<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Valid attacks in Argumentation Frameworks with Recursive Attacks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">C</forename><surname>Cayrol</surname></persName>
							<email>ccayrol@irit.fr</email>
						</author>
						<author>
							<persName><forename type="first">J</forename><surname>Fandinno</surname></persName>
							<email>jorge.fandinno@irit.fr</email>
						</author>
						<author>
							<persName><forename type="first">L</forename><surname>Fariñas</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Del</forename><surname>Cerro</surname></persName>
						</author>
						<author>
							<persName><forename type="first">M-C</forename><surname>Lagasquie-Schiex</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="laboratory">IRIT</orgName>
								<orgName type="institution" key="instit1">Université de Toulouse</orgName>
								<orgName type="institution" key="instit2">CNRS</orgName>
								<address>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="laboratory">Centre Interna-tional de Mathématiques et d&apos;Informatique de Toulouse</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Valid attacks in Argumentation Frameworks with Recursive Attacks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CD71A235711435F9351EAD39B850E214</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The purpose of this work is to study a generalisation of Dung's abstract argumentation frameworks that allows representing recursive attacks, that is, a class of attacks whose targets are other attacks. We do this by developing a theory of argumentation where the classic role of attacks in defeating arguments is replaced by a subset of them, which is extension dependent and which, intuitively, represents a set of "valid attacks" with respect to the extension. The studied theory displays a conservative generalisation of Dung's semantics (complete, preferred and stable) and also of its principles (conflictfreeness, acceptability and admissibility). Furthermore, despite its conceptual differences, we are also able to show that our theory agrees with the AFRA interpretation of recursive attacks for the complete, preferred and stable semantics.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Argumentation has become an essential paradigm for Knowledge Representation and, especially, for reasoning from contradictory information <ref type="bibr">[1; 11]</ref> and for formalizing the exchange of arguments between agents in, e.g., negotiation <ref type="bibr" target="#b1">[2]</ref>. Formal abstract frameworks have greatly eased the modelling and study of argumentation. For instance, a Dung's argumentation framework (AF) <ref type="bibr" target="#b10">[11]</ref> consists of a collection of arguments interacting with each other through an attack relation, enabling to determine "acceptable" sets of arguments called extensions.</p><p>A natural generalisation of Dung's argumentation frameworks consists in allowing high-order attacks that target other attacks. Here is an example in the legal field, borrowed from <ref type="bibr" target="#b2">[3]</ref>.</p><p>Example 1. The lawyer says that the defendant did not have intention to kill the victim (Argument b). The prosecutor says that the defendant threw a sharp knife towards the victim (Argument a). So, there is an attack from a to b. And the intention to kill should be inferred. Then the lawyer says that the defendant was in a habit of throwing the knife at his wife's foot once drunk. This latter argument (Argument c) is better considered attacking the attack from a to b, than argument a itself. Now the prosecutor's argumentation seems no longer sufficient for proving the intention to kill. This example is represented as a recursive framework in Fig. <ref type="figure" target="#fig_0">1</ref>. Another example, borrowed from <ref type="bibr">[4; 9]</ref>, will be taken as a running example.</p><p>Example 2. Suppose Bob is making decisions about his Christmas holidays, and is willing to buy cheap last minute offers. He knows there are deals for travelling to Gstaad (g) or Cuba <ref type="bibr">(c)</ref>. Suppose that Bob has a preference for skiing (p) and knows that Gstaad is a renowned ski resort. However, the weather service reports that it has not snowed in Gstaad (n). So it might not be possible to ski there. Suppose finally that Bob is informed that the ski resort in Gstaad has a good amount of artificial snow, that makes it anyway possible to ski there (a). The different attacks are represented on Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>A semantics for these classes of recursive frameworks has been first introduced in <ref type="bibr" target="#b13">[14]</ref> in the context of preferences in argumentation frameworks, and latter studied in <ref type="bibr" target="#b3">[4]</ref> under the name of AFRA (Argumentation Framework with Recursive Attacks). This version describes abstract argumentation frameworks in which the interactions can be either attacks between arguments or attacks from an argument to another attack. A translation of an AFRA into an AF is defined by the addition of some new arguments and the attacks they produce or they receive. Note that AFRA have been extended in order to handle recursive support interactions together with recursive attacks <ref type="bibr">[9; 10]</ref>. However, when supports are removed, these approaches go back to AFRA. A