<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A General Dialogue Framework for Logic-based Argumentation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Loan</forename><surname>Ho</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vrije Universiteit Amsterdam</orgName>
								<address>
									<addrLine>De Boelelaan 1105</addrLine>
									<postCode>1081 HV</postCode>
									<settlement>Amsterdam</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefan</forename><surname>Schlobach</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vrije Universiteit Amsterdam</orgName>
								<address>
									<addrLine>De Boelelaan 1105</addrLine>
									<postCode>1081 HV</postCode>
									<settlement>Amsterdam</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A General Dialogue Framework for Logic-based Argumentation</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">EAC26F798CF9FDBF70EFA2251D914E60</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Argumentation</term>
					<term>Inconsistency-tolerant reasoning</term>
					<term>Explanation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>There is an extensive body of work in logic-based argumentation, which links logic and argumentation, which is a potential solution to address inconsistencies or conflicting information in knowledge bases (KBs) by offering dialogue games as proof procedures to determine and explain the acceptance of propositions. Most existing work, though, focuses on specific logics (such as description logics, existential rules, defeasible and propositional logics), has limitations of representational aspects, for selected semantics and binary conflicts. In this paper, we generalise this work by introducing G-SAF, which generalises the notions of arguments, dialogues and dialogue trees for more general logical reasoning with inconsistencies, including the most common semantics and to facilitate reasoning with non-binary conflicts using argumentation with collective attacks (SAFs).</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Argumentation is a potential solution for inconsistencies or conflicting information in knowledge bases; it offers dialogue games as proof procedures to determine and explain the acceptance of propositions. To benefit from argumentation in explaining and querying answers in (possibly inconsistent) KBs, Logic-based argumentation frameworks ( LAFs) have emerged, linking logic with abstract argumentation frameworks (AFs), providing argument game-based proofs.</p><p>Several different approaches to logical argumentation have been introduced in the literature. Most previous LAFs frameworks link <ref type="bibr">Dung'</ref>s AFs <ref type="bibr" target="#b0">[1]</ref> to specific logics. For instance, these works present an instantiation of AFs for classical logic <ref type="bibr" target="#b1">[2]</ref>, Description Logic <ref type="bibr" target="#b2">[3]</ref> and for existential rules (Datalog ± ) <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. In <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>, LAFs with collective attacks are proposed to capture non-binary conflicts in Datalog ± , i.e., assuming that every conflict has more than two formulas. In <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>, ASPIC/ASPIC+ is introduced for defeasible logic. Following <ref type="bibr" target="#b9">[10]</ref>, the logical formalism in ASPIC+ is ill-defined, i.e., the contrariness relation is not general enough to consider n-ary constraints. This issue is stated in <ref type="bibr" target="#b5">[6]</ref> for Datalog ± . <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> proposes sequence-based argumentation for (propositional) logic and provides nonmonotonic extensions for Gentzen-style proof systems in terms of argumentation-based. Moreover, the authors conclude <ref type="bibr" target="#b11">[12]</ref> by wishing future work to include "the study of more expressive formalisms, like those that are based on first-order logics". In <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref> DeLP/DeLP with collective ArgXAI-24: 2nd International Workshop on Argumentation for eXplainable AI loanthuyho.cs@gmail.com (L. Ho); k.s.schlobach@vu.nl (S. Schlobach) attacks are introduced for defeasible logic programming. However, <ref type="bibr" target="#b5">[6]</ref> claims they cannot instantiate DeLP for Datalog ± , since it only considers ground rules. In <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref> assumptionbased argumentation (ABA)/ ABA with collective attacks for logic programming encodes a single conflict/multi-conflicts for each assumption, while in <ref type="bibr" target="#b16">[17]</ref>, ABA is linked to Answer Set Programming. In <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>, the focus is on flat ABA frameworks, i.e., it ignores the cases of the inferred assumption being conflicting, which is allowed in the existential rules or other logics.</p><p>From the observation, earlier works focus on specific logics or have limitations of representational aspects. This paper, using abstract logic with no requirement on the language ℒ and CN (a function from 2 ℒ to 2 ℒ ), provides a very flexible environment for logical argumentation. Like our approach, the work of <ref type="bibr" target="#b17">[18]</ref> proposed "non-flat" ABA frameworks with collective attacks. While the work of <ref type="bibr" target="#b17">[18]</ref> mainly focuses on representation considerations, our work further studies proof procedures used in AFs with collective attacks.</p><p>To compute and explain answers w.r.t the semantics of logical reasoning, argumentation provides dialogue models as proof procedures, but, there is no unifying approach for the most common inconsistency-tolerant semantics. In the Datalog ± context, the framework of <ref type="bibr" target="#b18">[19]</ref> focuses on ICR semantics (i.e., the query being entailed under the intersection of closure of repairs).The dialogue model of <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b3">4]</ref> considers queries entailed under IAR semantics (the intersection of all repairs) or Brave semantics (some repairs<ref type="foot" target="#foot_0">1</ref> ), while AR semantics have not yet been considered. This paper gives possible translations for the most common types of semantics (as defined in Definition 2).