<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On the Role of Argumentation in Discovery Proof-Events</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sofia Almpani</string-name>
          <email>salmpani@sch.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petros Stefaneas</string-name>
          <email>petros@math.ntua.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ioannis Vandoulakis</string-name>
          <email>i.vandoulakis@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University of Athens</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>The Hellenic Open University</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper, we demonstrate how argumentation theory can be used to explore certain aspects of the development of discovery proof-events in time. The concept of proof-event was introduced by Joseph Goguen, who understood mathematical proof, not as a purely syntactic object, but as a social event, that takes place in specific place and time and involving agents or communities of agents. Since argumentation is inseparable from the process of searching for mathematical proof, we suggest a modified model of the proof-events calculus, based on certain versions of argumentation theories. We claim that the exchange of arguments and counterarguments set forward to clarify eventual gaps or implicit assumptions occurring in the course of a proof-event can be formalized in this modified model.</p>
      </abstract>
      <kwd-group>
        <kwd>Discovery Proof-Events</kwd>
        <kwd>Argumentation</kwd>
        <kwd>Proof-Events Calculus</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The concept of mathematical proof has undergone significant changes in the 20th century.
Proof, particularly formalized proof, was initially identified with truth in traditional
philosophy of mathematics. However, many mathematicians dealing with real proofs did not
accept the paradigm of formalized proof. Joseph Goguen [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] suggested the broader
concept of proof-event, which is actually a social event that takes place in specific place and
time and involves public communication. The concept of proof-event is designed to
embrace any proving activity, including incomplete proofs or attempts to verify a conjecture.
Vandoulakis and Stefaneas [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] described proof-events as activity of a multi-agent system
incorporating their history, insofar as they form sequences of proof-events evolving in
time. Thus, they modelled certain temporal aspects of proof-events, using the language of
the calculus of events developed in Kowalski’s calculus of events [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>Our approach combines proof-events with logic-based argumentation to study in a
more adequate way the categories of purported, faulty or incomplete proofs, setting
forward the concept of dialogue between agents using arguments and
counterarguments. Hence, we extend the calculus of proof-events by integrating argumentation
theory to represent the relevant stages of a discovery proof-event (incomplete or even false
proofs, ideas, valid or invalid inference steps, comments, etc.) in a form of dialogue of
agents that use arguments and counterarguments or counterexamples in their attempt to
clarify the validity of a purported proof.</p>
      <p>
        Many researchers have highlighted the role of argumentation in mathematics.
Mathematicians do much more, than simply prove theorems. Most of their proving activity might be
understood as varieties of argumentation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Lakatos’ Proofs and Refutations [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is an
enduring classic that highlights the role of dialogue between agents (a teacher and some
students) by attempts at proofs and critiques of these attempts1. The comparison between
argumentation supporting an assumption or a purported proof and its proof is based on the
fact that proof can be regarded as a specific kind of argumentation in mathematics [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        A methodological tool that has been widely used to examine argumentation is
Toulmin’s model [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], in which argument consists of “claim”, “data”, and “warrant” that
are considered the essential elements of applied arguments. The procedure by which
mathematicians evaluate reasoning resembles to argumentation, as various researchers
have showed ([
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], by adjusting Toulmin’s model to mathematical
examples. We propose to integrate argumentation theory into the calculus of
proofevents. By doing so, we can represent all the relevant stages that we go through when
proving, from the statement of a problem until its validation or rejection by the relevant
community that uses arguments and counterarguments or counterexamples in checking
the validity of a purported proof.
      </p>
      <p>
        To combine the proof-event calculus with argumentation theory, we use the basic
structure of Toulmin’s model for the representation of arguments and Pollock’s
logicbased argumentation theory. We rely on Pollock’s view of defeasible reasoning that
has non-monotonic character. Pollock represents argument in the form ,c , where Φ
is a set of data and c is a claim [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. He separated the rebutting and undercutting defeat
and presented one of the first monotonic logics with concepts of argument and defeat,
even though he did not explicitly distinguish between them [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>In this paper, we proceed from a comparison of proof-events and argumentation. Then,</title>
      <p>we suggest a formalization of proof-events involving argumentation theory. We model
the argument moves and the calculus of the temporal predicates. The aforementioned
calculus is analyzed in terms of the levels of argumentation. In the last section, Fermat’s</p>
    </sec>
    <sec id="sec-3">
      <title>Last Theorem is investigated as a case study illustrating the concepts introduced.</title>
      <p>2</p>
      <sec id="sec-3-1">
        <title>Proof-events vs. arguments</title>
        <p>Comparison of the basic elements of proof-events and argumentation theory shows
similarities in structure, the sequence of events, the agents, the layers of communication,
and the levels of argumentation.
1 Lakatos uses Euler’s theorem for star-polyhedra to conclude that no proof is ultimately certain.</p>
        <p>However, in our view, Lakatos’ counterexamples can be removed by reinterpretation (by another
agent) of the initial definitions, so that the community involved in a proof event could reach an
agreement concerning the validity of a purported proof. Accordingly, the mathematical
community is the ultimate truthmaker of mathematical intuitions, the validity of which is decided within
a finite, although possibly too long time-period of evolution of sequences of proof-events.</p>
        <p>
          Arguments and proof-events have three common characteristics: a set of premises
for a task or problem, a method of reasoning and a conclusion. Moreover, each
proofevent has temporal extension and, thereby history: it has a starting point and a
termination point and what is posed to be proved, emerges often out of the history of earlier
proof-events (sequences of proof-events or sequences of arguments and
counterarguments) [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ]. A sequence of proof-events is complete when the community involved in
it concludes that they have understood the suggested proof and agree that it is actually
a proof or that is invalid, based on advocated counterargument (or counterexample).
