<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Extracting Argumentative Dialogues from the Neural Network that Computes the Dungean Argumentation Semantics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yoshiaki Gotou</string-name>
          <email>gotou@cs.ie.niigata-u.ac.jp</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Takeshi Hagiwara</string-name>
          <email>hagiwara@ie.niigata-u.ac.jp</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hajime Sawamura</string-name>
          <email>sawamura@ie.niigata-u.ac.jp</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Niigata University</institution>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <fpage>28</fpage>
      <lpage>33</lpage>
      <abstract>
        <p>Argumentation is a leading principle both foundationally and functionally for agent-oriented computing where reasoning accompanied by communication plays an essential role in agent interaction. We constructed a simple but versatile neural network for neural network argumentation, so that it can decide which argumentation semantics (admissible, stable, semistable, preferred, complete, and grounded semantics) a given set of arguments falls into, and compute argumentation semantics via checking. In this paper, we are concerned with the opposite direction from neural network computation to symbolic argumentation/dialogue. We deal with the question how various argumentation semantics can have dialectical proof theories, and describe a possible answer to it by extracting or generating symbolic dialogues from the neural network computation under various argumentation semantics.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Much attention and effort have been devoted to the symbolic
argumentation so far [Rahwan and Simari, 2009][Prakken and
Vreeswijk, 2002][Besnard and Doutre, 2004], and its
application to agent-oriented computing. We think that
argumentation can be a leading principle both foundationally and
functionally for agent-oriented computing where reasoning
accompanied by communication plays an essential role in agent
interaction. Dung’s abstract argumentation framework and
argumentation semantics [Dung, 1995] have been one of the most
influential works in the area and community of computational
argumentation as well as logic programming and non-monotonic
reasoning.</p>
      <p>In 2005, A. Garcez et al. proposed a novel approach to
argumentation, called the neural network argumentation [d’Avila
Garcez et al., 2005]. In the papers [Makiguchi and Sawamura,
2007a][Makiguchi and Sawamura, 2007b], we dramatically
developed their initial ideas on the neural network argumentation to
various directions in a more mathematically convincing manner.
More specifically, we illuminated the following questions which
they overlooked in their paper but that deserve much attention
since they are beneficial for understanding or characterizing the
computational power and outcome of the neural network
argumentation from the perspective of the interplay between neural
network argumentation and symbolic argumentation.
1. Can the neural network argumentation algorithm deal with
self-defeating or other pathological arguments?
2. Can the argument status of the neural network
argumentation correspond to the well-known status in symbolic
argumentation framework such as in [Prakken and Vreeswijk,
2002]?
3. Can the neural network argumentation compute the fixpoint
semantics for argumentation?
4. Can symbolic argumentative dialogues be extracted from
the neural network argumentation?</p>
      <p>The positive solutions to them helped us deeply understand
relationship between symbolic and neural network
argumentation, and further promote the syncretic approach of symbolism
and connectionism in the field of computational argumentation
[Makiguchi and Sawamura, 2007a][Makiguchi and Sawamura,
2007b]. They, however, paid attention only to the grounded
semantics for argumentation in examining relationship between
symbolic and neural network argumentation.</p>
      <p>Ongoingly, we constructed a simple but versatile neural
network for neural network argumentation, so that it can decide
which argumentation semantics (admissible, stable, semi-stable
semantics, preferred, complete, and grounded semantics) [Dung,
1995][Caminada, 2006] a given set of arguments falls into,
and compute argumentation semantics via checking [Gotou,
2010]. In this paper, we are concerned with the opposite
direction from neural network computation to symbolic
argumentation/dialogue. We deal with the question how various
argumentation semantics can have dialectical proof theories, and describe
a possible answer to it by extracting or generating symbolic
dialogues from the neural network computation under various
argumentation semantics.</p>
      <p>The results illustrate that there can exist an equal bidirectional
relationship between the connectionism and symbolism in the
area of computational argumentation. And also they lead to a
fusion or hybridization of neural network computation and
symbolic one [d’Avila Garcez et al., 2009][Levine and Aparicio,
1994][Jagota et al., 1999].</p>
      <p>The paper is organized as follows. In the next section, we
explicate our basic ideas on the neural network checking
argumentation semantics by tracing an illustrative example. In
Section 3, with our new construction of neural network for
argumentation, we develop a dialectical proof theory induced by the
neural network argumentation for each argumentation semantics
by Dung [Dung, 1995]. In Section 4, we describe some related
works although there is no work really related to our work except
for Garcez et al.’s original one and our work. The final section
discusses the major contribution of the paper and some future
works.</p>
    </sec>
    <sec id="sec-2">
      <title>Basic Ideas on the neural argumentation</title>
      <p>
        Due to the space limitation, we will not describe the technical
details for constructing a neural network for argumentation and
its computing method in this paper
        <xref ref-type="bibr" rid="ref7">(see [Gotou, 2010] for them)</xref>
        .
