This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Collective Argumentation: The Case of Aggregating Support-Relations of Bipolar Argumentation Frameworks

Weiwei Chen Institute of Logic and Cognition and Department of Philosophy
Sun Yat-sen University
Guangzhou, China [email protected]
Abstract

In many real-life situations that involve exchanges of arguments, individuals may differ on their assessment of which supports between the arguments are in fact justified, i.e., they put forward different support-relations. When confronted with such situations, we may wish to aggregate individuals’ argumentation views on support-relations into a collective view, which is acceptable to the group. In this paper, we assume that under bipolar argumentation frameworks, individuals are equipped with a set of arguments and a set of attacks between arguments, but with possibly different support-relations. Using the methodology in social choice theory, we analyze what semantic properties of bipolar argumentation frameworks can be preserved by aggregation rules during the aggregation of support-relations.

1 Introduction

The attack relation has played a significant role in formal argumentation [3, 12, 24]. However, recent years have seen a revived interest in the support relation between arguments in argumentation systems [5, 6, 7, 8, 27]. In these systems, an argument can not only attack another argument, but it can also support another one. For example, an argument can support another argument by confirming its premise or undermining one of its attackers. The support relation between arguments is vital in modeling debates in real life. Due to the incompleteness of information, or different positions, agents may have different opinions regarding the support relation between arguments. To see this, consider the following example:

Example 1.1.

Consider a debate regarding the possible influence of artificial intelligence (AI) to the job market. Suppose that there are two arguments in this debate:

AA: Artificial intelligence improves the degree of work automation

BB: More people will lose their jobs due to AI

Given the fact that AI is able to perform more of the tasks done by humans, some occupations will decrease. Therefore, some people hold that argument AA supports argument BB. On the other hand, given that AI will improve the quality of the work being done by humans, lower the prices of goods and services, create economic advantages, and allow for the creation of new jobs in new occupations, some people hold that argument AA does not support argument BB.

In many scenarios, such as court debate, parliament debate, policy advisory committee decision-making, agents may have different opinions on which supports between arguments are acceptable, which form argumentative stances of them. When a group of agents are engaged in a debate, we may wish to aggregate stances possessed by agents to obtain a collective decision agreed on by the group. To model the support relation between arguments, we consider the bipolar argumentation framework (BAF) [6, 7, 8], a formalism of Dung’s abstract argumentation framework [12]. Given that there is a broad discussion of the aggregation of argumentation systems with the attack relation [11, 26, 13, 10], it is far from being clear what consensuses can be achieved when the support relation is involved in this process. The goal of this paper is to investigate the aggregation of views of a group of agents in the context of bipolar argumentation. Given a set of arguments and a set of attack-relations between these arguments, agents might conflict with one another upon supports between arguments, i.e., for every pair of arguments that is being considered in a debate whether the first supports the second. In this scenario, we may wish to aggregate such support-relations.

In this paper, we use the method from graph aggregation, a recent discipline of social choice theory that deals with aggregating several graphs into a single output graph that constitutes a good compromise. Following the model introduced by Chen and Endriss [10], we consider the preservation of properties of bipolar argumentation frameworks, i.e., given a property that is satisfied by individual BAFs, we study whether it can be satisfied in the BAF returned by aggregation rules. For some properties, we show that there is an aggregation rule or a family of aggregation rules preserve them. For some others, we show that any aggregation rule that satisfies certain basic axioms and preserves them must be a dictatorship.

Paper overview

The rest of the paper is organized as follows. In Section 2, we recapitulate the bipolar argumentation framework, along with its semantics. We introduce our model for the aggregation of support-relations of bipolar argumentation frameworks in Section 3, followed by our results of preservation in Section 4. In Section 5, we introduce some work related to our work. Finally, in Section 6, we conclude this work and point out some directions for future work.

