You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.

# An analysis of critical-link semantics with variable degrees of justification

#### Abstract

This paper is to critically examines Pollock’s critical-link semantics with variable degrees of justification. Some possibly counterintuitive consequences of Pollock’s definition of degrees of justification are identified and a modified definition is proposed which avoids these consequences. Then the new solution is applied to the case of so-called presumptive defeat. A second contribution of the paper is to show how the modified semantics can be applied to the ASPIC+ framework: first the ASPIC+ framework is modified to allow for variable degrees of justification and then the modified way to compute these degrees is applied in a new notion of an argument graph.

## 1.Introduction

John L. Pollock [11,15] initiated the formal study of argumentation in AI based on his contributions to epistemology, and his approach is still very influential. Pollock introduced the distinction between deductive and defeasible reasons and the corresponding distinction between rebutting and undercutting defeat. Many of today’s approaches are still based on these ideas, such as ASPIC+ [16] and Defeasible Logic Programming [4]. Probably the best-known version of his work is his 1995 book [15]. The semantics of this version was by Jakobovits proved to be equivalent to Dung’s [2] preferred semantics [7]. Later Pollock revised his semantics, for two main reasons: he wanted to enforce the same treatment of odd and even defeat loops (like also Baroni and Giacomin [1]) and he wanted to make the justification status of conclusions a matter of degree. To achieve both aims, Pollock developed his so-called critical-link semantics for his system in [12,13].

Pollock introduced variable justification degrees to account for the so-called “diminishing” effect of attempted defeaters that are weaker than their target. In such cases Pollock wanted to model that the attempted defeaters can still weaken the degree of justification of their target. More generally, the idea that justification of conclusions is not an all-or-nothing affair but a matter of degree is very natural and therefore deserves to be studied. The present paper aims to contribute to such a study by critically examining Pollock’s proposal.

In particular, we will argue that Pollock’s approach in some cases arguably gives counterintuitive outcomes, and we will modify his account in a way that avoids these outcomes. Among other things we will apply our new proposal to the issue of “presumptive defeat”, also known as the issue of ambiguity blocking versus ambiguity propagating. Since many of Pollock’s ideas are still used in other frameworks, our contributions will also be relevant for these frameworks. To illustrate this point, we will at the end discuss how Pollock’s ideas and our modifications can be incorporated in the ASPIC+ framework for structured argumentation recently proposed by [9,10,1618].

This paper is organized as follows. In Section 2, we first summarize Pollock’s 1995 system [15], then discuss why Pollock wanted to change this and then give his critical-link semantics and his definition of gradual justification. In Section 3, we then discuss some arguably counterintuitive outcomes, present our revised definitions and show that they avoid these outcomes. In Section 4, we discuss how to transfer the revised semantic into ASPIC+ framework with gradual degrees. Finally, we conclude in Section 5.

## 2.Semantics

In this section we present Pollock’s critical-link semantics with variable degrees of justification, preceded by a brief overview of his multiple-assignment semantics.

### 2.1.Basic features

There are several constant features in Pollock’s work on defeasible reasoning. Reasoning proceeds from a knowledge base of classical-logic formulas by chaining reasons into inference graphs, where all reasons are either deductive or defeasible. Only applications of defeasible reasons can be defeated, and there are two kinds of defeaters: rebutting defeaters attack the conclusion of a defeasible inference by favoring a conflicting conclusion, while undercutting defeaters attack the defeasible inference itself, without favouring a conflicting conclusion.

More precisely, Pollock assumed as given a knowledge base of first-order formulas and two sets of deductive and defeasible reasons, which technically are inference rules. Pollock then considered arguments, which are sequences of argument lines (in later work, he speaks of sequences of nodes in an inference graph). Each argument line contains a proposition, the reason applied to infer the proposition (where this reason can also be that it is taken from the knowledge base), the set of preceding lines from which the proposition is inferred, and the line’s strength. Both elements from the knowledge base and reasons have a numerical strength, which are used to compute the strength of an argument in a way further explained below. The strength of an element φ of the knowledge base is below written as δ(φ) while the strength of a reason r will be written as ρ(r).

##### Definition 1.

An argument line is a tuple (φ,r,L,s), where φ is a proposition, r is the reason applied to infer φ, L is the set of preceding lines from which φ is inferred, and s is the line’s strength.

Below the strength of argument line l will sometimes be written as s(l).

##### Definition 2.

An argument line (φ,r,L,s) defeats an argument line (φ,r,L,s) iff r is a defeasible rule, and ss, and φ=¬φ or φ=¬r (here ¬r is shorthand for saying that the antecedents of rule r do not support its consequent). Moreover, an argument A defeats an argument B iff a line of A defeats a line of B.

In his account of the strength of arguments, Pollock rejected the probability calculus and initially proposed a weakest link principle as the underlying principle for computing the strength of an argument. He defined the argument strength of a defeasible argument as the minimum of the strengths of the defeasible reasons employed in it and the degrees of justification of its premises.

##### Definition 3.

For any argument line l=(φ,r,L,s) (where L={l1,,ln}) the strength s(l) is inductively defined as follows:

• If l takes φ from the knowledge base, then s(l)=δ(φ).

• Otherwise, s(l)=min{ρ(r),s(l1),,s(ln)}.

With respect to accrual of arguments for the same conclusion, Pollock proposed that if there are two or more separate undefeated arguments for a conclusion, the degree of justification for the conclusion is the maximum of the strengths of these arguments.

### 2.2.Multiple assignment semantic

In [15] Pollock considered inference graphs, where the nodes represent the conclusions of argument lines, support-links tie nodes to the nodes from which they are inferred from L or the conclusions of the argument lines, and defeat-links indicate defeat relations between nodes. These links relate their roots to their targets. The root of a defeat-link is a singe node, while the root of a support-link is a set of nodes. He then proposed a labeling approach to define the justification status of nodes and propositions.

##### Definition 4.

A node of the inference-graph is initial iff its node-basis and list of node-defeaters is empty, where

• The node-basis of a node is the set of roots of its support links.

• The node-defeaters are the roots of the defeat links having the node as their target.