Instead, we illustrate our basic ideas by using a simple
argumentation example and following a neural network computation trace
for it. We assume readers are familiar with the Dungean
semantics such as admissible, stable, semi-stable, preferred, complete,
and grounded semantics [Dung, 1995][Caminada, 2006].
      </p>
      <p>Let us consider an argumentation network on the left side
of Figure 1 that is a graphic presentation of the
argumentation framework AF =&lt; AR, attacks &gt;, where AR =
{i, k, j}, and attacks = {(i, k), (k, i), (j, k)}.</p>
      <p>i
k
j
io
ih2
ih1
ii
ko
kh2
kh1
ki
jo
jh2
jh1
ji
weight is a
weight is -b
weight is -1</p>
      <p>According to the Dungean semantics [Dung,
1995][Caminada, 2006], the argumentation semantics for AF is determined
as follows: Admissible set = {∅, {i}, {j}, {i, j}}, Complete
extension = {{i, j}}, Preferred extension = {{i, j}}, Semi-stable
extension = {{i, j}}, Stable extension = {{i, j}}, and Grounded
extension = {{i, j}}.</p>
    </sec>
    <sec id="sec-3">
      <title>Neural network architecture for argumentation</title>
      <p>In the Dungean semantics, the notions of ‘attack’, ‘defend
(acceptable)’ and ‘conflict-free’ play the most important role in
constructing various argumentation semantics. This is true
in our neural network argumentation as well. Let AF =&lt;
AR, attacks &gt; be as above, and S be a subset of AR, to be
examined. The argumentation network on the left side of Figure
1 is first translated into the neural network on the right side of
Figure 1. Then, the network architecture consists of the
following constituents:
• A double hidden layer network: It is a double hidden layer
network and has the following four layers: input layer, first
hidden layer, second hidden layer and output layer, which
have the ramified neurons for each argument, such as αi,
αh1 , αh2 and αo for the argument α.
• A recurrent neural network (for judging grounded
extension): The double hidden layer network like on the right
side of Figure 1 is piled up high until the input and output
layers converge (stable state) like in Figure 2. The symbol
τ represents the pile number (τ ≥ 0) which amounts to the
turning number of the input-output cycles of the neural
network. In the stable state, we set τ = converging. Then,
Sτ=n stands for a set of arguments at τ = n.
• A feedforward neural network (except judging grounded
extension): When we compute argumentation semantics
except grounded extension with a recurrent neural network, it
surely converges at τ = 1. Hence, the first output vector
equals to second output vector. We judge argumentation
semantics by using only first input vector and converged
output vector. As a result we can regard a recurrent
neural network as a feedforward neural network except judging
grounded extension.
• The vectors of the neural network: The initial input vector
for the neural network is a list consisting of 0 and a that
represent the membership of a set of arguments to be examined.
For example, it is [a, 0, 0] for S = Sτ=0 = {i} ⊆ AR. The
output vectors from each layer take as the values only “- a”,
“0”, “a” or “- b”.1 The intuitive meaning of them for each
output vector are as follows:</p>
      <sec id="sec-3-1">
        <title>Output layer</title>
        <p>– “a” in the output vector from the output layer
represents membership in
Sτ′ = {X ∈ AR | def ends(Sτ , X)}2 and the
argument is not attacked by S′ .</p>
        <p>τ
– “-a” in the output vector from the output layer
represents membership in Sτ′+.3
– “0” in the output vector from the output layer
represents the argument belongs to neither Sτ′ nor Sτ′+.
Second hidden layer
– “a” in the output vector from the second hidden
layer represents membership in Sτ′ and the argument
is not attacked by S′ .</p>
        <p>τ
– “0” in the output vector from the second hidden
layer represents membership not in Sτ′ or the
argument is attacked by Sτ′ .</p>
        <p>Fisrt hidden layer
– “a” in the output vector from the first hidden layer
represents membership in Sτ and the argument is
not attacked by Sτ .
– “-b” in the output vector from the first hidden layer
represents the membership in Sτ+.
– “0” in the output vector from the first hidden layer
represents the others.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Input layer</title>
        <p>– “a” in the output vector from the input layer
represents membership in Sτ .
