<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Extension-Based Argumentation Semantics via Logic Programming Semantics with Negation as Failure</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Juan</forename><forename type="middle">Carlos</forename><surname>Nieves</surname></persName>
							<email>jcnieves@lsi.upc.edu</email>
							<affiliation key="aff0">
								<orgName type="institution">Universitat Politècnica de Catalunya Software Department (LSI)</orgName>
								<address>
									<addrLine>c/Jordi Girona 1-3</addrLine>
									<postCode>E08034</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ignasi</forename><surname>Gomez-Sebastià</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universitat Politècnica de Catalunya Software Department (LSI)</orgName>
								<address>
									<addrLine>c/Jordi Girona 1-3</addrLine>
									<postCode>E08034</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Extension-Based Argumentation Semantics via Logic Programming Semantics with Negation as Failure</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">24063B38646818111F995EE7B07B5863</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Extension-based argumentation semantics have been shown to be a suitable approach for performing practical reasoning. Since extension-based argumentation semantics were formalized in terms of relationships between atomic arguments, it has been shown that extension-based argumentation semantics (such as the grounded semantics and stable semantics) can be characterized by logic programming semantics with negation as failure. Recently, it has been shown that argumentation semantics such as the preferred semantics and the CF2 semantics can be characterized in terms of logic programming semantics. In this paper, we make a short overview w.r.t. recent results in the close relationship between extension-based semantics and logic programming semantics with negation as failure. We also show that there is enough evidence to believe that the use of declarative approaches based on logic programming semantics with negation as failure is a practical approach for performing practical reasoning following an argumentation reasoning approach.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Argumentation theory is a formal discipline within Artificial Intelligence (AI) where the aim is to make a computer assist in or perform the act of argumentation. During the last years, argumentation has been gaining increasing importance in Multi-Agent Systems (MAS), mainly as a vehicle for facilitating rational interaction (i.e.interaction which involves the giving and receiving of reasons) <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b13">14]</ref>. A single agent may also use argumentation techniques to perform its individual reasoning because it needs to make decisions under complex preferences policies, in a highly dynamic environment.</p><p>Although several approaches have been proposed for capturing representative patterns of inference in argumentation theory, Dung's approach, presented in <ref type="bibr" target="#b6">[7]</ref>, is a unifying framework which has played an influential role on argumentation research and AI. The kernel of Dung's framework is supported by four extension-based argumentation semantics (we will refer to them also as abstract argumentation semantics): grounded semantics, stable semantics, preferred semantics, and complete semantics. When Dung introduced his argumen-tation approach, he proved that it can be regarded as a special form of logic programming with negation as failure. In fact, he showed that the grounded and stable semantics can be characterized by the well-founded and stable model semantics respectively. This result has at least two main implications:</p><p>1. It defines a general method for generating metainterpreters for argumentation systems 2. It defines a general method for studying abstract argumentation semantics <ref type="bibr">'</ref> properties in terms of logic programming semantics' properties.</p><p>As we can see, the study of abstract argumentation semantics in terms of logic programming semantics has important implications for closing the gap between theoretical results and argumentation systems. Despite these implications, until 2007 the only extension-based argumentation semantics characterized in terms of logic programming semantics were the grounded and stable semantics. Recently, there are novel results which have shown that extension-based argumentation semantics (such as the preferred) semantics can be characterized in terms of logic programming semantics <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b10">11]</ref>. In fact, there are results which show that not only a logic programming approach can characterize extension-based argumentation semantics but also it can define new extension based argumentation semantics <ref type="bibr" target="#b11">[12]</ref>.</p><p>In this paper, we present a survey of recent results w.r.t. the close relationship between extension-based semantics and logic programming semantics with negation as failure. These results are in two directions:</p><p>1. The identification of dual characterizations between extension-based argumentation semantics and logic programming semantics. These results represent an extension of Theorem 17 presented in <ref type="bibr" target="#b6">[7]</ref>. These results are based on regarding argumentation frameworks into logic programs. 