similar work is described in <ref type="bibr" target="#b6">[7]</ref> using the addition of meta-arguments that enable to encode the notions of "grounded attack" and "valid attack". The notion of grounded attack is about the source of the attack and the notion of valid attack is about the link between the source and the target of the attack (i.e. the role of the interaction itself). Despite the intuitive results obtained by these approaches regarding complete, stable or grounded extensions, it somehow changes the role that attacks play in Dung's frameworks. observe that {a, b} is considered conflict-free in AFRA because there is no attack between a and b. In some sense, the connection between an attack and its source has been lost. As another example of this behaviour, the set {α, b} is not AFRA-conflict-free despite the fact that the source of α, the argument a, is not in the set.</p><p>In this paper, we study an alternative semantics for argumentation frameworks with recursive attacks based on the following intuitive principles: P1 The role played in Dung's argumentation frameworks by attacks in defeating arguments is now played by a subset of these attacks, which is extension dependent and represents the "valid attacks" with respect to that extension.</p><p>P2 It is a conservative generalisation of Dung's framework for the definitions of conflict-free, admissible, complete, preferred, and stable extensions. For instance, in the proposed semantics, the conflictfree extensions of the framework of Fig. <ref type="figure">3</ref> are precisely Dung's conflict-free extensions: ∅, {a} and {b}. Besides, as we will see later, the attack α is valid with respect to all three extensions because it is not the target of any attack. It is worth noting that, despite its conceptual difference with respect to AFRA, we are able to prove an one-to-one correspondence between our complete, preferred and stable extensions and the corresponding AFRA extensions, in which the set of "acceptable" arguments are the same. This offers an alternative view for the semantics of recursive attacks that we believe to be closer to Dung's intuitive understanding. For instance, the graph depicted in Fig. <ref type="figure">3</ref>  To obtain shorter definitions we will also use the following notations:</p><formula xml:id="formula_0">Def (S) def = { a ∈ A ∃b ∈ S s.t. (b, a) ∈ R } Acc(S) def = { a ∈ A ∀b ∈ A, (b, a) ∈ R implies b ∈ Def (S) }</formula><p>respectively denote the set of all defeated and acceptable arguments w.r.t. S.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3. Given a D-framework AF</head><formula xml:id="formula_1">= A, R , a set of arguments S ⊆ A is said to be i) conflict-free iff S ∩ Def (S) = ∅, ii) admissible iff it is conflict-free and S ⊆ Acc(S), iii) complete iff it is conflict-free and S = Acc(S), iv) preferred iff it is ⊆-maximal 1 admissible, v) stable iff it is conflict-free and S ∪ Def (S) = A.</formula><p>Theorem 1 <ref type="bibr">([11]</ref>). Given a D-framework AF = A, R , the following assertions hold: i) every complete set is also admissible, ii) every preferred set is also complete, and iii) every stable set is also preferred.</p><p>For instance, in Example 3, the argument a is accepted w.r.t. any set S because there is no argument x ∈ A such that (x, a) ∈ R. Furthermore, b is defeated and nonacceptable w.r.t. the set {a}. Then, it is easy to check that {a} is stable (and, thus, conflict-free, admissible, complete and preferred). The empty set ∅ is admissible, but not complete; and the set {b} is conflict-free, but not admissible.</p><p>3 Semantics for recursive attacks Definition 4. A recursive argumentation framework RAF = A,K,s,t is a quadruple where A and K are (possibly infinite) disjunct sets respectively representing arguments and attack names, and where s : K −→ A and t : K −→ A ∪ K are functions respectively mapping each attack to its source and its target.</p><p>For instance, the argumentation framework of Example 3 corresponds to RAF 3 = A 3 , K 3 , s 3 , t <ref type="bibr" target="#b2">3</ref> where</p><formula xml:id="formula_2">A 3 = {a, b}, K 3 = {α}, s 3 (α) = a and t 3 (α) = b.</formula><p>In general, given any D-framework AF = A,R , we may obtain its corresponding argumentation framework RAF = A,K,s,t by defining a set of attack names It is worth noting that our definition allows the existence of several attacks between the same arguments. Though this does not make any difference for frameworks without recursive attacks, for recursive ones, it allows representing attacks between the same arguments that are valid in different contexts. For instance, in the example of Figure <ref type="figure" target="#fig_6">5</ref>, there are two attacks between a and b, </p><formula xml:id="formula_3">K = { α (a,b) (a, b) ∈ R }.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 5 (Structure).</head><p>A pair A = S, Γ is said to be a structure of some RAF = A,K,s,t iff it satisfies: S ⊆ A and Γ ⊆ K.</p><p>Intuitively, the set S represents the set of "acceptable" arguments w.r.t. the structure A, while Γ represents the set of "valid attacks" w.r.t. A. Any attack<ref type="foot" target="#foot_0">2</ref> α ∈ Γ is understood as non-valid and, in this sense, it cannot defeat the argument or attack that it is targeting.