</p><p>Previous proposed dialogue models are used in LAFs with binary attacks, which are not generic enough to deal with collective attacks. In <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b3">4]</ref> the authors propose a dialogue model as an abstract dialectic proof procedure and only involving arguments and binary attacks. The models in <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>, applied to ABA, are limited to express the contrariness relation for existential rules with non-binary conflicts. The models in <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b24">25]</ref> related domain expert and a system, but are only applied to a specific domain (agronomy).</p><p>Main contributions. The existing approaches are mostly restricted to: (1) specific logics or limitations of representational aspects; (2) specific inconsistency-tolerant semantics; (3) (dialectical) proof procedures used in AFs with binary attacks. This paper closes this gap: <ref type="bibr" target="#b0">(1)</ref> we propose a unifying framework, G-LAF, that allows a translation of KBs in a broad family of logics into argumentation frameworks; (2) our unified approach includes inconsistency-tolerant semantics considered in previous literature (e.g. IAR and Brave in the case of Datalog ± ) as well as new ones (AR in the case of Datalog ± ); <ref type="bibr" target="#b2">(3)</ref> we propose an extended version of the dialogue model that applies to AFs/LAFs with collective attacks, generalizing the dialogue model used in AFs/LAFs with binary attacks.</p><p>We only sketch the proofs for our main results in this paper, more details can be found in the appendix.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Preliminaries</head><p>Most of our discussion applies to arbitrary logics (monotonic and non-monotonic) consisting of a set ℒ (of sentences) and a function CN from 2 ℒ to 2 ℒ returning the logical consequences of a set of sentences (the consequence operator), that satisfies the axiom: Expansion 𝑋 ⊆ CN(𝑋), Idempotence CN(CN(𝑋)) = CN(𝑋). Fix a logic (ℒ, CN) and a set of sentences 𝑋 ⊆ ℒ. We say that:</p><p>• 𝑋 is consistent wrt (ℒ, CN) iff CN(𝑋) ̸ = ℒ. It is inconsistent otherwise; • A knowledge base (KB) is any subset 𝒦 of ℒ. A knowledge base may be inconsistent.</p><p>Reasoning in inconsistent KBs 𝒦 ⊆ ℒ amounts to:</p><p>1. Constructing maximal consistent subsets, 2. Applying classical entailment mechanism on a choice of the maximal consistent subsets.</p><p>Motivated by this idea, we give the following definition. Definition 1. Let 𝒦 be a KB and 𝑋 ⊆ 𝒦 be a set of sentences. 𝑋 is a maximal (for set-inclusion) consistent subset of 𝒦 iff 𝑋 is consistent, there is no 𝑋 ′ such that 𝑋 ⊂ 𝑋 ′ and 𝑋 ′ is consistent. We denote the set of all maximal consistent subsets by MCS(𝒦).</p><p>Inconsistency-tolerant reasoning in KB has semantics to determine different types of answers. Definition 2. Let 𝒦 be a KB and ⊢: 2 MCS(𝒦) ↦ → MCS(𝒦) be an entailment mechanism. A sentence</p><formula xml:id="formula_0">𝑓 ∈ ℒ is entailed in • all maximal consistent subsets, written 𝒦 ⊢ ⋃︀ MCS(𝒦) 𝑓 , iff for all Δ ∈ MCS(𝒦), 𝑓 ∈ CN(Δ); • some maximal consistent subset, written 𝒦 ⊢ MCS(𝒦) 𝑓 , iff for some Δ ∈ MCS(𝒦), 𝑓 ∈ CN(Δ); • the intersection of all maximal consistent subsets, written 𝒦 ⊢ ⋂︀ MCS(𝒦) 𝑓 , iff for Ψ = ⋂︀ {Δ | Δ ∈ MCS(𝒦)}, 𝑓 ∈ CN(Ψ).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">A General Framework of Explanatory Dialogues</head><p>In this section, we introduce: (1) A general logic-based argumentation with collective attacks (G-SAF) translated from a KB. (2) General formal model of dialogue (for G-SAF) considered as a dialectical proof procedure to determine and explain reasoning outcomes in KBs. This dialogue model is inspired by previous works <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b20">21]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">General Logic-based Argumentation</head><p>Arguments are built from a KB. They represent proofs for conclusions. Thus, an argument has two parts: a support (also called a set of premisses) and a conclusion. Some proposals for logic-based argumentation stipulate additionally that the argument's support is consistent and/or that none of its subsets entails the argument's conclusion (see <ref type="bibr" target="#b26">[27]</ref>). However, such restrictions are not be substantial (although required for some specific logics). To keep our framework as general as possible, we do not consider the extra restrictions for our definition of arguments. We refer to <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b10">11]</ref> for further justifications of this choice.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 (G-SAF arguments). An argument induced from a KB</head><p>Different attack relations have been considered in the literature for logic-based argumentation. However, some definitions of attack are not suitable to capture non-binary conflicts <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b16">17]</ref>. The attack definitions in <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b10">11]</ref> can capture non-binary conflicts, and these frameworks can generate a large number (See <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b5">6]</ref> for justifications in the case of Datalog ± ). To overcome this, we use the notion of collective attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 4 (Collective Attacks).</head><p>Let 𝐴 = (Γ, 𝛼) be an argument and 𝒳 ⊆ Arg 𝒦 be a set of arguments.</p><formula xml:id="formula_1">• 𝒳 undercut-attacks 𝐴 iff there is Γ ′ ⊆ Γ s.t ⋃︀ 𝑋∈𝒳 {Con(𝑋)} ∪ Γ ′ is inconsistent. • 𝒳 rebuttal-attacks 𝐴 iff ⋃︀ 𝑋∈𝒳 {Con(𝑋)} ∪ {𝛼} is inconsistent.</formula><p>We can say that 𝒳 attacks 𝐴 for short. We use Att 𝒦 ⊆ 2 Arg 𝒦 × Arg 𝒦 to denote the set of attacks induced from 𝒦.</p><p>For KBs with only binary conflicts (e.g. core DL-Lite dialects), we have that |𝒳 | = 1. We refer this case to <ref type="bibr">(Dung)</ref> AFs where they consider an attack between two arguments (i.e. a binary attack). Definition 5. Let 𝒦 be a KB, the corresponding general logic-based argumentation (G-SAF) 𝒜ℱ 𝒦 is the pair (Arg 𝒦 , Att 𝒦 ), where Arg 𝒦 is the set of arguments induced from 𝒦 and Att 𝒦 is the set of attacks.</p><p>Its semantics are now defined as in the definition of argumentation semantics for SAFs <ref type="bibr" target="#b28">[29]</ref>. Given a G-SAF 𝒜ℱ 𝒦 = (Arg 𝒦 , Att 𝒦 ) and 𝒮 ⊆ Arg 𝒦 . 𝒮 attacks 𝒳 iff ∃𝐴 ∈ 𝒳 s.t. 𝒮 attacks 𝐴. 