2. The implementation of logic programming metainterpreters for inferring extension-based argumentation semantics. These metainterpreters are based on the platform of Answer Set Programming (ASP) <ref type="foot" target="#foot_0">1</ref> and a characterization of extension-based argumentation semantics in terms of labels (IN, OUT, UNDEC). This labeling process has shown to be a practical approach for defining interactive algorithms for inferring extension-based argumentation semantics <ref type="bibr" target="#b9">[10]</ref>. However, there are results that show that the declarative specification of a labeling process defines an easy approach for computing extension-based argumentation semantics <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b14">15]</ref>.</p><p>The rest of the paper is divided as follows: In §2, the syntax of valid logic programs in ASP is introduced, some basic concepts of the Dung's argumentation approach are defined and the characterization of extension-based argumentation semantics in terms of the labels: IN, OUT, UNDEC is presented. In §3, some recent results w.r.t. the relationship between extension-based argumentation semantics and logic programming semantics are presented. In §4, some approaches for implementing logic programming metainterpreters for inferring extension-based argumentation semantics are presented. Finally, in the last section some conclusions are presented.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>In this section, we present some basic concepts on: a) the syntax of logic programs b) extension-based argumentation semantics c) a labeling approach for characterizing extension-based argumentation semantics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Syntax of Logic Programs</head><p>A signature L is a finite set of elements that we call atoms. A literal is an atom, a (positive literal), or the negation of an atom not a (negative literal). Given a set of atoms {a 1 , . . . , a n }, we write not {a 1 , . . . , a n } to denote the set of literals {not a 1 , . . . , not a n }. A disjunctive clause is a clause of the form:</p><formula xml:id="formula_0">a 1 ∨ • • • ∨ a m ← a m+1 , .</formula><p>. . , a j , not a j+1 , . . . , not a n where a i is an atom, 1 ≤ i ≤ n. When n = m and m &gt; 0, the disjunctive clause is an abbreviation of the fact</p><formula xml:id="formula_1">a 1 ∨ • • • ∨ a m ←</formula><p>where is an atom that always evaluate to true. When m = 0 and n &gt; 0 the clause is an abbreviation of ⊥ ← a 1 , . . . , a j , not a j+1 , . . . , not a n where ⊥ is an atom that always evaluate to false. Clauses of this form are called constraints (the rest non-constraints). A disjunctive logic program is a finite set of disjunctive clauses.</p><p>We denote by L P the signature of P , i.e., the set of atoms that occur in P. Given a signature L, we write P rog L to denote the set of all the programs defined over L.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Extension-based Argumentation Semantics</head><p>We are going to present a short introduction of Dung's argumentation approach. A fundamental Dung's definition is the concept called argumentation framework which is defined as follows: Dung also defined a skeptical semantics which is called grounded semantics and it is defined in terms of a characteristic function. Definition 6. <ref type="bibr" target="#b6">[7]</ref> The characteristic function, denoted by F AF , of an argumentation framework AF = AR, attacks is defined as follows:</p><formula xml:id="formula_2">Definition 1. [7]</formula><formula xml:id="formula_3">F AF : 2 AR → 2 AR F AF (S) = {A| A is acceptable w.r.t. S } Definition 7. [7]</formula><p>The grounded extension of an argumentation framework AF, denoted by GE AF , is the least fixed point of F AF Dung defined the concept of complete extension which provides the link between preferred extensions (credulous semantics), and grounded extension (skeptical semantics). Definition 8. <ref type="bibr" target="#b6">[7]</ref> An admissible set S of arguments is called complete extension if and only if each argument which is acceptable w.r.t. S, belongs to S.</p><p>In <ref type="bibr" target="#b6">[7]</ref>, a general method for generating metainterpreters in terms of logic programming for argumentation systems was suggested. This is the first approach which regards an argumentation framework as a logic program. This metainterpreter is divided in two units: Argument Generation Unit (AGU), and Argument Processing Unit (APU). The AGU is basically the representation of the attacks upon an argumentation framework and the APU consists of two clauses. In order to define these clauses, let us introduce the predicate d(x), where the intended meaning of d(x) is: "the argument x is defeated" and the predicate acc(x), where the intended meaning of acc(x) is: "the argument x is acceptable".</p><formula xml:id="formula_4">(C1) acc(x) ← not d(x) (C2) d(x) ← attack(y, x), acc(y)</formula><p>The first one (C1) suggests that the argument x is acceptable if it is not defeated and the second one (C2) suggests that an argument is defeated if it is attacked by an acceptable argument. Formally, the Dung's metainterpreter is defined as follows: This result is really important in argumentation semantics, in fact it has at least two main implications:</p><p>1. It defines a general method for generating metainterpreters for argumentation systems and 2. It defines a general method for studying abstract argumentation semantics' properties in terms of logic programming semantics' properties.