relation associated with some
structure: RRAF d=ef { (s(α), t(α)) α ∈ K }. Note that,
since every structure A = hS, Γi satisfies Γ ⊆ K, it
clearly follows that RA ⊆ RRAF. We also precise what
we mean by non-recursive framework:
Definition 14 (Non-recursive framework). A
framework RAF = hA,K,s,ti is said to be non-recursive iff
RRAF ⊆ A×A.</p>
        <p>That is, non-recursive frameworks are those in which
no attack targets another attack. Given a non-recursive
framework RAF, it is easy to observe that AF =
hA, RRAFi is a D-framework (Definition 1). In this sense,
by RAFD d=ef hA, RRAFi, we denote the D-framework
associated with some RAF.</p>
        <p>Observation 3. Every d-structure A = hS, Γi of any
non-recursive framework satisfies Γ = K.</p>
        <p>Theorem 4. A set of arguments S ⊆ A is conflict-free
(resp. admissible, complete, preferred or stable) w.r.t.
some non-recursive RAF (Definition 13) iff it is
conflictfree (resp. admissible, complete, preferred or stable)
w.r.t. RAFD (Definition 3).</p>
        <sec id="sec-5-1-1">
          <title>Due to Observation 2, it follows directly that:</title>
          <p>Corollary 1. A structure A = hS, Ki is complete (resp.
preferred, stable) w.r.t. a non-recursive RAF
(Definition 7) iff S is complete (resp. preferred or stable) w.r.t.
RAFD (Definition 3).</p>
          <p>It is worth to note that the notion of d-structure
provides alternative semantics for the principles of
conflict-freeness and admissibility.</p>
          <p>Example 1 (cont’d) Among the conflict-free
structures that are not admissible, only five are conflict-free
d-structures: h?, {α, β}i, h{a}, {α, β}i, h{b}, {α, β}i,
h{a, b}, {β}i, h{b}, {β}i. Similarly, among the
admissible structures that are not complete, only five are
admissible d-structures: h{a, c}, {β}i, h{b, c}, {β}i, h{a}, {β}i,
h{c}, {β}i and h?, {β}i.</p>
          <p>Example 2 (cont’d) There are admissible structures
w.r.t. the framework represented in Fig. 2 that are not
d-structures: for instance A1 and A2. Indeed, each
dstructure must contain the attacks thas are not targeted
by any other attack, that is, { , α, δ}. Moreover each
d-structure containing a must also contain γ.
6</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Inhibited attacks</title>
      <p>In this section, the intuition behind the concept of
inhibited attacks is deepened and precisely defined. Indeed,
we may expect that attacks that are inhibited do not
have any effect on their targets, that is, we may remove
them without modifying the condition of the structure.
Example 6. Let RAF be the recursive argumentation
framework of Fig. 6 and A = h{a, b, c}, {β}i its unique
complete structure. It is easy to check that α is inhibited
w.r.t. A because c and β belong to the structure and α is
the target of β. According to the above intuition, we may
expect that this would imply that there is a “somehow”
corresponding structure A0 which is complete w.r.t. some
RAF0 obtained by removing α. Note that, in this case,
removing α also implies removing β because there
cannot be attacks without target. In fact, the resulting RAF0
is a recursive framework with arguments {a, b, c} and no
attack. It is easy to check that A0 = h{a, b, c}, ?i is
complete (also preferred and stable) w.r.t RAF0 and that it
shares with A the set of “acceptable” arguments.</p>
      <sec id="sec-6-1">
        <title>Let us now formalise this intuition:</title>
        <p>Definition 15. Given some framework RAF and two
different attacks β, α, we define: β ≺ α iff there is some
chain of attacks δ1, δ2, . . . δn such that δ1 = β, δn = α
and t(δi) = δi+1 for 1 ≤ i &lt; n.</p>
        <p>For instance, in the argumentation framework of
Fig. 6, we have that β ≺ α. On the other hand, neither
α ≺ β, nor β ≺ α hold for the argumentation framework
of Fig. 10. Note that ≺ is the empty relation for any
non-recursive framework. As usual, by we denote the
reflexive closure of ≺.</p>
        <p>Given an attack α, and a set of attacks Γ, by Γ−α d=ef
Γ\{ β ∈ K β α } we denote the set of attacks
obtained by removing the attack α from Γ.