2 Bipolar argumentation

An abstract bipolar argumentation framework [6, 7, 8] is an extension of Dung’s abstract argumentation framework [12] in which a general support relation between arguments is added. Formally, an abstract bipolar argumentation framework is a triple Arg,,\langle\text{\it Arg},\rightharpoonup,\rightsquigarrow\rangle, where Arg is a set of arguments, \rightharpoonup is a binary relation on Arg, which is called the attack relation, \rightsquigarrow is a binary relation on Arg, which is called the support relation. Given two arguments A,BArgA,B\in\text{\it Arg}, if ABA\rightharpoonup B holds, then we say that AA attacks BB, if ABA\rightsquigarrow B, then we say that AA supports BB. The attack relation and the support relation must verify the following consistency constraint: =\rightharpoonup\cap\rightsquigarrow=\emptyset, which is called essential constraint.

Definition 2.2.

Let A,BArgA,B\in\text{\it Arg}, there is a sequence of supports for BB by AA iff there exists a sequence of elements (A_1,,A_n)(A_{\_}1,\ldots,A_{\_}n) of Arg such that n2,A=A_1,B=A_n,A_1A_2,,A_n1A_nn\geqslant 2,A=A_{\_}1,B=A_{\_}n,A_{\_}1\rightsquigarrow A_{\_}2,\ldots,A_{\_}{n-1}\rightsquigarrow A_{\_}n.

Definition 2.3.

Let A,BArgA,B\in\text{\it Arg}, a supported attack against BB by AA is a sequence of arguments (A_1,,A_n)(A_{\_}1,\ldots,A_{\_}n) of Arg such that A_1,,A_n1A_{\_}1\rightsquigarrow,\ldots,\rightsquigarrow A_{\_}{n-1}, A_n1A_nA_{\_}{n-1}\rightharpoonup A_{\_}n, A=A_1A=A_{\_}1, A_n=BA_{\_}n=B, and n3n\geqslant 3.

Note that if ABA\rightharpoonup B is the case, then we say that AA directly attacks BB.

Definition 2.4.

A secondary attack against an argument BB by an argument AA is a sequence (A_1,,A_n)(A_{\_}1,\ldots,A_{\_}n) of arguments of Arg such that A_1A_2A_{\_}1\rightharpoonup A_{\_}2, A_2,A_nA_{\_}2\rightsquigarrow\ldots,\rightsquigarrow A_{\_}n, A=A_1A=A_{\_}1, A_n=BA_{\_}n=B, and n2n\geqslant 2.

For example, in Figure 1, A_1A_{\_}1 supported attacks E_1E_{\_}1, while A_2A_{\_}2 secondary attacks E_2E_{\_}2.

A_1A_{\_}1B_1B_{\_}1C_1C_{\_}1D_1D_{\_}1E_1E_{\_}1
Supported attack
A_2A_{\_}2B_2B_{\_}2C_2C_{\_}2D_2D_{\_}2E_2E_{\_}2
Secondary attack

Figure 1: Illustration of supported attack and secondary attack
Definition 2.5.

Let ΔArg\Delta\subseteq\text{\it Arg} and AArgA\in\text{\it Arg}. Δ\Delta set-attacks AA iff there exists a supported attack or a secondary attack against AA from an element of Δ\Delta. Δ\Delta set-supports AA iff there exists a sequence of supports for AA from an element of Δ\Delta.

Definition 2.6.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is conflict-free iff A,BΔ\nexists A,B\in\Delta such that {A}\{A\} set-attacks BB.

Definition 2.7.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is safe iff BArg\nexists B\in\text{\it Arg} such that Δ\Delta set-attacks BB and either Δ\Delta set-supports BB, or BΔB\in\Delta.

In the context of bipolar argumentation, admissibility can be translated into d-admissibility, s-admissibility and c-admissibility, based on different lines of coherence. In the following definition, the notion of defense is the same as classical defense, namely, we say ΔArg\Delta\subseteq\text{\it Arg} defends the argument BArgB\in\text{\it Arg}, then, there is an argument CΔC\in\Delta with CAC\rightharpoonup A for all arguments AArgA\in\text{\it Arg} such that ABA\rightharpoonup B.

Definition 2.8.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is called d-admissible iff Δ\Delta is conflict-free and defends all its elements; Δ\Delta is a d-preferred extension if it is maximal (w.r.t. set-inclusion) among all d-admissible sets.