</p><p>For the rest of this section we assume that all definitions and results are relative to some given framework RAF = A,K,s,t . We extend now the definition of defeated arguments (Definition 2) using the set Γ instead of the attack relation R: given a structure of the form A = S, Γ , we define:</p><formula xml:id="formula_4">Def (A) def = { a ∈ A ∃α ∈ Γ, s(α) ∈ S and t(α) = a } (1)</formula><p>In other words, an argument a ∈ A is defeated w.r.t. A iff there is a "valid attack" w.r.t. A that targets a and whose source is "acceptable" w.r.t. A. It is interesting to observe that we may define the attack relation associated with some structure A = S, Γ as follows:</p><formula xml:id="formula_5">R A def = { (s(α), t(α)) α ∈ Γ }<label>(2)</label></formula><p>and that, using this relation, we can rewrite (1) as:</p><formula xml:id="formula_6">Def (A) def = { a ∈ A ∃b ∈ S s.t. (b, a) ∈ R A } (3)</formula><p>Now, it is easy to see that our definition can be obtained from Dung's definition of defeat (Definition 2) just by replacing the attack relation R by the attack relation R A associated with the structure A, or in other words, by replacing the set of all attacks in the argumentation framework by the set of the "valid attacks" w.r.t. the structure A, as stated in P1. Analogously, by</p><formula xml:id="formula_7">Inh(A) def = { α ∈ K ∃b ∈ S s.t. (b, α) ∈ R A } (4)</formula><p>we denote a set of attacks that, intuitively, represents the "inhibited attacks 3 " w.r.t. A.</p><p>We are now ready to extend the definition of acceptable argument w.r.t. a set (Definition 2): Definition 6 (Acceptability). An element x ∈ (A ∪ K) is said to be acceptable w.r.t. some structure A iff every attack α ∈ K with t(α) = x satisfies one of the following conditions:</p><formula xml:id="formula_8">(i) s(α) ∈ Def (A) or (ii) α ∈ Inh(A).</formula><p>By Acc(A), we denote the set containing all acceptable arguments and attacks with respect to A. We also define the following order relations that will help us defining preferred structures: for any pair of structures A = S, Γ and A = S , Γ , we write A A iff (S ∪ Γ) ⊆ (S ∪ Γ ) and we write A ar A iff S ⊆ S . As usual, we say that a structure A is -maximal (resp. ar -maximal) iff every A that satisfies A A (resp. A ar A ) also satisfies A A (resp. A ar A).  It is worth to mention that preferred and arg-preferred structures do not necessarily coincide, since there exist preferred structures that do not contain a maximal set of arguments as shown by the following example: We show now 5 that, as in Dung's argumentation theory, there is also a kind of Fundamental Lemma for argumentation frameworks with recursive attacks. For the sake of compactness, we will adopt the following notations: Given a structure A = S, Γ and a set T ⊆ (A ∪ K) containing arguments and attacks, by</p><formula xml:id="formula_9">Definition 7. A structure A = S, Γ is said to be: i) conflict-free iff S ∩Def (A) = ∅ and Γ∩Inh(A) = ∅, ii) admissible iff it is conflict-free and (S ∪ Γ) ⊆ Acc(A), iii) complete iff it is conflict-free and Acc(A) = (S ∪ Γ), iv) preferred iff it is a -maximal admissible structure, v) arg-preferred iff it is a ar -maximal preferred structure, vi) stable 4 iff S = Def (A) and Γ = Inh(A).</formula><formula xml:id="formula_10">A ∪ T def = S ∪ (T ∩ A), Γ ∪ (T ∩ K)</formula><p>we denote the result of extending A with the elements in T .</p><p>Lemma 1 (Fundamental Lemma). Let A = S, Γ be an admissible structure and x, y ∈ Acc(A) be any pair arguments. Similarly, by Inh(A) def = K\Inh(A) we denote the non-inhibited attacks. Note also that S = Def (A) and Γ = Inh(A) already implies conflict-freeness. 5 The proofs of propositions, lemmas, theorems given in this paper can be found in <ref type="bibr" target="#b7">[8]</ref>.</p><p>of acceptable elements. Then, (i) A = A ∪ {x} is an admissible structure, and (ii) y ∈ Acc(A ). Moreover, admissible structures form a complete partial order with preferred structures as maximal elements: Proposition 1. The set of all admissible structures forms a complete partial order with respect to . Furthermore, for every admissible structure A, there exists an (arg-)preferred one A such that A A . The following result shows that the usual relation between extensions also holds for structures. Theorem 2. The following assertions hold: i) every complete structure is also admissible, ii) every preferred structure is also complete, and iii) every stable structure is also preferred.  <ref type="figure" target="#fig_1">2</ref>. This framework has a unique complete, preferred and stable structure: A 0 = {a, g, p}, {α, , γ, δ} . Among the 63 admissible structures, we find A 1 = {a}, { } , A 2 = {a}, { , δ} , and A 3 = {a}, {α, , γ, δ} .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Relation with AFRA</head><p>In this section, we establish correspondences between our semantics for recursive attacks and the semantics for AFRA. In <ref type="bibr" target="#b3">[4]</ref> a recursive framework is turned into a Dung's framework by adding new arguments and attacks using the following notion of defeat:</p><formula xml:id="formula_11">Definition 8 (Defeat). Let RAF = A,K,s,t . An attack α ∈ K is said to directly defeat x ∈ A ∪ K iff t(α) = x. It is said to indirectly defeat β ∈ K iff α directly defeats s(β). Then, α is said to defeat x ∈ A ∪ K iff α directly defeats x or α indirectly defeats x.