𝒮 defends 𝐴 if for each 𝒳 ⊆ Arg 𝒦 s.t. 𝒳 attacks 𝐴, some 𝒮 ′ ⊆ 𝒮 attacks 𝒳 . An extension 𝒮 is called</p><p>• conflict-free if it does not attack itself.</p><p>• admissible (ad) if it is conflict-free and defends itself.</p><p>• complete (cm) if it is an admissible extension containing all arguments that it defends.</p><p>• preferred (pr) if it is an inclusion-maximal admissible extension.</p><p>• stable (st) if it is conflict-free and attacks every argument which is not in it.</p><p>• grounded (gr) if it is an inclusion-minimal complete extension.</p><p>Let Ext s (𝒜ℱ 𝒦 ) denote the set of all extensions of 𝒜ℱ 𝒦 under the semantics s ∈ {ad, cm, st, pr, gr}. Let us define acceptability in our G-SAF: Definition 6. Let 𝒜ℱ 𝒦 be the corresponding G-SAF of a KB 𝒦 and s ∈ {ad, st, pr}. A sentence 𝑓 ∈ ℒ is • credulously accepted under s iff for some ℰ ∈ Ext s (𝒜ℱ 𝒦 ), 𝑓 ∈ Cons(ℰ ).</p><p>• sceptically accepted under s iff for all ℰ ∈ Ext s (𝒜ℱ 𝒦 ), 𝑓 ∈ Cons(ℰ ).</p><p>• groundedly accepted under gr iff for some ℰ ∈ Ext gr (𝒜ℱ 𝒦 ), 𝑓 ∈ Cons(ℰ ).</p><p>Proposition 1 shows a relation between extensions of G-SAFs and maximal consistent subsets of KBs. Proposition 1. Let 𝒜ℱ 𝒦 be the corresponding G-SAF of a KB 𝒦. Then,</p><p>• the maximal consistent subset of 𝒦 coincides with the stable/ preferred extension of 𝒜ℱ 𝒦 ;</p><p>• the intersection of the maximal consistent subsets of 𝒦 coincides with the grounded extension of 𝒜ℱ 𝒦 .</p><p>Proof 1. The idea of the proof is to show that every preferred extension is the set of arguments generated from a MCS, that every such set of arguments is a stable extension, and that every stable extension is a preferred extension.</p><p>The following is the main result of this section, which generalises related results of previous works.</p><p>Theorem 1. Let 𝒜ℱ 𝒦 be the corresponding G-SAF of a KB 𝒦, 𝑓 ∈ ℒ a sentence and s ∈ {st, ad, pr}. Then,</p><formula xml:id="formula_2">• 𝒦 ⊢ MCS(𝒦) 𝑓 if 𝑓 is credulously accepted under s. • 𝒦 ⊢ ⋃︀ MCS(𝒦) 𝑓 if 𝑓 is sceptically accepted under s. • 𝒦 ⊢ ⋂︀ MCS(𝒦) 𝑓 if 𝑓 is groundedly accepted under gr.</formula><p>The proof of Theorem 1 follows Proposition 1.</p><p>To argue the quality of G-SAF, it can be shown that it satisfies the rationality postulates introduced in <ref type="bibr">[</ref> Example 2. Let (ℒ 𝑑 , CN 𝑑 ) be a defeasible logic such as used in defeasible logic programming <ref type="bibr" target="#b12">[13]</ref>, assumption-based argumentation (ABA) <ref type="bibr" target="#b14">[15]</ref>, ASPIC systems <ref type="bibr" target="#b7">[8]</ref>. The language for defeasible logic ℒ 𝑑 includes a set of (strict and defeasible) rules and a set of literals. </p><formula xml:id="formula_3">𝑟 6 : t(𝑥, 𝑦) ∧ GC(𝑦) → FP(𝑥)} 𝒞 ={𝑐 1 : TA(𝑥), Re(𝑥) → ⊥, 𝑐 2 : Le(𝑥), TA(𝑥) → ⊥} ℱ ={ta(v, KD), UC(KD), t(v, KR), GC(KR), t(v, KD)}</formula><p>Table <ref type="table">1</ref> shows the supports and conclusions of arguments induced from 𝒦.</p><p>The KB admits six MCSs (called repairs) ℬ 1 , . . . , ℬ 6 , e.g., ℬ 1 = {ta(v, KD), UC(KD)}. The corresponding G-SAF admits extensions: Ext st/pr (𝒜ℱ) = {ℰ 1 , . . . , ℰ 6 }, where ℰ 1 = Args({ta(v, KD), UC(KD)})<ref type="foot" target="#foot_2">3</ref> = {𝐴 5 , 𝐴 6 , 𝐴 7 }, and ℰ 2 , . . . , ℰ 6 are obtained in an analogous way. By Theorem 1, the extensions correspond to the repairs of the KBs, for example, ℰ 1 corresponds to ℬ 1 .</p><p>Consider 𝑞 1 = Re(v). We have that "Re(v) is a possible answer" since 𝑞 1 is entailed in ℬ 2 , ℬ 3 , ℬ 5 . In other words, 𝑞 1 is credulously accepted under st (pr) extensions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Explanatory Dialogue Model for G-SAF</head><p>We have presented the translation of KBs into G-SAFs as an instantiation of SAFs. Subsequently, we shift the problem of determining the entailment of a sentence 𝑓 to computing and explaining the acceptance of arguments for 𝑓 . This section shows how to determine the acceptance of an argument, in various argumentation semantics from an explanatory dialogue (or "dialogue" for short).</p><p>Dialogues can be viewed as dialectical proof procedures of moving arguments as a 2-person dialogue game. Informally, a dialectical proof procedure is formalised by a dialogue between two players a proponent (P) and an opponent (O). The dialogue begins with P moving an initial argument 𝐴 that it wants to put to the test. O and P take turns in moving arguments that attack their counterpart's last move. We adapt the notion of dialogue model<ref type="foot" target="#foot_3">4</ref> from <ref type="bibr" target="#b20">[21]</ref> for G-SAF:</p><p>• A topic language ℒ 𝑡 , which is argument-based.</p><p>• A communication language ℒ 𝑐 .</p><p>• An utterance is a pair 𝑢 = (PL, C), where PL is the player P (or O) and C ∈ ℒ 𝑐 is the speech act performed in the utterance. C is one of the following forms:</p><p>claim(𝐴): The move advances an argument 𝐴 ∈ Arg 𝒦 that supports a query 𝑞 of a KB. We set arg(𝑢) = 𝐴. contrary(𝐴) (contrary(𝒮) resp.): The move advances an argument 𝐴 (a set of arguments 𝒮 resp.) in Arg 𝒦 that attack the previously advanced arguments. We set arg(𝑢) = 𝐴 (arg(𝑢) = 𝒮 resp.). retract(𝐴, 𝑖): When O (P resp.) cannot advance any argument attacking (defending) the previously advanced arguments, it should retrace back and choose another argument 𝐴 to start a new line of attack (defend resp.) at the 𝑖-th position. We set arg(𝑢) = 𝐴. For such utterance 𝑢, we set pl(𝑢) = PL. Let 𝒰 denote the set of utterances.</p><p>• A dialogue 𝐷 G is a finite sequence 𝑢 1 , . . . , 𝑢 𝑘 of utterances such that the first utterance 𝑢 1 is played by P, i.e. pl(𝑢 1 ) = P. We denote by 𝒟 &lt; ∞ the set of all dialogues. • A protocol Θ on 𝒰 specifying the legal moves at each stage of a dialogue. Formally, a protocol on 𝒰 is a function</p><formula xml:id="formula_4">Θ : 𝒟 ↦ → 2 𝒰 such that 𝒟 ⊆ 𝒟 &lt; ∞ .</formula><p>The elements of 𝒟 are called the legal finite dialogues. For 𝐷 G ∈ 𝒟, the elements of Θ(𝐷 G ) are called the moves allowed after 𝐷 G . If 𝐷 G is a legal dialogue and Θ(𝐷 G ) = ∅, then 𝐷 G is said to be a terminated dialogue. Θ must satisfy the following condition: for all finite dialogues 𝐷 G and moves 𝑢, 𝐷 G ∈ 𝒟 and 𝑢 ∈ Θ(𝐷 G ) iff 𝐷 G , 𝑢 ∈ 𝒟.