        </p>
        <p>
          Proof-events presuppose the existence of at least two agents enacting the roles of
prover or interpreter [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ]. Similarly, argumentation involves (at least two) agents
enacting the roles of supporter or opponent [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. The layers of communication,
understanding, interpretation, and validation that agents use to disseminate their knowledge,
are common in both approaches. An agent is a proactive and intelligent system that
enacts a specific role. We may consider some software systems as agents, provided that
they possess these characteristics. The main concept advanced in agent-based
approaches is that of autonomy: agents operate as independent individual entities trying
often to collaborate and coordinate with others [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. However, the steps that an
individual agent strives to perform in order to accomplish a mathematical task may intersect
with the steps attempted or undertaken by other agents. A number of important
questions arise out of this inter-agent debate, such as the systematization of agents’
contribution as phases in a goal-directed plan (such as proving) and the review in the
formalization of logic-based languages in terms of both syntactic and semantic aspects [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
3
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Argumentation models</title>
        <p>
          Argumentation models generally contain the following main elements: an underlying
logical language with the definition of the concepts of argument, conflict between arguments
and counterarguments, and status of argument. We will formalize proof-events based on
argumentation theory, using a list of structures, which represent arguments and
counterarguments. Our approach presupposes a multi-agent system, where the agents enact the
roles of provers and interpreters. An argument has premises, sentences, and conclusion.
Arguments considered in this section involve grounds and claims, which are formulae in
classical logic and methods of inference by which a claim follows from a set of formulae,
which are taken to be deductive inferences, denoted by ⊢. A proof-event е can be
understood as a communicated argument ,c [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] concerning a stated (fixed) problem
specified by certain conditions (predicates) and be designated by the pair e ,c , i.e.
e ,c
        </p>
        <p>e communicate(Problem,t) ,(communicate ,c ),w
where Φ is the Data of the argument, c is the Claim that refers to a stated (fixed) problem
(proposition), specified by certain conditions (predicates) and w are the (possibly implicit)
inference rules (Warrant) which allow Φ to be logically associated with c, such that:
(i)
(ii) c
(iii) There is no , such that c .</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>A counterargument to a proof-event e ,c represents a new proof-event that can be</title>
      <p>designated by the pair e , , where Ψ is the Data (generally different from those of
Φ) on which is based the Claim (Counterargument) β that refers to the same fixed
problem (proposition) stated at time t, specified by the same conditions (predicates).</p>
      <p>
        Argumentation may require chains (or trees) of reasoning, where claims are used in
the assumptions for obtaining further claims [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], so that a proof-event could be an atomic
argument or a sequence of arguments (fluent). Fluents f are sequences of proof-events
(proving instances) evolving in time that refer to a fixed problem, specified by certain
conditions [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Let R be a set of rules of inference. A fluent f is a formula of the form
e1,e2,e3 e
where e1 1,c1 , e2 2,c2 , e3 3,c3
      </p>
      <p>is a finite, possibly empty, sequence of
arguments, such that the conclusion of proof-event ei is the claim ci , i.e.</p>
      <p>conc(e1)
c1, conc(e2 )
c2, conc(e3)
c3
for some rule c1,c2,c3
c</p>
    </sec>
    <sec id="sec-5">
      <title>R [33]. Accordingly, the meaning of the three essential</title>
      <p>
        components of argument based on Toulmin’s model [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], which abbreviated by
corresponding prefixes, are defined as follows for the concept of fluent:
      </p>
    </sec>
    <sec id="sec-6">
      <title>Data:</title>
      <p>Claim:
prem(e)
prem(e1)
prem(e2)
prem(e3)
1
2
3
conc(e)
c
c1
c2
c3
Warrant:
sent(e)
sent(e1) sent(e2) sent(e3)
w1
w2
w3
where c (Claim) is the statement communicated by the agent, Φ (Data) are facts that serve
as the ground of the claim, and w (Warrant) are the inference rules, which allow data to
be logically associated with the claim. The aforementioned elements are frequently used
to define a consequence relation between the arguments and/or the counter-arguments.
(1)
(2)
(3)
3.1</p>
      <sec id="sec-6-1">
        <title>Argument moves</title>
        <p>In the course of a proof-event, we pass through various inference stages, such as
attempts, impasses, confirmed or unconfirmed steps, false suggestions or implicit
assumptions, intuitive ideas, intentions, etc. Arguments can then be specified as chains of
reasoning leading to a conclusion with consideration of possible counterarguments at
each step. When a chain of reasoning ( x0x1, x2, xn , where the argument xi attacks
the argument xi 1 for i</p>
        <p>
          0 ) is explicitly constructed, distinct concepts of defeat can
be conceptualized. When an agent has gained control of an argument, he must select
which argument-move to apply. Gordon [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] refers to “argument moves” as analogues
of three roles for legal cases2. We reserve the term argument moves for specific, active
tactics or strategy that a prover can choose to support his claim. We present four
fundamental relations that indicate links and conflicts at the sequence of proof-events. The
possible argument moves could provide support or attack the claim.
