=Paper= {{Paper |id=None |storemode=property |title=Towards a Probabilistic Dung-style Argumentation System |pdfUrl=https://ceur-ws.org/Vol-918/111110138.pdf |volume=Vol-918 |dblpUrl=https://dblp.org/rec/conf/at/Rienstra12 }} ==Towards a Probabilistic Dung-style Argumentation System== https://ceur-ws.org/Vol-918/111110138.pdf
             Towards a probabilistic Dung-style
                  argumentation system?

                                    Tjitze Rienstra

       University of Luxembourg / LIRMM, University of Montpellier 2, France



        Abstract. In this paper we present a generalization of the ASPIC ar-
        gumentation system, where a rule can be associated with a probability.
        This probability expresses uncertainty about whether or not the partic-
        ular rule is active. We call this system p-ASPIC. The uncertainty about
        rules carries over to uncertainty about whether or not a particular argu-
        ment is active. We generalize the usual Dung-style abstract argumenta-
        tion semantics, in order to deal with this uncertainty. Our work should
        be understood as an initial step in the direction of probabilistic, instan-
        tiated, Dung-style argumentation, and we discuss a number of directions
        for future work.


1     Introduction

Dung’s famous ’95 paper [9] introduced a model of non-monotonic reasoning
that, given a non-monotonic formalism, is based on the three-step procedure of
(1) argumentation framework generation, (2) evaluation of arguments and (3)
extraction of conclusions. That is, from a knowledge base, an argumentation
framework is generated, consisting of arguments and attacks; this framework is
evaluated in order to determine which arguments are acceptable; and from a set
of acceptable arguments, we can extract conclusions that follow from the initial
knowledge base. The main reason of the model’s appeal is the fact that the com-
plicated task of determining which conclusions can be non-monotonically derived
from a knowledge base is reduced to the relatively simple task of selecting ar-
guments from a framework. That is, on the instantiated level, we specify how to
generate a framework, and on the abstract level, we deal only with the arguments
and attacks, without looking at the actual content of the arguments. This Dung-
style argumentation model has been used with a number of non-monotonic for-
malisms. One of the most general ones is the ASPIC argumentation system [15].
    In this paper we look at a problem that has received little attention so far,
namely the problem of reasoning under uncertainty using the Dung-style argu-
mentation model. In some respect, non-monotonic reasoning is already reasoning
under uncertainty. That is, we want to derive conclusions under incomplete or
uncertain knowledge. This knowledge comes in the form of defeasible rules, which
we do not want to accept as strict rules, or in the form of assumptions, which
?
    AT2012, 15-16 October 2012, Dubrovnik, Croatia. Copyright held by the author(s).
we do not want to accept as facts. This defeasibility, sometimes made more ex-
pressive, as in the ASPIC system, by using of preferences over rules (see also [1,
13]) is a form of qualitative uncertainty. However, uncertainty is often expressed
quantitatively, using probability theory. It is not clear how to deal with this
kind of uncertainty, within the Dung-style argumentation model, and this is the
problem that we address in this paper.
    On the abstract level, we extend the notion of a framework to that of a
probabilistic framework. This is an argumentation framework supplemented with
a probability distribution over sets of arguments. Furthermore, we generalize the
usual notion of an acceptance function, in order to evaluate the arguments of a
probabilistic framework, and we show how it can be used to determine, given a
probabilistic framework, the probability of skeptical and credulous acceptance
of an argument.
    On the instantiated level, we take as a basis a simplified version of the ASPIC
argumentation system. This simplified version has also been considered in [6, 7],
and it consists of the fragment of ASPIC dealing only with strict rules, defeasible
rules, rebutting attack and undercutting attack. We call this system ASPIC-Lite.
The approach that we take is simple: we associate with each strict and defeasible
rule a probability. This probability is associated with the event that the rule is
active, and may be applied in an argument. We finally show how to generate a
probabilistic framework given a p-ASPIC theory.
    The work presented in this paper should be understood as an initial step in
the direction of probabilistic, instantiated, Dung-style argumentation. There are
many open issues and possible directions for future work.
    The outline of this paper is as follows. In section 2 we focus on the abstract
level, and present first the familiar concepts of Dung-style argumentation: ar-
gumentation frameworks, labelings and acceptance functions. Then we present
our probabilistic generalizations of these concepts, namely that of probabilistic
frameworks, along with a method of determining the probability that arguments
are skeptically or credulously accepted. In section 3 we turn to the instanti-
ated setting, and we present a generalization of the ASPIC-Lite argumentation
system, which we call p-ASPIC. This section defines how we can generate an in-
stance of a probabilistic framework. In section 4.1, we turn again to the abstract
level, where we demonstrate the evaluation of the arguments of a probabilistic
framework, generated from a p-ASPIC theory. Finally, before we present our
conclusions in section 7, we discuss in section 5 a number of open problems and
in section 6 we give an overview of related work.