Definition 2.9.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is called s-admissible iff Δ\Delta is safe and defends all its elements; Δ\Delta is a s-preferred extension if it is maximal (w.r.t. set-inclusion) among all s-admissible sets.

Let the closure of ΔArg\Delta\subseteq\text{\it Arg} be CL(Δ)={AArgthere is a sequence of supports from BΔ to A}\text{\rm CL}(\Delta)=\{A\in\text{\it Arg}\mid\text{there is a sequence of supports from }B\in\Delta\text{ to }A\}, we say Δ\Delta is closed iff Δ=CL(Δ)\Delta=\text{\rm CL}(\Delta).

Definition 2.10.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is called c-admissible iff Δ\Delta is conflict-free, self-defending and closed; Δ\Delta is a c-preferred extension if it is maximal (w.r.t. set-inclusion) among all c-admissible sets.

We restate a proposition in [6] that demonstrates the relation between safety and conflict-freeness.

Proposition 2.11.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, if Δ\Delta is safe, then Δ\Delta is conflict-free. If Δ\Delta is conflict-free and closed, then Δ\Delta is safe.

Definition 2.12.

Let ΔArg\Delta\subseteq\text{\it Arg} be a set of arguments, Δ\Delta is stable if and only if Δ\Delta is conflict-free and for every argument AArg\ΔA\in\text{\it Arg}\backslash\Delta, Δ\Delta set-attacks AA.

It is worth mentioning that in the original papers, [6, 7] consider a particular set of BAFs, namly acyclic BAFs, showing that such BAFs have some nice features. However, in this paper, we foucs on BAFs that are more general, i.e., we remove the restriction on BAFs and consider both acyclic and cyclic BAFs. From a technical point of view, the BAFs that are acyclic have only one stable extension, which is the only preferred extension as well, while the BAFs with cycles could have more than one stable extension and will be more general.

There are several interpretations of support in the literature, including the deductive support, the necessary support, and the evidential support (see an overview in [8]). The deductive support [5] is intended to capture the intuition that given two arguments AA and BB, if AA supports BB, then the acceptance of AA implies the acceptance of BB. The necessary support [20, 21] is intended to capture the intuition that if ABA\rightsquigarrow B is the case, then the the acceptance of BB implies the acceptance of AA, i.e., the acceptance of AA is necessary to obtain the acceptance of BB. Finally, the evidential support [23, 22] proposes a new type of argument, namely prima-facie arguments. Every standard argument is supposed to be supported by at least one prima-facie argument, and every prima-facie argument does not require support from other arguments.

The supported attack is connected with deductive support. To see this, let us come back to Figure 1, according to the deductive support, the acceptance of A_1A_{\_}1 implies the acceptance of B_1B_{\_}1, and so the acceptance of C_1C_{\_}1, the acceptance of D_1D_{\_}1. In the meantime, the acceptance of D_1D_{\_}1 implies the non-acceptance of E_1E_{\_}1. Thus, the acceptance of A_1A_{\_}1 implies the non-acceptance of E_1E_{\_}1. The necessary support can be taken into account by considering secondary attack. We again consider Figure 1. First, the acceptance of A_2A_{\_}2 implies the non-acceptance of B_2B_{\_}2. Then, according to necessary support, the non-acceptance of B_2B_{\_}2 implies the non-acceptance of C_2C_{\_}2, and so the non-acceptance of D_2D_{\_}2, the non-acceptance of E_2E_{\_}2. Thus, the acceptance of A_2A_{\_}2 implies the non-acceptance of E_2E_{\_}2.