</p><p>The dialogue represents a compact representation of a tree where nodes are arguments played by both parties. To display all disclosed information from the dialogues, we introduce the notion of dialogue trees in terms of a meta-level, which includes arguments and counter-arguments. Definition 8. Given a dialogue 𝐷 G = 𝑢 1 , . . . , 𝑢 𝑘 (for an argument 𝐴 ∈ Arg 𝒦 ). The general dialogue tree drawn from 𝐷 G is a labelled tree 𝒯 G = (𝒱, ℰ), where 𝒱 is the set of nodes and ℰ is the set of hyperedges that are directed from nodes to their parent node. 𝒯 G is defined as follows:</p><p>• The set of all nodes is defined as 𝒱 = {arg(𝑢 𝑘 ) | 𝑢 𝑘 ∈ 𝐷 G } with arg(𝑢 1 ) as the root node of the tree s.t. arg(𝑢 1 ) = 𝐴. • ℰ is recursively defined as:</p><formula xml:id="formula_5">-ℰ 1 = ∅ if the player P utters 𝑢 1 , -ℰ 𝑘−1 ∪ {(arg(𝑢 𝑘−1 ), arg(𝑢 𝑘 ))} if the player PL ∈ {P, O} utters 𝑢 𝑘 .</formula><p>A branch in a dialogue tree may be finite or infinite. A finite branch represents a winning debate (i.e., P wins) that ends with an argument by P against which O cannot attack. An infinite branch represents a winning debate in which P counterattacks every attack of O, ad infinitum. The requirement that "the proponent must counterattack every attack" does not guarantee that the proponent does not attack itself. This further requirement is incorporated in the definition of admissible dialogue tree: A dialogue tree is said to be admissible iff P wins and no argument labels both a proponent and an opponent node.</p><p>Notice that, in admissible dialogue trees, it is not required that the opponent and proponent nodes have no arguments in common. This is because the opponent can use the proponent's arguments against the proponent. If the opponent can attack the proponent using only the proponent's arguments, then the proponent loses. To win, the proponent must identify and counter-attack each opponent's attack with some culprit not part of their own defence.</p><p>To ensure credulous soundness, all possible O nodes must be considered. But if such a parent node is already in the dialogue tree, then deploying it will not help O win the dialogues. For this reason we call an admissible tree non-redundant <ref type="bibr" target="#b31">[32]</ref>  We now determine the acceptance of an argument from its dialogues and dialogue trees.</p><p>Theorem 2. Let 𝐷 G be a dialogue for an argument 𝐴 ∈ Arg G . Then 𝐴 is</p><formula xml:id="formula_6">• credulously accepted in some admissible extension of 𝒜ℱ G if 𝐷 G is admissible-succesful; • credulously accepted in some preferred extension of 𝒜ℱ G if 𝐷 G is preferred-successful; • groundedly accepted in 𝒜ℱ G if 𝐷 G grounded-successful; • sceptical accepted in all preferred extensions of 𝒜ℱ G if 𝐷 G is sceptical-successful.</formula><p>Proof 2. Theorem 2 generalizes known results about the abstract dispute trees of <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33]</ref> to the dialogue trees of Definition 8.</p><p>The following is a direct corollary of Theorem 1, 2 and Definition 9, which shows how to determine the entailment of a sentence wrt dialogues. The acceptance of a sentence 𝑓 corresponds to the acceptance of a set of arguments 𝒜 for 𝑓 .  Example 4 (Continue Example 3). Assume that the user wants to understand why "v is a possible researcher". The deliver system considers a persuasion dialogue: P is persuading O to agree that v is a researcher. The agreement can be reached through a dialogue 𝐷(𝐴 3 ). Figure <ref type="figure">1</ref> shows the dialogue tree 𝒯 drawn from the dialogue 𝐷(𝐴 3 ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>In this paper, we generalized the translation of arbitrary logic into SAFs. We introduced an argumentation dialogue framework and investigated the relation between its outcome and inconsistency-tolerant semantics in KBs. Our dialogue framework functions as proof procedures to compute and explain the acceptability of propositions. It can be applied to formalisms with collective attacks, thereby we show that this framework can be a generalization of the dialogue model used in AFs/LAFs with binary attacks. However, our framework has limitations: (1) Our dialogue model is still defined abstractly, only considering arguments and attacks and ignoring the internal structure of arguments; (2) Space complexity wrt the large input size, since the procedure considers all arguments translated from KBs as input to compute attacks. In future, we would address the limitations.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>𝒦 is the pair 𝐴 = (Γ, 𝑓 ) such that Γ ⊆ 𝒦 and 𝑓 ∈ CN(Γ). For such argument, we denote by Sup(𝐴) = Γ the support set of 𝐴 and by Con(𝐴) = 𝑓 the consequence of 𝐴. We use Arg 𝒦 to denote the set of arguments constructed from 𝒦. Fix 𝒮 ⊆ Arg 𝒦 , Cons(𝒮) = ⋃︀ 𝐴∈𝒮 {Con(𝐴)} are the conclusions in 𝒮.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Corollary 1 .Figure 1 :</head><label>11</label><figDesc>Figure 1: Left: a dialectical proof procedure for abstract level. Right: the corresponding dialogue tree; the line indicates children conflict with their parents.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b29">30]</ref>. Let 𝒜ℱ 𝒦 be the corresponding G-SAF of a KB 𝒦. Wrt. s ∈ {ad, st, pr, gr}, 𝒜ℱ 𝒦 is 1. closed under CN iff for all ℰ ∈ Ext s (𝒜ℱ 𝒦 ), Cons(ℰ ) = CN(Cons(ℰ )); 2. consistent iff for all ℰ ∈ Ext s (𝒜ℱ 𝒦 ), Cons(ℰ ) is consistent. Wrt. to any semantics in {ad, st, pr, gr}, 𝒜ℱ 𝒦 satisfies consistency, closure.To further illustrate the generality of our framework for monotonic and nonmonotonic logics, let us consider the following example. Let 𝐴 be a set of propositional atoms. Any atoms 𝑎 ∈ 𝐴 is a well-formed formula wrt. 𝐴. If 𝜑 and 𝛼 are well-formed formulas wrt. 𝐴 then ¬𝜑, 𝜑 ∧ 𝛼, 𝜑 ∨ 𝛼 are well-formulas wrt. 𝐴 (we also assume that the usual abbreviations →, ↔ are defined accordingly). Then ℒ 𝑝 is the set of well-formed formulas wrt.𝐴. Let |= be the entailment relation, i.e., 𝜑 |= 𝛼 if all models of 𝜑 are models of 𝛼 in the propositional semantics. A consequence operator CN 𝑝 : 2 ℒ𝑝 → 2 ℒ𝑝 is defined for each 𝑋 ⊆ ℒ 𝑝 by CN 𝑝 (𝑋) = {𝛼 ∈ ℒ 𝑝 | 𝑋 |= 𝛼}. The propositional logic can be defined as (ℒ 𝑝 , CN 𝑝 ). Consider the propositional atoms 𝐴 1 = {𝑥, 𝑦} and the knowledge base 𝒦 ′ = {𝑥, 𝑦, 𝑥 → ¬𝑦} ⊆ ℒ 𝑝 . The following set of arguments: 𝐶 1 = ({𝑥}, 𝑥); 𝐶 2 = ({𝑦}, 𝑦); 𝐶 3 = ({𝑥 → ¬𝑦}, 𝑥 → ¬𝑦); 𝐶 4 = ({𝑥, 𝑥 → ¬𝑦}, ¬𝑦); 𝐶 5 = ({𝑦, 𝑥 → ¬𝑦}, ¬𝑥); 𝐶 6 = ({𝑥, 𝑦}, 𝑥 ∧ 𝑦). The attack relations:{(𝐶 1 , 𝐶 5 ), (𝐶 5 , 𝐶 1 ), (𝐶 2 , 𝐶 4 ), (𝐶 4 , 𝐶 2 ), (𝐶 3 , 𝐶 6 ), (𝐶 6 , 𝐶 3 )}. The preferred extensions: {𝐶 1 , 𝐶 2 , 𝐶3}, {𝐶 4 , 𝐶 5 , 𝐶 6 }.</figDesc><table><row><cell>Definition 7. Proposition 2. Example 1.