##### Definition 5.

An assignment σ of defeated and undefeated to a subset of the nodes of an inference-graph is a partial status assignment iff:

• σ assigns undefeated to any initial node;

• σ assigns undefeated to a non-initial node α iff σ assigns undefeated to all the members of the node-basis of α and σ assigns defeated to all node-defeaters of α;

• σ assigns defeated to a non-initial node α iff either σ assigns defeated to a member of the node-basis of α or σ assigns undefeated to a node-defeater of α.

##### Definition 6.

Assignment σ is a status assignment iff σ is a partial status assignment and σ is not properly contained in any other partial status assignment.

Finally, Pollock defines the justification status of an argument as follows:

##### Definition 7.

A node α of an inference graph is undefeated iff every status assignment to the inference graph assigns undefeated to α; otherwise α is defeated.

Although the multiple assignment semantics produces the intuitively correct answer for many complicated inference-graphs, Pollock was still not satisfied with it, since it can produce different outcomes for inference-graphs containing odd-length and even-length defeat cycles. See, for example, the graphs in Fig. 1 (dotted arrows indicate support links and full arrows indicate defeat links):

##### Fig. 1.

Inference graphs.

In G(1), there are two status assignments: in the first assignment B is assigned defeated while D is assigned undefeated while in the second assignment B is assigned undefeated while D is assigned defeated. In both assignments P is defeated by an undefeated defeater, so in both assignments P is defeated and hence Q is undefeated. Hence according to Definition 7, P and Q respectively have the justification status defeated and undefeated. By contrast, in G(1) there is only one status-assignment, namely an assignment that assigns no status to any node of B, D, F, P, or Q. So according to Definition 7, both P and Q have the justification status defeated.

Pollock believed that the difference of statuses of Q in these two graphs is a clear counterexample to all existing semantics. In order to avoid this problem, he proposed a new so-called critical-link semantics.

### 2.3.Critical-link semantics on status of justification

The core idea of critical-link semantics [12,13] for solving the above problem is to build new inference-graphs as subgraphs of the original inference graph and assign various statuses to initial nodes in different cases. This idea is formally defined as follows:

##### Definition 8.

An inference/defeat-path from a node φ to a node θ is a sequence of support-links and defeat-links such that

• φ is a root of the first link in the path;

• θ is the target of the last link in the path;

• the root of each link after the first member of the path is the target of the preceding link;

• the path does not contain an internal loop, i.e., no two links in the path have the same target.

For simplicity, we define the inference/defeat-path from a node φ to a node θ as a sequence of support-links and defeat-links L1,,Ln, such that (1) node φ is the initial node in path; (2) there exist nodes ψ1,,ψn1, such that L1=(φ,ψ1), Li=(ψi1,ψi), and Li=(ψn1,θ), where (φ,ψ) means the support-link or defeat link from node φ to node ψ.

##### Definition 9.

A node θ of an inference graph is φ-dependent iff there is an inference/defeat-path from φ to θ.

In G(1), B/D is D/B-dependent, while in G(1), B is D-dependent and F-dependent, D is F-dependent and B-dependent and F is D-dependent and B-dependent.

##### Definition 10.

A circular inference/defeat-path from a node φ to itself is an inference/defeat-path from φ to φ via a defeater of φ.

In G(1) there exist two circular defeat paths (B,D),(D,B) and (D,B),(B,D), while in G(1) there exist three circular defeat paths (B,D),(D,F),(F,B), (D,F),(F,B),(B,D) and (F,B),(B,D),(D,F).

##### Definition 11.

A circular inference/defeat-path is an undefeated circular path iff it is a circular path and there is no defeat link outside the path having a node in the circular path as its target.

In G(1) and G(1), all of the circular paths are undefeated circular path. Consider next three nodes A, B and C, where A defeats B, B defeats C and C defeats B (ignore the node-basis). From the above definition it follows that the circular paths (B,C),(C,B) and (C,B),(B,C) are not undefeated circular paths.

##### Definition 12.

A defeat-link is φ-critical iff it is a member of some minimal set of defeat-links such that removing all the defeat-links in the set suffices to cut all the circular inference/defeat-paths from φ to φ.

In G(1), (B,D) and (D,B) are both B-critical and D-critical, since {(B,D)} and {(D,B)} are the minimal sets such that removing (B,D) and (D,B) suffices to cut the circular defeat paths (B,D),(D,B) and (D,B),(B,D). Likewise, in G(1), (B,D), (D,F) and (F,B) are all both B-critical, D-critical and F-critical, since {(B,D)}, {(D,F)} and {(D,B)} are the minimal sets such that removing their sole member suffices to cut the circular defeat paths of which they are part.

##### Definition 13.

If φ is a node of an inference graph G, then Gφ is the inference graph that results from

• 1. deleting all φ-critical defeat-links from G and

• 2. making all members of the node-basis of φ initial nodes in Gφ and

• 3. making all φ-independent nodes initial-nodes in Gφ with stipulated defeat-statuses the same as their defeat-statuses in G.

Note that Pollock thus in fact modified the default justification status “undefeated” of initial nodes by stipulating that some initial nodes in a newly-constructed inference graph are defeated, instead of being automatically undefeated. For example, graph G(2) in Fig. 2 displays GB (and also GD). In this graph, both B and D are also initial nodes but they are now stipulated to be defeated, since they both had the justification status ‘defeated’ in the original graph G(1). Likewise, graph G(2) in Fig. 2 displays GB (and also GD and GF). In this graph, all of B, D and F are initial nodes but they are now stipulated to be defeated, since they all had the justification status ‘defeated’ in the original graph G(1).

Pollock then redefined his computation principles as follows:

#### Definition 14(Justification status for critical-link semantics).

The critical-link semantics consists of two rules:

• 1. Initial nodes are defeated when they are newly initial nodes and belong to the node-basis of a node in an undefeated circular path. Otherwise, initial nodes are undefeated.

• 2. A non-initial node φ is undefeated in an inference-graph G iff all members of the node-basis of φ are undefeated and any defeater for φ is defeated in Gφ.

Note that thus in his critical-link semantics Pollock does not any more consider (possibly multiple) status assignments to a graph but directly defines the justification status of nodes.

##### Fig. 2.

Renewed inference graphs.