        </p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Given a claim c and an argument communicated during the proof-event e, possible</title>
      <p>
        argument moves, which provide support for c [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] include:
      </p>
    </sec>
    <sec id="sec-8">
      <title>Equivalence: an argument for a claim, which is equivalent to (or is) c;</title>
    </sec>
    <sec id="sec-9">
      <title>Elaboration: an argument that is elaboration of c, and</title>
      <p>
        whereas argument moves, which oppose c [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] include:
      </p>
    </sec>
    <sec id="sec-10">
      <title>Rebutting: an argument for a claim which disagrees with c;</title>
    </sec>
    <sec id="sec-11">
      <title>Undercutting: an argument for a claim which disagrees with a premise of c.</title>
      <p>Argument moves that support a claim. A proof-event e1 is equivalent with
proofevent e2 , if
, c
c , although it might be w
w , i.e., whenever they have
the same data and the same conclusion (although possibly different warrants), i.e.</p>
      <p>Equivalence(e,e )
e( ,c)
e ( ,c ) .</p>
    </sec>
    <sec id="sec-12">
      <title>Therefore, equivalent proof-events can have different ways of proving3.</title>
    </sec>
    <sec id="sec-13">
      <title>If e ,c is a proof-event, a set of sentences S is called that elaborates or embellishes</title>
      <p>upon e, if the following relation holds
Elaboration(e,S)
sent(e) sent(S)
concl(e) iff</p>
      <p>S
c</p>
    </sec>
    <sec id="sec-14">
      <title>These moves are used for backing our claim and supporting our proof, so that</title>
      <p>Support(e,t)</p>
      <p>Equivalent(e,e )</p>
      <p>Elaboration(e,S)
(4)
(5)
(6)
(7)
Counterargument moves that attack a claim. A counterargument communicated
during the proof-event e
,</p>
      <p>
        attacks or rebuts the conclusion of an argument
communicated during the proof-event e ,c , if the following relation holds
Rebutting(e ,e)
rebut(e ,e)
concl(e) iff
c
A counterargument communicated during the proof-event e
,
is called that
undercuts or attacks some of the premises (defeasible inference) of the argument
communicated during the proof-event e ,c , if the following relation holds
2 This term was also previously used by Rissland [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], Asley and Aleven [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Pease et al [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
3 For instance, the Pythagorean Theorem has been proved in numerous ways, such as by
Euclid’s geometrical proving or by James Abram Garfield algebraic proving.
      </p>
      <p>Undercutting(e ,e)
undercut(e ,e)
prem(e) iff
i
i
(8)
for { 1, 2, , n }</p>
    </sec>
    <sec id="sec-15">
      <title>Given an argument communicated during the proof-event e ,c , a counterargu</title>
      <p>ment communicated during the proof-event e
,
attacks the argument
communicated during the proof-event e, at time t, iff e rebuts e or e undercuts e. In symbols,
Attack(e ,t)
rebut(e ,e) undercut(e ,e)
(9)
3.2</p>
      <sec id="sec-15-1">
        <title>Temporal Predicates</title>
        <p>
          Even though proof-events can be regarded as taking place instantaneously, the Event
Calculus is actually neutral with respect to whether events have duration or are
instantaneous [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Reasoning about actions and change (RAC) [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] is concerned with the
study of how fluents change when new information is acquired and how this view of
the problem is affected by the observation of some events remaining active or
terminated at a particular time. The language in RAC uses causal propositions
(c-propositions), of the form “A initiates F when C” or “A terminates F when C”, which in this
paper are represented in more detailed and specific form with the arguments’ and
counterarguments’ moves that initiate or terminate a fluent. In most cases, we will take into
consideration only the starting point of a proof-event, with the exception of those
proofevents that terminate, or when duration plays a significant role. In these cases, we
mention both the starting and termination points.
        </p>
      </sec>
    </sec>
    <sec id="sec-16">
      <title>We apply the abovementioned operators combined with the basic temporal predicates</title>
      <p>
        from [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]: Happens(e,t) , Initiates (e,f ,t ) , Terminates(e, f, t), ActiveAt( f, t) ,
Clipped(t1, f ,t2) . In particular,
      </p>
    </sec>
    <sec id="sec-17">
      <title>Happens(e,t) means that a proof-event e occurs at time t.</title>
      <p>Initiates(e, f ,t)</p>
      <p>Happens(e,t1)</p>
      <p>attack(e ,t1) support(e,t1) , at time t1 , (11)
which means that if a proof-event e occurs at time t, then there are no counterarguments
that attack the validity of the outcome of the proof-event and there is adequate support
for our claim at the specific time t1 .</p>
      <p>Clipped(t1, f ,t2 )
[ e2,t2(Happens(e2,t2 )
e1,e1 ,t1,t[Happens(e,t1),(t1</p>
      <p>t t2 ) attack(e1 ,t)]
attack(e1 ,t))], for t1 t t2
which means that a proof-event clips when there is no proof-event e2 that attacks the
counterargument e1 attacking the proof-event e1 between t1 and t2 .
(10)
(12)
Terminates(e1, f ,e1)
e,e ,t1([attack(e ,t1)
sequence and there is no proof-event e2 that happens in time t2 , with t1
t2 , to defend
our claim. The termination of a sequence of proof-events may be caused by the proof
of the falsity of the problem (there are counter-arguments that attack the conclusion of
the proof-event), or the undecidability of the problem (there is a lack of adequate
warrants to prove the desideratum).</p>
      <p>ActiveAt(e, f ,tn 1)</p>
      <p>Happens(t,en 1,tn 1)</p>
      <p>attack(en,tn )
support(en ,tn ), for every n
, tn 1
tn
which means that a fluent is active, if there is an argument to support our claim for every
counterargument attacking our claim. This means that for every counterargument e
i
1, , n, n</p>
      <p>there is a proof-event en 1( n 1,cn 1) , which Happens(en 1,tn 1) and
defeats the attack of the counterargument en
n , n , for tn 1
tn .</p>
    </sec>
    <sec id="sec-18">
      <title>From the aforementioned, we can conclude that</title>
      <p>Happens(e,t1) Initiates(e, f ,t1) (t1
t2)
attack(e ,t2)
ActiveAt(e, f ,t2 )
which means that a fluent remains active at time t2 , if a proof-event e has taken place
at time t1 , with t1
t2 and has not been terminated at a time between t1 and t2 .
(13)
(14)
i , i ,
(15)
(16)
i
n[ActiveAt(e, f ,ti ) (ti tn )</p>
      <p>Valid(e,tn ), at time tn, i</p>
      <p>Terminates(e, f ,ti )]
1, ,n, n
which means that a fluent could consider valid at time tn , if it is active and there is no
counterarguments to terminate it at time ti , for every i
1, ,n, n
.