</formula><p>For instance, in Example 5, it is easy to see that α directly defeats b and indirectly defeats γ. Hence, α defeats both b and γ. Attacks β and γ directly defeat α and β, respectively. It has been shown in <ref type="bibr" target="#b3">[4]</ref>  In order to characterize the relation between our approach and AFRA, we will need the following notation. Given some structure A = S, Γ , by</p><formula xml:id="formula_12">E A def = S ∪ { α ∈ Γ s(α) ∈ S }</formula><p>we denote its corresponding AFRA-extension.</p><p>Note that the AFRA-extension corresponding to a given structure only contains the attacks of the structure whose source belongs to the structure. The other attacks of the structure do not appear in the AFRAextension. Intuitively, this selection is motivated by the fact that any attack in an AFRA-extension directly carries a conflict against its target, even if its source is not accepted, something which we avoid in our framework. Proposition 2. Let RAF = A,K,s,t and a structure A = S, Γ , the following assertions hold: i</p><formula xml:id="formula_13">) if A is conflict-free, then E A is AFRA-conflict-free, ii) if A is admissible, then E A is AFRA-admissible, iii) if A is complete, then E A is AFRA-complete, iv) if A is preferred, then E A is AFRA-preferred, v) if A is stable, then E A is AFRA-stable.</formula><p>For the converse of Prop. 2, we need to introduce some extra notation: Given some set E ⊆ (A ∪ K), by S E def = (E ∩ A), we denote the set of arguments of E. Then, considering the structure A = S E , (E ∩ K) , by</p><formula xml:id="formula_14">Γ E def = (E ∩K) ∪ { α ∈ (Acc(A )∩K) s(α) E } (5)</formula><p>we denote the set of "valid attacks" with respect to E. Finally, by A E def = S E , Γ E , we denote the structure corresponding to some AFRA-extension E. Here, we have to add attacks that do not belong to the AFRA-extension. Intuitively, this is due to the fact that, in AFRA, an attack is not acceptable whenever its source is not acceptable [4, <ref type="bibr">Lemma 1]</ref>. Hence, we need to add to the structure all those attacks that are non-AFRA-acceptable only because of attacks towards their source. Proposition 3. Given a RAF = A,K,s,t and a set E ⊆ (A ∪ K), the following assertions hold:</p><p>i</p><formula xml:id="formula_15">) if E is AFRA-conflict-free, then A E is conflict-free, ii) if E is AFRA-admissible, then A E is conflict-free, iii) if E is AFRA-complete, A E is a complete structure, iv) if E is AFRA-preferred, A E is a preferred structure, v) if E is AFRA-stable, A E is a stable structure.</formula><p>It is worth to emphasise that for an AFRA-admissible extension, Proposition 3 only ensures that the corresponding structure A E is a conflict-free structure. In fact, there exist AFRA-admissible extensions, whose corresponding structures are not admissible. For instance, consider- ing the argumentation framework of Fig. <ref type="figure" target="#fig_9">10</ref>, the set {α, c} is AFRA-admissible, but the corresponding structure {c}, {α, β} is not an admissible structure (since a is not in the structure). This discrepancy follows from the fact that, in AFRA, α defeats β despite of the absence of a while in our approach attacks whose source is not accepted cannot defeat other arguments or attacks. This difference disappears if we consider what we call closed sets. We say that</p><formula xml:id="formula_16">E ⊆ (A ∪ K) is closed iff every attack α ∈ (E ∩ K) satisfies s(α) ∈ E. Proposition 4.</formula><p>Let E be a closed AFRA-admissible extension. Then, A E is an admissible structure.</p><p>Note that for conflict-freeness and admissibility, the correspondence is not necessarily one-to-one. For instance, A = {a, c}, {α} and A = {a, c}, {α, β} are both admissible structures of the framework of Fig. <ref type="figure" target="#fig_9">10</ref> and both of them correspond to the same AFRAadmissible extension E A = E A = {a, c, α}. Recall that β is acceptable w.r.t. A because it is not attacked. However, it is not AFRA-acceptable w.r.t. {a, c, α, β} because, in AFRA, α defeats β and α is not itself defeated (in fact, {a, c, α, β} is not even AFRA-conflict-free). On the other hand, note that only A is a complete structure. In fact, for complete structures the correspondence is one-to-one.</p><p>Let us denote by Afra(•) the function mapping each structure A to its corresponding AFRA-extension E A . Proposition 5. The following assertions hold: i) if E is AFRA-complete (or just a closed AFRAconflict-free extension), then Afra(A E ) = E, and ii) if A is a complete structure, then A Afra(A) = A. Theorem 3. The function Afra(•) is a one-to-one correspondence between the sets of all complete (resp. preferred and stable) structures and the set of all AFRAcomplete (resp. preferred and stable) extensions.</p><p>Note that given the one-to-one correspondence between preferred structures and AFRA-preferred extensions, there are AFRA-preferred extensions that do not correspond to arg-preferred ones and thus, they do not contain a maximal set of arguments. For instance, {a, b, β} and {a, α} are both AFRA-preferred extensions in Example 4, but only the former contains a maximal set of arguments.