</p><p>As we can see, the study of abstract argumentation semantics in terms of logic programming semantics has important implications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Extension-based Argumentation Semantics via Labeling</head><p>A common approach for deciding acceptability of arguments is by considering a labeling process. The labeling approach is a suitable approach for characterizing argumentation semantics <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>.</p><p>The labeling process is based in a labeling mapping. In this paper, we are going to consider the mapping presented in <ref type="bibr" target="#b9">[10]</ref> which considers three labels: in, out and undec. This mapping is defined as follows: Given an argumentation framework AF = AR, attacks , for any argument a ∈ AR one can define functions IN (a) , OU T (a) and U N DEC(a) that return true if the argument a is labeled in, out and undec respectively, and false otherwise. Also, the sets IN , OU T and U N DEC can be defined as the sets containing all the arguments in the framework labeled in, out and undec respectively. A special type of labeling is the reinstatement labeling. A reinstatement labeling is a labeling that, given an Argumentation framework AF = AR, attacks and attacks(a, b) if f (a, b) ∈ attacks meets the following two properties:</p><formula xml:id="formula_5">∀a ∈ AR : OU T (a) = true if f ∃b ∈ AR : attacks(b, a) ∧ IN (b) = true ∀a ∈ AR : IN (a) = true if f ∀b ∈ AR : attacks(b, a) then OU T (b) = true</formula><p>Some authors have shown that by considering a mapping process one can characterize the extension-based argumentation semantics defined by Dung in <ref type="bibr" target="#b6">[7]</ref> and also some other new argumentation semantics that have been defined by the argumentation community. Some of these characterizations are <ref type="bibr" target="#b9">[10]</ref>: In the following sections, we are going to present some recent results which extend Theorem 1 and its implications.</p><formula xml:id="formula_6">-</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Extension-Based Semantics as Logic Programming Semantics with Negation as Failure</head><p>In this section, we are going to introduce some recent results which extend Theorem 1. For this aim, we are going to introduce some simple mappings in order to regard argumentation frameworks in terms of logic programs.</p><p>Definition 10. Let AF = AR, attacks be an argumentation framework, then P 1 AF , P<ref type="foot" target="#foot_1">2</ref> AF and P 3 AF are defined as follows: The intuitive ideas behind these mappings are:</p><formula xml:id="formula_7">P 1 AF = a∈AR</formula><p>-P 1 AF suggests that an argument a will be defeated if one of its adversaries is not defeated. It is not hard to see that P 1  AF is equivalent to P AF (introduced in Definition 9). -P 2 AF suggests that the argument a is defeated when all the arguments that defend 2 a are defeated.</p><p>-P 3 AF suggest that any arguments which is not defeated is accepted.</p><p>The conditions captured by P 1 AF and P 2 AF are standard settings in argumentation theory for expressing the acceptability of an argument. In fact, these conditions are also standard setting in Defeasible Logic <ref type="bibr" target="#b7">[8]</ref>.</p><p>In order to present some relevant properties of the defined mappings, let us define the function tr as follows: Given a set of arguments E, tr(E) is defined as follows: tr(E) = {acc(a)|a ∈ E} ∪ {d(b)|b is an argument and b ∈ E} Now, let us introduce a theorem that essentially summarizes some relevant characterizations of extension-based argumentation semantics in terms of logic programming semantics with negation as failure.</p><p>Theorem 2. Let AF be an argumentation framework and E be a set of arguments. Then:</p><p>-E is the grounded extension AF iff tr(E) is the well-founded model of</p><formula xml:id="formula_8">Ψ 1 AF ∪ Ψ 2 AF ∪ Ψ 3 AF . -E is a stable extension of AF iff tr(E) is a stable model of P si 1 AF ∪ Ψ 2 AF ∪ Ψ 3 AF . -E is a preferred extension of AF iff tr(E) is a p-stable model of Ψ 1 AF ∪ Ψ 2 AF ∪ Ψ 3 AF .</formula><p>This theorem was proved in <ref type="bibr" target="#b4">[5]</ref>. Observe that essentially, this theorem is extending Theorem 1 and suggests that one can capture three of the well accepted argumentation semantics in one single logic program and three different logic programming semantics. The interesting part of this kind of results is that one can explore meta-interpreters of these argumentation semantics in terms of solvers of logic programming semantics . Also, one can explore non-monotonic reasoning properties of argumentation semantics in terms of their corresponding logic programming semantics. For instance, a possible research issue in this line is to explore the non-monotonic properties of the preferred semantics via p-stable semantics. It is worth mentioning that the p-stable semantics is based on paraconsistent logics. This suggests that one can characterize the preferred semantics in terms of paraconsistent logics.</p><p>The identification of non-monotonic reasoning properties which could represent a good-behavior of an argumentation semantics represents a hot topic since recently the number of new argumentation semantics in the context of Dungs argumentation approach has increased. The new semantics are motivated by the fact that the extension based semantics introduced by Dung in <ref type="bibr" target="#b6">[7]</ref> have exhibited a variety of problems common to the grounded, stable and preferred semantics <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>One of the approaches that has been emerging for building new extensionbased argumentation semantics was introduced in <ref type="bibr" target="#b2">[3]</ref>. This approach is based on a solid concept in graph theory: strongly connected components (SCC). In <ref type="bibr" target="#b2">[3]</ref>, several alternative argumentation semantics were introduced; however, from them, CF2 is an argumentation semantics that has shown to have good-behavior <ref type="bibr" target="#b1">[2]</ref>.