3 The model

Fix a finite set Arg of arguments, a set ()(\rightharpoonup) of attacks between arguments, and a set N={1,,n}N=\{1,\ldots,n\} of nn agents. Each agent iNi\in N supplies us with a set of supports _i\rightsquigarrow_{\_}i, which together with Arg and ()(\rightharpoonup) gives rise to a bipolar argumentation framework Arg,,_i\langle\text{\it Arg},\rightharpoonup,\rightsquigarrow_{\_}i\rangle, reflecting her individual views on which supports between arguments are acceptable. A profile of support-relations =(_1,,_n){\bm{\rightsquigarrow}}=(\rightsquigarrow_{\_}1,\ldots,\rightsquigarrow_{\_}n) is a set of support-relations provided by agents. An aggregation rule F:(2Arg×Arg)n2Arg×ArgF:(2^{\text{\it Arg}\times\text{\it Arg}})^{n}\to 2^{\text{\it Arg}\times\text{\it Arg}} is a function that maps a given profile of support-relations into a single support-relation. We denote N_supN_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}} by the set of agents who accept sup under profile {\bm{\rightsquigarrow}}, i.e., N_sup={iNsup_i}N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}}=\{i\in N\mid\text{\it sup}\in\rightsquigarrow_{\_}i\}, and #N_sup\#N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}} denotes the number of such agents.

Here we define desirable properties of aggregation rules. These properties are referred as axioms in the social choice literature. We start with formal definitions, followed by informal descriptions.

Definition 3.13.

An aggregation rule FF is unanimous if _1_nF()\rightsquigarrow_{\_}1\cap\ldots\cap\rightsquigarrow_{\_}n\subseteq F({\bm{\rightsquigarrow}}).

Definition 3.14.

An aggregation rule FF is grounded if F()_1_nF({\bm{\rightsquigarrow}})\subseteq\rightsquigarrow_{\_}1\cup\ldots\cup\rightsquigarrow_{\_}n.

Definition 3.15.

An aggregation rule FF is neutral if for any profile of support-relations {\bm{\rightsquigarrow}}, for any pair of supports sup_1\text{\it sup}_{\_}1, sup_2\text{\it sup}_{\_}2, N_sup_1=N_sup_2N_{\_}{\text{\it sup}_{\_}1}^{{\bm{\rightsquigarrow}}}=N_{\_}{\text{\it sup}_{\_}2}^{{\bm{\rightsquigarrow}}} then sup_1F()\text{\it sup}_{\_}1\in F({\bm{\rightsquigarrow}}) iff sup_2F()\text{\it sup}_{\_}2\in F({\bm{\rightsquigarrow}}).

Definition 3.16.

An aggregation rule FF is independent if for any pair of profiles of support-relations _1{\bm{\rightsquigarrow}}_{\_}1, _2{\bm{\rightsquigarrow}}_{\_}2, for any support sup, N_sup_1=N_sup_2N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}_{\_}1}=N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}_{\_}2} then supF(_1)\text{\it sup}\in F({\bm{\rightsquigarrow}}_{\_}1) iff supF(_2)\text{\it sup}\in F({\bm{\rightsquigarrow}}_{\_}2).

Definition 3.17.

An aggregation rule FF is dictatorial if there is an agent ii such that for any profile of support-relations ,F()=_i{\bm{\rightsquigarrow}},F({\bm{\rightsquigarrow}})=\rightsquigarrow_{\_}i.

The unanimity axiom states that the support agreed by all agents should be included in the collective BAF. The groundedness axiom expresses that all supports in the collective BAF should be supported by at least one agent. The neutrality axiom requires that given a profile of support-relations, any pair of supports should be treated equally in this profile. The independent axiom states that all support-relations should be treated equally in any profile of support-relations. The dictatorship axiom indicates that there is an agent who is dictatorial.

Definition 3.18.

The unanimity rule is an aggregation rule FF with F()={supArg×Argsup_1_n}F({\bm{\rightsquigarrow}})=\{\text{\it sup}\in\text{\it Arg}\times\text{\it Arg}\mid\text{\it sup}\in\rightsquigarrow_{\_}1\cap\ldots\cap\rightsquigarrow_{\_}n\}.

Definition 3.19.

Let iNi\in N be an agent, the dictatorship rule of individual ii is the aggregation rule with F()=_iF({\bm{\rightsquigarrow}})=\rightsquigarrow_{\_}i.

The unanimity rule only accepts those supports approved by all agents: it is a demanding aggregation rule. The dictatorships always return the supports submitted by dictators.

Example 3.20.