– “0” in the output vector from the input layer
represents the argument does not belong to S.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>A trace of the neural network</title>
      <p>Let us examine to which semantics S = {i} belongs in AF on
the left side of Figure 1 by tracing the neural network
computation. The overall visual computation flow is shown in Figure
2.</p>
      <p>Stage1. Operation of input layer at τ = 0
Sτ=0 = S = { }</p>
      <p>i . Hence, [a, 0, 0] is given to the input layer
of the neural network in Figure 1. Each input neuron computes
its output value by its activation function (see the graph of the
activation function, an identity function, on the right side of the
input layer of Figure 2). The activation function makes the input
1Let a,b be positive real numbers and they satisfy √b &gt; a &gt; 0.
2Let S⊆AR and A∈AR. defends(S, A) iff ∀B ∈ AR(attacks(B,
A) → attacks(S, B)).</p>
      <p>3Let S ⊆ AR. S+ = {X ∈ AR | attacks(S, X)}.
output value
neuron</p>
      <p>threshold θ
input value
weight is a
weight is -b
1st input vector
2nd input vector
X belongs to {i, k, j}
layer simply pass the value to the hidden layer. The input layer
thus outputs the vector [a, 0, 0].</p>
      <p>In this computation, the input layer judges Sτ=0 = {i} and
inputs a2 to ih1 through the connection between ii and ih1 whose
weight is a. At the same time, the input layer inputs −ab to kh
through the connection between ii and kh1 whose weight is −b
so as to make the first hidden layer know that i ∈ Sτ=0 attacks k
(in symbols, attacks(i, k)). Since the output values of ki and ji
are 0, they input 0 to other first hidden neurons.</p>
      <p>In summary, after the input layer receives the input vector
[a, 0, 0], it turns out to give the hidden layer the vector [ a · a
+ 0·(−b), a · (−b) + 0 · a + 0 · (−b), 0 · a ]= [a2, −ab, 0].
Stage 2. Operation of first hidden layer at τ = 0
Now, the first hidden layer receives a vector [a2, −ab, 0] from
the input layer. Each activation function of ih1 , kh1 and jh1 is a
step function as put on the right side of the first hidden layer in
Figure 2. The activation function categorizes values of vectors
which are received from the input layer into three values as if
the function understand each argument state. Now, the following
inequalitis hold: a2 ≥ a2, −ab ≤ −b, −b ≤ 0 ≤ a2.
According to the activation function, the first hidden layer outputs the
vector [a, −b, 0].</p>
      <p>Next, the first hidden layer inputs a2 + b into the second
hidden neuron ih2 through the connections between ih1 and ih2
whose weight is a, kh1 and ih2 whose weight is −1, so that the
second hidden layer can know attacks(k, i) with i ∈ Sτ=0. At
the same time, the first hidden layer inputs −a − ab into kh2
through the connections between ih1 and kh2 whose weight is
−1, kh1 and kh2 whose weight is a, so that the second hidden
layer can know attacks(i, k) with k ∈ Sτ+=0 and inputs 0 into
jh2 so that the second hidden layer can know the argument j is
not attacked by any arguments with j ̸∈ Sτ=0.</p>
      <p>In summary, after the first hidden layer received the vector
[a2, −ab, 0], it turns out to pass the output vector [a2 + b, −a −
ab, 0] to the second hidden neurons.</p>
      <p>Stage 3. Operation of second hidden layer at τ = 0
The second hidden layer receives a vector [a2, −ab, 0] from first
hidden layer. Each activation function of ih2 , kh2 and jh2 is a
step function as put on the right side of the first hidden layer in
Figure 2 with its threshold, θi = a2 + b, θk = a2 + 2b and
θj = 0 respectively.</p>
      <p>These thresholds are defined by the ways of being attacked as
follows:
• If an argument X can defend X only by itself (in Figure
1, such X is i since def ends({i}, i)), then the threshold of
Xh2 (θX ) is a2+tb (t is the number of arguments bilaterally
attacking X).
• If an argument X can not defend X only by
itself and is both bilaterally and unilaterally attacked
by some other argument (in Figure 1, such X is
k since ¬def ends({k}, k)&amp;attacks(j, k)&amp;attacks(i, k)),
then the threshold of Xh2 (θX ) is a2 + b(s + t) (s(t) is the
number of arguments unilaterally(bilaterally) attacking X).</p>
      <p>Note that l=m=1 for the argument k in Figure 1.
• If an argument X is not attacked by any other arguments (in</p>
      <p>Figure 1, such X is j), then the threshold of Xh (θXh ) is 0.