</p><p>In <ref type="bibr" target="#b11">[12]</ref>, an new approach for building argumentation semantics was introduced. In this approach the author suggests to use any logic programming semantics. By considering this approach, the authors were able to characterize the argumentation semantics CF2. Theorem 3. <ref type="bibr" target="#b11">[12]</ref> Let AF be an argumentation framework and E be a set of arguments. Then,</p><formula xml:id="formula_9">E is a CF2 extension AF iff tr(E) is M M r model of Ψ 1 AF ∪ Ψ 3 AF .</formula><p>theorem suggests that the relationship between the approach presented in <ref type="bibr" target="#b2">[3]</ref> and <ref type="bibr" target="#b11">[12]</ref> is close. In fact, both Theorem 2 and Theorem 3 suggest that not only one can characterize argumentation semantics in terms of logic programming semantics but also one can define new argumentation semantics in terms of logic programming semantics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Inferring Extension-Based Semantics via NonMonotonic</head><p>Reasoning Tools</p><p>So far, we have shown that logic programming semantics can be a suitable approach for exploring properties of extension-based argumentation semantics and defining new argumentation semantics. In this section, we show that the use of nonmonotic tools represent a potential approach for building intelligent systems based on an argumentation reasoning process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Preferred Semantics by Positive Disjunctive Logic Programs</head><p>Taking advantage of the mappings presented in Definition 10, in <ref type="bibr" target="#b10">[11]</ref>, it was shown that by considering Ψ 1 AF ∪ Ψ 2 AF as a propositional formula its minimal models characterize the preferred extensions of the given argumentation framework. In fact, by transforming This theorem suggest that one can any disjunctive answer set solver as DLV <ref type="bibr" target="#b5">[6]</ref> for inferring the preferred semantics. It is worth mentioning that by considering P 1 AF , P 2 AF and P 3 AF one can use any answer solver for computing the stable and grounded semantics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Computing Extension-Based Argumentation Semantics by Labeling</head><p>Until now, we have shown that we can infer extension-based argumentation semantics by regarding an argumentation framework as a logic program. However, as we saw in §2.3 some extension-based argumentation semantics can be characterized by considering labeling process. The labeling represents an alternative approach for computing extension-based argumentation semantics in terms of logic programming with negation as failure. In particular, there are results that show that by considering a labeling process one is able to compute the grounded, stable, preferred and complete argumentation semantics in terms of answer set semantics. An outstanding trend of computing such labellings is via answer set solvers.</p><p>The following two sections present studies that explore ASP applications that are able to compute various argumentation semantics, as well as decide whether an argument is sceptically or credulously accepted with reference to the chosen semantics. The idea behind these works is to transform an argumentation framework into a single normal logic program that references an argumentation semantics (either preferred, grounded, stable or complete). The answer set of the resulting program is a labeling <ref type="bibr" target="#b9">[10]</ref> that expresses an argument-based extension for the chosen semantics.</p><p>Once programs to compute every available semantics are available, a procedure to decide if an argument is sceptically or credulously accepted in the semantic can be introduced. The following mapping between skeptical or credulous arguments, argumentation frameworks and argumentation semantics is defined. Given an argumentation framework AF = AR, attacks , an argument a ∈ AR, and an argumentation semantics S: a) a is credulously justified if a ∈ IN in, at least, one possible labeling that matches the restrictions defined by the semantic S. b) a is sceptically justified if a ∈ IN in every possible labeling that matches the restrictions defined by the semantic S.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">First Approach for Implementing an Argumentation MetaInterpreter in ASP</head><p>This section presents an approach for implementing an argumentation metainterpreter presented in <ref type="bibr" target="#b15">[16]</ref> based on answer-set semantics to compute admissible, preferred, stable, semi-stable, complete, and grounded extensions.</p><p>following programs are specified given an Argumentation Framework AF = AR, attacks , two variables X and Y , the predicate symbol arg that denotes that the variable a is an argument of AF , and the functions IN (X) , OU T (X) defined before.</p><p>The program formed by the set of rules Π CF is able to compute complete extensions. The set of rules Π CF is as follows:</p><formula xml:id="formula_10">IN (x) ← arg(x), not OU T (x). OU T (x) ← arg(x), not IN (x). ⊥ ← IN (x), IN (Y ), def eat(X, Y ). def eat(X, Y ) ← (X, Y ) ∈ attacks.