</p><p>An interesting consequence of Theorem 3 and Proposition 12 in <ref type="bibr" target="#b3">[4]</ref> is that complexity for RAFs' semantics does not increase w.r.t. Dung's frameworks. That is, credulous acceptance w.r.t. the complete, preferred and the stable semantics is NP-complete. Sceptical acceptance w.r.t. the preferred (resp. stable) semantics is Π P 2 -complete (resp. coNP-complete) <ref type="bibr" target="#b11">[12]</ref>. Example 2 (cont'd) For the framework represented in Fig. <ref type="figure" target="#fig_1">2</ref>, there is a unique AFRA-complete, AFRA-preferred and AFRA-stable extension: E = {a, g, p, α, , γ}. Note that δ E whereas E = E A0 . Indeed, no AFRA-admissible extension contains δ. Analogously, we have E A1 = E A2 = E A3 = {a, }. Moreover, among the AFRA-admissible extensions, we find {a, g, , γ} which is not closed. The associated structure A 4 = {a, g}, { , γ} is not an admissible structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conservative generalisation</head><p>As mentioned in the introduction, our theory aims to be a conservative generalisation of Dung's theory (P2). Indeed, given the one-to-one correspondence between complete, preferred and stable structures and their corresponding AFRA-extensions and between the latter and Dung's extensions <ref type="bibr" target="#b3">[4]</ref> in the case of non-recursive frameworks, it immediately follows that there exists a one-to-one correspondence between complete, preferred and stable structures and their corresponding Dung's extensions.</p><p>On the other hand, this is not the case when we consider only conflict-freeness or admissibility. As mentioned in the introduction, {a, b} is an AFRA-conflict-free extension of the non-recursive argumentation framework of Example 3. From Proposition 3, this implies that the corresponding structure {a, b}, ∅ , is a conflict-free structure.</p><p>It is worth to note that, in Dung's argumentation frameworks, every attack is considered as "valid" in the sense that it may affect its target. The following definition strengthens the notion of structure by adding a kind of reinstatement principle on attacks, that forces every attack that cannot be defeated to be "valid". Definition 11 (D-structure). A d-structure A = S, Γ is a structure that satisfies (Acc(A) ∩ K) ⊆ Γ. Definition 12. A conflict-free (resp. admissible, complete, preferred, stable) d-structure is a conflict-free (resp. admissible, complete, preferred, stable) structure which is also a d-structure.</p><p>As a direct consequence of Definition 7, we have:</p><formula xml:id="formula_17">Observation 2.</formula><p>Every complete structure is also a d-structure.</p><p>Observation 2 plus Theorem 3 immediately imply the existence of a one-to-one correspondence between complete (resp. preferred or stable) d-structures and their corresponding AFRA and Dung's extensions. In order to establish a correspondence between conflict-free (resp. admissible) d-structures and their corresponding Dung's extensions, we need to define what it means for a set of arguments to be an extension of some recursive framework. Definition 13 (Argument extensions). A set of arguments S ⊆ A is conflict-free (resp. admissible, complete, preferred, stable) iff there is some Γ ⊆ K such that A = S, Γ is a conflict-free (resp. admissible, complete, preferred, stable) d-structure.</p><p>Definition 13 allows us to talk about sets of arguments instead of structures. Before formalising the fact that Definition 13 characterizes a conservative generalisation of Dung's argumentation framework, we define the attack relation associated with some framework in a similar way to the attack relation associated with some structure: R RAF def = { (s(α), t(α)) α ∈ K }. Note that, since every structure A = S, Γ satisfies Γ ⊆ K, it clearly follows that R A ⊆ R RAF . We also precise what we mean by non-recursive framework: Definition 14 (Non-recursive framework). A framework RAF = A,K,s,t is said to be non-recursive iff R RAF ⊆ A×A.</p><p>That is, non-recursive frameworks are those in which no attack targets another attack. Given a non-recursive framework RAF, it is easy to observe that AF = A, R RAF is a D-framework (Definition 1). In this sense, by RAF D def = A, R RAF , we denote the D-framework associated with some RAF. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Inhibited attacks</head><p>In this section, the intuition behind the concept of inhibited attacks is deepened and precisely defined. Indeed, we may expect that attacks that are inhibited do not have any effect on their targets, that is, we may remove them without modifying the condition of the structure. Example 6. Let RAF be the recursive argumentation framework of Fig. <ref type="figure">6</ref> and A = {a, b, c}, {β} its unique complete structure. It is easy to check that α is inhibited w.r.t. A because c and β belong to the structure and α is the target of β. According to the above intuition, we may expect that this would imply that there is a "somehow" corresponding structure A which is complete w.r.t. some RAF obtained by removing α. Note that, in this case, removing α also implies removing β because there cannot be attacks without target. In fact, the resulting RAF is a recursive framework with arguments {a, b, c} and no attack. It is easy to check that A = {a, b, c}, ∅ is complete (also preferred and stable) w.r.t RAF and that it shares with A the set of "acceptable" arguments.</p><p>Let us now formalise this intuition:</p><p>Definition 15. Given some framework RAF and two different attacks β, α, we define: β ≺ α iff there is some chain of attacks δ 1 , δ 2 , . . . δ n such that δ 1 = β, δ n = α and t(δ i ) = δ i+1 for 1 ≤ i &lt; n.</p><p>For instance, in the argumentation framework of Fig. <ref type="figure">6</ref>, we have that β ≺ α. On the other hand, neither α ≺ β, nor β ≺ α hold for the argumentation framework of Fig. <ref type="figure" target="#fig_9">10</ref>. Note that ≺ is the empty relation for any non-recursive framework. As usual, by we denote the reflexive closure of ≺.