Suppose that there are three agents have to decide on the acceptance of supports between four arguments. Agent 1 supports ABA\rightsquigarrow B and BCB\rightsquigarrow C, agent 2 supports BCB\rightsquigarrow C and CDC\rightsquigarrow D, agent 3 supports ABA\rightsquigarrow B and CDC\rightsquigarrow D. We assume that the attack relation from DD to EE is accepted by all agents. The scenario is illustrated in Figure 2. If we apply the majority rule, then we obtain a bipolar argumentation framework consisting of the three supports ABA\rightsquigarrow B, BCB\rightsquigarrow C, and CDC\rightsquigarrow D.

AABBCCDDEE
Agent 1
AABBCCDDEE
Agent 2
AABBCCDDEE
Agent 3
AABBCCDDEE
F()F({\bm{\rightsquigarrow}})
Figure 2: Example for a profile with Arg={A,B,C,D,E}\text{\it Arg}=\{A,B,C,D,E\}

We observe that the set {A,E}\{A,E\} is conflict-free for all agents. However, it is not conflict-free in the outcome of the majority rule (which returns a set containing only the majoritarian supports) since AA supported attacks EE. So conflict-freeness as a semantic property is not preserved by the majority rule in this specific example.

But what about the preservation results of other semantic properties? Can they be preserved in general? Before going any further, we introduce more semantic properties of particular interest.

The problem we are considering in this paper is the preservation of semantic properties in the context of bipolar argumentation. Given a property P2Arg×ArgP\subseteq 2^{\text{\it Arg}\times\text{\it Arg}} that is a set of supports on Arg, and PP is satisfied by all agents, whether the output of the aggregation rule satisfies PP? A formal definition is as follows.

Definition 3.21.

An aggregation rule FF preserves a property PP if whenever for every profile {\bm{\rightsquigarrow}} we have that P(_i)P(\rightsquigarrow_{\_}i) for all iNi\in N, then we have P(F())P(F({\bm{\rightsquigarrow}})).

The problem of preservation is a special problem of collective rationality which has been discussed extensively in other parts of social choice, such as preference aggregation [2], judgment aggregation [17], graph aggregation [14], as well as attack aggregation in the context of abstract argumentation [4, 25, 10].

In the scenario where each agent possesses a BAF, agents might disagree on some details, such as whether a support between two arguments can be justified. Nevertheless, they may agree on some high-level features of BAFs. The essential constraint is an example of a high-level feature that requires no agent accepts both the attack relation and the support relation between a pair of arguments. When we observe that all agents verify such semantic feature, we would like to see what aggregation rule preserves this basic constraint under aggregation.

Given a set of arguments ΔArg\Delta\in\text{\it Arg} that is conflict-free in every agent’s bipolar argumentation framework, we may wish to preserve its conflict-freeness in the outcome. Therefore, conflict-freeness as a semantic property is of particular interest. Similar definition can be posed to the preservation of safety and admissibility. Recall that if a set of arguments Δ\Delta is conflict-free and closed, then Δ\Delta is safe (Proposition 2.11). Thus, the closedness is of interest to us as well. Finally, we are also interested in the preservation of semantic extensions. Given a set of arguments ΔArg\Delta\subseteq\text{\it Arg} that is an extension of a specific semantics of Arg,,_i\langle\text{\it Arg},\rightharpoonup,\rightsquigarrow_{\_}i\rangle for all iNi\in N, we are interested in under what circumstances Δ\Delta is an extension of such semantics of F()F({\bm{\rightsquigarrow}}) as well. Finally, given an argument that is acceptable under a specific semantics for all agents, we would like to see whether such argument is acceptable in the collective outcome.

4 Preservation results

In this section, we present the preservation results for semantic properties. We start with essential constraint and closedness, two basic requirements of bipolar argumentation frameworks. Then, we turn to consider the preservation of conflict-freeness, followed by considering safety, followed by considering d-admissibility, s-admissibility, and c-admissibility. Then, we proceed with the study the properties of being an extension, including the property of being a d-preferred extension, being a s-preferred extension, being a c-preferred extension and being a stable extension. Finally, we study the preservation of acceptability of arguments. Proofs of results in this section can be found in the appendix.

4.1 Preservation results for essential constraint, closedness, conflict-freeness, safety and admissibility

Recall that a bipolar AF satisfies essential constraint if it does not contain two arguments for which the first one simultaneously attacks and supports the second one.