4</p>
      <sec id="sec-18-1">
        <title>Levels of argumentation</title>
        <p>
          In order to define the warranted premises that are justified by a set of arguments in the
sequence, we need a mechanism, which by recursion could examine the representation
of the arguments. Pollock introduces defeasible reasoning where arguments are chains
of reasoning that may lead to a conclusion, whereas additional information may destroy
the chain of reasoning. Kakkas and Moraitis [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] presented three levels of arguments:
object level arguments, which represent the possible decisions or actions in a specific
domain. First-level priority arguments, which express justifications on the object-level
arguments in order to resolve possible conflicts. Then, higher-order priority arguments
are used to deal with potential conflicts between priority arguments of the previous
level until all conflicts are resolved.
        </p>
        <p>
          We can apply the same levels in mathematical proving, in order to understand the
history of proof-events, starting from the statement of a problem until its validation or
rejection, including attempts or failures [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]. The data and the claim of the initial
proofevents constitute the object-level arguments. Proof-events constitute the first-level
priority arguments, in which we have preferences and justifications in the object-level
arguments. The proof-events that have fulfilled their purpose terminate, while the rest
of them continue to the higher-order priority arguments. As proof-events continue from
lower levels to higher, they constitute fluents. In the example below, we describe the
possible steps and conflicts for the justification of a proof-event e through the levels of
argumentation.
4.1
        </p>
        <sec id="sec-18-1-1">
          <title>Object level arguments</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-19">
      <title>In the object level arguments, we have our claim and the initial representations of</title>
      <p>arguments. The proof-events that are not attacked constitute the fluent f0 and continue
to the first level priority arguments.</p>
      <p>Happens(ei,ti ), i
1, ,m, m
, ti
tm
t
ei[Happens(ei,ti )
attack(ei ,ti ) (ti
tm )]</p>
      <p>Initiates(ei, f0,tm )
for i
1, ,m, m
, ti
tm</p>
      <p>t .
4.2</p>
      <p>First-level priority arguments
for every i
that we have
(17)
(18)
(19)
(20)
Initiates(em 1, f1,tm 1), attacks(em 1, f1,tm 1),
i
1, ,m1, m1
, tm 1
tm m1
t
em i ,em i ,tm i [attack(em i ,tm i ) conc(em i )</p>
      <p>prem(em i )] (tm i tm m1 t)
[ em i 1,tm i 1(Happens(em i 1,tm i 1)</p>
      <p>prem(em i )]
attack(em i ,tm i )]</p>
      <p>Terminates(em i , f1,tm m1 )]
so that the proof-events that have been attacked and could not resolve the conflict,
terminate in this fluent. The rest of them remain active, so we have:</p>
      <p>ActiveAt(em j , f1,tm m1 ) for every j
i, j
and continues to the second-level priority arguments.</p>
      <p>The same pattern continues for n-level priority arguments and for n fluents fn , that
deal with potential conflicts between priority arguments of the preceding level until all
conflicts are resolved or our claim proved invalid. In the final level, we have
4.3</p>
      <sec id="sec-19-1">
        <title>Higher-order priority arguments</title>
        <p>If proof-events fail to resolve all the conflicts, our claim cannot be proved and it clips:
(21)
(22)
(23)
Clipped(ti,e,tn ) at the time tn
tm(n 1) mn
ti</p>
      </sec>
    </sec>
    <sec id="sec-20">
      <title>If the proof –events manage to deal with all the attacks and</title>
      <p>j, j
[ActiveAt(em(n 1) j , fn,tn )
Valid(e,tn ), at the time tn
Terminates(e, fn,tn )]
tm(n 1) mn ti
then our claim is proved valid.
5</p>
      <sec id="sec-20-1">
        <title>A Case Study: Fermat’s Last Theorem</title>
        <p>We illustrate our approach by the examination of Fermat’s Last Theorem (FLT). It was
formulated in 1637 by Pierre de Fermat, who stated that there are no three distinct
positive integers a, b, and c, other than zero, that satisfy the equation an bn cn ,
whenever n is an integer greater than 2. The statement of the problem marks the
startingpoint of a sequence of proof-events that evolved in time. Even though Fermat claimed
to have proved this theorem, it actually took 358 years and numerous attempts
undertaken by eminent mathematicians (agents) to prove it until its final proof by Andrew
Wiles in 1995. Fermat’s alleged proof cannot be included in the initial proof-event,
since it was never communicated. In his letters, Fermat communicates the Theorem for
the cases n 3 and n 4 and gives a solution only for the latter case.</p>
      </sec>
    </sec>
    <sec id="sec-21">
      <title>We cannot expose here the whole sequence of such proof-events. We confine our</title>
      <p>selves to select some of these historical attempts (proof-events) until the proof-event,
during which the communication and validation of the final proof of the theorem took
place and demonstrate how argumentation is involved in the process of search for proof.</p>
    </sec>
    <sec id="sec-22">
      <title>The first attempts to prove FLT concerned specific exponents. The case n 3 was first</title>
      <p>
        explored by Abu-Mahmud Khojandi (c. 940 - 1000), but his attempt has not survived (and
thereby cannot be considered as a proof-event) and it is conjectured that it was incorrect.
Leonhard Euler gave a proof for n 3 in 1755 and for n 4 in 1747, but his proof of
the former case contained a basic fallacy [
        <xref ref-type="bibr" rid="ref9">9, 39-40</xref>
        ]. Many other mathematicians proved the
theorem for n 3 using various methods. In 1825, Legendre (1752–1833) and Peter
Gustav Lejeune Dirichlet (1805-1859) proved independently FLT for the case n 5 . Several
novel approaches were developed by Sophie Germain in 19th century [
        <xref ref-type="bibr" rid="ref9">9, 59</xref>
        ]. In 1839,
Gabriel Lamé (1795 –1870) proved FLT for the case n 7 . In 1847, he communicated a
proof of FLT, but it was flawed, because it was assumed incorrectly that complex numbers
could be factored into primes uniquely. This gap was indicated by Joseph Liouville [
        <xref ref-type="bibr" rid="ref9">9,
7677</xref>
        ]. Kummer proved the conjecture for regular prime numbers, but not for irregular primes.