In our example this definition yields that node Q has in both G(2) and G(2) the same status defeated. First, all the statuses of nodes A, C in G(2) and A, C, E in G(2) are undefeated, since they were already initial nodes in the original graphs. Then B, D in G(2) and B, D, F in G(2) are defeated, since they are newly initial nodes stipulated to be defeated. Consider the statuses of node P in the new semantics: there are no P-critical defeat-links in Fig. 2, so removing P-critical defeat-links leaves the original graph unchanged. P is then undefeated. Then, because there are no Q-dependent defeat-links in Fig. 2, Q is defeated in both graphs. Note also that this result reflects Pollock’ intuition that nodes that are defeated should not have power to defeat other nodes. We will discuss this further below in Section 3.4, when we discuss Pollock’ account of so-called “presumptive defeat”.

### 2.4.Critical-link semantics with variable degrees of justification

We next discuss how Pollock uses his critical-link semantics [12] to define variable degrees of justification. A main motivation of the idea that propositions should have variable degrees of justification is Pollock’ notion of a diminisher. A diminisher is a defeater of a node that is weaker than its target. Note that the notion of defeater here is different from the notion defined in Definition 2, since the new version of the defeat relation does not depend on the strength of arguments anymore. Thus from now on we assume that the condition ss in Definition 2 is deleted and we will refer to the defeat notion of Definition 2 as s-defeat (for ‘strength defeat’). Now in the above definitions, such a diminisher has no effect on the justification status of its target, since that status is an all-or-nothing affair. However, in Pollock’s new approach, the diminisher is still able to diminish the degree of justification of its target.

To see how a diminisher works, see again G(1) in Fig. 1. For simplicity, we assume that the strengths of reasons are at least as great as the degrees of justification of the initial nodes, so that the strength of reasons can be ignored. If the degree justification of node C is greater than node A, then the degree justification of node D is greater than node B. In multiple assignment semantic, B is assigned defeated/undefeated and D is then assigned undefeated/defeated. However, the idea of the new approach is that B still diminishes D, that is, the degree of justification of D is lower than the degree of justification of C.

For the sake of the mathematics of diminishers, Pollock proposed that there exists a function ◇1 such that given two argument lines that rebut one another, if their strengths are x and y, the degree of justification for the conclusion of the former is xy, while the degree of justification for conclusion of y is yx. He assumed that

the degree of justification can be measured using real numbers, possibly augmented with , i.e., ‘the extended real numbers’. More precisely, the degrees of justification fall in some interval [o,θ], where 0oθ. o corresponds to no justification, and θ to perfect justification, presumably only possible for necessary truths.

Then Pollock defined mathematical properties of ◇ and its representation as follows:

### Definition 15(Mathematics of ◇).

• (A1) ◇ is continuous on the interval [o,θ].

• (A2) If θ>α>β>o, then α>αβ>o.

• (A3) If θ>α>β>γ>o, then αβ<αγ and αγ>βγ.

• (A4) If θαβo, then βα=o.

• (A5) If θα>o, then αo=α.

• (A6) If θ>α and β and γ are in [o,θ], then (αβ)γ=(αγ)β.

It should be noted that (A2) means that an argument line with strength β diminishes the other argument line with strength α, without completely defeating it. To the contrary, (A4) means that an argument line with strength α completely defeats the other argument line with strength β. We call that the latter argument line in (A2) is incompletely defeated and the latter argument line in (A4) is completely defeated. Moreover, Pollock proved that if (A1)–(A6) hold, then ◇ has a very simple representation, namely ∽, which is an instantiation of the operator.

#### Definition 16(Representation of ◇).

(1)xy=xyif y<x<,0otherwise.

Pollock then gave his definition of the computation of degrees of justification.

#### Definition 17(Computation of degree of justification).

• (DJ1) If P is inferred from the basis {B1,,Bn} in an inference-graph G in accordance with a reason of strength ρ, D1,,Dk are the defeaters for P, and no Di is P-dependent, then J(P,G)=min{ρ,J(B1,G),,J(Bn,G)}max{J(D1,G),,J(Dk,G)}.

• (DJ2) If P has P-dependent defeaters D1,,Dk in G, then J(P,G)=J(P,GP)max{J(D1,GP),,J(Dn,GP)}.

• (DJ) If P is inferred from the basis {B1,,Bn} in an inference-graph G in accordance with a reason of strength ρ, D1,,Dk are the P-independent defeaters for P, and Dk+1,,Dm are the P-dependent defeaters of P, then J(P,G)=min{ρ,J(B1,G),,J(Bn,G)}[max{J(D1,G),,J(Dk,G)}+max{J(Dk+1,GP),,J(Dm,GP)}].

Principle DJ1 is the computation for the nodes not in a circular path, while DJ2 is for the nodes in a circular path and DJ unites these two principles for “collaborative defeat”, where the nodes are defeated by both node-dependent defeaters and node-independent defeaters. Note that in both cases, if P is taken from the knowledge base, then the degree of justification of P equals δ(P) (the strength of P).

Consider by way of example node B in G(1) and let δ(A)=0.8 while δ(C)=0.5 (recall that by assumption all reasons have strength > 0.8 and can therefore be ignored). Then according to DJ2 we have that J(B,G(1))=J(B,G(2))J(D,G(2))=0.80.5=0.80.5=0.3.

## 3.Problem cases and modifications

In this section, we discuss some possible problems of Pollock’s critical-link semantics with variable degrees of justification, by analyzing some problem cases.

### 3.1.Problem case on diminishers

The first problem concerns some arguably counter-intuitive consequences of the mathematical properties and representation of the function ◇. We present an example and discuss why the outcomes may be counter-intuitive, and then modify some properties of ◇ and choose another definition for ∽ to represent ◇.

##### Fig. 3.

Inference graph of Presumptive defeat.

Consider rebutting defeaters in Fig. 3. Let P be “Jones says that it is not raining”, R be “Smith says that it is raining”, and Q be “It is raining”. Let us first assume that Smith and Jones as equally reliable. Then according to Pollock both Q and ¬Q should be ‘completely defeated’, since both Q and ¬Q should have degree 0, when their strengths are equal. If we apply Definition 17 and again assume that the degrees of justification of the initial nodes are at least as great as the strengths of reasons, then we have J(Q,G)=J(¬Q,G)=0. Assume next that Smith is much more reliable than Jones: then Q s-defeats ¬Q while ¬Q diminishes Q: by Definition 17 we have J(¬Q,G)=0 and J(Q,G)=J(R,G)J(P,G)>0.