2     Formal preliminaries

2.1   Dung-style abstract argumentation theory

Dung-style argumentation theory centers on the concept of an argumentation
framework (in short framework ). A framework consists of a set of arguments
and a binary attack relation, representing conflicts among arguments.
Definition 1. An argumentation framework F is a pair (Args, Att), where
Args is a finite set of arguments, and where Att ⊆ Args × Args is called the
attack relation.
   Given a framework, we are interested in which arguments we can simultane-
ously accept. The answer is given in the form of a labeling, that represents an
evaluation of the arguments of the framework.
Definition 2. Given a framework F = (Args, Att), a labeling is a function
L : Args → V , where V = {I, U, O}. We denote the set of all labelings of F
by Lall
    F . If L is a labeling of F then L
                                       −1
                                          : V → 2Args , where 2Args denotes the
                                  −1
power set of Args, is defined by L (v) = {a ∈ Args | L(a) = v}.
    An argument labeled I, O or U (for in, out or undecided ) is, respectively,
accepted, rejected or neither accepted nor rejected. A function that takes as input
a framework and returns a set of labelings, is called an acceptance function:
Definition 3. An acceptance function is a function A that returns, for any
framework F , a set A(F ) ⊆ Lall
                             F .

   Different types of acceptance functions can be defined, each corresponding to
an argumentation semantics that embodies a particular set of rationality criteria.
The properties of conflict-freeness and admissibility are usually considered to be
the minimum requirements:
Definition 4. Given a framework F = (Args, Att), we say that a labeling L ∈
Lall                1
  F is conflict-free iff: @(a, b) ∈ Att s.t. L(a) = L(b) = I; and admissible iff:
∀a ∈ Args, L(a) = I implies ∀(b, a) ∈ Att, L(b) = O and L(a) = O implies
∃(b, a) ∈ Att s.t. L(b) = I. We denote the set of conflict-free and admissible
                    cf
labelings of F by L and Aad , respectively.
                      F          F

   Another property is completeness. It states that an argument is labeled I if
and only if all attackers are labeled O, and that an argument is labeled O if and
only if there is an attacker labeled I.
Definition 5. Given a framework F = (Args, Att), we say that a labeling L is
complete if and only if:
1. L(a) = I if and only if ∀(b, a) ∈ Att, L(b) = O.
2. L(a) = O if and only if ∃(b, a) ∈ Att, L(b) = I.
   Note that complete labelings are also conflict free and admissible. Among
the complete labelings, we can select those that satisfy certain properties, such
as having a maximal set of arguments labeled I or U , or having no argument
labeled U . The main types of acceptance functions are now defined as follows:
1
    Different definitions of conflict-free labelings exist. In [3], a conflict-free labeling
    is defined by the condition that, ∀a ∈ Args, L(a) = I implies @(b, a) ∈ Att s.t.
    L(b) = I, and L(a) = O implies ∃(b, a) ∈ Att s.t. L(a) = I. Our definition is the
    same as in [8].
Definition 6. The complete acceptance function, denoted by Aco , is defined to
return all complete labelings of F . The preferred, grounded and stable acceptance
functions, denoted by Apr , Agr and Ast , respectively, are defined as follows.

 – Apr (F ) = {L ∈ Aco        co
                    F | @K ∈ A (F ), K
                                       −1
                                          (I) ⊃ L−1 (I)}
 – Agr (F ) = {L ∈ Aco        co
                    F | @K ∈ A (F ), K
                                       −1
                                          (U ) ⊃ L−1 (U )}
    st              co   −1
 – A (F ) = {L ∈ AF | L (U ) = ∅}

   Given a framework (Args, Att), a set of arguments B ⊆ Args and a semantics
sem, two basic types of queries that can be answered are:

 – Skeptical acceptance: Is, for all labelings returned by Asem (F ), at least one
   argument a ∈ B labeled I?
 – Credulous acceptance: Is, for at least one labeling returned by Asem (F ), at
   least one argument a ∈ B labeled I?

    Note that we consider acceptance of sets rather than single arguments be-
cause we may have that, in the instantiated setting presented in section 3, mul-
tiple arguments have the same conclusion. We are then interested in skeptical
and credulous acceptance of a conclusion, rather than an argument, and we need
to look at the set of all arguments with this conclusion.


2.2   Probabilistic Dung-style argumentation theory

In the previous section, we introduced the basic concepts of the theory of ab-
stract argumentation theory. We now consider a probabilistic generalization of
these concepts. Given a framework (Args, Att), there may be uncertainty about
whether or not an argument a ∈ Args is active. This uncertainty may arise, for
example, from:

 – Uncertainty of evidence. Individual pieces of evidence, on which an ar-
   gument is based, may be uncertain. This uncertainty carries over to the
   argument. So the probability that the argument is active is the probability
   that the evidence is true.
 – Opponent modeling. If we use a framework to model the knowledge of
   an opponent (e.g. in the setting of an argumentation game), we may be un-
   certain about which arguments the opponent is aware of. So the probability
   that the argument is active is the probability that the opponent is aware of
   the argument.