Furthermore, by RAF−α = hA, K−α, s−α, t−αi, with s−α and
t−α the restrictions of s and t to K−α, we denote
the framework obtained by removing the attack α from
RAF = hA,K,s,ti. Similarly, by A−α = hS, Γ−αi we
denote the structure obtained by removing the attack α
from the structure A = hS, Γi.</p>
        <p>Example 1 (cont’d) Let RAF be the recursive
argumentation framework of Fig. 6. Then RAF−α =
hA, ?, s−α, t−αi with A = {a, b, c} because β ≺ α
implies that β &lt; K−α. Furthermore, if A = h{a, b, c}, {β}i,
then A−α = h{a, b, c}, ?i which is a stable structure of
RAF−α.</p>
        <p>Proposition 6 below formalises the intuitions presented
in the previous example.</p>
        <p>Proposition 6. Let RAF be some framework, A be some
conflict-free (resp. admissible, complete, preferred,
stabwl.er).ts.trAu.ctTuhreena,nAd−αα ∈is Iancho(nAfl)icbte-fsroeem(ereisnph.ibaitdemd isastitbalcek,
complete, preferred, stable) structure of RAF−α.
7</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion and future works</title>
      <p>In this work we have extended Dung’s abstract
argumentation framework with recursive attacks. One of the
essential characteristics of this extension is its
conservative nature with respect to Dung’s approach (when
d-structures are considered). The other one is that
semantics are given with respect to the notion of “valid
attacks” which play a role analogous to attacks in Dung’s
frameworks. The notions of “grounded attack” and
“valid attack” have been introduced in [7]. However,
these notions have been encoded through a two-step
translation into a meta-argumentation framework. In
the first step, a meta-argument is associated to an
attack, and a support relation is added from the source of
the attack to the meta-argument. In the second step,
a support relation is encoded by the addition of a new
meta-argument and new attacks. So [7] uses a method
for flattening a recursive framework. As a consequence,
extensions contain different kinds of argument. In
contrast, we propose a theory where valid attacks remain
explicit, and distinct from arguments, within the notion
of structure. Despite these differences with respect to
other generalisations, we proved a one-to-one
correspondence with AFRA-extensions in the case of the complete,
preferred and stable semantics, while retaining a
one-toone correspondence with Dung’s frameworks in the case
of conflict-free and admissible extensions.</p>
      <p>For a better understanding of the RAF framework,
future work should include the study of other
semantics (stage, semi-stable, grounded and ideal),
extending our approach by taking into account bipolar
interactions [9; 16] (case when arguments and attacks may
be attacked or supported), and enriching the translation
proposed by [5; 6; 13; 15] from Dung’s framework into
propositional logic and ASP, in order to capture RAF.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          .
          <article-title>A reasoning model based on the production of acceptable arguments</article-title>
          .
          <source>Annals of Mathematics and Artificial Intelligence</source>
          ,
          <volume>34</volume>
          :
          <fpage>197</fpage>
          -
          <lpage>216</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Maudet</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          .
          <article-title>Modelling dialogues using argumentation</article-title>
          .
          <source>In Proc. of ICMAS</source>
          , pages
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Arisaka</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Satoh</surname>
          </string-name>
          .