The arguably counter-intuitive consequence is that node ¬Q has in both cases the same degree of justification, namely, 0, while yet in the second case the degree of justification of Q is higher than in the first case. Thus intuitively, in the second case, ¬Q is s-defeated by Q with higher strength, so it is intuitive to accept the result that ¬Q loses the competition with Q (if we assume that “loses” means that justification equals 0). However, in the first case, if ¬Q is diminished by Q with equal strength, then it is counter-intuitive to acknowledge that ¬Q loses the competition, since its strength is equal to Q, not lower than Q. In other words, although node ¬Q is in the first case not accepted, it is still much more reliable than in the second case. Thus the degrees of justification of nodes in cases of symmetric s-defeat should be greater than the ones in cases of asymmetric s-defeat. Moreover, the first case is similar to “zombie arguments” [8]: although the arguments are s-defeated, they can still affect other arguments. In other words, the node ¬Q in the first case still has ability to attack or support other nodes, but the node ¬Q in the second case does not. So it is necessary to make a difference between the degrees of justification of nodes in these two cases.

### 3.2.Problem case on “presumptive defeat”

The previous point can be further developed in a discussion of ambiguity blocking vs. ambiguity propagating (by Pollock called “presumptive defeat”). Consider again Fig. 3 but let now Q stand for “Rain was predicted by the morning weather forecast”, P for “Jones says that no rain was predicted by the morning weather forecast”, R for “Smith says that rain was predicted by the morning weather forecast”, S for “It will rain” and A for “rain was predicted by the afternoon weather forecast”. Suppose again that the reason strengths are at least as great as those of the initial nodes and suppose that P and R are equally strong. Then according to Pollock’s new approach the degree of justification of all of Q, ¬Q and ¬S equals 0, so that ¬S cannot diminish or “completely defeat” S. However, according to Section 3.1 the degrees of justification of Q and ¬Q should be greater than 0, and this has the consequence that ¬S potentially has the force to diminish or even completely defeat S.

### 3.3.Problem case on undercutters

Next we discuss a problem of the computation principle DJ by arguing that it gives an unnatural treatment of the effect of undercutters on the degree of justification of their target. Consider Fig. 4 and let P be “Jones says that it is raining” and Q be “It is raining”, R be “Smith says that Jones always lies” and PQ be “Jones is lying” means “P does not guarantee Q”. Note that node PQ attacks the connection between node P and node Q, so the strength of node PQ should arguably directly weaken the strength of the reason from P to Q and only indirectly weaken the strength of node Q. In other words, the strength of an undercutting node should be in comparison with the strength of the reason it undercuts rather than with the strength of the node it attacks. However, in Pollock’s definitions this is not the case.

##### Fig. 4.

Inference of Undercutter.

### 3.4.Modified definition of representation

In his final paper [14], Pollock reconsidered the problem of degrees of justification. He measured degrees of justification using numbers in the interval [0,1], for which reason we henceforth choose the scale as [0,1]. From assumptions (A2) and (A4) it is clear that Pollock meant to design the function to distinguish between diminishers that diminish nodes without completely defeating them and diminishers that completely defeat their targets. However, we claim that some assumptions on the mathematical properties of the operator are counter-intuitive and should be revised in order to avoid the above problems.

Firstly, according to the above analysis on diminishers and “presumptive defeat”, assumption (A4) should be modified as follows:

• (A4) If θα>βo, then βα=o.

• (A4′) If θα=βo, then βαo.

These two revised assumptions say that the degrees of justification of nodes in defeat cycles (where defeat is defined as in Definition 2) should be not less than 0 if we choose the scale as [0,1].

Secondly, Pollock wanted that the function for degrees of justification is continuous for both merely diminishing nodes and completely defeating nodes. However, according to the above analysis of diminishers, the degree of justification of a diminished node reduces to real number 0 when the strength of the completing defeating node is approaching to the strength of the diminished node. Then the degree of justification of the diminished node would be definitely greater than 0 in accordance with (A4′) if the strengths of the rebutting defeaters are equal. Therefore, the representation is not continuous on the whole interval [0,1], since any point (x0,y0) that satisfies x0=y0 would be a discontinuous point.

Thirdly, the degree of justification for a diminished node should be the strength of this node decremented by an amount determined by the strength of the diminishing node. Moreover, the strength of a node as conclusion is determined by the strength of its reason and the strength of its node as premise. Rebutting defeaters or undercutting defeaters can both act as diminishers but their influences on diminished nodes are different. Undercutting defeaters weaken the strength of the reason they attack, while rebutting defeaters directly weaken the strength of the node as conclusion. Therefore, the order in which undercutting defeaters and rebutting defeaters as diminishers are applied to an argument makes a difference to the degrees of justification, and this in turn means that (A6) is invalid.

In sum, our analysis in Sections 3.13.3 makes that assumption (A4) must be modified while assumptions (A1) and (A6) cannot hold. We now define a new representation ∽ for operator ◇, which matches the above-revised assumptions. Let us define:

(2)xy=x(1y)if 0yx1,0otherwise.

Next we prove that the new function satisfies the revisions of Pollock’s assumptions:

• (A1) xy is not continuous on the interval [0,1].

##### Proof.

For any point (x0,y0), where x0=y0>0. If 0yx1, then lim(x,y)(x0,y0)xy=x0(1x0)0. If 0x<y1, then lim(x,y)(x0,y0)xy=0. Hence, xy is not continuous on the interval [0,1]. □

• (A2) If 1>x>y>0, then x>xy>0.

##### Proof.

If 1>x>y>0, then xx(1y)=xy, hence x>xy. We further have xy=x(1y)>0, since x>0 and 1y>0. □

• (A3) If 1>x>y>z>0, then xy<xz and xz>yz.

##### Proof.

If 1>x>y>z>0, then x(1z)x(1y)=x(yz)>0, hence xy<xz, and x(1z)y(1z)=(xy)(1z)>0, hence xz>yz. □

• (A4) If 1x>y0, then yx=0.

It’s easy to directly prove this property by definition of function (2).

• (A4′) If 1x=y0 then xy0.