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>The rules is the form of 𝑥 1 , . . . 𝑥 𝑖 → 𝑠 𝑥 𝑖+1 (𝑥 1 , . . . 𝑥 𝑖 → 𝑑 𝑥 𝑖+1 ) where 𝑥 1 , . . . 𝑥 𝑖 , 𝑥 𝑖+1 are literals and → 𝑠 (denote strict rules) and → 𝑑 (denotes defeasible rules) are implication symbols. The consequence operator CN 𝑑 is a function from 2 ℒ 𝑑 to 2 ℒ 𝑑 such that for all 𝑋 ⊆ ℒ 𝑑 , 𝑥 ∈ CN 𝑑 (𝑋) iff there exists a sequence 𝑥 1 , . . . , 𝑥 𝑛 such that 1. 𝑥 is 𝑥 𝑛 , and 2. for each 𝑥 𝑖 ∈ {𝑥 1 , . . . , 𝑥 𝑛 },• there is 𝑦 1 , . . . , 𝑦 𝑗 → 𝑠 𝑥 𝑖 ∈ 𝑋, or 𝑦 1 , . . . , 𝑦 𝑗 → 𝑑 𝑥 𝑖 ∈ 𝑋, such that {𝑦 1 , . . . , 𝑦 𝑗 } ⊆ {𝑥 1 , . . . , 𝑥 𝑖−1 }, • or 𝑥 𝑖 ∈ 𝑋 Consider 𝒦 ′′ = {𝑎, ¬𝑏, 𝑎 → 𝑠 ¬𝑐, ¬𝑏 ∧ ¬𝑐 → 𝑑 𝑠, 𝑠 → 𝑠 𝑡, 𝑎 ∧ 𝑡 → 𝑑 𝑢}, the following is an argument in defeasible logic 𝐵 = ({𝑎, ¬𝑏, 𝑎 → 𝑠 ¬𝑐, ¬𝑏 ∧ ¬𝑐 → 𝑑 𝑠}, 𝑠). Let (ℒ 𝑑𝑎 , CN 𝑑𝑎 ) be Datalog ±<ref type="bibr" target="#b30">[31]</ref>. 𝛿 is a rule of the form ∀𝑥 ⃗ 𝜑(𝑥 ⃗ ) → ⊥ where 𝜑(𝑥 ⃗ ) is a conjunction of atoms. The language ℒ 𝑑𝑎 contain a set of facts, TGDs, and NCs.Assume that |= ℒ 𝑑𝑎 is an entailment of first-order formulas, i.e., Δ |= ℒ 𝑑𝑎 𝛼 holds iff every model of all elements in Δ is also a model of 𝛼. The consequence operator CN 𝑑𝑎 is defined for 𝑋 ⊆ ℒ 𝑑𝑎 by CN 𝑑𝑎 (𝑋) = {𝛼 ∈ ℒ 𝑑𝑎 | 𝑋 |= ℒ 𝑑𝑎 𝛼} in the first-order semantics. Le(𝑥) → Em(𝑥), 𝑟 2 : Re(𝑥) → Em(𝑥),</figDesc><table><row><cell>Supports and conclusions of arguments Argument Sup(𝐴 𝑖 ) 𝐴 0 {t(v, KR)} 𝐴 1 {GC(KR)} 𝐴 2 {GC(KR), t(v, KR)} 𝐴 3 {GC(KR), t(v, KR)} 𝐴 4 {t(v, KD)} 𝐴 5 {ta(v, KD)} 𝐴 6 {UC(KD)} 𝐴 7 {ta(v, KD), UC(KD)} TA(v) Con(𝐴 𝑖 ) t(v, KR) GC(KR) FP(v) Re(v) t(v, KD) ta(v, KD) UC(KD) 𝐴 9 {t(v, KR)} Le(v) 𝐴 10 {t(v, KD)} Le(v) 𝐴 11 {t(v, KR)} Em(v) 𝐴 12 {t(v, KD)} Em(v) 𝐴 13 {GC(KR), t(v, KR)} Em(v) Example 3. Table 1 𝑟</cell></row></table><note>Let N t be a set of terms that contain variables, constants and function terms. An atom is of the form 𝑃 (𝑡 ⃗ ), with 𝑃 a predicate name and 𝑡 ⃗ a vector of terms, which is ground if it contains no variables. A database is a finite instance. A tuple-generating dependency (TGD) 𝜎 is a firstorder formula of the form ∀𝑥 ⃗ ∀𝑦 ⃗𝜑(𝑥 ⃗ , 𝑦 ⃗) → ∃𝑧 ⃗𝜓(𝑥 ⃗ , 𝑧 ⃗), where 𝜑(𝑥 ⃗ , 𝑦 ⃗) and 𝜓(𝑥 ⃗ , 𝑧 ⃗) are non-empty conjunctions of atoms.2 A negative constraint (NC) A knowledge base 𝒦 is a tuple (ℱ, ℛ, 𝒞) where a database ℱ, a set ℛ of TGDs and a set 𝒞 of NCs.Consider KB 𝒦 = {ℛ, 𝒞, ℱ} ⊆ ℒ, where:ℛ ={𝑟 1 : 3 : FP(𝑥) → Re(𝑥), 𝑟 5 : t(𝑥, 𝑦) → Le(𝑥), 𝑟 4 : ta(𝑥, 𝑦) ∧ UC(𝑦) → TA(𝑥),</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>if there is no sequence of arguments 𝐴 1 , . . . , 𝐴 𝑚 with 𝐴 𝑖+1 children of 𝐴 𝑖 and 𝐴 1 children of 𝐴 𝑚 .The following definition defines successful dialogues. Let 𝒯 G be the dialogue tree drawn from a dialogue 𝐷 G for an argument 𝐴 ∈ Arg 𝒦 . 𝐷</figDesc><table><row><cell>Definition 9.</cell></row></table><note>G is called • admissible-successful iff 𝒯 G is admissible; • preferred-successful iff it is admissible-successful; • grounded-successful iff 𝒯 G isadmissible and finite;• sceptical-successful iff 𝒯 G is admissible and for no opponent node O in it there exists an admissible dialogue tree for the argument labelling O.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>• credulously accepted, and 𝒦 ⊢ MCS(𝒦) 𝑓 if there is a dialogue 𝐷 G for some 𝐴 ∈ 𝒜 s.t. 𝐷 G is preferred-successful; • groundedly accepted, and 𝒦 ⊢ ⋂︀ MCS(𝒦) 𝑓 if there is a dialogue 𝐷 G for all 𝐴 ∈ 𝒜 s.t. 𝐷 G is grounded-successful; • sceptically accepted, and 𝒦 ⊢ ⋃︀ MCS(𝒦) 𝑓 if 1. there is a dialogue 𝐷 G for some 𝐴 ∈ 𝒜 such that 𝐷 G is sceptical-successful; 2. or there is a dialogue 𝐷 G for all 𝐴 ∈ 𝒜 s.t. 𝐷 G is preferred-successful and 𝒜 is contained in all preferred extensions of 𝒜ℱ 𝒦 .</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">The notion of repair corresponds to "maximal consistent subsets" in our work</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">We usually leave out the universal quantification, and refer to 𝜑(𝑥 ⃗ , 𝑦 ⃗) and 𝜓(𝑥 ⃗ , 𝑧 ⃗) as the body ad head of 𝜎.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">Fix ℱ ′ ⊆ ℱ , Args(ℱ ′ ) = {𝐴 ∈ Arg 𝒦 | Sup(𝐴) ⊆ ℱ ′ }</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">Following<ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>, this model uses Dung's very abstract notion of argument, and they do not need utterances to reflect particular procedures or forms of argument. Thus, the model has a rather small set of utterances.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is partially supported by the Hybrid Intelligence programme (https://www. hybrid-intelligence-centre.nl/), funded by a 10 year Zwaartekracht grant from the Dutch Ministry of Education, Culture and Science.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Proof for Proposition 1</head><p>Notation 1. Let 𝒦 be a KB, 𝒳 ⊆ 𝒦 be a set of formulas and 𝒮 ⊆ Arg 𝒦 be a set of arguments. Then,</p><p>• Args(𝒳 ) = {𝐴 ∈ Arg | Sup(𝐴) ⊆ 𝒳 } are the set of arguments generated by 𝒳 , • Base(𝒮) = ⋃︀ 𝐴∈𝒮 Sup(𝐴) are the set of supports of arguments in 𝒮,</p><p>• An argument 𝐵 is a subargument of argument 𝐴 iff Sup(𝐵) ⊆ Sup(𝐴). We denote the set of subarguments of 𝐴 as Subs(𝐴).</p><p>• 𝑋 is a minimal conflict of 𝒦 if 𝑋 ′ ⊊ 𝑋 implies 𝑋 ′ is consistent. We denote the set of minimal conflicts of 𝒦 by Conflicts(𝒦).</p><p>We prove Proposition 1 through Lemma 1 and Lemma 2.</p><p>Lemma 1. Let 𝒦 be a KB, the corresponding G-LAF 𝒜ℱ 𝒦 . Then, the maximal consistent subset of 𝒦 coincides with the stable/ preferred extension of 𝒜ℱ 𝒦 ; Proof 3. To prove the lemma, we first prove it with the undercut-attacks. For the rebuttal-attacks, the proof is similar to that of the undercut-attacks. We separate the proof of the lemma into two parts:</p><p>1. We prove {Args(𝒜) | 𝒜 ∈ MCS(𝒦)} ⊆ Ext st (𝒜ℱ 𝒦 ). Suppose that 𝒜 ∈ MCS(𝒦) (i.e., 𝒜 is consistent) and ℰ = Args(𝒜), we show that ℰ is a stable extension of 𝒜ℱ 𝒦 , i.e., ℰ ∈ Ext st (𝒜ℱ 𝒦 ). Which means that, by definition, we prove that ℰ is conflict-free and attacks all arguments not belonging to ℰ.</p><p>First, we prove that ℰ is conflict-free. Suppose for a contradiction that ℰ is not conflict-free. There exists ℰ ′ ⊆ ℰ and an argument 𝐴 ∈ ℰ such that ℰ ′ attacks 𝐴. By Definition 4, there exists 𝛽 ∈ Sup(𝐴) such that</p><p>Second, we prove that ℰ attacks all arguments not belonging to ℰ. Let 𝐶 ∈ Arg 𝒦 ∖ ℰ and 𝛼 ∈ Sup(𝐶) ∖ 𝒜. Since 𝛼 / ∈ 𝒜 and 𝒜 is a maximal consistent subset of 𝒦, then for every 𝒮 ⊆ ℰ = Args(𝒜) such that ⋃︀ 𝑆∈𝒮 Sup(𝑆) ∪ {𝛼} is inconsistent, there follows that ⋃︀ 𝑆∈𝒮 {Con(𝑆)} ∪ {𝛼} is inconsistent. By Definition 4, 𝒮 attacks 𝐶. Since ℰ = Args(𝒜), this proves that ℰ attacks all arguments not belonging to ℰ. Since ℰ is conflict-free and attacks all arguments not belonging to ℰ, it follows that ℰ is a stable extension.