Further, the Theorem was proved for the exponents n 6,10,14 . In 1984, Gerhard Frey
pointed out a connection between the modularity theorem and Fermat’s equation, but FLT
remained unproved. The Taniyama-Shimura-Weil conjecture, which was proposed in 1955,
was the method that led to a successful proof of FLT, when Andrew Wiles accomplished a
partial proof of this conjecture in 1994 [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
    </sec>
    <sec id="sec-23">
      <title>Wiles, after spending six years applying various methods that were proved unsuc</title>
      <p>
        cessful, he approached the problem in a new way. He discovered an Euler system
developed by Victor Kolyvagin and Matthias Flach, which, with his own extension,
seemed to work successfully. He asked his colleague, Nick Katz, to help him in
checking his line of reasoning for eventual flaws. He decided to present his work in June
1993 at the Isaac Newton Institute for Mathematical Sciences [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
    </sec>
    <sec id="sec-24">
      <title>However, during the peer review, it became evident that there was an incorrect crit</title>
      <p>
        ical point in the proof. Wiles tried almost a year to resolve this point, firstly by himself
and then in collaboration with Richard Taylor, but without success [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. When Wiles
was on the verge to quit his attempt, he experienced an insight that the Kolyvagin–
Flach approach and Iwasawa theory were each insufficient on their own, but in
combination they could be strong enough to overcome this final obstacle. In 1994, Wiles
submitted two papers that establish the modularity theorem for the case of semistable
elliptic curves, which was the last step in proving FLT [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>This example illustrates the contribution of different agents (mathematicians) that take
part in the sequence of proof-events. Firstly, the main objective for a prover is to convince
the community about the soundness of his reasoning and the validity of his purported
proof. Moreover, other agents involved also in the proof-event contribute significantly by
enacting sometimes as provers or supporters (by suggesting additional supporting
arguments) and other times as interpreters or opponents (by suggesting counterarguments that
identify eventual gaps or inaccuracies). Thus, many agents participated in the considered
sequence of proof-events in order to fulfil the initial task, which was the proof of FLT.
This participation has the following manifestations:
a. By suggesting partial proofs (for specific cases) of the Theorem.
b. By the rejection of someone else’s attempt, pointing out a fault and/or inaccuracy.
c. Through a dialogue between provers in order to detect and resolve weak or
insufficiently supported arguments in proving (for instance, Wiles asked his
colleagues’ contribution, notably Nick Katz and Richard Taylor, when he faced a
dead-end in his attempt).</p>
      <p>During all these years, thousands of unsuccessful proofs have been undertaken, most
of which remain unknown, but some of them have been proposed by eminent
mathematicians, such as Euler, Cauchy, Lamé, Kummer, and others. Argumentation is
evident in interactive contexts, as they let counterarguments to be set forth and stronger
arguments to survive. Both arguments and counterarguments play essential role in the
process of proving, contributing equally in the construction and justification of the
proof. The warranted parts of the proofs act as groundwork for the subsequent proofs,
while the counterarguments that identify faults in unsuccessful proofs open the way for
better-justified proofs and, in some cases, turn the interest of the mathematical
community on new unexplored areas. In the next section, we present a model of this example
in terms of the levels of argumentation.
5.1</p>
      <sec id="sec-24-1">
        <title>Object level arguments – Fermat’s Conjecture</title>
        <p>In the object level arguments, we have Fermat’s conjecture as the initial proof-event
eFermat and his claim that he has a proving for this conjecture, without any
claim-counterargument eFermat clearly opposes this conjecture.</p>
        <p>Happens(eFermat ,t1637 )
attack(eFermat ,t1637 )</p>
        <p>Initiates(eFermat , f0,t1637 )
5.2</p>
      </sec>
      <sec id="sec-24-2">
        <title>First-level priority arguments - Proofs for specific exponents</title>
        <p>In the first-level priority arguments, we have proofs for specific exponents n of the FLT
from various mathematicians in different time points.</p>
        <p>For the exponent n 3 , the proof-event en 3 happened when Leonhard Euler gave
a proof in 1755. Therefore, we have Happens(eEuler ,t1755 ) .</p>
      </sec>
    </sec>
    <sec id="sec-25">
      <title>Many other well-known mathematicians followed with equivalent proofs that sup</title>
      <p>port the validity of the proof for n 3 . Each prover used a different way (warrant) for
proving the conclusion. Thus, their provings are equivalent.</p>
      <p>Support(en 3,ti ) Equivallent(en 3,ei ) for i 1, ,14 , with
i
i
i
i
1 : (eEuler ,t1707 ) , i
2 : (eKausler ,t1802 ) , i</p>
      <p>3 : (eLegendre,t1823 ) ,