##### Proof.

Actually, we can get a precise result: 0.25xy0. If 1>x=y0, then xy=x(1y)=x(1x)=(x0.5)2+0.25, hence 0.25xy0. □

• (A5) If 1x>0, then x0=x.

##### Proof.

If 1x>0, let y=0, then xy=x(1y), hence x0=x. □

### 3.5.Modified definition of variable degrees of justification

The revised idea for the problem case of undercutters is that the degree of justification of node P equals the minimum of the strength of reason after being diminished and the degrees of justification of its premises. Then the computation can be modified as follows: (DJ1) If P has P-independent defeaters D1,,Dk in G and has no P-dependent defeaters, then J(P,G)=min{(ρmax{J(D1,G),,J(Dk,G)}),J(B1,G),,J(Bn,G)}.

We next discuss the case where a node P is defeated by both P-dependent defeaters and P-independent defeaters. We propose that these two kinds of defeaters can unite to defeat node P with a double counting, but computing it with P-independent defeaters firstly and then continue to compute it with P-dependent defeaters. The final computation can be modified as follows:

#### Definition 18(Variable degrees of justification).

If P is inferred from the basis {B1,,Bn} in an inference-graph G in accordance with a reason of strength ρ, D1,,Dk are the P-independent defeaters for P, and Dk+1,,Dm are the P-dependent defeaters of P, then J(P,G)=min{(ρmax{J(D1,G),,J(Dk,G)}),J(B1,G),,J(Bn,G)}max{J(Dk+1,GP),,J(Dm,GP)}.

For instance, in Fig. 5, node ¬S is S-dependent, node S is ¬S-dependent and node QS is S-independent. Let J(P,G)=0.15, J(Q,S)=J(R,G)=0.8 and the reasons are equally strong: ρ=0.9. Then J(QS,G)=0.8, ρJ(QS,G)=0.18, J(¬S,GS)=0.15, J(S,G)=min{ρJ(QS,G),J(Q,G)}J(¬S,GS)=0.180.15=0.153, and J(S,GS)=0.18, J(¬S,G)=min{ρ,J(P,G)}J(S,G¬S)=0.150.18=0.

##### Fig. 5.

Inference graph of Collective defeaters.

### 3.6.Solution to the problem cases

We now show that the new definition avoids the arguably counterintuitive outcomes we described above. We do this by analyzing the example of presumptive defeat, which includes the problem case of diminishers. Consider again the example in Fig. 3. In the multiple-assignment semantics of Definition 5, ¬Q has the ability to support ¬S if ¬Q is assigned undefeated in the partial status assignment and ¬Q has no ability to support S if ¬Q is assigned defeated in the other partial status assignment. In critical-link semantics with Pollock’s definition of ∽, we explained above that Q, ¬Q, and hence ¬S, are all defeated, and then S is undefeated. With our new definition of ∽ the outcome is different. For simplicity, we again assume that the strengths of reasons are at least as great as the degrees of justification of the initial node. Then the computation of J(¬S,G) can be concluded as follows: J(¬S,G)=min{ρ,J(¬Q,G)}J(S,G¬S)=J(¬Q,G)J(A,G)=(J(P,G)J(R,G))J(A,G).

We discuss the possible degrees of justification of ¬Q and ¬S. ¬Q has ability to support ¬S iff J(P,G)J(R,G). Hence, J(¬S,G)>0 iff ¬Q has ability to support ¬S and J(P,G)(1J(R,G))J(A,G). Otherwise, J(¬S,G)=0. For instance, let J(P,G)=J(R,G)=0.8, J(A,G)=0.1 and the reason-strengths are equally strong: ρ=0.9, then J(¬Q,G)=min{ρ,J(P,G)}J(Q,G¬Q)=J(P,G)J(R,G)=0.16; J(Q,G)=min{ρ,J(R,G)}J(¬Q,GQ)=J(R,G)J(P,G)=0.16; J(¬S,G)=min{ρ,J(¬Q,G)}J(S,G¬S)=J(¬Q,G)J(A,G)=0.144.

Apparently, ¬Q has the power to support ¬S and ¬S therefore has the ability to defeat or support another nodes. Moreover, if we let J(P,G)<J(R,G) or J(P,G)(1J(R,G))<J(A,G), the degree of justification of ¬S equals 0.

## 4.The new semantics applied to the ASPIC+ framework

The idea of critical-link semantics with variable degrees of justification is a general theory and can be applied in other argumentation formalisms as well. In this section, we discuss how the new semantics can be combined with the ASPIC+ argumentation framework. This framework [9,10,1618] has been shown to capture a number of other approaches to structured argumentation, such as assumption-based argumentation [3], forms of classical argumentation [6] and Carneades [5]. Therefore, a discussion of how the above ideas can be incorporated in ASPIC+ arguably increases the generality of the present contributions. It should be noted, however, that in the present section we modify ASPIC+’s semantics, by replacing its Dung-based semantics with a semantics that allows for variable degrees of justification.

The ASPIC+ framework is like Pollock’s approach based on the general idea that arguments are constructed by chaining reasons into trees and it also assumes both deductive and defeasible reasons (unlike in Pollock’s work, ASPIC+ also allows for premise attack). However, ASPIC+ does not define the notion of an inference graph but defines a set of arguments plus binary relations of attack and defeat, where defeat is a subset of attack by applying a preference relation between arguments to resolve attacks. Attack and defeat are thus not defined between argument lines but between arguments in their entirety. In essence, an argument A attacks/defeats an argument B if it directly attacks/defeats the last step of some subargument B of B (where direct attack and defeat are defined as above for argument lines). The main technical problem then is to modify the above definitions by taking only the direct attackers/defeaters of an argument into account when computing the argument’s degree of justification.

We now sketch how this can be done, where we assume that the degree of justification of one argument equals the degree of justification of its conclusion. Firstly, we introduce the ASPIC+ framework with variable degrees of justification.

### 4.1.ASPIC+ framework with variable degrees

The ASPIC+ framework assumes an unspecified logical language L with a binary contrariness relation and defines arguments as inference trees formed by applying strict or defeasible inference rules of the form φ1,,φnφ and φ1,,φnφ, where φ1,,φn are the antecedents and φ the consequent φ of the rule. The framework applies to any set of strict and defeasible inference rules formulated over L. The inference rules can be used to express domain-specific knowledge but also to capture general patterns of reasoning.