</p><p>2. We next prove Ext pr (𝒜ℱ 𝒦 ) ⊆ {Args(𝒜) | 𝒜 ∈ MCS(𝒦)}. Suppose that ℰ ∈ Ext pr (𝒜ℱ 𝒦 ), we prove that there exists a maximal consistent subset 𝒜 such that ℰ = Args(𝒜). Which means that, by definition, we prove that 𝒜 is maximal consistent.</p><p>First, suppose that 𝒜 = Base(ℰ ) and we prove 𝒜 is consistent. Assume for a contradiction that 𝒜 is inconsistent. Let {𝛽 1 , . . . , 𝛽 𝑚 } = 𝒜 ′ ⊆ 𝒜 be an inconsistent set and every proper subset of it is consistent. Let 𝐶 ∈ ℰ be an argument such that 𝛽 𝑚 ∈ Sup(𝐶) and 𝒮 be the set of arguments generated from <ref type="bibr">Definition 4)</ref>. Since Sup(𝐶) ⊆ 𝒜 ′ , 𝒮 attacks 𝐶. Since ℰ is conflict-free, we have 𝒮 ⊈ ℰ; and since ℰ is also an admissible set, there is a set of arguments 𝒟 ⊆ ℰ such that 𝒟 attacks 𝒮. Then, there exist some arguments 𝑆 𝑖 ∈ 𝒮 and 𝛽 𝑖 ∈ Sup(𝑆 𝑖 ), 𝑖 ∈ {1, . . . , 𝑚 − 1} such that ⋃︀ 𝐷∈𝒟 {Con(𝐷)} ∪ {𝛽 𝑖 } is inconsistent. Next, we will show 𝒟 attacks an argument in ℰ. Since 𝛽 𝑖 ∈ Base(ℰ ), there exists an argument 𝐹 ∈ ℰ s.t. 𝛽 𝑖 ∈ Sup(𝐹 ), which implies 𝒟 attacks 𝐹 . Clearly, 𝐶 is attacked by 𝒮 but cannot be defended, which is in contradiction with the fact that ℰ is admissible. Hence 𝒜 is consistent.</p><p>Second, we show that 𝒜 is maximal consistent, i.e., there is no maximal consistent subset 𝒜 ′ ∈ MCS(𝒦) such that 𝒜 ′ ⊆ 𝒜 and 𝒜 ′ is inconsistent. Assume the contrary. Since ℰ is a preferred extension, it follows that Args(𝒜)∖Args(𝒜 ′ ) ̸ = ∅, and let Ω ⊆ 𝒜∖𝒜 ′ and ℳ be the set of arguments generated by Ω, i.e., ℳ = {𝑀 ∈ Arg | Sup(𝑀 ) ⊆ Ω}. Since Ω ⊆ 𝒜∖𝒜 ′ , it follows that ℳ ⊆ Args(𝒜)∖Args(𝒜 ′ ). By the first part of the proof, Args(𝒜 ′ ) is a stable extension of 𝒜ℱ 𝒦 , there must be Φ ⊆ 𝒜 ′ such that the set of all arguments generated by Φ, that is 𝒳 = {𝑋 ∈ Args(𝒜 ′ ) | Sup(𝑋) ⊆ Φ}, attacks ℳ. Since ℰ is the preferred extension, there must be a set of arguments ℋ ⊆ ℰ and ℋ attacks 𝒳 . Since ℋ ⊆ ℰ and 𝒜 = Base(ℰ ), it follows that Base(ℋ) ⊆ 𝒜. By assumption, i.e., 𝒜 ′ ⊆ 𝒜, it follows that 𝒜 ′ is inconsistent, which contradicts the assumption. Hence 𝒜 is maximal consistent. We conclude that 𝒜 ∈ MCS(𝒦).</p><p>Since every stable extension is a preferred one <ref type="bibr" target="#b28">[29]</ref>, we can proceed as follows. From the first item, we proved that every maximal consistent subset is a stable extension, thus the proposition holds for preferred semantics. From the second item, we have that every preferred extension is a maximal consistent subset, thus the proposition holds for stable semantics. Lemma 2. Let 𝒦 be a KB, the corresponding G-LAF 𝒜ℱ 𝒦 . Then, the intersection of the maximal consistent subsets of 𝒦 coincides with the grounded extension of 𝒜ℱ 𝒦 . Proof 4. Let 𝒢 be the grounded extension of 𝒜ℱ 𝒦 and 𝒜 be the intersection of the maximal consistent subsets of 𝒦. Let 𝒜 ′ ∈ MCS(𝒦) and 𝒜 = ⋂︀ 𝒜 ′ ∈MCS(𝒦) 𝒜 ′ . By Lemma 1, 𝒜 ′ is a stable extension of 𝒜ℱ 𝒦 . Since every stable extension is also a complete extension, and 𝒢 is the minimal (w.r.t. set inclusion) complete extension of 𝒜ℱ 𝒦 , it follows that 𝒢 ⊆ Args(𝒜 ′ ). Thus 𝒢 ⊆ Args(𝒜).</p><p>In the other direction, let Δ ⊊ 𝒜. Then there is no 𝒞 ∈ Conflicts(𝒦) such that Δ ⊊ 𝒞 (If Δ ⊊ 𝒞, 𝒞 ∖ Δ would be consistent and could be extended to a maximal consistent subset of 𝒦 that would not contain Δ). Hence, there are no arguments that attack the argument 𝐷 ∈ Args(𝒜) where Sup(𝐷) = Δ. Since 𝐷 has no attackers, then any extension trivially defends it, so 𝐷 must be in 𝒢. It follows that Args(𝒜) ⊆ 𝒢.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Proof of Proposition 2</head><p>We prove each postulate:</p><p>1. Closure: Let us show that for every ℰ ∈ Ext s (𝒜ℱ 𝒦 ), Cons(ℰ ) = CN(Cons(ℰ )). From Expansion axiom, it follows that Cons(ℰ ) ⊆ CN(Cons(ℰ )).</p><p>In the other direction, we prove CN(Cons(ℰ )) ⊆ Cons(ℰ ). Let 𝛼 ∈ CN(Cons(ℰ )). Since ℰ is a preferred or stable extension, there is a set of sentences 𝒜 ⊆ 𝒦 such that ℰ = Args(𝒜) (by Proposition 1). Thus ℰ = Args(Base(ℰ )). Since the supports of the arguments of ℰ include the sentences in 𝒜, it follows that 𝛼 ∈ CN(𝒜). Hence, there is an argument 𝐴 ∈ ℰ such that Con(𝐴) = 𝛼.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Consistency:</head><p>We prove that for ℰ ∈ Ext s (𝒜ℱ 𝒦 ), Cons(ℰ ) is consistent. First, we consider the case of stable or preferred extensions. Let ℰ be a stable or preferred extension of 𝒜ℱ 𝒦 . By Proposition 1, there is a maximal consistent subset 𝒜 ∈ MCS(𝒦) such that ℰ = Args(𝒜). Since 𝒜 is a preferred maximal consistent subset, we see that CN(𝒜) is consistent. Since Cons(ℰ ) = CN(𝒜) and CN(𝒜) is consistent, it follows that Cons(ℰ ) is consistent.</p><p>We consider the case of grounded semantics. We denote 𝒢 as the grounded extension of 𝒜ℱ 𝒦 . We prove that for every ℰ ∈ Ext gr (𝒜ℱ 𝒦 ), Cons(ℰ ) is consistent. Since the grounded extension is a subset of the intersection of the preferred extensions, and since there is at least one preferred extension ℰ 1 , then 𝒢 ⊆ ℰ 1 . From Proposition 1, there is a maximal consistent subset 𝒜 ∈ MCS(𝒦) s.t. ℰ 1 = Args(𝒜). By the first part of the proof, Cons(ℰ 1 ) is consistent. It follows that Cons(𝒢) is consistent. This ends the proof of Theorem 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Proof of Theorem 1</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. Proof for Theorem 2</head><p>Proof 5. It is clear that 𝐴 is accepted in some admissible extension of 𝒜ℱ G if 𝐷 G is admissible. Let 𝒯 G be the dialogue tree drawn from 𝐷 G . The argument given in Definition 2 and Lemma 1 of <ref type="bibr" target="#b31">[32]</ref> for binary attacks generalizes to collective attacks, implying that 𝐴 is accepted in some admissible extension if 𝒯 G is admissible which in turn holds iff P wins and no argument labels both a proponent and an opponent node. By Definition 9, 𝐷 G is admissible-successful iff 𝒯 G is admissible. Thus, the statement is proved. 𝐷 G is preferred-successful if 𝐷 G is admissible-successful. This result directly follows from the results of <ref type="bibr" target="#b0">[1]</ref> that states that an extension is preferred if it is admissible. Thus, 𝐴 is credulously accepted in some preferred extension if 𝐷 G is preferred-successful.</p><p>The other statement follows in a similar way as a straightforward generalization of Theorem 1 of <ref type="bibr" target="#b31">[32]</ref> for the "grounded-successful" semantic; Definition 3.3 and Theorem 3.4 of <ref type="bibr" target="#b32">[33]</ref> for the "sceptical-successful" semantic.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Classical logic, argument and dialectic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Agostino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