</formula><p>The program formed by the set of rules Π CF ∪ Π stable is able to compute stable extensions. The set of rules Π stable is as follows:</p><formula xml:id="formula_11">def eated(X) ← IN (Y ), attack(Y, X) ∈ attacks. ← OU T (X), not def eated(X).</formula><p>The program formed by the set of rules Π CF ∪ Π stable ∪ Π complete is able to compute complete extensions. The set of rules Π complete is as follows:</p><formula xml:id="formula_12">not def ended(X) ← def eat(Y, X), not def eated(Y ). ← OU T (X), not not def ended(X).</formula><p>Computing grounded, preferred and semi-stable extensions is a bit harder, because they require a labeling that maximizes or minimizes the elements in a set. In order to compute these extensions, this approach makes use of a stratified program <ref type="bibr" target="#b0">[1]</ref>. This program defines the order operator ( &lt; ) between the arguments in the domain, and derives predicates for minimal, maximal and successor. For doing so, the following program, Π &lt; is defined:</p><formula xml:id="formula_13">lt(X, Y ) ← arg(X), arg(Y ), X &lt; Y . nsucc(X, Z) ← lt(X, Y ), lt(Y, Z). succ(X, Y ) ← lt(X, Y ), not nsucc(X, Y ). ninf (Y ) ← lt(X, Y ).</formula><p>inf (X) ← arg(X), not ninf (X). nsup(X) ← lt(X, Y ). sup(X) ← arg(X), not nsup(X).</p><p>Using the program above, the predicate def end(X) is defined. This predicate is derived if for a given Argumumentation Framework AF = AR, attacks , each argument Y : Y ∈ AR def end(X, Y ). In order ensure that def end(X, Y ) is checked for every available argument, variable Y ranges from the minimal to the maximal using successor relations. The program Π def end that defines the above mentioned predicate, is as follows:</p><formula xml:id="formula_14">def end upto(X, Y ) ← inf (Y ), arg(X), not def eat(Y, X). def end upto(X, Y ) ← inf (Y ), in(Z), def eat(Z, Y ), def eat(Y, X). def end upto(X, Y ) ← succ(Z, Y ), def end upto(X, Z), not def eat(Y, X). def end upto(X, Y ) ← succ(Z, Y ), def end upto(X, Z), in(V ), def eat(V, Y ), def eat(Y, X). def end(X) ← sup(Y ), def end upto(X, Y ).</formula><p>The program formed by the set of rules Π &lt; ∪ Π def end ∪ Π ground computes grounded extensions. The set of rules Π ground is as follows: in(X) ← def ended(X).</p><p>Computing both preferred and semi-stable extensions will make use of the programs Π &lt; and Π def end defined above. However this process is a bit more complicated, because it requires computing maximal sets instead of minimal ones. For tackling this issue the approach makes use of a saturation technique. This technique consists in building a labeling S such that every other possible labeling T that complies with certain conditions (either maximal IN or U N DEC labels) does not characterize an admissible extension.</p><p>First of all, in order to model the maximal sets that both preferred and semistable extensions require, the program Π def end presented above is slightly modified, to include predicates inN and outN . The meaning of the predicates varies depending the type of semantic computed (either preferred or semi-stable) so they are defined later, in the program associated to this semantics. The program Π undef eated is defined as follows:</p><formula xml:id="formula_15">undef eated upto(X, Y ) ← inf (Y ), outN (X), outN (Y ).</formula><p>undef eated upto(X, Y ) ← inf (Y ), outN (X), not def eat(Y, X).</p><p>undef eated upto(X, Y ) ← succ(Z, Y ), undef eated upto(X, Z), outN (Y ).</p><p>undef eated upto(X, Y ) ← succ(Z, Y ), undef eated upto(X, Z), not def eat(Y, X).</p><p>undef eated(X) ← sup(Y ), undef eated upto(X, Y ).</p><p>The program formed by the sets of rules Π adm ∪ Π &lt; ∪ Π undef eated ∪ Π pref erred computes preferred extensions. The set of rules Π pref erred is as follows:</p><formula xml:id="formula_16">eq upto(Y ) ← inf (Y ), in(Y ), inN (Y ). eq upto(Y ) ← inf (Y ), out(Y ), outN (Y ). eq upto(Y ) ← succ(Z, Y ), in(Y ), inN (Y ), eq upto(Z).</formula><p>eq upto(Y ) ← succ(Z, Y ), out(Y ), outN (Y ), eq upto(Z).</p><p>eq ← sup(Y ), eq upto(Y ). inN (X) ∨ outN (X) ← out(X). inN (X) ← in(X) spoil ← eq. spoil ← inN (X), inN (Y ), def eat(X, Y ).</p><p>spoil ← inN (X), outN (Y ), def eat(Y, X), undef eated(Y ). inN (X) ← spoil, arg(X). outN (X) ← spoil, arg(X). ⊥ ← not spoil.</p><p>Last but not least, the program formed by the sets of rules Π adm ∪ Π &lt; ∪ Π undef eated ∪ Π semi−stable computes semi-stable extensions.. The set of rules Π semi−stable is as follows:   </p><formula xml:id="formula_17">eqplus upto(Y ) ← inf (Y ), in(Y ), inN (X), def eat(X, Y ). eqplus upto(Y ) ← inf (Y ), in(X), inN (Y ), def eat(X, Y ). eqplus upto(Y ) ← inf (Y ), in(X), inN (Z), def eat(X, Y ), def eat(Z, Y ). eqplus upto(Y ) ← inf (Y ), out(Y ), outN (Y ), not def eated(Y ), undef eated(Y ).</formula><formula xml:id="formula_18">← sup(Y ), eqplus upto(Y ). inN (X) ∨ outN (X) ← arg(X). spoil ← eqplus. spoil ← inN (X), inN (Y ), def eat(X, Y ). ← inN (X), outN (Y ), def eat(Y, X), undef eated(Y ).</formula><p>spoil ← inN (X), outN (X), undef eated(X).</p><p>spoil ← inN (Y ), def eat(Y, X), outN (X), undef eated(X). inN (X) ← spoil, arg(X). outN (X) ← spoil, arg(X). ⊥ ← not spoil.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Second Approach for Implementing an Argumentation</head><p>MetaInterpreter in ASP</p><p>The work presented in this section <ref type="bibr" target="#b14">[15]</ref> is an approach for computing Dung's standard argumentation semantics as well as semi-stable semantics via ASP.