Informally, that an inference rule is strict means that if its antecedents are accepted, then its consequent must be accepted no matter what, while that an inference rule is defeasible means that if its antecedents are accepted, then its consequent must be accepted if there are no good reasons not to accept it. In other words, if an inference rule is strict, then it is rationally impossible to accept its antecedents while refusing to accept its consequent, while if an inference rule is defeasible, it is rationally possible to accept its antecedents but not its consequent.

We now present a modified definition of ASPIC+’s notion of an argumentation system,2 allowing for degrees of strengths of inference rules. We assign real number 1 to the strength of strict inference rules and assume that the defeasible inference rules have a strength with which is any real number belonging to [0,1).

#### Definition 19(Argumentation system).

An argumentation system AS is a tuple AS=(L,,R,ν,n) where

• L is a logical language.

• is a function from L to 2L, such that:

• φ is a contrary of ψ, if φψ, ψφ;

• φ is a contradictory of ψ (denoted by ‘φ=ψ’), if φψ, ψφ;

• each φL has at least one contradictory.

• R=RsRd is a set of strict (Rs) and defeasible (Rd) inference rules, such that RsRd=;

• ν is a function that assigns the degree of support from antecedent to consequent in a strict or defeasible inference, modeled as: ν(δ):δ[0,1], where δR and ν(δ0)=1, if δ0Rs;

• n:RdL is a naming convention for defeasible rules.

Arguments are constructed from a knowledge base KB, which consists of well-formed formulas to which a strength is assigned.

#### Definition 20(Knowledge base).

A knowledge base KB in an argumentation system (L,,R,ν,n) is a pair (K,η) where

• KL consisting of two disjoint subsets Kn (the axioms) and Kp (the ordinary premises);

• η is a function that assigns degrees of acceptability to elements of the knowledge base, modeled as η(A):A[0,1], where AK and η(A0)=1, if A0Kn.

Arguments can be constructed step-by-step by chaining inference rules into directed acyclic graphs. Arguments thus contain subarguments, which are the structures that support intermediate conclusions (plus the argument itself and its premises as limiting cases). In what follows, for a given argument Prem returns A’s premises, Conc returns A’s conclusion, Sub returns all of A’s sub-arguments, Rules returns all rules in A, and TopRule(A) returns the last rule applied in A.

#### Definition 21(Argument).

An argument A on the basis of a knowledge base (K,η) in an argumentation (L,,R,ν,n) is:

• φ if φK with: Prem(A)={φ}; Conc(A)=φ; Sub(A)={φ}; Rules(A) = .

• A1,,An/ψ if A1,,An are arguments such that there exists a strict/defeasible rule Conc(A1),,Conc(An)/ψ in Rd/Rs.

• Prem(A)=Prem(A1)Prem(An);

• Conc(A)=ψ;

• Sub(A)=Sub(A1)Sub(An){A};

• Rules(A)=Rules(A1)Rules(An){Conc(A1),,Conc(An)/ψ};

• DefRules(A)={r|rRules(A),rRd};

• Toprule(A)={Conc(A1),,Conc(An)/ψ}.

An argument is strict if all its inference rules are strict and defeasible otherwise, and it is firm if all its premises are in Kn and plausible otherwise. Next, we define the computation strength of arguments in accordance with Pollock’s analysis on argument-strengths in [12].

#### Definition 22(Argument strength).

V is a function to evaluate the strength of an argument with conditions as follows:

• if AK, then V(A)=η(A);

• if A is the form A1,,An/ψ, then V(A)=min{V(A1),,V(An),v(n(Conc(A1),,Conc(An)/ψ))}.

#### Definition 23(Maximal proper subargument).

Argument A is a maximal proper subargument of B iff A is a subargument of B and there does not exist any proper subargument C of B such that A is a proper subargument of C.

#### Definition 24(Argumentation theories).

An argumentation theory is a triple AT=(AS,KB,V) where AS is an argumentation system, KB is a knowledge base in AS and V is the strength of every argument on the basis of KB in AS.

Arguments can be attacked in three ways: attacking a conclusion of a defeasible inference, attacking the defeasible inference itself, or attacking a premise.

#### Definition 25(ASPIC+ attacks).

A attacks B iff A undercuts, rebuts or undermines B, where:

• A undercuts argument B (on B) iff Conc(A)n(r) for some BSub(B) with defeasible top rule r.

• A rebuts argument B (on B) iff Conc(A)=φ for some BSub(B) of the form B1,,Bnφ.

• Argument A undermines B (on B) iff Conc(A)=φ for some B = φ, φPrem(B)Kp.

We next give some new definitions that are useful in our modification of ASPIC+.

#### Definition 26(Direct attacks).

Argument A directly attacks argument B iff A rebuts or undercuts or undermines B on B; Otherwise A indirectly attacks B.

##### Corollary 1.

Argument A directly attacks argument B iff

• (1) Conc(A)=Conc(B), where B is not an atomic argument; or

• (2) Conc(A)=φ, where φPrem(B)Kp and B is an atomic argument; or

• (3) Conc(A)=r for TopRule(B)=r and r is defeasible.

We further say that (1) A directly rebuts B or A is the direct rebutter of B iff they satisfy the first condition, (2) A directly undermines B or A is the direct underminer of B iff they satisfy the second condition, and (3) A directly undercuts B or A is the direct undercutter of B iff they satisfy the third condition.

In all previous publications on the ASPIC+ framework the definition of attack was combined with a preference ordering on arguments to yield a notion of defeat. Then the semantics was defined by regarding the set of all arguments that can be constructed plus the defeat relation as an abstract argumentation framework in the sense of [2].

Thus any semantics can be applied to arguments in an ASPIC+ framework and it can also be used to define the degrees of justification of arguments and their conclusions after it’s extended with gradual degrees. We will not link the semantics of ASPIC+’s argumentation theories with gradual values to Dung’s theory, but instead of a gradual graph with two kinds of links.

##### Fig. 6.

Presumptive defeat.

### 4.2.Modifying the ASPIC+ framework with variable degrees of justification

Next we will discuss the computation of degrees of justification in ASPIC+, using the new notion of an argument graph. We regard the degree of justification of an argument as the variable degree for accepting or rejecting the argument from a cognitive perspective. We further assume that the degree of justification of one argument equals the degree of justification of its conclusion.