To represent this kind of uncertainty, we introduce the concept of a probabilistic
framework :

Definition 7. A probabilistic framework is a pair P F = (F, P ), where F =
(Args, Att) is a framework and P : 2Args → [0, 1] is a probability
                                                          P        distribution
over sets of arguments, called framework states, such that C∈2Args P (C) = 1.
    A framework state C corresponds to the event that all (and only) the ar-
guments in C are active. We do not know which framework state C ⊆ 2Args is
active; we only know its probability P (C). We say that an argument a is active
(resp. inactive) in C if a ∈ C (resp. a 6∈ C).
Example 1. Consider the probabilistic framework (F, P ) with F = (Args, Att),
where Args = {a, b}, R = {(a, b), (b, a)}. Thus, we have four framework states:
C1 = ∅, C2 = {a}, C3 = {b} and C4 = {a, b}. Suppose the probability that a is
active is 0.4 and that b is active is 0.5, and that these events are independent.
The probability distribution over framework states is then defined by P (C1 ) =
P (C3 ) = 0.3 and P (C2 ) = P (C4 ) = 0.2.
    The way we evaluate the arguments of the framework F , given a state C, is
straightforward. We apply the criterium of completeness with the proviso that all
inactive arguments are labeled O. More precisely, given a state C, an argument
is labeled I if and only if it is active and all attackers are labeled O or is labeled
O if and only if it is inactive or there is an attacker labeled I. We thus end up
with a notion of completeness given a framework state C:
Definition 8. Given a framework (Args, Att) and a framework state C ⊆ Args,
we say that a labeling L ∈ Lall is complete given the framework state C iff:
1. L(a) = I if and only if a ∈ C and ∀(b, a) ∈ Att, L(b) = O.
2. L(a) = O if and only if either a 6∈ C or ∃(b, a) ∈ Att, L(b) = I.
   We can now define the conditionally complete, preferred, grounded and stable
acceptance functions, that take as input a framework and a framework state:
Definition 9. Given a framework F , the conditionally complete, preferred, grounded
                                         pr     gr
and stable acceptance functions2 CAco                     st
                                   F , CAF , CAF and CAF are defined by:

 – CAco (F, C) = {L ∈ Lall
                       F | L is complete given C}.
 – CApr (F, C) = {L ∈ CAco                 co
                         F (C) | @K ∈ CAF (C), K
                                                 −1
                                                    (I) ⊃ L−1 (I)}
     gr                  co                co
 – CA (F, C) = {L ∈ CAF (C) | @K ∈ CAF (C), K −1 (U ) ⊃ L−1 (U )}
 – CAst (F, C) = {L ∈ CAco
                        F (C) | L
                                  −1
                                     (U ) = ∅}
   Now we generalize the two basic types of queries. Given a probabilistic frame-
work ((Args, Att), P ), a semantics sem and a set B ⊆ Args, we can ask:

 – What is the probability that B is skeptically accepted?
 – What is the probability that B is credulously accepted?

    Loosely speaking, the probabilities of skeptical and credulous acceptance can
be understood as lower and upper bound probabilities, where the differences
between the two arise from conflicts among arguments. The probabilities are
calculated as follows.
2
    The concept of a conditional acceptance function presented here is similar to the one
    presented in [4], with some difference in notation. More precisely, our CAx (F, C) is
    equivalent in [4] to CAxF ([L]F ), where L1 (I) = C and L1 (O) = Args \ C.
Definition 10. Let P F = (F, P ) be a probabilistic framework, F = (Args, Att),
B ⊆ Args a set of arguments and sem a semantics. The probability of skeptical
                     sem
acceptance, denoted Pskep (B), is defined by:
                                            X
               sem
              Pskep (B) =                                           P (C)
                            {C∈2Args |∀L∈CAsem (F,C),∃a∈B,L(a)=I}

                                                      sem
    The probability of credulous acceptance, denoted Pcred (B), is defined by:
                                          X
               sem
             Pcred (B) =                                      P (C)
                            {C∈2Args |∃L∈CAsem (F,C),∃a∈B,L(a)=I}


   In words, the definitions above amount to: the probability of skeptical (resp.
credulous) acceptance of B is the sum probability of all framework states in
which B is skeptically (resp. credulously) accepted.

Example 2. (Continued from 1) First, if we look at the framework F , we can
see that both {a} and {b} are credulously accepted but not skeptically accepted,
under the complete semantics. Let us now look at the probability of credulous
and skeptical acceptance under the complete semantics, given the probabilis-
tic framework (F, P ). We have that the set {a} is skeptically accepted only
given framework state C2 and the set {b} only given framework state C3 . Hence
  co ({a}) = P (C ) = 0.2 and P co ({a}) = P (C ) = 0.3. The set {a} is credu-
Pskep             2              skep            3
lously accepted in the framework states C2 and C4 and {b} in C3 and C4 . Hence
  co ({a}) = P (C ) + P (C ) = 0.4 and P co ({b}) = P (C ) + P (C ) = 0.5.
Pcred             2        4             cred            3        4

    We are now equipped to deal with uncertainty of arguments on the abstract
level, using the concept of a probabilistic argumentation framework. In the fol-
lowing section, we present an instantiation that generates a probabilistic frame-
work, called p-ASPIC. That is, we define a logical language to specify a p-ASPIC
theory, which includes rules associated with probabilities, and we specify how we
can construct a probabilistic framework from such a theory. After that we return
to the issue of evaluating the arguments of a probabilistic framework, where we
apply the concepts introduced here, to a probabilistic framework generated by
the p-ASPIC system.