Proposition 4.22.

Every aggregation rule FF that is grounded preserves essential constraint.

The closedness is also an important property. Our result demonstrates that every reasonable rule preserves it.

Lemma 4.23.

Every aggregation rule FF that is grounded preserves closedness.

For conflict-freeness, we obtain that the unanimity rule, a demanding rule preserves the conflict-freeness of arbitrary sets of arguments.

Proposition 4.24.

The unanimity rule preserves conflict-freeness.

The preservation of the safety of arbitrary sets of arguments can be accomplished by the unanimity rule.

Proposition 4.25.

The unanimity rule preserves safety.

Proof 4.26.

This proposition is a consequence of Proposition 4.24, Lemma 4.23, and Proposition 2.11.

The concepts of d-admissibility and s-admissibility are based on different coherences, but the preservation results for them are similar, as the following proposition demonstrates.

Proposition 4.27.

The unanimity rule preserves either d-admissibility or s-admissibility.

4.2 Preservation results for properties of being an extension

We are going to present preservation results for more demanding properties. Before proceeding, we introduce some necessary terminology and a simple result, as well as a technique developed by Endriss and Grandi for the more general framework of graph aggregation [14]. Let sup\text{\it sup}\in\rightsquigarrow be a support, let N={1,,n}N=\{1,\ldots,n\} be a finite set of individuals (or agents, we assume that there are two or more agents), and let {\bm{\rightsquigarrow}} be a profile of support-relations. Recall that N_supN_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}} is the set of agents who accept sup under profile {\bm{\rightsquigarrow}}. A winning coalition 𝒲N\mathcal{W}\subseteq N is a set of agents who can decide whether to accept or reject a given support sup. Given an aggregation rule FF, if FF is neutral and independent, then FF can be fully determined by a single set 𝒲\mathcal{W} of winning coalitions, i.e., for every profile {\bm{\rightsquigarrow}} and every support sup it is the case that supF()N_sup𝒲\text{\it sup}\in F({\bm{\rightsquigarrow}})\Leftrightarrow N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}}\in\mathcal{W}.

In our proofs, we will rely on the concept of ultrafilter familiar from set theory [18]. An ultrafilter is a collection of subsets of NN satisfying closure under intersection, maximality, and 𝒲\emptyset\notin\mathcal{W}.

Definition 4.28.

An ultrafilter 𝒲\mathcal{W} on a set NN is a collection of subsets of NN satisfying the following conditions:

  1. (1)(1)

    𝒲\emptyset\notin\mathcal{W}

  2. (2)(2)

    for any pair of sets C_1,C_2NC_{\_}1,C_{\_}2\subseteq N, C_1,C_2𝒲C_{\_}1,C_{\_}2\in\mathcal{W} implies C_1C_2𝒲C_{\_}1\cap C_{\_}2\in\mathcal{W} (closure under intersection)

  3. (3)(3)

    for any set CC, one of CC and N\CN\backslash C is in 𝒲\mathcal{W} (maximality)

We restate a simple result, which interprets a well-known fact of ultrafilter in our context:

Let FF be an independent and neutral aggregation rule and let 𝒲\mathcal{W} be the corresponding set of winning coalitions for supports, i.e., supF()N_sup𝒲\text{\it sup}\in F({\bm{\rightsquigarrow}})\Leftrightarrow N_{\_}{\text{\it sup}}^{{\bm{\rightsquigarrow}}}\in\mathcal{W} for all sup\text{\it sup}\in\rightsquigarrow. Then, FF is dictatorial if and only if 𝒲\mathcal{W} is an ultrafilter.

Besides the properties identified in Section 3, we introduce two meta-properties:

Definition 4.29.

A property PP is called non-simple if there exists a set SupArg×Arg\text{\it Sup}\subseteq\text{\it Arg}\times\text{\it Arg} of supports and three individual supports sup_1,sup_2,sup_3Arg×ArgSup\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\in\text{\it Arg}\times\text{\it Arg}\setminus\text{\it Sup} such that Arg,,SupS\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2,sup_3}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\} satisfies PP if and only if S{sup_1,sup_2,sup_3}S\not=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}.