##### Definition 27.

An argument graph G is a labeled, finite, directed graph, consisting of argument nodes and attacking links indicating attacking relationships between argument nodes and proper subargument links indicating connecting subargument relationships between an argument and its proper superarguments.

The attacking links relate their roots to their targets and the root of an attacking link is an attacker in the graph, while the proper subargument links relate their roots to their targets and the root is the proper subargument of its target or the target is the proper superargument of its root in graph. In the diagrams of argument graphs, arguments are displayed as dots, attacking links are indicated using ordinary arrowheads, while proper subargument links are indicated using closed-dot arrowheads. The initial arguments in G can be defined as follows:

##### Definition 28.

An argument is initial in G iff it is not the target of any attacking link or proper subargument link.

##### Example 1.

Consider and Pollock’s inference graph in Fig. 3. We assume arguments in ASPIC+ framework as B=[B1¬S]; B1=[B2¬Q]; B2=[P]; C=[C1Q]; C1=[R]; D=[D1S]; D1=[A]. We show the arguments in Fig. 6. Note that C directly rebuts B1 and indirectly rebuts B, B directly rebuts D. Moreover, nodes B2, C1 and D1 are initial arguments.

##### Definition 29.

An argument path P(A,B) from argument A to argument B in graph G is a sequence of attacking links and proper subargument links L1,,Ln, such that there exist arguments B1,,Bn1 with L1=(A,B1), Li+1=(Bi,Bi+1), and Ln=(Bn1,B), where (A,B) means the attacking link or proper subargument link from node A to node B.

For instance, in Fig. 6, P(D1,B)=(D1,D),(D,B1) and P(C1,B)=(C1,C),(C,B1),(B1,B).

##### Definition 30.

An argument-path is a circular path from an argument A to itself iff there exists an argument path P(A,A). Moreover, (1) An argument path is an even cycle iff the argument path is a circular path and the length n=2k. (2) An argument path is an odd cycle iff the argument path is a circular path and the length n=2k+1.

For instance, in Fig. 6, P(D,D)=(D,B),(B,D) and P(C,C)=(C,B1),(B1,C) are even cycles.

##### Definition 31.

Argument A is in a circular path from an argument B to B itself iff there exists at least one circular path from argument B to B itself containing argument A.

For instance, let P(A,A)=(A,B),(B,C),(C,D),(D,A), where (A,B) and (C,D) are attack links, (B,C) and (D,A) are proper subargument links. Then C is in the circular path P(A,A) from A to A.

Next we will make our approach simpler than Pollock’s by defining the notions of a basic set and its extension instead of the notions of node-dependent and node-critical links.

##### Definition 32.

The notions of basic set and critical extension can be defined as follows:

• 1. A set of attack links is a basic set of argument A in graph G iff removing all members of the set suffices to cut all cycles from A to A.

• 2. A set of attack links is a critical extension of argument A in graph G iff it is a minimum basic set of argument of A in graph G.

##### Proposition 1.

For any argument A in a circular path, there exists at least one basic set of A.

##### Proof.

Suppose for contradiction that there is no basic set of argument A. If there is no basic set of argument A, then there does not exist any link set such that removing all members suffices to cut the circular paths from A to A. But clearly removing all members of the set containing all links in the path can cut the circular paths. Contradiction. □

##### Corollary 2.

For any attack link L in a circular path P, there exists at least one critical extension containing L.

##### Proof.

Suppose for contradiction that there exists at least one critical extension containing L. If there is no critical extension containing L, then there is no basic set, contradicting Proposition 1. □

##### Corollary 3.

If an attack link does not occur on any circular path, then it does not belong to any critical extension.

##### Proof.

It is equivalent to prove that if an attack link belongs to a critical extension, then it occurs on a circular path. Assume attack link L belongs to a critical extension and it does not occur on any circular path, by definition 32, then there does not exist basic set, hence there is no critical extension contains L. Contradiction. □

##### Definition 33.

Given a graph G, the new graph GA is the argument-graph that results from removing all members in all critical extensions in graph G and making all arguments B1,,Bn which are not in a defeat cycle initial with J(Bi,GA)=J(Bi,G).

Note that Pollock only has two kinds of defeaters, namely rebuttals (attacking a conclusion) and undercutters (attacking an inference rule), so there is no computation for the defeater on premises. However, in ASPIC+, a third way of argument attacking, namely premise attack or “undermining” has been added. So we add a calculation for the arguments which are attacked by underminers. The new computation for the degrees of justification of arguments in a new argument graph can be defined as follows:

##### Definition 34.

The computation of Justification (JC) can be defined as follows:

• (1) If argument A is initial in G, J(A,G)=V(A).

• (2) If argument A is initial in GA, and B1,,Bn are the direct underminers of A, then J(A,G)=J(A,GA)max{J(B1,GA),,J(Bn,GA)}.

• (3) If argument A is not initial in G and GA, and A1,,An are the maximal proper subarguments of A, and v(r)=ρ is the strength of Toprule(A)=r. B1,,Bi are the direct undercutters of A and Bi+1,,Bm are the direct rebutters of A in a circular path P(A,A), then J(A,G)=min{(ρmax{J(B1,G),,J(Bi,G)}),J(A1,G),,J(An,G)}max{J(Bi+1,GA),,J(Bm,GA)}.

We define xy=x(1y), if 0yx1, otherwise, xy=0 and max{}=0. The computation JC is for arguments attacked both by direct undercutters, direct rebuttals and direct underminers in cycles. JC(3) unites and double counts the computation for arguments only attacked by direct undercutters which are not in cycles and the computation for arguments only attacked by direct rebuttals.

##### Example 2.

We assume the arguments in Fig. 7 as A1=[q], B1=[p], B=[B1¬q] with DefRules(B)={d1:p¬q}, A=[A1s] with DefRules(A)={d2:qs}, C=[E¬n(qs)] with DefRules(C)={d3:r¬n(qs)}, D=[¬s], E=[r]. We show the degrees of justification of these arguments as follows:

• B1 and E are initial arguments in G, then from JC(1), we have J(B1,G)=V(B1)=η(p) and J(E,G)=V(E)=η(r).