</p><p>The base of all this programs is a set of rules defining the Argumentation Framework, that is, both the available arguments and the attack relations between them. Given an argumentation framework AF = AR, attacks , and two constants a and b the following ASP program , known as Π AF can be defined: The program formed by the set of rules Π AF ∪ Π Complete ∪ Π Stable is able to compute stable extensions. The set of rules Π Stable is as follows:</p><formula xml:id="formula_19">⊥ ← U N DEC(x)</formula><p>Computing grounded, preferred and semi-stable extensions is a bit harder, because it implies the need to minimize or maximize the elements in certain sets. In order to be able to compute such semantics, the following program, known as Π AF M AX is defined: </p><formula xml:id="formula_20">c(Y ) ← cno(Y ), m1(X), i(X), not m2(X, Y ). d(Y ) ← m2(X, Y ), i(X), not m1(X). ⊥ ← d(Y ), not c(Y ).</formula><p>The program formed by the set of rules Π AF ∪ Π AF M AX ∪ Π Complete ∪ Π Grounded is able to compute grounded extensions. The set of rules Π Grounded is as follows: c(Y ) ← cno(Y ), m1(X), i(X), not m2(X, Y ). d(Y ) ← m2(X, Y ), i(X), not m1(X). ⊥ ← c(Y ), not d(Y ).</p><p>The program formed by the rules Π AF ∪ Π AF M AX ∪ Π Complete ∪ Π semi−stable is able to compute semi-stable extensions. The set of rules Π semi−stable is as follows: c(Y ) ← cno(Y ), m1(X), u(X), not m2(X, Y ). d(Y ) ← m2(X, Y ), u(X), not m1(X). ⊥ ← c(Y ), not d(Y ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Discussion w.r.t. Label Process</head><p>Labeling provides an easy and intuitive approach to argumentation theory. It is based on simple and easy principles that are simpler to explain and understand than extension-based approaches.</p><p>Computing the labels that are to be assigned to nodes via an ASP program allows to build and interpreter that processes the Argumentation Framework as input, in contrast to using a fixed logic program which depends on the Argumentation Framework to process. In this sense, the interpreter is easier to understand, extend and debug. Moreover, it eases the process of formally proving the correspondence between answer sets and extensions. Finally, having an interpreter which is independent of the Argumentation Framework allows to easily change the framework without having to re-generate the logic program. However, it must be noted that a full decoupling between the input Argumentation Framework and the programs used to compute its labellings has not been achieved. Both works present programs that are bounded to the Argumentation Framework when computing grounded, preferred and semi-stable extension. In the first work analyzed if the Argumentation Framework changes, predecessor, successor and maximal properties of arguments must be re-built, whereas in the second one constant ξ must be updated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In this paper, we have presented a survey of resent results w.r.t. the dual relationship between extension-based argumentation semantics and logic programming semantics (see §3). We have presented as well results that show that answer set programming is suitable approach for building Argumentation MetaInterpreters (see §4). We have presented two approaches for exploring extension-based argumentation semantics in terms of logic programming. On the one hand, the first approach <ref type="bibr" target="#b15">[16]</ref> presents a more complex but more versatile code due to the usage of the stratified programming and saturation techniques. On the other hand, the second one <ref type="bibr" target="#b14">[15]</ref> presents a more simple code, but it has to be meta-coded by an external program due to being bound to the number of available arguments in the argumentation framework. Both approaches are based on mapping the argumentation framework to a labeling system, this facilitates the computational</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Definition 9 .</head><label>9</label><figDesc>Given an argumentation framework AF = AR, attacks , P AF denotes the logic program defined by P AF = AP U + AGU where AP U = {C1, C2} and AGU = {attacks(a, b) ← |(a, b) ∈ attacks} For each extension E of AF , m(E) is defined as follows: m(E) = AGU ∪ {acc(a)|a ∈ E} ∪ {d(b)|b is attacked by some a ∈ E} Based on P AF , Dung was able to characterize the stable semantics and the grounded semantics. Theorem 1. Let AF be an argumentation framework and E be an extension of AF. Then1. E is a stable extension of AF if and only if m(E) is an answer set of P AF 2. E is a grounded extension of AF if and only if m(E) ∪ {not def eat(a)|a ∈ E} is the well-founded model of P AF</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>{</head><label></label><figDesc>b:(b,a)∈attacks {d(a) ← not d(b)} P 2 AF = a∈AR { b:(b,a)∈attacks {d(a) ← c:(c,b)∈attacks d(c)}} P 3 AF = a∈AR {acc(a) ← not d(a)}</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Ψ 1 AFDefinition 11 .Theorem 4 .</head><label>1114</label><figDesc>into a positive disjunctive logic program one can characterize the preferred semantics in terms of stable model semantics as follows: Let AF = AR, attacks be an argumentation framework ,a ∈ AR and attacks(a, b) if f (a, b) ∈ attacks. We define the transformation function Γ (a) as follows: Γ (a) = { b:attacks(b,a) {d(a)∨d(b)}}∪{ b:attacks(b,a) {d(a) ← c:attacks(c,b) d(c)}} Now we define the function Γ in terms of an argumentation framework.Definition 12. Let AF = AR, attacks be an argumentation framework. We define its associated general program as follows: Let AF = AR, attacks be an argumentation framework and S ⊆ AR. S is a preferred extension of AF if and only if compl(S) is a stable model of Γ AF .