4 : (eCalzolari,t1855 ) , i
7 : (eGunther ,t1878 ) , i
10 : (eRycklik ,t1910 ) , i
5 : (eLamé,t1865 ) , i</p>
      <p>6 : (eKausler ,t1802 ) ,
8 : (eGambioli ,t1901) , i</p>
      <p>9 : (eKrey ,t1909) ,
11 : (eStockhaus ,t1910 ) , i
12 : (eCarmichael ,t1915) ,
i 13 : (eThue,t1917 ) , i</p>
    </sec>
    <sec id="sec-26">
      <title>From the aforementioned, we have</title>
      <p>14 : (eDuarte,t1944 ) .</p>
      <p>Happens(eEuler ,t1755 ) Initiates(en 3, f1,t1755 )
[ attack(en 3,ti ) support(en 3,ti )] (t1755</p>
      <p>ActiveAt(en 3, f1,ti ), for t1755 ti
ti )</p>
      <p>Similarly, we have proofs for n
ticians (provers). The first proof for n
5 (en 5 ) and n</p>
      <p>7 (en 7 ) by various
mathema5 belongs to Legendre (1825). Accordingly,
we have Happens(eLegendre,t1825 ) . Equivalent proofs were also proposed.</p>
      <p>Equivalent(en 5,ej ) for i
1,
,10 , with
1 : (eLegendre ,t1825 ) , j
4 : (eLebergue ,t1843 ) , j
7 : (eWerebrusow ,t1905 ) , j
10 : (eTerjanian ,t1987 ) .</p>
      <p>2 : (eDirichlet ,t1825 ) , j</p>
      <p>3 : (eGauss ,t1875 ) ,
5 : (eLamé ,t1847 ) , j</p>
      <p>6 : (eGambioli ,t1901) ,
8 : (eRychlik ,t1901) , j
9 : (eCorput ,t1159 )
1 : (eLamé ,t1839 ) , k
4 : (eMaillet ,t1897 ) .</p>
    </sec>
    <sec id="sec-27">
      <title>7 , the first proof was provided by Lamé in 1839; therefore, we have</title>
      <p>Happens(eLamé,t1839 ) and the equivalent supporting provings
Support(en 7,tk )</p>
      <p>Equivalent(en 7,ek ) for k
1,
,10 , with
2 : (eLeberguet ,t1840 ) , k
3 : (eGenocchi ,t1876 ) ,</p>
    </sec>
    <sec id="sec-28">
      <title>Therefore, we have</title>
      <p>Happens(eLamé ,t1839 )
Initiates(en 7, f1,t1839 )</p>
    </sec>
    <sec id="sec-29">
      <title>FLT was also proved for the exponents n</title>
      <p>) tried unsuccessfully to prove FLT for all even exponents
(en 2p ) , which was proved by Guy Terjanian (eTerjanian ) in 1977. Germain’s attempt
was incomplete; thus, it clipped</p>
      <p>Clipped(t1776,en 2p ,t1831)
(t1776 t1 t1831)
[ e2,t2(Happens(e2,t2 )
eGermain ,eGermain ,t1[Happens(eGermain ,t1)
attack(eGermain ,t)]
attack(eGermain ,t1))], for t1776
t1
t1831.
and became active again after the successful proving of Terjanian in 1977.</p>
      <p>ActiveAt(en 2p, f2,t1977 ) Happens(eTerjanian ,t1977 )</p>
      <sec id="sec-29-1">
        <title>5.4 Third-level priority arguments - Ernst Kummer and the theory of ideals</title>
        <p>The sequence of proof events continues in the third-level with further attempts for
proving FLT. In 1847, Lamé’s proof (eLamé ) failed, because it incorrectly assumes that
complex numbers can be factored into primes uniquely, a gap that was revealed by Liouville
(eLiouville ) . Thus the counterargument generated by Liouville indicated the fault in</p>
        <p>Kummer (eKummer ) proved the conjecture for regular prime numbers (eregular ) ,
although not for irregular primes (eirregular ) . Therefore, we have</p>
        <p>ActiveAt(eregular , f3,t1893 )</p>
        <p>Happens(eKummer ,t1893 )
attack(eKummer ,t1893) ,
but
Happens(eFrey ,t1984 ).
5.6</p>
      </sec>
      <sec id="sec-29-2">
        <title>Fifth-level priority arguments – Andrew Wiles</title>
        <p>In the fifth-level priority arguments, the procedure and history in the Andrew Wile’s
attempts is represented. Wiles (eWiles ) discovered and extended an Euler system. He also
asked his colleague, Nick Katz, to help him in checking his reasoning for eventual faults.</p>
        <p>Initiates(eWiles , f5,t1993 )</p>
        <p>Happens(eWiles ,t1993 )
attack(eWiles ,t1993 ) support(eKatz ,t1993 ).</p>
      </sec>
    </sec>
    <sec id="sec-30">
      <title>He presented his work in June 1993, but it soon became evident that there was an</title>
      <p>incorrect critical point (eWiles ) in the proof. Wiles tried for almost a year to resolve this
point, firstly by himself and then in collaboration with Richard Taylor (eTaylor ) , but in
vain. Thus, his attempted is clipped on the time period from 1993 until 1994.</p>
      <p>Clipped(t1993,eWiles ,t1994 )
(t1993 t1 t1994 )
[ e2,t2(Happens(eTaylor ,t2 )
eWiles,eWiles ,t1[Happens(eWiles,t1)
attack(eWiles 1
,t )]</p>
    </sec>
    <sec id="sec-31">
      <title>In 1994, Wiles managed to overcome this gap by combining Kolyvagin–Flach approach</title>
      <p>[Elaboration(eWiles,SKolyvagin Flach )] and Iwasawa theory [Elaboration(eWiles,SIwasawa )]
and he submitted his final paper which was the last step in proving FLT.</p>
      <p>ActiveAt(eWiles , f5,t1994 )</p>
      <p>Happens(eWiles ,t1994 )</p>
      <p>attack(eWiles ,t1994 )
Elaboration(eWiles ,SKolyvagin Flach )</p>
      <p>Elaboration(eWiles ,SIwasawa )
5.7</p>
      <sec id="sec-31-1">
        <title>Higher-order priority arguments-Fermat’s Last Theorem</title>
      </sec>
    </sec>
    <sec id="sec-32">
      <title>The proof–event managed to deal with all the attacks and we have</title>
      <p>[ActiveAt(eWiles, fn,t1994 ) Terminates(eFermat , fn,t1994 )]
Valid(eFermat,t1994 )
at the time t1994 .</p>
    </sec>
    <sec id="sec-33">
      <title>Thus, FLT is proved valid by Wiles, with the contribution of the other agents that opened the way before him in this ages-long sequence of proof-events.</title>
      <p>attack(eWiles,t1))], for t1993
t2
t1993.