• If an argument X can not defend X only by itself and is
just unilaterally attacked by some other argument, then the
threshold of Xh2 (θX ) is bs (s is the number of arguments
unilaterally attacking X).</p>
      <p>By these thresholds and their activation functions (step
functions), if S defends X then Xh2 outputs a. Otherwise, Xh2
outputs 0 in the second hidden layer. As the result, the second
hidden layer judges either X ∈ Sτ′ or X ̸∈ Sτ′ by two output
values (a and 0). In this way, the output vector in the second
hidden layer yields [a, 0, a]. This vector means that the second
hidden layer judges that the arguments i and j are defended by
Sτ=0, resulting in Sτ′=0 = {i, j}.</p>
      <p>Next, the second hidden layer inputs a2 into the output
neurons io and jo through the connections between ih2 and io, jh2
and jo whose weights are a,so that the output layer can know
i, j ∈ Sτ=0 and i, j ∈ Sτ′=0. At the same time, the second
hidden layer inputs −2a into ko through the connections between
ih2 and ko, jh2 and ko whose weights are −1,so that output layer
can know attacks(i, k) and attacks(j, k) with k ∈ Sτ′+=0.</p>
      <p>Furthermore, it should be noted that another role of the second
hidden layer lies in guaranteeing that Sτ′ is conflict-free 4. It is
actually true since the activation function of the second hidden
layer makes Xh2 for the argument X attacked by Sτ output 0.
The conflict-freeness is important since it is another notion for
characterizing the Dungean semantics.</p>
      <p>In summary, after the second hidden layer received the
vector [a2 + b, −a − ab, 0], it turns out to pass the output vector
[a2, −2a, a2] to the second hidden neurons.</p>
      <p>Stage 4. Operation of output layer at τ = 0
The output layer now received the vector [a2, −2a, a2] from the
second hidden layer. Each neuron in the output layer has an
activation function as put on the right side of the output layer in
Figure 2.</p>
      <p>This activation function makes the output layer interpret any
positive sum of input values into the output neuron Xo as X ∈
Sτ′ , any negative sum as X ∈ Sτ′+, and the value 0 as X ̸∈ Sτ′
and X ̸∈ Sτ′+. As the result, the output layer outputs the vector
[a, −a, a].</p>
      <p>Summarizing the computation at τ = 0, the neural network
received the vector [a, 0, 0] in the input layer and outputted
[a, −a, a] from the output layer. This output vector means that
the second hidden layer judged Sτ′=0 = {i, j} and guaranteed
its conflict-freeness. With these information passed to the output
layer from the hidden layer, the output layer judged Sτ′+=0 = {k}.
Stage 5. Inputting the output vector at τ = 0 to the
input layer at τ = 1 (shift from τ = 0 to τ = 1)
At τ = 0, the neural network computed Sτ′=0 = {i, j} and
Sτ′+=0 = {k}. We continue the computation recurrently by
connecting the output layer to the input layer of the same neural
network, setting first output vector to second input vector. Thus,
at τ = 1, the input layer starts its operation with the input vector
[a, −a, a]. We, however, omit the remaining part of the
operations starting from here since they are to be done in the similar
manner.</p>
      <sec id="sec-4-1">
        <title>Stage 6. Convergence to a stable state</title>
        <p>We stop the computation immediately after the time round τ = 1
since the input vector to the neural network at τ = 1 coincides
with the output vector at τ = 1. This means that the neural
network amounts to having computed a least fixed point of the
characteristic function that was defined with the acceptability of
arguments by Dung [Dung, 1995].</p>
        <p>4A set S of arguments is said to be conflict-free if there are no
arguments A and B in S such that A attacks B.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Stage 7. Judging admissible set, complete extension and stable extension</title>
        <p>Through the above neural network computation, we have
obtained Sτ′=0 = {i, j} and S′+</p>
        <p>τ=0 = {k} for Sτ=0 = {i}, and
Sτ′=1 = {i, j} and Sτ′+=1 = {k} for Sτ=1 = {i, j}. Moreover,
we also have such a result that both the sets {i} and {i, j} are
conflict-free.</p>
        <p>The condition for admissible set says that a set of arguments S
satisfies its conflict-freeness and ∀X ∈ AR(X ∈ S → X ∈ S′).