          <article-title>Voluntary manslaughter? a case study with meta-argumentation with supports</article-title>
          . In S. Kurahashi,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ohta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Arai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Satoh</surname>
          </string-name>
          , and D. Bekki, editors,
          <source>New Frontiers in Artificial Intelligence. JSAI-isAI 2016. Lecture Notes in Computer Science</source>
          , vol
          <volume>10247</volume>
          , pages
          <fpage>241</fpage>
          -
          <lpage>252</lpage>
          . Springer, Cham,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          , and
          <string-name>
            <surname>G. Guida.</surname>
          </string-name>
          <article-title>AFRA: argumentation framework with recursive attacks</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          ,
          <volume>52</volume>
          (
          <issue>1</issue>
          ):
          <fpage>19</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          .
          <article-title>Checking the acceptability of a set of arguments</article-title>
          . In J. P. Delgrande and T. Schaub, editors,
          <source>10th International Workshop on Non-Monotonic Reasoning (NMR</source>
          <year>2004</year>
          ), Whistler, Canada, June 6-8,
          <year>2004</year>
          , Proceedings, pages
          <fpage>59</fpage>
          -
          <lpage>64</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Carballido</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Nieves</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Osorio</surname>
          </string-name>
          .
          <article-title>Inferring preferred extensions by pstable semantics</article-title>
          .
          <source>Inteligencia artificial: Revista Iberoamericana de Inteligencia Artificial</source>
          ,
          <volume>13</volume>
          (
          <issue>41</issue>
          ):
          <fpage>38</fpage>
          -
          <lpage>53</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          .
          <article-title>Reasoning about preferences in argumentation frameworks</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>173</volume>
          (
          <fpage>9</fpage>
          -10):
          <fpage>901</fpage>
          -
          <lpage>934</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Osorio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Nieves</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Santoyo</surname>
          </string-name>
          .
          <article-title>Complete extensions as clark's completion semantics</article-title>
          .
          <source>In Proc. of the Mexican International Conference on Computer Science</source>
          , pages
          <fpage>81</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. van der Torre.</surname>
          </string-name>
          <article-title>Modelling defeasible and prioritized support in bipolar argumentation</article-title>
          .
          <source>Annals of Maths and AI</source>
          ,
          <volume>66</volume>
          (
          <issue>1-4</issue>
          ):
          <fpage>163</fpage>
          -
          <lpage>197</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          , and
          <string-name>
            <surname>M-C.</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Towards a new framework for recursive interactions in abstract bipolar argumentation</article-title>
          .
          <source>In Proc. of COMMA</source>
          , pages
          <fpage>191</fpage>
          -
          <lpage>198</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          <article-title>Farin˜as del Cerro, and</article-title>
          <string-name>
            <surname>M-C.</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Valid attacks in argumentation frameworks with recursive attacks</article-title>
          .
          <source>Technical Report RR-2017-16-FR</source>
          , IRIT,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gottifredi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Garc</surname>
          </string-name>
          <article-title>´ıa, and</article-title>
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          .
          <article-title>An approach to abstract argumentation with recursive attack and support</article-title>
          .
          <source>J. Applied Logic</source>
          ,
          <volume>13</volume>
          (
          <issue>4</issue>
          ):
          <fpage>509</fpage>
          -
          <lpage>533</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gottifredi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Garc</surname>
          </string-name>
          <article-title>´ıa, and</article-title>
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          .
          <article-title>On the acceptability semantics of argumentation frameworks with recursive attack and support</article-title>
          .
          <source>In Proc. of COMMA</source>
          , pages
          <fpage>231</fpage>
          -
          <lpage>242</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          .
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          .
          <article-title>Computational properties of argument systems satisfying graph-theoretic constraints</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>171</volume>
          (
          <fpage>10</fpage>
          -15):
          <fpage>701</fpage>
          -
          <lpage>729</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>U.</given-names>
            <surname>Egly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Answer-set programming encodings for argumentation frameworks</article-title>
          .
          <source>Argument &amp; Computation</source>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          ):
          <fpage>147</fpage>
          -
          <lpage>177</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>