		<idno type="DOI">10.1016/J.ARTINT.2018.05.003</idno>
		<ptr target="https://doi.org/10.1016/j.artint.2018.05.003.doi:10.1016/J.ARTINT.2018.05.003" />
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">262</biblScope>
			<biblScope unit="page" from="15" to="51" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">An argumentation framework for description logic ontology reasoning and management</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Intell. Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="375" to="403" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Logic-based argumentation with existential rules</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arioua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vesic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Approx. Reason</title>
		<imprint>
			<biblScope unit="volume">90</biblScope>
			<biblScope unit="page" from="76" to="106" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Arch-int, An argumentative approach for handling inconsistency in prioritized datalog± ontologies</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Arch-Int</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Acar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Schlobach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Commun</title>
		<imprint>
			<biblScope unit="page" from="243" to="267" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Sets of attacking arguments for inconsistent datalog knowledge bases</title>
		<author>
			<persName><forename type="first">B</forename><surname>Yun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vesic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Models of Argument -Proceedings of COMMA 2020</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">326</biblScope>
			<biblScope unit="page" from="419" to="430" />
		</imprint>
	</monogr>
	<note>Frontiers in Artificial Intelligence and Applications</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Toward a More Efficient Generation of Structured Argumentation Graphs</title>
		<author>
			<persName><forename type="first">B</forename><surname>Yun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vesic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
		<editor>COMMA</editor>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Logics for Defeasible Argumentation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Vreeswijk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="219" to="318" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The ASPIC + framework for structured argumentation: a tutorial</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument Comput</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="31" to="62" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Five weaknesses of ASPIC +</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IPMU 2012 Proceedings</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">299</biblScope>
			<biblScope unit="page" from="122" to="131" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Sequent-based logical argumentation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Arieli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Straßer</surname></persName>
		</author>
		<idno type="DOI">10.1080/19462166.2014.1002536</idno>
		<ptr target="https://doi.org/10.1080/19462166.2014.1002536" />
	</analytic>
	<monogr>
		<title level="j">Argument Comput</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="73" to="99" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Logical argumentation by dynamic proof systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Arieli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Straßer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theor. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">781</biblScope>
			<biblScope unit="page" from="63" to="91" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Defeasible logic programming: Delp-servers, contextual queries, and explanations for answers</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Simari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument Comput</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="63" to="88" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A characterization of collective conflict for defeasible argumentation</title>
		<author>
			<persName><forename type="first">T</forename><surname>Alsinet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Béjar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Godo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Models of Argument: Proceedings of COMMA 2010</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page" from="27" to="38" />
		</imprint>
	</monogr>
	<note>Frontiers in Artificial Intelligence and Applications</note>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Assumption-Based Argumentation</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Kowalski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Toni</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="199" to="218" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Just a matter of perspective</title>
		<author>
			<persName><forename type="first">M</forename><surname>König</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rapberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ulbricht</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Models of Argument -Proceedings of COMMA 2022</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">353</biblScope>
			<biblScope unit="page" from="212" to="223" />
		</imprint>
	</monogr>