Therefore, the neural network can know that the sets {i} and
{i, j} are admissible since it confirmed the condition at the time
round τ = 0 and τ = 1 respectively.</p>
        <p>The condition for complete extension says that a set of
arguments S satisfies its conflict-freeness and ∀X ∈ AR(X ∈
S ↔ X ∈ S′). Therefore, the neural network can know that
the set {i, j} satisfies the condition since it has been obtained at
τ = converging. Incidentally, the neural network knows that
the set {i} is not a complete extension since it does not appear in
the output neuron at τ = converging.</p>
        <p>The condition for stable extension says that a set of arguments
S satisfies ∀X ∈ AR(X ̸∈ S → X ∈ S′+). The neural network
can know that the {i, j} is a stable extension since it confirmed
the condition from the facts that Sτ=1 = {i, j}, Sτ′=1 = {i, j}
and Sτ′+=1 = { }</p>
        <p>a .</p>
      </sec>
      <sec id="sec-4-3">
        <title>Stage 8. Judging preferred extension, semi-stable extension and grounded extension</title>
        <p>By invoking the neural network computation that was stated from
the stages 1-7 above for every subset of AR, and AR itself as an
input set S, it can know all admissible sets of AF , and hence
it also can know the preferred extensions of AF by picking up
the maximal ones w.r.t. set inclusion from it. In addition, the
neural network can know semi-stable extensions by picking up a
maximal S ∪ S+ where S is a complete extension in AF . This
is possible since the neural network already has computed S+.</p>
        <p>For the grounded extension, the neural network can know that
the grounded extension of AF is Sτ′=converging when the
computation stopped by starting with Sτ=0 = ∅. This is due to the
fact that the grounded extension is obtained by the iterative
computation of the characteristic function that starts from ∅ [Prakken
and Vreeswijk, 2002].</p>
        <p>Readers should refer to the paper [Gotou, 2010] for the
soundness theorem of the neural network computation illustrated so
far.
3</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Extracting Symbolic Dialogues from the</title>
    </sec>
    <sec id="sec-6">
      <title>Neural Network</title>
      <p>In this section, we will address to such a question as if symbolic
argumentative dialogues can be extracted from the neural
network argumentation. The symbolic presentation of arguments
would be much better for us since it makes the neural net
argumentation process verbally understandable. The notorious
criticism for neural network as a computing machine is that
connectionism usually does not have explanatory reasoning capability.
We would say our attempt here is one that can turn such criticism
in the area of argumentative reasoning.</p>
      <p>
        In our former paper [Makiguchi and Sawamura, 2007b], we
have given a method to extract symbolic dialogues from the
neural network computation under the grounded semantics, and
showed its coincidence with the dialectical proof theory for the
grounded semantics. In this paper, we are concerned with the
question how other argumentation semantics can have
dialectical proof theories. We describe a possible answer to it by
extracting or generating symbolic dialogues from the neural
network computation under other more complicated argumentation
semantics. We would say this is a great success that was brought
by our neural network approach to argumentation since
dialectical proof theories for various Dungean argumentation
semantics have not been known so far except only some works
        <xref ref-type="bibr" rid="ref16 ref5">(e. g.,
[Vreeswijk and Prakken, 2000], [Dung et al., 2006])</xref>
        .
      </p>
      <p>First of all, we summarize the trace of the neural network
computation as have seen in Section 2 as in Table 1, in order to make
it easy to extract symbolic dialogues from our neural network.
Wherein, SP RO,τ=k and SOP P,τ=k denote the followings
respectively: At time round τ = k(k ≥ 0) in the neural network
computation, SP RO,τ=k = Sτ=k, and SOP P,τ=k = Sτ′+=k (see
′
Section 2 for the notations).</p>
      <p>For example, Table 2 is the table for S = {i} summarized
from the neural network computation in Fig. 2</p>
      <p>We assume dialogue games are performed by proponents
(PRO) and opponents (OPP) who have their own sets of
arguments that are to be updated in the dialogue process. In advance
of the dialogue, proponents have S(= Sτ=0) as an initial set
SP RO,τ=0, and opponents have an empty set {} as an initial set
SOP P,τ=0.</p>
      <p>We illustrate how to extract dialogues from the summary table
by showing a concrete extraction process of dialogue moves in
Table 2:
1. P(roponent, speaker): PRO declares a topic as a set of
beliefs by saying {i} at τ = 0. OPP just hears it with no
response {} for the moment. (dialogue extraction from the
first row of Table 2)
2. P(roponent, or speaker): PRO further asserts the
incremented belief {i, j} because the former beliefs defend j,
and at the same time states the belief {i, j} conflicts with
{k} at τ = 0. (dialogue extraction from the second row of
Table 2)
3. O(pponent, listener or audience): OPP knows that its belief
{k} conflicts with PRO’s belief {i, j} at τ = 0. (dialogue
extraction from the second row of Table 2)
4. No further dialogue moves can be promoted at τ = 1,
resulting in a stable state. (dialogue termination by the third
and fourth rows of Table 2)
SOP P,τ=k
{}
. . .