3    p-ASPIC: ASPIC with probabilities
We present here a generalization of the ASPIC-Lite system that supports rules
associated with a probability. We call it p-ASPIC. Let L be a logical language
which is closed under negation and let − : L → L be defined by −φ = ψ, if
φ = ¬ψ, and −φ = ¬φ, otherwise. In the ASPIC-Lite system, knowledge is
represented using two types of rules: strict rules, of which the conclusion always
holds, if the premises hold, and defeasible rules, of which the conclusion holds
defeasibly, if the premises hold. Here, we associate the rules with a probability,
and we call them p-rules.
Definition 11. A p-rule is a rule of the form Φ →xp ψ, where Φ ⊆ L is the
antecedent and ψ the consequent, x ∈ {s, d} the type, and p ∈ (0, 1] is the
probability of the rule. Given a rule Φ →xp ψ we say that it is a strict p-rule if
x = s and a defeasible p-rule if x = d.

    Throughout this text, we either write Φ →xp ψ, where x ranges over any of
the two types of rules, or Φ →sp ψ and Φ →dp ψ, to denote a strict and defeasible
p-rule in particular. Our notation is different from that in [6, 7], where strict rules
are written using → and defeasible rules using ⇒. We adopt the type parameter
for notational convenience.
    The probability p, associated with a p-rule Φ →xp ψ, is interpreted as the
probability that the rule is active. As we hinted at before, such probabilities
may arise from:

 – Uncertainty of evidence. It may be uncertain whether or not a fact or
   rule is a valid constituent of an argument. So the probability that a rule is
   active is the probability that the rule is valid.
 – Opponent modeling. If we use a framework to model the knowledge of
   an opponent (e.g. in the setting of an argumentation game), we may be
   uncertain about which rules the opponent is aware of. So the probability
   that the argument is active is the probability that the opponent is aware of
   the rule.

   Note that we assume that there are no rules with zero probability. For a rule
that is certain, i.e. has a probability of 1, we omit the probability and simply
write Φ →x ψ. A p-theory is a set of p-rules:

Definition 12. A p-theory is a set R of p-rules. We denote by D(R) the set of
defeasible rules in R and by S(R) the set of strict rules in R.

    In the ASPIC-Lite system, a theory is assumed to be closed under transpo-
sition of strict rules and to be consistent. These requirements are necessary to
enforce certain coherence requirements on the output of the ASPIC-Lite system
(we refer to [5] for details). We define these properties below. Again,we deviate
slightly from [6, 7]. We do not assume R to be closed under transposition of strict
rules, and R to be consistent. Rather, we require that the closure of R under
transposition of strict rules is consistent. Furthermore, we require another prop-
erty, not considered in the normal ASPIC-Lite system, namely non-redundancy
of strict rules. This means that R is minimal, in that R does not contain trans-
positions of other rules in R. Formally:

Definition 13. Let P ⊆ L and R a p-theory. The closure of P under the strict
rules in R, denoted ClR (P ), is the smallest set satisfying:

 – P ⊆ ClR (P ),
 – If {φ1 , . . . , φn } →sp ψ ∈ R and φ1 , . . . , φn ∈ ClR (P ) then ψ ∈ ClR (P ).
Definition 14. A strict rule Φ0 →sp ψ 0 is a transposition of a strict rule Φ →sp ψ
if and only if ∃φ ∈ Φ s.t. Φ0 = (Φ \ {φ}) ∪ {−ψ} and ψ 0 = −φ. Let R be a p-
theory. The closure of R under transposition of strict rules, denoted T r(R), is
the smallest set satisfying:
 – R ⊆ T r(R)
 – If Φ →sp ψ ∈ T r(R) and Φ0 →sp ψ 0 is a transposition of Φ →sp ψ then
   Φ0 →sp ψ 0 ∈ T r(R).

Definition 15. Let P ⊆ L. We say that P is consistent if and only if there is no
φ ∈ L such that φ, −φ ∈ P . Let R be a p-theory. We say that R is consistent if
and only if there is no consistent P ⊆ L and φ ∈ L such that φ, −φ ∈ ClT r(R) (P ).

Definition 16. Let R be a p-theory. A strict rule r ∈ S(R) is redundant in R
if and only if T r(R) = T r(R \ {r}). We say that R is non-redundant if and only
if ∀r ∈ S(R), r is not redundant.

    Throughout this paper, we assume that R is consistent and non-redundant
and, furthermore, that there are no two rules Φ →xp ψ, Φ →xp0 ψ ∈ R such that
p 6= p, i.e. there are no two rules with equivalent antecedents/premises, but a
different p-value. In the rest of this paper, we use the following running example.