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>ag(a) ←. for any argument a ∈ AR def (a, b). for any pair (a, b) ∈ attacks eqplus upto(Y ) ← inf (Y ), in(Y ), inN (Y ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>eqplus upto(Y ) ← succ(Z, Y ), in(Y ), inN (Y ), eqplus upto(Z). eqplus upto(Y ) ← succ(Z, Y ), in(Y ), inN (X), def eat(X, Y ), eqplus upto(Z). eqplus upto(Y ) ← succ(Z, Y ), in(Y ), inN (Y ), def eat(X, Y ), eqplus upto(Z). eqplus upto(Y ) ← succ(Z, Y ), in(X), inN (U ), def eat(X, Y ), def eat(U, Y ), eqplus upto(Z).eqplus upto(Y ) ← succ(Z, Y ), out(Y ), outN (Y ), not def eated(Y ), undef eated(Y ), eqplus upto(Z).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>eqplus</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>ag(a) ←. for any argument a ∈ AR def (a, b). for any pair (a, b) ∈ attacks The program formed by the set of rules Π AF ∪Π Complete is able to compute complete extensions. Given two variables X and Y , the predicate symbols ng and arg and the functions IN (x), OU T (x), U N DEC(x) defined before, the set of rules Π Complete is as follows: IN (x) ← ag(x), not ng(x). ng(x) ← IN (y), def (y, x). ng(x) ← U N DEC(y), def (y, x). OU T (x) ← IN (y), def (y, x). U N DEC(x) ← ag(x), not IN (x) , not OU T (x).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>m1(Lt) ← L. for any set of arguments Lt : ∀a ∈ LtIN (a) ∪ U N DEC(a) m2(Lt, j) ← . cno(j) ← . 1 ≥ j ≥ ξ where ξ is the number of possible labellings in the framework, and Lt is a set of arguments labeled IN or UNDEC in the labeling number j. i(Lt) for any set of arguments Lt : ∀a ∈ Lt IN (a) u(Lt) for any set of arguments Lt : ∀a ∈ Lt U N DEC(a) The program formed by the set of rules Π AF ∪ Π AF M AX ∪ Π Complete ∪ Π P ref erred is able to compute preferred extensions.. The set of rules Π P ref erred is as follows:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>An argumentation framework is a pair AF = AR, attacks , where AR is a set of arguments, and attacks is a binary relation on AR, i.e.attacks ⊆ AR × AR.Another relevant semantics that Dung introduced is the stable semantics of an argumentation framework which is based in the notion of stable extension.</figDesc><table><row><cell>Following Dung's reading, we say that A attacks B (or B is attacked by A)</cell></row><row><cell>if attacks(A, B) holds. Similarly, we say that a set S of arguments attacks B</cell></row><row><cell>(or B is attacked by S) if B is attacked by an argument in S.</cell></row><row><cell>Definition 2. [7] A set S of arguments is said to be conflict-free if there are no</cell></row><row><cell>arguments A, B in S such that A attacks B.</cell></row><row><cell>Definition 3. [7] (1) An argument A ∈ AR is acceptable with respect to a set</cell></row><row><cell>S of arguments if and only if for each argument B ∈ AR: If B attacks A then B</cell></row><row><cell>is attacked by S. (2) A conflict-free set of arguments S is admissible if and only</cell></row><row><cell>if each argument in S is acceptable w.r.t. S.</cell></row><row><cell>The (credulous) semantics of an argumentation framework is defined by the</cell></row><row><cell>notion of preferred extensions.</cell></row><row><cell>Definition 4. [7] A preferred extension of an argumentation framework AF is a</cell></row><row><cell>maximal (w.r.t. inclusion) admissible set of AF.</cell></row><row><cell>Definition 5. [7] A conflict-free set of arguments S is called a stable extension</cell></row><row><cell>if and only if S attacks each argument which does not belong to S.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>Complete extensions are equal to reinstatement labellings. -Grounded extensions are equal to reinstatement labellings, where the set IN is minimal. That is, there is no other possible reinstatement labeling in the same Argumentation Framework with a set IN such that IN ⊆ IN . -Preferred extensions are equal to reinstatement labellings, where the set IN is maximal. That is, there is no other possible reinstatement labeling in the same Argumentation Framework with a set IN such that IN ⊆ IN . -Stable extensions are equal to reinstatement labellings, where the set U N DEC is empty. That is, ∀a ∈ AR : a / ∈ U N DEC. -Semi-stable extensions are equal to reinstatement labellings, where the set U N DEC is minimal. That is, there is no other possible reinstatement labeling in the same Argumentation Framework with a set U N DEC such that U N DEC ∈ U N DEC.</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Answer Set Programming is a novel approach of logic programming which was suggested by the non-monotonic reasoning community<ref type="bibr" target="#b0">[1]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">We say that c defends a if b attacks a and c attacks b.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>the argumentation semantics in terms of declarative specifications. There are still several open issues to explore in the close relationship between argumentation theory and logic programming with negation as failure. One of the most appealing issues is exploring the inference of CF2 semantics in terms of answer set models.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Knowledge Representation, Reasoning and Declarative Problem Solving</title>
		<author>
			<persName><forename type="first">C</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Cambridge University Press</publisher>