. . .
. . .
. . .
{}
{k}
{k}
{k}
SOP P,τ=k</p>
      <p>Thus, we can view P(roponent, speaker)’s initial belief {i} as
justified one in the sense that it could have persuaded O(pponent,
listener or audience) under an appropriate Dungean
argumentation semantics. Actually, we would say it is admissibly justified
under admissibly dialectical proof theory below. Formally, we
introduce the following dialectical proof theories, according to
the respective argumentation semantics.</p>
      <sec id="sec-6-1">
        <title>Definition 1 (Admissibly dialectical proof theory) The admis</title>
        <p>sibly dialectical proof theory is the dialogue extraction
process in which the summary table generated by the neural
network computation satisfies the following condition: ∀A ∈
SP RO,τ=0 ∀k ≥ 0(A ∈ SP RO,τ=k), where SP RO,τ=0 is the
input set at τ = 0.</p>
        <p>Intuitively, the condition says every argument in SP RO,τ=0 is
retained until the stable state as can be seen in Table 2. It should
be noted that the condition reflects the definition of ‘admissible
extension’ in [Dung, 1995].</p>
        <p>Definition 2 (Completely dialectical proof theory) The
completely dialectical proof theory is the dialogue extraction
process in which the summary table generated by the neural network
computation satisfies the following conditions: let SP RO,τ=0 be
the input set at τ = 0.</p>
        <p>1. SP RO,τ=0 satisfies the condition of Definition 1.
2. ∀A ̸∈ SP RO,τ=0 ∀k(A ̸∈ SP RO,τ=k)
Intuitively, the second condition says that any argument that does
not belong to SP RO,τ=0 does not enter into SP RO,τ=t at any
time round t up to a stable one k. Those conditions reflect the
definition of ‘complete extension’ in [Dung, 1995].</p>
        <p>Definition 3 (Stably dialectical proof theory) The stably
dialectical proof theory is the dialogue extraction process in which
the summary table generated by the neural network computation
satisfies the following conditions: let SP RO,τ=0 be the input set
at τ = 0.</p>
        <p>1. SP RO,τ=0 satisfies the conditions of Definition 2.
2. AR = SP RO,τ=n ∪ SOP P,τ=n, where AF
AR, attacks &gt; and n denotes a stable time round.
=&lt;
Intuitively, the second condition says that PRO and OPP cover
AR exclusively and exhaustively. Those conditions reflect the
definition of ‘stable extension’ in [Dung, 1995].</p>
        <p>For the dialectical proof theories for preferred [Dung, 1995]
and semi-stable semantics [Caminada, 2006], we can similarly
define them taking into account maximality condition. So we
omit them in this paper.</p>
        <p>As a whole, the type of the dialogues in any dialectical proof
theories above would be better classified as a persuasive dialogue
since it is closer to persuasive dialogue in the dialogue
classification by Walton [Walton, 1998].
4</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Related Work</title>
      <p>Garcez et al. initiated a novel approach to argumentation, called
the neural network argumentation [d’Avila Garcez et al., 2005].
However, the semantic analysis for it is missing there. That is,
it is not clear what they calculate by their neural network
argumentation. Besnard et al. proposed three symbolic approaches
to checking the acceptability of a set of arguments [Besnard and
Doutre, 2004], in which not all of the Dungean semantics can be
dealt with. So it may be fair to say that our approach with the
neural network is more powerful than Besnard et al.’s methods.</p>
      <p>Vreeswijk and Prakken proposed a dialectical proof theory for
the preferred semantics [Vreeswijk and Prakken, 2000]. It is
similar to that for the grounded semantics [Prakken and Sartor,
1997], and hence can be simulated in our neural network as well.</p>
      <p>In relation to the neural network construction and
computation for the neural-symbolic systems, the structure of the neural
network is a similar 3-layer recurrent network, but our neural
network computes not only the least fixed point (grounded
semantics) but also the fixed points (complete extension). This is a
most different aspect from Ho¨lldobler and his colleagues’ work
[Ho¨lldobler and Kalinke, 1994].