• B directly undermines A1 and A1 is initial in GA, A directly undermines D and D is initial in GD, then from JC(2), we have J(A1,G)=J(A1,GA1)J(B,GA1) and J(D,G)=J(D,GD)J(A,GD).

• A1 directly rebuts B and B is not initial in G and GB, then from JC(3), we have J(B,G)=min{ρ(d1),J(B1,G)}J(A1,GB).

• D directly rebuts A and C directly undercuts A, then from JC(3), we have J(A,G)=min{(ρ(d2)J(C,G)),J(A1,G)}J(D,GA).

• C is free from attacking, so J(C,G)=min{ρ(d3),J(E,G)}.

### Example 3(Example 1 continued).

(JC) can also be illustrated with real values. We consider the arguments in Example 1. Let η(P)=η(R)=0.8, η(A)=0.1 and the reasons are equally strong: ρ=0.9. From JC(1), it follows J(B2,G)=J(C1,G)=0.8 and J(D1,G)=0.1 It’s easy to have that C directly rebuts B1, then from JC(3), it follows J(B1,G)=min{ρ,J(B2,G)}J(C,GB1)=J(B2,G)J(C1,G)=0.16; We also have B directly rebuts D, then from JC(3), it follows J(B,G)=min{ρ,J(B1,G)}J(C,GB)=J(B1,G)J(D1,G)=0.144; Similar, J(B,GD)=0.16; J(D,G)=min{ρ,J(D1,G)}J(B,GD)=J(D1,G)J(B,GD)=0.

## 5.Conclusion

In this paper we studied the modelling of variable degrees of justification in argumentation. We pointed out some arguably counter-intuitive consequences of Pollock’s critical-link semantics with variable degrees of justification and then presented some modifications that avoid these outcomes. Moreover, to illustrate the generality of Pollock’ approach and our modifications, we also discussed how they can be combined with the ASPIC+ framework. In future work we aim to investigate the properties of our definitions and to study their application to realistic examples, including problems of legal reasoning with evidence.

##### Fig. 7.

Collaborative defeat.

While our contributions in this paper still need to be further developed in these and other ways, we hope we have contributed to the study of an important but often neglected aspect of natural argumentation. In most current approaches, the justification status of arguments and conclusions is an all-or-nothing affair, but in many realistic applications, such as legal reasoning about evidence or other applications of epistemic reasoning, it is natural to regard arguments or conclusions as justified to variable degrees.

## Notes

1 Pollock added the mathematical analysis in his extended version of [12], see http://johnpollock.us/ftp/PAPERS/Degrees.pdf.

2 In fact, we consider the special case where ASPIC+’s contrariness function over L corresponds to negation.

## Acknowledgements

We thank the anonymous reviewers for their useful comments on the earlier versions of this paper. Bin Wei was supported by the Humanity and Social Science Youth foundation of Ministry of Education of China (15YJCZH182), the Chinese MOE Project of Key Research Institute of Humanities and Social Sciences at Universities (15JJD720014) and by the Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJ1500103).

## References

 [1] P. Baroni and M. Giacomin, Solving semantic problems with odd-length cycles in argumentation, in: Proceedings of the 7th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, Springer-Verlag, 2003, pp. 440–451. doi:10.1007/978-3-540-45062-7_36. [2] P.M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games, Artificial Intelligence 77 (1995), 321–377. doi:10.1016/0004-3702(94)00041-x. [3] P.M. Dung, P. Mancarella and F. Toni, Computing ideal sceptical argumentation, Artificial Intelligence 171 (2007), 642–674. doi:10.1016/j.artint.2007.05.003. [4] A. Garcia and G. Simari, Defeasible logic programming: An argumentative approach, Theory and Practice of Logic Programming 4 (2004), 95–138. doi:10.1017/s1471068403001674. [5] T.F. Gordon, H. Prakken and D.N. Walton, The Carneades model of argument and burden of proof, Artificial Intelligence 171 (2007), 875–896. doi:10.1016/j.artint.2007.04.010. [6] N. Gorogiannis and A. Hunter, Instantiating abstract argumentation with classical-logic arguments: Postulates and properties, Artificial Intelligence 175 (2011), 1479–1497. doi:10.1016/j.artint.2010.12.003. [7] H. Jakobovits and D. Vermeir, Robust semantics for argumentation frameworks, Journal of Logic and Computation 9 (1999), 215–261. doi:10.1093/logcom/9.2.215. [8] D. Makinson and K. Schlechta, Floating conclusions and zombie paths, Artificial Intelligence 48 (1991), 199–209. doi:10.1016/0004-3702(91)90061-n. [9] S. Modgil and H. Prakken, A general account of argumentation with preferences, Artificial Intelligence 195 (2013), 361–397. doi:10.1016/j.artint.2012.10.008. [10] S.J. Modgil and H. Prakken, Revisiting preferences and argumentation, in: Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011), 2011, pp. 1021–1026. [11] J.L. Pollock, Defeasible reasoning, Cognitive Science 11 (1987), 481–518. doi:10.1207/s15516709cog1104_4. [12] J.L. Pollock, Defeasible reasoning with variable degrees of justification, Artificial Intelligence 133 (2002), 233–282. doi:10.1016/s0004-3702(01)00145-x. [13] J.L. Pollock, A recursive semantics for defeasible reasoning, in: Argumentation in Artificial Intelligence, I. Rahwan and G. Simari, eds, Springer, Berlin, 2009, pp. 173–197. doi:10.1007/978-0-387-98197-0_9. [14] J.L. Pollock, Defeasible reasoning and degrees of justification, Argument and Computation 1(1) (2010), 7–22. doi:10.1080/19462161003728921. [15] J.L. Pollock, Cognitive Carpentry: A Blueprint for How to Build a Person, MIT Press, Cambridge, MA, 1995. [16] H. Prakken, An abstract framework for argumentation with structured arguments, Argument and Computation 1(2) (2010), 93–124. doi:10.1080/19462160903564592. [17] B. van Gijzel and H. Prakken, Relating Carneades with abstract argumentation via the ASPIC+ framework for structured argumentation, Argument and Computation 3(1) (2012), 21–47. doi:10.1080/19462166.2012.661766. [18] B. van Gijzel and H. Prakken, Relating Carneades with abstract argumentation, in: Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011), 2011, pp. 1113–1119.