</p><p>Given an attack α, and a set of attacks Γ, by Γ −α def = Γ\{ β ∈ K β α } we denote the set of attacks obtained by removing the attack α from Γ. Furthermore, by RAF −α = A, K −α , s −α , t −α , with s −α and t −α the restrictions of s and t to K −α , we denote the framework obtained by removing the attack α from RAF = A,K,s,t . Similarly, by A −α = S, Γ −α we denote the structure obtained by removing the attack α from the structure A = S, Γ .</p><p>Example 1 (cont'd) Let RAF be the recursive argumentation framework of Fig. <ref type="figure">6</ref>. Then RAF −α = A, ∅, s −α , t −α with A = {a, b, c} because β ≺ α implies that β K −α . Furthermore, if A = {a, b, c}, {β} , then A −α = {a, b, c}, ∅ which is a stable structure of RAF −α . Proposition 6 below formalises the intuitions presented in the previous example. Proposition 6. Let RAF be some framework, A be some conflict-free (resp. admissible, complete, preferred, stable) structure and α ∈ Inh(A) be some inhibited attack w.r.t. A. Then, A −α is a conflict-free (resp. admissible, complete, preferred, stable) structure of RAF −α .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion and future works</head><p>In this work we have extended Dung's abstract argumentation framework with recursive attacks. One of the essential characteristics of this extension is its conservative nature with respect to Dung's approach (when d-structures are considered). The other one is that semantics are given with respect to the notion of "valid attacks" which play a role analogous to attacks in Dung's frameworks. The notions of "grounded attack" and "valid attack" have been introduced in <ref type="bibr" target="#b6">[7]</ref>. However, these notions have been encoded through a two-step translation into a meta-argumentation framework. In the first step, a meta-argument is associated to an attack, and a support relation is added from the source of the attack to the meta-argument. In the second step, a support relation is encoded by the addition of a new meta-argument and new attacks. So <ref type="bibr" target="#b6">[7]</ref> uses a method for flattening a recursive framework. As a consequence, extensions contain different kinds of argument. In contrast, we propose a theory where valid attacks remain explicit, and distinct from arguments, within the notion of structure. Despite these differences with respect to other generalisations, we proved a one-to-one correspondence with AFRA-extensions in the case of the complete, preferred and stable semantics, while retaining a one-toone correspondence with Dung's frameworks in the case of conflict-free and admissible extensions.</p><p>For a better understanding of the RAF framework, future work should include the study of other semantics (stage, semi-stable, grounded and ideal), extending our approach by taking into account bipolar interactions <ref type="bibr">[9; 16]</ref> (case when arguments and attacks may be attacked or supported), and enriching the translation proposed by <ref type="bibr">[5; 6; 13; 15</ref>] from Dung's framework into propositional logic and ASP, in order to capture RAF.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: An acyclic recursive framework</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Bob's dilemma: arguments are in circle and attacks in square.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Example 3 .Figure 3 :Figure 4 :</head><label>334</label><figDesc>Figure 3: A simple Dung's framework</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>2 BackgroundDefinition 1 .</head><label>21</label><figDesc>A Dung's abstract argumentation framework (D-framework for short) is a pair AF = A,R where A is a set of arguments and R ⊆ A × A is a relation representing attacks over arguments.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Definition 2 .</head><label>2</label><figDesc>corresponds to the D-framework AF 3 = A 3 , R 3 with the set of arguments A 3 = {a, b} and the attack relation R 3 = {(a, b)}. Given some D-framework AF = A,R and some set of arguments S ⊆ A, an argument a ∈ A is said to be i) defeated w.r.t. S iff ∃b ∈ S such that (b, a) ∈ R, and ii) acceptable w.r.t. S iff for every argument b ∈ A with (b, a) ∈ R, there is c ∈ S such that (c, b) ∈ R.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>Functions s and t are straightforwardly defined by mapping each attack (a, b) ∈ R as follows: s(α (a,b) ) = a and t(α (a,b) ) = b.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: A recursive framework representing attacks in different contexts</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Example 1 (Figure 6 :</head><label>16</label><figDesc>Figure 6: An acyclic recursive framework</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Example 4 .βFigure 7 :</head><label>47</label><figDesc>Figure 7: A RAF in which preferred and arg-preferred structures do not coincide</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: A Dung's framework with two attacks</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>). It is easy to check that this framework has a unique complete, preferred and stable structure A = {a, b, c}, {β} . Furthermore, there are nine admissible structures that are not complete: {a, c}, {β} , {b, c}, {β} , {a}, {β} , {c}, {β} , ∅, {β} , {a, c}, ∅ , {a}, ∅ , {c}, ∅ and ∅, ∅ . There are also other conflict-free structures that are not admissible: ∅, {α, β} , {a}, {α, β} , {b}, {α, β} , {a, b}, {β} , {b}, {β} , {a, c}, {α} , {b, c}, {α} , {a}, {α} , {b}, {α} , {c}, {α} , ∅, {α} , {a, b}, ∅ , {a, b, c}, ∅ , {b, c}, ∅ and {b}, ∅ .