5</p>
    </sec>
    <sec id="sec-8">
      <title>Concluding Remarks</title>
      <p>It is a long time since connectionism appeared as an
alternative movement in cognitive science or computing science which
hopes to explain human intelligence or soft information
processing. It has been a matter of hot debate how and to what
extent the connectionism paradigm constitutes a challenge to
classicism or symbolic AI. In this paper, we showed that symbolic
dialectical proof theories can be obtained from the neural
network computing various argumentation semantics, which allow
to extract or generate symbolic dialogues from the neural
network computation under various argumentation semantics. The
results illustrate that there can exist an equal bidirectional
relationship between the connectionism and symbolism in the area
of computational argumentation. On the other hand, much effort
has been devoted to a fusion or hybridization of neural net
computation and symbolic one [d’Avila Garcez et al., 2009][Levine
and Aparicio, 1994][Jagota et al., 1999]. The result of this
paper as well as our former results on the hybrid argumentation
[Makiguchi and Sawamura, 2007a][Makiguchi and Sawamura,
2007b] yields a strong evidence to show that such a symbolic
cognitive phenomenon as human argumentation can be captured
within an artificial neural network.</p>
      <p>The simplicity and efficiency of our neural network may be
favorable to our future plan such as introducing learning
mechanism into the neural network argumentation, implementing the
neural network engine for argumentation, which can be used
in argumentation-based agent systems, and so on. Specifically,
it might be possible to take into account the so-called core
method developed in [Ho¨lldobler and Kalinke, 1994] and CLIP
in [d’Avila Garcez et al., 2009] although our neural-symbolic
system for argumentation is much more complicated due to the
complexities and varieties of the argumentation semantics.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>[Besnard and Doutre</source>
          , 2004]
          <string-name>
            <given-names>Philippe</given-names>
            <surname>Besnard</surname>
          </string-name>
          and
          <string-name>
            <given-names>Sylvie</given-names>
            <surname>Doutre</surname>
          </string-name>
          .
          <article-title>Checking the acceptability of a set of arguments</article-title>
          .
          <source>In 10th International Workshop on Non-Monotonic Reasoning (NMR</source>
          <year>2004</year>
          , pages
          <fpage>59</fpage>
          -
          <lpage>64</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[Caminada</source>
          , 2006]
          <string-name>
            <given-names>Martin</given-names>
            <surname>Caminada</surname>
          </string-name>
          .
          <article-title>Semi-stable semantics</article-title>
          . In Paul E. Dunne and
          <string-name>
            <surname>Trevor J. M.</surname>
          </string-name>
          Bench-Capon, editors,
          <source>Computational Models of Argument: Proceedings of COMMA</source>
          <year>2006</year>
          , volume
          <volume>144</volume>
          <source>of Frontiers in Artificial Intelligence and Applications</source>
          , pages
          <fpage>121</fpage>
          -
          <lpage>130</lpage>
          . IOS Press,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>[d'Avila Garcez</surname>
          </string-name>
          et al.,
          <year>2005</year>
          ] Artur S.
          <string-name>
            <surname>d'Avila Garcez</surname>
          </string-name>
          ,
          <string-name>
            <surname>Dov M. Gabbay</surname>
          </string-name>
          , and
          <string-name>
            <surname>Luis</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Lamb</surname>
          </string-name>
          .
          <article-title>Value-based argumentation frameworks as neural-symbolic learning systems</article-title>
          .
          <source>Journal of Logic and Computation</source>
          ,
          <volume>15</volume>
          (
          <issue>6</issue>
          ):
          <fpage>1041</fpage>
          -
          <lpage>1058</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>[d'Avila Garcez</surname>
          </string-name>
          et al.,
          <year>2009</year>
          ] Artur S.
          <string-name>
            <surname>d'Avila Garcez</surname>
            , Lu´ıs
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Lamb</surname>
          </string-name>
          , and
          <string-name>
            <surname>Dov</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Gabbay</surname>
          </string-name>
          .
          <source>Neural-Symbolic Cognitive Reasoning</source>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Dung et al.,
          <year>2006</year>
          ]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kowalski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          .
          <article-title>Dialectic proof procedures for assumption-based, admissible argumentation</article-title>
          .
          <source>Artificial Intelligence</source>
          ,
          <volume>170</volume>
          :
          <fpage>114</fpage>
          -
          <lpage>159</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[Dung</source>
          , 1995]
          <string-name>
            <given-names>P.M.</given-names>
            <surname>Dung</surname>
          </string-name>
          .
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logics programming and n-person games</article-title>
          .
          <source>Artificial Intelligence</source>
          ,
          <volume>77</volume>
          :
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>[Gotou</source>
          , 2010]
          <string-name>
            <given-names>Yoshiaki</given-names>
            <surname>Gotou</surname>
          </string-name>
          .
          <article-title>Neural Networks calculating Dung's Argumentation Semantics</article-title>
          .