	<note>Frontiers in Artificial Intelligence and Applications</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Justifying answer sets using argumentation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Schulz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Toni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory Pract. Log. Program</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="59" to="110" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Collective attacks in assumption-based argumentation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Arieli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Heyninck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing,SAC, ACM</title>
				<meeting>the 39th ACM/SIGAPP Symposium on Applied Computing,SAC, ACM</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="746" to="753" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Query answering explanation in inconsistent datalog± knowledge bases</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arioua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DEXA</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">9261. 2015</date>
			<biblScope unit="page" from="203" to="219" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Dialectical characterization of consistent query explanation with existential rules</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arioua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of FLAIRS, AAAI</title>
				<editor>
			<persName><forename type="first">Z</forename><surname>Markov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Russell</surname></persName>
		</editor>
		<meeting>FLAIRS, AAAI</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="621" to="625" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Coherence and flexibility in dialogue games for argumentation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Comput</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="1009" to="1040" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Towards argument-based foundation for sceptical and credulous dialogue games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Thang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Hung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of COMMA</title>
				<meeting>COMMA</meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">245</biblScope>
			<biblScope unit="page" from="398" to="409" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A general framework for sound assumption-based argumentation dialogues</title>
		<author>
			<persName><forename type="first">X</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Toni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page" from="20" to="54" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Explanatory dialogues with argumentative faculties over inconsistent knowledge bases</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arioua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Buche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="page" from="244" to="262" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Query failure explanation in inconsistent knowledge bases using argumentation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Arioua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Croitoru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Buche</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Comma</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Two party immediate response disputes: Properties and efficiency</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bench-Capon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">149</biblScope>
			<biblScope unit="page" from="221" to="250" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Base logics in argumentation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hunter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Frontiers in Artificial Intelligence and Applications</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">216</biblScope>
			<biblScope unit="page" from="275" to="286" />
		</imprint>
	</monogr>
	<note>Proceedings of COMMA</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A dialectical characterisation of argument game proof theories for classical logic argumentation</title>
		<author>
			<persName><forename type="first">F</forename><surname>Castagna</surname></persName>
		</author>
		<ptr target=".org" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of AIxIA</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Agostino</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>D'asaro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Larese</surname></persName>
		</editor>
		<meeting>AIxIA</meeting>
		<imprint>
			<publisher>CEUR-WS</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">3086</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">A generalization of dung&apos;s abstract framework for argumentation: Arguing with sets of attacking arguments</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Nielsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Argumentation in Multi-Agent Systems</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="54" to="73" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Logical limits of abstract argumentation frameworks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Besnard</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Appl. Non Class. Logics</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="229" to="267" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A general datalog-based framework for tractable query answering over ontologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Calì</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gottlob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lukasiewicz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Web Semantics</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="57" to="83" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Towards a common framework for dialectical proof procedures in abstract argumentation</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Thang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Hung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Comput</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1071" to="1109" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Computing ideal sceptical argumentation</title>
		<author>
			<persName><forename type="first">P</forename><surname>Dung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mancarella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Toni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="642" to="674" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