Example 3. Consider the p-theory R = {r1 , . . . , r10 } with:
     r1 = ∅ →s aw                   r5 = {aw} →d aj            r9 = {aj, bj, cj} →s ¬dj
                   s                              d
     r2 = ∅ →0.5 bw                 r6 = {bw} → bj             r10 = {cj, dj} →s ¬dr5 e
                   s                              d
     r3 = ∅ →0.6 cw                 r7 = {cw} → cj
     r4 = ∅ →s0.7 dw                r8 = {dw} →d dj
     The example can be interpreted as follows: Four friends, let us call them
Anne, Bob, Chris and David have expressed their desire to join you on a road
trip. The strict rules r1 , . . . , r4 stand for ‘Anne wants to join’, . . ., ‘David wants
to join’. You are not certain whether Bob, Chris and David want to join. This
is expressed by the probabilities associated with r2 , r3 and r4 . The defeasible
rules r5 , . . . , r8 express the principle that if your friends want want to join you
then, if possible, they can join you. However, your car seats at most three pas-
sengers, which is expressed by the rule r9 . (Also consider the transpositions of
r9 , e.g. {aj, bj, dj} →s ¬cj.) Furthermore, both Chris and David are in love with
Anne, which could lead to unpleasant situations in the cramped car. You decide,
therefore, that if Chris and David both join, then Anne cannot join, which is
expressed by r10 . (Here, d. . .e stands for the objectification operator, which maps
defeasible rules to elements of the language. We need this to define undercut,
which we introduce below.)

    An ASPIC-Lite theory can be used to instantiate a Dung-style argumentation
framework. This framework is then an abstract representation of the reasoning
problem posed by the theory. To do this, the ASPIC system specifies how ar-
guments are constructed and how the attack relation is defined. Moreover, the
probabilities associated with the rules of a p-theory, allow us to define a proba-
bility distribution over sets of arguments. We can thus specify how to instantiate
a probabilistic framework. Before turning to this aspect, we start out with ar-
guments and attacks. An argument is a chaining of rules, where the premises of
every rule follow from the conclusions of preceding rules. Apart from notation,
we define argument generation as usual in the ASPIC-Lite system:

Definition 17. An argument a is a pair (B, φ), where B is a set of p-rules
and φ ∈ L is the conclusion. The set of arguments generated by a p-theory R,
denoted ArgsR , is inductively defined as follows:

 – If {φ1 , . . . , φn } →xp ψ ∈ T r(R) and (Φ1 , φ1 ), . . . , (Φn , φn ) ∈ ArgsR then
   (Φ1 ∪ . . . ∪ Φn ∪ {{φ1 , . . . , φn } →xp ψ}, ψ) ∈ ArgsR .

    Given a set of arguments A, we denote by R(A) the set of rules appearing in
the arguments in A and by S(A) and D(A) the set of strict and defeasible rules,
respectively, appearing in A.

   Notice that the base case of the inductive definition of ArgsR is the case
where a rule has an empty set of premises.

Example 4. (Continued from 3) The set of arguments generated by the p-theory
of example 3 is the set ArgsR = {a1 , . . . , a13 } with:
    a1 = ({r1 }, aw)                            a8 = ({r4 , r8 }, dj)
    a2 = ({r2 }, bw)                            a9 = ({r2 , r3 , r4 , r6 , r7 , r8 , r9 }, ¬aj)
    a3 = ({r3 }, cw)                            a10 = ({r1 , r3 , r4 , r5 , r7 , r8 , r9 }, ¬bj)
    a4 = ({r4 }, dw)                            a11 = ({r1 , r2 , r4 , r5 , r6 , r8 , r9 }, ¬cj)
    a5 = ({r1 , r5 }, aj)                       a12 = ({r1 , r2 , r3 , r5 , r6 , r7 , r9 }, ¬dj)
    a6 = ({r2 , r6 }, bj)                       a13 = ({r3 , r7 , r4 , r8 , r10 }, ¬dr5 e)
    a7 = ({r3 , r7 }, cj)
      Two kinds of attack are defined by the ASPIC-Lite system. The first is defined
by a conclusion of the attacking argument contradicting a defeasible conclusion of
the attacked argument. This is called rebut. For the second type, called undercut,
it is assumed, in the ASPIC-Lite system, that there is an objectification operator
d. . .e that maps defeasible rules to elements of L. Formally:

Definition 18.        Given a p-theory R and the generated arguments ArgsR , we
say:
 – An argument (B, φ) ∈ ArgsR rebuts (B 0 , φ0 ) ∈ ArgsR if and only if there is
   a Φ →dp ψ ∈ D(B 0 ) and ψ = −φ.
 – An argument (B, φ) ∈ ArgsR undercuts (B 0 , φ0 ) ∈ ArgsR if and only if there
   is a Φ →dp ψ ∈ D(B 0 ) and φ = ¬dΦ →dp ψe.
The attack relation AttR ⊆ ArgsR ×ArgsR is defined by ((B, φ), (B 0 , φ0 )) ∈ AttR
if and only if (B, φ) rebuts or undercuts (B 0 , φ0 ).