</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>that AFRA extensions can be characterized as the extensions of a Dung's framework whose new set of arguments contains both arguments and attacks and whose new attack relation is the defeat relation of Definition 8. In this sense, under</figDesc><table><row><cell>a</cell><cell>α</cell><cell>b</cell></row><row><cell></cell><cell>β</cell><cell>γ</cell></row><row><cell></cell><cell>c</cell><cell></cell></row><row><cell cols="3">Figure 9: AF framework for AFRA framework of Ex. 5</cell></row><row><cell cols="3">AFRA, the argumentation framework of Example 5 is</cell></row><row><cell cols="3">turned into the one in Fig. 9 and it can be checked that</cell></row><row><cell cols="3">it has a unique complete and preferred extension {a, c}</cell></row><row><cell cols="3">and no stable one. We recall next the formal definitions</cell></row><row><cell>of AFRA from [4]:</cell><cell></cell><cell></cell></row><row><cell cols="3">Definition 9. As illustrated by Example 3, AFRA does not preserve</cell></row><row><cell cols="2">Dung's notion of conflict-freeness.</cell><cell></cell></row><row><cell cols="3">Observation 1. AFRA is not a conservative generali-</cell></row><row><cell>sation of Dung's approach.</cell><cell></cell><cell></cell></row></table><note>Let RAF = A,K,s,t and E ⊆ (A ∪ K). Then, an element x ∈ (A ∪ K) is said to be AFRAacceptable w.r.t. E iff for every α ∈ K that defeats x, there is β ∈ E that defeats α. Definition 10 (AFRA-extensions).Let RAF = A,K,s,t and a set E ⊆ (A ∪ K), E is said to be: i) AFRA-conflict-free iff α, x ∈ E s.t. α defeats x, ii) AFRA-admissible iff E is AFRA-conflict-free and each element of E is AFRA-acceptable w.r.t. E, iii) AFRA-complete iff it is AFRA-admissible and every x ∈ (A ∪ K) which is AFRA-acceptable w.r.t. E belongs to E, iv) AFRA-preferred iff it is a ⊆-maximalAFRA-admissible extension, v) AFRA-stable iff it is AFRA-conflict-free and, for every x ∈ (A ∪ K), x E implies that x is defeated by some α ∈ E.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>Due to Observation 2, it follows directly that: Corollary 1. A structure A = S, K is complete (resp. preferred, stable) w.r.t. a non-recursive RAF (Definition 7) iff S is complete (resp. preferred or stable) w.r.t. RAF D (Definition 3). It is worth to note that the notion of d-structure provides alternative semantics for the principles of conflict-freeness and admissibility. ∅, {α, β} , {a}, {α, β} , {b}, {α, β} , {a, b}, {β} , {b}, {β} . Similarly, among the admissible structures that are not complete, only five are admissible d-structures: {a, c}, {β} , {b, c}, {β} , {a}, {β} , {c}, {β} and ∅, {β} . There are admissible structures w.r.t. the framework represented in Fig. 2 that are not d-structures: for instance A 1 and A 2 . Indeed, each dstructure must contain the attacks thas are not targeted by any other attack, that is, { , α, δ}. Moreover each d-structure containing a must also contain γ.</figDesc><table><row><cell>Example 1 (cont'd) Among the conflict-free struc-</cell></row><row><cell>tures that are not admissible, only five are conflict-free</cell></row><row><cell>d-structures: Example 2 (cont'd)</cell></row><row><cell>Observation 3. Every d-structure A = S, Γ of any</cell></row><row><cell>non-recursive framework satisfies Γ = K.</cell></row><row><cell>Theorem 4. A set of arguments S ⊆ A is conflict-free</cell></row><row><cell>(resp. admissible, complete, preferred or stable) w.r.t.</cell></row><row><cell>some non-recursive RAF (Definition 13) iff it is conflict-</cell></row><row><cell>free (resp. admissible, complete, preferred or stable)</cell></row><row><cell>w.r.t. RAF D (Definition 3).</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0">By Γ def = K\Γ we denote the set complement of Γ.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_1">We will deepen about the intuition of inhibited attacks in Section 6.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_2">By Def (A) def = A\Def (A) we denote the non-defeated</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A reasoning model based on the production of acceptable arguments</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Cayrol</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Mathematics and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="197" to="216" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Modelling dialogues using argumentation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Maudet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ICMAS</title>
				<meeting>of ICMAS</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="31" to="38" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Voluntary manslaughter? a case study with meta-argumentation with supports</title>
		<author>
			<persName><forename type="first">R</forename><surname>Arisaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">New Frontiers in Artificial Intelligence. JSAI-isAI 2016</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Kurahashi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Ohta</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Arai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Bekki</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">10247</biblScope>