6</p>
      <sec id="sec-33-1">
        <title>Conclusion</title>
        <p>
          We have developed a model of the proof-events calculus [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] based on Pollock’s [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ],
Toulmin’s [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] and Kakas’ argumentation theories, extending the proof-events calculus
by integrating argumentation theories. The combination of Vandoulakis-Stefaneas
proof-events-based theory and logic-based argumentation has the advantage of
highlighting weak areas in a proof. Proof-events are not considered as infallible facts before
their ultimate validation, thus enabling the exploration of flawed approaches and proofs
to be found and resolved. We outlined a calculus for proof-event argument, argument
moves, and temporal predicates and analyzed them in terms of levels of argumentation.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Aberdein</surname>
            <given-names>Andrew</given-names>
          </string-name>
          , (
          <year>2005</year>
          ), “
          <article-title>The Uses of Argument in Mathematics”</article-title>
          .
          <source>Argumentation</source>
          <volume>19</volume>
          :
          <fpage>287</fpage>
          -
          <lpage>301</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Aberdein</surname>
            <given-names>Andrew</given-names>
          </string-name>
          , (
          <year>2008</year>
          ),
          <article-title>Mathematics and argumentation</article-title>
          .
          <source>Netherlands</source>
          , Kluwer Academic Publishers.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Aberdein</surname>
            <given-names>Andrew</given-names>
          </string-name>
          , (
          <year>2009</year>
          ), “Mathematics and argumentation”.
          <source>Foundations of Science</source>
          <volume>14</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Aberdein</given-names>
            <surname>Andrew</surname>
          </string-name>
          , Dove Ian J. (Eds.). (
          <year>2013</year>
          ).
          <article-title>The argument of mathematics</article-title>
          . Dordrecht: Springer.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Aczel Amir D.</surname>
          </string-name>
          (
          <year>1996</year>
          )
          <article-title>Fermat's Last Theorem: Unlocking the Secret of an Ancient Mathematical Problem</article-title>
          . New York: Dell Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Alcolea</given-names>
            <surname>Banegas</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          (
          <year>1998</year>
          ), “L'
          <article-title>Argumentació en Matemàtiques”</article-title>
          . E. Casaban i Moya (ed.), XIIè Congrés Valencià de Filosofia. Valencià,
          <volume>135</volume>
          -
          <fpage>147</fpage>
          . Translation online at http://my.fit.edu/~aberdein/ArgMathIntro.pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Ashley K.D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Aleven</surname>
            <given-names>V.</given-names>
          </string-name>
          , (
          <year>1991</year>
          ),
          <article-title>“A Computational Approach to Explaining CaseBased Concepts of Relevance in a tutorial Contect”</article-title>
          .
          <source>Proc. Case-Based Reasoning workshop</source>
          , Washington,
          <fpage>257</fpage>
          -
          <lpage>168</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Besnard</given-names>
            <surname>Philippe</surname>
          </string-name>
          and Hunter Anthony, (
          <year>2008</year>
          ), “Elements of Argumentation”. The MIT Press Cambridge, Massachusetts London, England.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Edwards Harold</surname>
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1977</year>
          )
          <article-title>Fermat's Last Theorem</article-title>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Goguen</surname>
          </string-name>
          , Joseph, (
          <year>2001</year>
          ), “
          <article-title>What is a proof”</article-title>
          , http://cseweb.ucsd.edu/~goguen/papers/proof.html
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gordon</surname>
            <given-names>T. F.</given-names>
          </string-name>
          , (
          <year>1991</year>
          ), “
          <article-title>An abductive theory of legal issues”</article-title>
          ,
          <source>International Journal of Man-Machine Studies</source>
          ,
          <volume>35</volume>
          (
          <issue>1</issue>
          ):
          <fpage>95</fpage>
          -
          <lpage>118</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Haggith</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1996</year>
          ),
          <article-title>“A meta-level argumentation framework for representing and reasoning about disagreement”</article-title>
          .
          <source>Ph.D. thesis</source>
          , Dept. of Artificial Intelligence, University of Edinburgh.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kakas</surname>
            <given-names>A.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalski</surname>
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            <given-names>F.</given-names>
          </string-name>
          , (
          <year>1992</year>
          ), “
          <article-title>Abductive logic programming”</article-title>
          ,
          <source>J. Logic Comput</source>
          .
          <volume>2</volume>
          (
          <issue>6</issue>
          ):
          <fpage>719</fpage>
          -
          <lpage>770</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kakas</surname>
            <given-names>Antonis</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loizos</surname>
            <given-names>Michael</given-names>
          </string-name>
          , (
          <year>2016</year>
          ),
          <article-title>“Cognitive Systems: Argument and Cognition”</article-title>
          .
          <source>IEEE Intelligent Informatics Bulletin</source>
          ,
          <volume>17</volume>
          (
          <issue>1</issue>
          ):
          <fpage>15</fpage>
          -
          <lpage>16</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kakas</surname>
            <given-names>Antonis</given-names>
          </string-name>
          , Loizos Michael,
          <string-name>
            <surname>Toni</surname>
            <given-names>Francesca</given-names>
          </string-name>
          , (
          <year>2016</year>
          ), “Argumentation:
          <article-title>Reconciling Human and Automated Reasoning”</article-title>
          .
          <source>Proceedings of the Workshop on Bridging the Gap between Human and Automated Reasoning</source>
          , New York, USA.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Prendinger</surname>
            <given-names>Helmut</given-names>
          </string-name>
          , Schurz
          <string-name>
            <surname>Gerhard</surname>
          </string-name>
          (
          <year>1996</year>
          )
          <article-title>“Reasoning about actions and change”</article-title>
          .