Example 5. (Continued from 4) Some attacks in our running example are: a9
rebuts a5 , a10 , a11 and a12 ; a13 undercuts a10 , a11 , a12 and a13 ; and both a11 and
a12 rebut a13 .
    Given a p-theory we can now generate a framework:

Definition 19. Given a p-theory R, the framework generated by R is the frame-
work FR = (ArgsR , AttR ).

Example 6. (Continued from 4) Figure 1 shows the argumentation framework
(ArgsR , AttR ) generated by the p-theory of our running example. The nodes
represent arguments in ArgsR and are labeled with the argument name and the
conclusion. The edges represent the attack relation AttR .




         a5             a13            a6
         aj            ¬[r5]           bj         S                               pS
                                                  S0 = Rcertain                   .06
        a1     a9               a10     a3
        aw     ¬aj              ¬bj     cw
                                                  S1 = Rcertain ∪ {r2 }           .14
                                                  S2 = Rcertain ∪ {r3 }           .09
                                                  S3 = Rcertain ∪ {r2 , r3 }      .21
        a2     a12              a11     a4
                                                  S4 = Rcertain ∪ {r4 }           .06
        bw     ¬dj              ¬cj     dw        S5 = Rcertain ∪ {r2 , r4 }      .14
                                                  S6 = Rcertain ∪ {r3 , r4 }      .09
         a8                            a7         S7 = Rcertain ∪ {r2 , r3 , r4 } .21
         dj                            cj

                                                  Table 1. Theory states in our
     Fig. 1. The framework of our running ex-     running example.
     ample.


    We have now described the process of the generation of a framework, given a
p-theory R, as in the ASPIC-Lite system. However, we have not done anything
with the probabilities associated with the rules. We turn to this in the following
section, where we describe the process of generating a probabilistic framework,
given a p-theory R.


4    Calculating probabilities of arguments

As we said, we interpret a p-rule Φ →xp ψ as saying that the probability that the
rule Φ →x ψ is active, is p. That is, the rule is active and can be applied, with
a probability of p and it is inactive and cannot be applied, with a probability
of 1 − p. The uncertainty about the rules used in an argument carry over to
uncertainty about whether or not the argument is active. That is, the probability
that an argument (B, φ) is active, is the probability that all p-rules in B are
active. To model this, we define the notion of a theory state. A theory state is
corresponds to the event that a set of rules is active. If a theory state holds, then
all and only the rules in the theory state are active. Next, we define a probability
distribution over the set of theory states. We can, in principle, use any type of
distribution but, for simplicity, we assume here that the events of different p-
rules being active, are independent. Thus, the probability of the event that a
theory state is active, is easily calculated:
Definition 20. Let R be a p-theory. A theory state is a set S ⊆ R. If (Φ → ψ) ∈
T r(S), we say that (Φ → ψ) is active in S, otherwise inactive. The probability
of S, denoted pS , is defined by
                                 Y        Y
                       pS =         p            (1 − p)
                             (Φ→x
                                p ψ)∈S   (Φ→x
                                            p ψ)∈R\S


    Note that, from the way the probability of a theory state is calculated, it is
easy to see that the sum probability of all theory states is 1. Also note that a
strict rule Φ →s ψ is active in S if and only if all transpositions of Φ →s ψ are
active in S. Apart from transposition, we may consider in definitions 16 and 20
closure under additional properties. For example, we may require that rules are
closed under transitivity so that, in a state, two rules {a} →s b, {b} →s c are
active if and only if {a} →s c is active. However, for the current purpose, we
consider only transposition.
Example 7. (Continued from 6) There are three uncertain rules in the p-theory
of our running example, namely r2 , r3 and r4 . Let Rcertain = R \ {r2 , r3 , r4 }.
Every theory state not containing all rules in Rcertain receives zero probability.
Table 1 lists the states that receive non-zero probability:
Given the probability distribution over theory states, the probability of a frame-
work state (see definition 7) is defined by the sum probability of all theory states
that give rise to the framework state.
Definition 21. Let R be a p-theory and (ArgsR , AttR ) the framework generated
by R. We say that a theory state S gives rise to a framework state C ⊆ 2Args
if and only if C = G(S). The probability distribution over framework states
generated by R, denoted PR , is defined by:
                                         X
                         PR (C) =                pS
                                      {S∈2R |C=G(S)}

Proposition 1. Given a p-theory R and the framework (ArgsR , AttR ) gener-
P by R, the sum probability of all framework states C ⊆ ArgsR is 1, i.e.
ated
   C⊆ArgsR PR (C) = 1.

   Note that, while the events of different p-rules being active are be indepen-
dent, the events of different arguments being active, are in general not indepen-
dent. This is not surprising, because the same p-rule may be used in several
arguments.
   Furthermore, some framework states may receive zero probability. This hap-
pens when no theory state gives rise to the particular framework state. These
framework states are exactly those that are not well-formed, in the sense that
they are not closed under argument construction:
Definition 22. We say that a set of arguments C is closed under argument
construction if and only if C = AR(C)

Proposition 2. Let R be a p-theory, (ArgsR , AttR ) the framework generated by
R and C ⊆ ArgsR . If PR (C) > 0 then C is closed under argument construction.