			<biblScope unit="page" from="241" to="252" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">AFRA: argumentation framework with recursive attacks</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cerutti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approx. Reasoning</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="19" to="37" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Checking the acceptability of a set of arguments</title>
		<author>
			<persName><forename type="first">P</forename><surname>Besnard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Doutre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Workshop on Non-Monotonic Reasoning (NMR 2004)</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Delgrande</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Schaub</surname></persName>
		</editor>
		<meeting><address><addrLine>Whistler, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">June 6-8, 2004. 2004</date>
			<biblScope unit="page" from="59" to="64" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Inferring preferred extensions by pstable semantics</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Carballido</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Revista Iberoamericana de Inteligencia Artificial</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">41</biblScope>
			<biblScope unit="page" from="38" to="53" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>teligencia artificial</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Towards a new framework for recursive interactions in abstract bipolar argumentation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cayrol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cohen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M-C</forename><surname>Lagasquie-Schiex</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of COMMA</title>
				<meeting>of COMMA</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="191" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Valid attacks in argumentation frameworks with recursive attacks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Cayrol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fandinno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Del Cerro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M-C</forename><surname>Lagasquie-Schiex</surname></persName>
		</author>
		<idno>RR-2017-16-FR</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>IRIT</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An approach to abstract argumentation with recursive attack and support</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cohen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gottifredi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Simari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Applied Logic</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="509" to="533" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">On the acceptability semantics of argumentation frameworks with recursive attack and support</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cohen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gottifredi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Simari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of COMMA</title>
				<meeting>of COMMA</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="231" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="321" to="358" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Computational properties of argument systems satisfying graph-theoretic constraints</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="issue">10-15</biblScope>
			<biblScope unit="page" from="701" to="729" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Answer-set programming encodings for argumentation frameworks</title>
		<author>
			<persName><forename type="first">U</forename><surname>Egly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Gaggl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument &amp; Computation</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="147" to="177" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Reasoning about preferences in argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">173</biblScope>
			<biblScope unit="issue">9-10</biblScope>
			<biblScope unit="page" from="901" to="934" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Complete extensions as clark&apos;s completion semantics</title>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Santoyo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the Mexican International Conference on Computer Science</title>
				<meeting>of the Mexican International Conference on Computer Science</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="81" to="88" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Modelling defeasible and prioritized support in bipolar argumentation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Villata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Boella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Gabbay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Van Der Torre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Maths and AI</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page" from="163" to="197" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