          <source>Master's thesis</source>
          , Graduate School of Science and Technology, Niigata University, Niigata, Japan,
          <year>December 2010</year>
          . http://www.cs.ie.niigata-u.ac.jp/Paper/ Storage/graguation_thesis_gotou.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>[Ho¨lldobler and Kalinke</source>
          , 1994]
          <article-title>Steffen Ho¨lldobler and Yvonne Kalinke</article-title>
          .
          <article-title>Toward a new massively parallel computational model for logic programming</article-title>
          .
          <source>In Proc. of the Workshop on Combining Symbolic and Connectionist Processing, ECAI 1994</source>
          , pages
          <fpage>68</fpage>
          -
          <lpage>77</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Jagota et al.,
          <year>1999</year>
          ]
          <string-name>
            <given-names>Arun</given-names>
            <surname>Jagota</surname>
          </string-name>
          , Tony Plate, Lokendra Shastri, and
          <string-name>
            <given-names>Ron</given-names>
            <surname>Sun</surname>
          </string-name>
          .
          <source>Connectionist symbol processing: Dead or alive? Neural Computing Surveys</source>
          ,
          <volume>2</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[Levine and Aparicio</source>
          , 1994]
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Levine</surname>
          </string-name>
          and
          <string-name>
            <given-names>Manuel</given-names>
            <surname>Aparicio</surname>
          </string-name>
          .
          <article-title>Neural Networks for Knowledge Representation and Inference</article-title>
          .
          <source>LEA</source>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>[Makiguchi and Sawamura</source>
          , 2007a]
          <string-name>
            <given-names>Wataru</given-names>
            <surname>Makiguchi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Hajime</given-names>
            <surname>Sawamura</surname>
          </string-name>
          .
          <article-title>A Hybrid Argumentation of Symbolic and Neural Net Argumentation (Part I)</article-title>
          .
          <article-title>In Argumentation in Multi-Agent Systems</article-title>
          , 4th International Workshop, ArgMAS 2007,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Selected</surname>
          </string-name>
          and Invited Papers, volume
          <volume>4946</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>197</fpage>
          -
          <lpage>215</lpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[Makiguchi and Sawamura</source>
          , 2007b]
          <string-name>
            <given-names>Wataru</given-names>
            <surname>Makiguchi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Hajime</given-names>
            <surname>Sawamura</surname>
          </string-name>
          .
          <article-title>A Hybrid Argumentation of Symbolic and Neural Net Argumentation (Part II)</article-title>
          .
          <article-title>In Argumentation in Multi-Agent Systems</article-title>
          , 4th International Workshop, ArgMAS 2007,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Selected</surname>
          </string-name>
          and Invited Papers, volume
          <volume>4946</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>216</fpage>
          -
          <lpage>233</lpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[Prakken and Sartor</source>
          , 1997]
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Sartor</surname>
          </string-name>
          .
          <article-title>Argument-based extended logic programming with defeasible priorities</article-title>
          .
          <source>J. of Applied Non-Classical Logics</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ):
          <fpage>25</fpage>
          -
          <lpage>75</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[Prakken and Vreeswijk</source>
          , 2002]
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Vreeswijk</surname>
          </string-name>
          .
          <article-title>Logical systems for defeasible argumentation</article-title>
          . In In D. Gabbay and F. Guenther, editors,
          <source>Handbook of Philosophical Logic</source>
          , pages
          <fpage>219</fpage>
          -
          <lpage>318</lpage>
          . Kluwer,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>[Rahwan and Simari</source>
          , 2009]
          <string-name>
            <given-names>Iyad</given-names>
            <surname>Rahwan</surname>
          </string-name>
          and Guillermo R. (Eds.) Simari.
          <source>Argumentation in Artificial Intelligence</source>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[Vreeswijk and Prakken</source>
          , 2000]
          <string-name>
            <surname>Gerard</surname>
            <given-names>A. W.</given-names>
          </string-name>
          <string-name>
            <surname>Vreeswijk</surname>
            and
            <given-names>Henry</given-names>
          </string-name>
          <string-name>
            <surname>Prakken</surname>
          </string-name>
          .
          <article-title>Credulous and sceptical argument games for preferred semantics</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          ,
          <year>1919</year>
          :
          <fpage>239</fpage>
          -
          <lpage>?</lpage>
          ?,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>[Walton</source>
          , 1998]
          <string-name>
            <given-names>D.</given-names>
            <surname>Walton</surname>
          </string-name>
          .
          <article-title>The New Dialectic: Conversational Contexts of Argument</article-title>
          . Univ. of Toronto Press,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>