Hostname: page-component-cd9895bd7-dzt6s Total loading time: 0 Render date: 2024-12-18T12:34:55.832Z Has data issue: false hasContentIssue false

A parameterised hierarchy of argumentation semantics for extended logic programming and its application to the well-founded semantics

Published online by Cambridge University Press:  10 January 2005

RALF SCHWEIMEIER
Affiliation:
Camtec Software GmbH, An den Treptowers 1, 12435 Berlin, Germany (e-mail: [email protected]) Department of Computer Science, Technische Universität Dresden, 01062 Dresden, Germany (e-mail: [email protected], [email protected])
MICHAEL SCHROEDER
Affiliation:
Department of Computer Science, Technische Universität Dresden, 01062 Dresden, Germany (e-mail: [email protected], [email protected])

Abstract

Argumentation has proved a useful tool in defining formal semantics for assumption-based reasoning by viewing a proof as a process in which proponents and opponents attack each others arguments by undercuts (attack to an argument's premise) and rebuts (attack to an argument's conclusion). In this paper, we formulate a variety of notions of attack for extended logic programs from combinations of undercuts and rebuts and define a general hierarchy of argumentation semantics parameterised by the notions of attack chosen by proponent and opponent. We prove the equivalence and subset relationships between the semantics and examine some essential properties concerning consistency and the coherence principle, which relates default negation and explicit negation. Most significantly, we place existing semantics put forward in the literature in our hierarchy and identify a particular argumentation semantics for which we prove equivalence to the paraconsistent well-founded semantics with explicit negation, WFSX$_p$. Finally, we present a general proof theory, based on dialogue trees, and show that it is sound and complete with respect to the argumentation semantics.

Type
Regular Papers
Copyright
© 2005 Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)