			<pubPlace>Cambridge</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">On principle-based evaluation of extension-based argumentation semantics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="issue">10-15</biblScope>
			<biblScope unit="page" from="675" to="700" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">SCC-recursiveness: a general schema for argumentation semantics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">168</biblScope>
			<biblScope unit="page" from="162" to="210" />
			<date type="published" when="2005-10">October 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Argumentation in artificial intelligence</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">J M</forename><surname>Bench-Capon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="issue">10-15</biblScope>
			<biblScope unit="page" from="619" to="641" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Inferring Preferred Extensions by Pstable Semantics</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Carballido</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
		<idno type="DOI">10.4114/ia.v13i41.1029</idno>
	</analytic>
	<monogr>
		<title level="j">Iberoamerican Journal of Artificial Intelligence (Inteligencia Artificial</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">41</biblScope>
			<biblScope unit="page" from="38" to="53" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">S</forename><surname>Dlv</surname></persName>
		</author>
		<ptr target="http://www.dbai.tuwien.ac.at/proj/dlv/" />
		<imprint>
			<date type="published" when="1996">1996</date>
		</imprint>
		<respStmt>
			<orgName>Vienna University of Technology</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="321" to="358" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Argumentation semantics for defeasible logic</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Maher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Antoniou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Billington</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Comput</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="675" to="702" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Robust semantics for argumentation frameworks</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jakobovits</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Vermeir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of logic and computation</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="215" to="261" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Argumentation in Artificial Intelligence, chapter Proof Theories and Algorithms for Abstract Argumentation Frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="105" to="129" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Preferred Extensions as Stable Models</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Cortés</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory and Practice of Logic Programming</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="527" to="543" />
			<date type="published" when="2008-07">July 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Expressing Extension-Based Semantics based on Stratified Minimal Models</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zepeda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of WoLLIC 2009</title>
		<title level="s">FoLLI-LNAI subseries</title>
		<editor>
			<persName><forename type="first">H</forename><surname>Ono</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Kanazawa</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>De Queiroz</surname></persName>
		</editor>
		<meeting>WoLLIC 2009<address><addrLine>Tokyo, Japan</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">5514</biblScope>
			<biblScope unit="page" from="305" to="319" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Logics for defeasible argumentation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A W</forename><surname>Vreeswijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Philosophical Logic</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Gabbay</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Günthner</surname></persName>
		</editor>
		<meeting><address><addrLine>Dordrecht/Boston/London</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="219" to="318" />
		</imprint>
	</monogr>
	<note>second edition</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Argumentation technology: Introduction to the special issue</title>
		<author>
			<persName><forename type="first">I</forename><surname>Rahwan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcburney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Intelligence Systems</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="21" to="23" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">N</forename><surname>Toshiko Wakaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">New Frontiers in Artificial Intelligence</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="volume">5447</biblScope>
			<biblScope unit="page" from="254" to="269" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Answer-set programming encodings for argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">W</forename><surname>Uwe Egly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sarah</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Alice</forename><surname>Gaggl</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>DBAI</publisher>
		</imprint>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