    Note that the right-to-left direction of proposition 2 fails to hold only because
of rules r ∈ R with probability 1. Then there may be a framework state C
that is closed under argument construction but receives zero probability because
r 6∈ R(C).

Example 8. Consider a p-theory R = {∅ →s0.5 a, a →s0.5 b}. Two arguments
that are generated by this theory are: a1 = ({∅ →s0.5 a}, a) and a2 = ({∅ →s0.5
a, a →s0.5 b}, b). We have that the framework states {a1 } and {a1 , a2 } are closed
under argument construction, but {a2 } is not. There are four theory states:
S1 = ∅, S2 = {r1 }, s3 = {r2 } and S4 = {r1 , r2 }. S1 gives rise to the framework
state ∅, S2 to {a1 }, S3 to ∅ and S4 to {a1 , a2 }. No theory state gives rise to {a2 }.
Hence it receives zero probability.

   We can now generate a probabilistic framework:

Definition 23. Given a p-theory R, the probabilistic framework generated by
R is the probabilistic framework P FR = (FR , PR ).

Example 9. (Continued from 7) Given the p-theory of our running example,
the probabilistic framework is (FR , PR ), where FR is the framework shown in
example 6 and where PR is displayed in table 2. (The column C shows the
framework states that receive non-zero probability, the column PR (C) shows
the corresponding probabilities and in every row, a checkmark means that the
argument is active in the corresponding framework state.)


            C           PR (C) a1 a2 a3 a4 a5 a6 a7 a8 a9 a10 a11 a12 a13
            C1 = G(S1 ) .06    X           X
            C2 = G(S2 ) .14    X X         X X
            C3 = G(S3 ) .09    X     X     X     X
            C4 = G(S4 ) .21    X X X       X X X              X
            C5 = G(S5 ) .06    X        X X         X
            C6 = G(S6 ) .15    X X      X X X       X             X
            C7 = G(S7 ) .09    X     X X X       X X      X           X
            C8 = G(S8 ) .21    X X X X X X X X X X X X X
              Table 2. The framework states in our running example.
4.1   Evaluating arguments of a p-ASPIC framework
In the previous sections we demonstrated how, given a p-theory, we can gener-
ate a probabilistic framework. In this section we conclude our running example
and show the result of calculating the probability of skeptical and credulous
acceptance of a conclusion from our p-theory.

Example 10. If we take the complete semantics, then the different labelings cor-
respond to different ways in which the constraints, expressed by the rules of
our theory, can be satisfied. Focusing on just Anne, we can answer the follow-
ing questions: What is the lower bound probability that Anne joins? and What
is the upper bound probability that Anne joins?. These questions correspond,
respectively, to the probabilities of skeptical and credulous acceptance. Regard-
ing skeptical acceptance, we have that a5 is labeled I in all complete labelings,
given all framework states except the framework states C7 and C8 . Therefore,
this probability is the sum probability of the states C1 , . . . , C6 , which is 0.7.
(Indeed, Anne does not necessarily join because whenever both Chris and David
want to join (p = 0.3), it is not sure that Anne will join.) Regarding credulous
acceptance, we have that a5 is labeled I in at least one complete labeling, given
all possible framework states. Therefore, this probability is 1. (Indeed Anne can
always possibly join; even if Bob, Chris and David want to join, it is possible to
refuse either Chris or David, so that Anne can join.)


5     Discussion and future work
In this paper we presented an initial attempt at combining probability with
instantiated and abstract argumentation. Many issues are still open and are left
for future work. Here we give an overview.
    One limitation of our formalization is that we apply probabilities on a meta-
level rather than the object-level. That is, we associate probabilities with rules
and not with elements of L. We cannot, for example, express in our formalism
that the conclusion of a rule holds with some probability, given that the premises
hold. We can say that our formalism is strictly about reasoning under uncer-
tainty, rather than reasoning about uncertainty. Furthermore, it is not very clear,
from a conceptual point of view, what it means to associate a probability with
a rule. However, as our example shows, it is quite natural to associate probabil-
ities with facts (i.e. strict rules with empty sets of premises). This suggests two
directions for future work: one the one hand, we can investigate argumentation
about uncertainty and on the other hand, we can focus on the ‘uncertainty about
facts’ part, and from there, add expressivity.
    It is worth mentioning one important issue, when modeling argumentation
about uncertainty. Namely, how do we interpret rules? An obvious candidate
for such an interpretation is conditional probability, but then we lose context
independence, transitivity (i.e. chaining) and transposition.
    Furthermore, we have assumed in this paper that the events of individual
rules being active are probabilistically independent. While this assumption re-
duces the complexity, it leads to serious inaccuracy when modeling many real-
world problems. In many domains, one has to deal with phenomena such as
common causes and effects, where different events are not probabilistically inde-
pendent. We have already mentioned that, in principle, we can work with arbi-
trary probability distributions over theory states. An obvious choice to represent
such a distribution is by using Bayesian belief networks. Since both Bayesian be-
lief networks and abstract argumentation frameworks are intuitive and easy to
understand graphical representations of knowledge, an interesting question is
whether the two can be fused in a meaningful way.