          <source>Journal of Logic, Language and Information</source>
          . Volume
          <volume>5</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <fpage>209</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kakas</surname>
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Miller</surname>
            <given-names>R.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>“A simple declarative language for describing narratives with actions”</article-title>
          .
          <source>Journal of Logic and Algebraic Programming</source>
          ,
          <volume>31</volume>
          ,
          <fpage>157</fpage>
          -
          <lpage>200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kakas Antonis</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moraitis</surname>
            <given-names>Pavlos</given-names>
          </string-name>
          , (
          <year>2003</year>
          ), “
          <article-title>Argumentation based decision making for autonomous agents”</article-title>
          .
          <source>In: Proc. Second International Joint Conference on Autonomous Agents &amp; Multiagent Systems, AAMAS</source>
          <year>2003</year>
          , Melbourne, Australia,
          <fpage>883</fpage>
          -
          <lpage>890</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kolata</surname>
            <given-names>Gina</given-names>
          </string-name>
          , (
          <year>1994</year>
          ),
          <string-name>
            <given-names>A Year</given-names>
            <surname>Later</surname>
          </string-name>
          , Snag Persists in Math Proof, Published: June 28,
          <year>1994</year>
          , http://www.nytimes.com/
          <year>1994</year>
          /06/28/science/a
          <article-title>-year-later-snag-persistsin-math-proof</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kowalski</surname>
            <given-names>Robert</given-names>
          </string-name>
          , (
          <year>1992</year>
          ), “
          <article-title>Database updates in the event calculus”</article-title>
          .
          <source>The Journal Of Logic Programming</source>
          , Elsevier Science Publishing Co., Inc.,
          <volume>12</volume>
          :
          <fpage>121</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Lakatos</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>1976</year>
          ),
          <source>Proofs and Refutations</source>
          . Cambridge, Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Pease</surname>
            <given-names>Alison</given-names>
          </string-name>
          , Smaill Alan, Colton Simon,
          <string-name>
            <surname>Lee John</surname>
          </string-name>
          , (
          <year>2008</year>
          ).
          <article-title>Bridging the gap between argumentation theory and the philosophy of mathematics</article-title>
          , Kluwer Academic Publishers.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Pedemonte</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>“How can the relationship between argumentation and proof be analyzed?”</article-title>
          <source>Educational Studies in Mathematics</source>
          ,
          <volume>66</volume>
          :
          <fpage>23</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Pedemonte</surname>
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2008</year>
          ),
          <article-title>“Argumentation and algebraic proof”</article-title>
          .
          <source>ZDM Mathematics Education, FIZ Karlsruhe</source>
          ,
          <volume>40</volume>
          :
          <fpage>385</fpage>
          -
          <lpage>400</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Prakken</surname>
            <given-names>Henry</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horty John</surname>
          </string-name>
          , (
          <year>2012</year>
          ), “
          <article-title>An appreciation of John Pollock's work on the computational study of argument”</article-title>
          ,
          <source>Argument &amp; Computation</source>
          . 3:
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Pollock</surname>
            <given-names>J. L.</given-names>
          </string-name>
          (
          <year>1987</year>
          ), “
          <article-title>Defeasible reasoning”</article-title>
          .
          <source>Cognitive Science</source>
          ,
          <volume>11</volume>
          :
          <fpage>481</fpage>
          -
          <lpage>518</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Pollock</surname>
            <given-names>J. L.</given-names>
          </string-name>
          (
          <year>1992</year>
          ), “
          <article-title>How to reason defeasibly”</article-title>
          . Artif. Intell.,
          <volume>57</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Rissland</surname>
            <given-names>E.L.</given-names>
          </string-name>
          , (
          <year>1985</year>
          ), “
          <article-title>Argument moves</article-title>
          and Hypotheticals” In C. Walter (Ed.),
          <source>Computing Power and Legal Reasoning</source>
          , St. Paul, MN: West Publishing Co.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Toulmin</surname>
            <given-names>S. E.</given-names>
          </string-name>
          (
          <year>1993</year>
          ).
          <article-title>The use of arguments</article-title>
          . Cambridge: Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Singh</surname>
            <given-names>Simon</given-names>
          </string-name>
          , (
          <year>1997</year>
          ),
          <article-title>Fermat's Last Theorem</article-title>
          , Fourth Estate Ltd.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Stefaneas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Vandoulakis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2015</year>
          ), “On Mathematical Proving”.
          <source>Computational Creativity</source>
          , Concept Invention, and
          <article-title>General Intelligence Issue</article-title>
          .
          <source>Journal of General AI</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):
          <fpage>130</fpage>
          -
          <lpage>149</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Vandoulakis Ioannis</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefaneas</surname>
            <given-names>Petros</given-names>
          </string-name>
          , (
          <year>2015</year>
          ), “
          <article-title>Mathematical Style as Expression of the Art of Proving”</article-title>
          ,
          <source>Handbook of the 5th World Congress and School on Universal Logic</source>
          , Istanbul, Turkey,
          <string-name>
            <surname>UniLog</surname>
          </string-name>
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Vandoulakis Ioannis</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefaneas</surname>
            <given-names>Petros</given-names>
          </string-name>
          , (
          <year>2016</year>
          ), “
          <article-title>Mathematical Proving as Multi-Agent Activity Spatio-Temporal”</article-title>
          .
          <source>23rd World Congress of Philosophy, Methodology of Mathematical Modelling and of Applications of Logical Systems in Scientific Knowledge.</source>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Vreeswijk Gerard</surname>
            <given-names>A.W.</given-names>
          </string-name>
          (
          <year>1997</year>
          ),
          <source>“Abstract argumentation systems” AI</source>
          ,
          <volume>90</volume>
          :
          <fpage>225</fpage>
          -
          <lpage>279</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>