6   Related work
Our concept of a probabilistic framework is similar to that of a probabilis-
tic framework, as introduced in [14], where arguments and attacks are asso-
ciated with probabilities, assuming independence of the events of individual ar-
guments/attacks being active. They do not consider rule-based instantiation of
arguments. They apply their formalism to the problem of coalition forming and
present an efficient evaluation algorithm, based on Monte Carlo simulation. Our
work shows that, in the instantiated setting, it is in general not possible to
assume independence between different arguments.
    Other related work includes [11], which presents an ‘equational approach’ to
argumentation semantics, where arguments get numerical values [0, 1], satisfying
certain equations, such that the labelings of the framework are the solutions to
the equations. A similar, but probabilistically oriented approach, is presented
in [16], where acceptability of arguments is expressed by probabilities instead
of labels. Both approaches subsume the complete semantics (interpreting I and
O as a probability or numerical value of 1 and 0, respectively). These two ap-
proaches do not focus on uncertainty of the arguments themselves. Rather, they
generalize the traditional ‘discrete’ evaluation of I/U /O labelings.
    An interesting approach to probabilistic argumentation, which is not related
to Dung-style argumentation theory, is presented in [2]. It models judgment of
a hypothesis based on from arguments against the hypothesis, each having a
likelihood or reliability based on probabilities.
    Also mentioned should be work that approaches the problem from another
side, namely by associating numerical weights [10] or fuzzy values [12] with
attacks.


7   Conclusion
In this paper we extended the model of Dung-style argumentation with uncer-
tainty, both on the abstract level and the instantiated level. On the instantiated
level, we presented an extension of the ASPIC argumentation system, which
we call p-ASPIC. This system extends ASPIC in a simple manner, by allowing
probabilities associated with rules. This probability is interpreted as being as-
sociated with the event that the rule is active. To capture this uncertainty on
the abstract level, we extended the notion of an argumentation framework to
a probabilistic framework. We have showed how to instantiate a probabilistic
framework using the p-ASPIC system, and we demonstrated the system with a
number of examples. This work should be understood as an initial step in the
direction of probabilistic, instantiated, Dung-style argumentation, and we have
discussed a number of directions for future work.


References
 1. Leila Amgoud and Claudette Cayrol. Inferring from inconsistency in preference-
    based argumentation frameworks. J. Autom. Reasoning, 29(2):125–169, 2002.
 2. B. Anrig, R. Bissig, R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumen-
    tation systems: Introduction to assumption-based modeling with ABEL. Institute
    of Informatics University of Fribourg, 1999.
 3. Pietro Baroni, Martin Caminada, and Massimiliano Giacomin. An introduction to
    argumentation semantics. Knowledge Eng. Review, 26(4):365–410, 2011.
 4. R. Booth, S. Kaci, T. Rienstra, and L. van der Torre. Conditional acceptance
    functions. 2012. To appear.
 5. M. Caminada and L. Amgoud. On the evaluation of argumentation formalisms.
    Artificial Intelligence, 171(5):286–310, 2007.
 6. Martin Caminada and Leila Amgoud. On the evaluation of argumentation for-
    malisms. Artif. Intell., 171(5-6):286–310, 2007.
 7. Martin Caminada and Yining Wu. On the limitations of abstract argumentation.
    In BNAIC 2011. 2011.
 8. M.W.A. Caminada and D.M. Gabbay. A logical account of formal argumentation.
    Studia Logica, 93(2-3):109–145, 2009. Special issue: new ideas in argumentation
    theory.
 9. P.M. Dung. On the acceptability of arguments and its fundamental role in non-
    monotonic reasoning, logic programming and n-person games. Artificial intelli-
    gence, 77(2):321–357, 1995.
10. Paul E. Dunne, Anthony Hunter, Peter McBurney, Simon Parsons, and Michael
    Wooldridge. Weighted argument systems: Basic definitions, algorithms, and com-
    plexity results. Artif. Intell., 175(2):457–486, 2011.
11. Dov M. Gabbay. Introducing equational semantics for argumentation networks. In
    Weiru Liu, editor, ECSQARU, volume 6717 of Lecture Notes in Computer Science,
    pages 19–35. Springer, 2011.
12. J. Janssen, M. De Cock, and D. Vermeir. Fuzzy argumentation frameworks. In
    Information Processing and Management of Uncertainty in Knowledge-based Sys-
    tems, pages 513–520, 2008.
13. Souhila Kaci and Leendert van der Torre. Preference-based argumentation: Ar-
    guments supporting multiple values. Int. J. Approx. Reasoning, 48(3):730–751,
    2008.
14. Hengfei Li, Nir Oren, and Timothy J. Norman. Probabilistic argumentation frame-
    works. In Sanjay Modgil, Nir Oren, and Francesca Toni, editors, TAFA, volume
    7132 of Lecture Notes in Computer Science, pages 1–16. Springer, 2011.
15. Henry Prakken. An abstract framework for argumentation with structure argu-
    ments. Argument and Computation, 1(2):93–124, 2010.
16. M. Thimm. A probabilistic semantics for abstract argumentation. 2012. To appear.