Definition 4.30.

A property PP is called disjunctive if there exists a set SupArg×Arg\text{\it Sup}\subseteq\text{\it Arg}\times\text{\it Arg} of supports and two individual supports sup_1,sup_2Arg×ArgSup\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\in\text{\it Arg}\times\text{\it Arg}\setminus\text{\it Sup} such that Arg,,SupS\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\} satisfies PP if and only if SS\not=\emptyset.

Non-simplicity requires that, in the context of Sup, accepting any proper subset of {sup_1,sup_2,sup_3}\{sup_{\_}1,sup_{\_}2,sup_{\_}3\} is possible, while accepting {sup_1,sup_2,sup_3}\{sup_{\_}1,sup_{\_}2,sup_{\_}3\} is not. Disjunctiveness requires that, in the context of Sup, we should accept at least one of sup_1sup_{\_}1 and sup_2sup_{\_}2. The term of simplicity was introduced by Nehring and Puppe [19] as the median property; the term of disjunctiveness was introduced by Endriss and Grandi [14] as a graph meta-property. It is worth noting that a meta-property is a class of properties, a property satisfies or does not satisfy a specific meta-property. Even though the definitions of meta-properties are not complicated, deciding whether a given property belongs to a meta-property is still not straightforward.

Meta-properties have connections with properties of BAFs and aggregation rules: on the one hand, meta-properties outline high-level features of properties of BAFs, with which we are able to systematically study the preservation of semantic properties of BAFs with simple proofs; on the other hand, as we will see in the following lemmas, meta-properties allow us to generalize specific result for specific properties by instantiating the general results. To be more specific, if an aggregation rule preserves a property that belongs to a meta-property, then it is a dictatorship.

Lemma 4.31.

Let PP be a property that is non-simple and disjunctive. Then, for |Arg|3\lvert\text{\it Arg}\,\rvert\geqslant 3, any unanimous, grounded, neutral, and independent aggregation rule FF that preserves PP must be a dictatorship.

If a property we are interested in is non-simple and disjunctive, then we can apply Lemma 4.31 to obtain an axiomatic result for it.

Theorem 4.32.

For |Arg|5\lvert\text{\it Arg}\,\rvert\geqslant 5, any unanimous, grounded, neutral, and independent aggregation rule FF that preserves either d-preferred, s-preferred, or c-preferred extensions must be a dictatorship.

For the scenarios when |Arg|=4|\text{\it Arg}|=4, or even |Arg|=3|\text{\it Arg}|=3, we are not able to verify whether the theorem can still apply, we conjecture that the bound on the cardinality of Arg is sharp and we believe that the theorem has covered all cases of practical interest. By comparison, we recall that for the property of being a preferred extension of Dung’s argumentation framework, Chen and Endriss have shown that only dictatorships preserve it [10]. They have made the assumption that every agent is equipped with a different set of attack relations while they hold the same set of arguments.

Note that Theorem 4.32 is an impossibility result that indicates the preservation of specific properties is impossible, unless the aggregation rule under consideration is dictatorial. They relate to generalisations of Arrow’s Impossibility Theorem [2] to graph aggregation and attack-relation aggregation. One of the features of the aggregation rules we used in this section is that they accept the axiom of independence. Even though this axiom is attractive in some sense, to escape the impossibilities, a prime direction is to relax it. For example, we can consider distance-based rules and investigate whether we are able to obtain some positive results.

Theorem 4.32 has assumed that the interpretation of support is deductive support. Even though it is enough for our purposes, namely it is enough to show that only dictatorships preserve d-preferred (s-preferred, c-preferred) extensions, we are still interested in what happens when the interpretation is restricted to necessary support. The bad news is, we still cannot overcome impossibility results.

Theorem 4.33.

If the interpretation of support is necessary support, for |Arg|5\lvert\text{\it Arg}\,\rvert\geqslant 5, any unanimous, grounded, neutral, and independent aggregation rule FF that preserves either d-preferred, s-preferred, or c-preferred extensions must be a dictatorship.

4.2.1 Preservation result for stable extensions

For stable extensions, by using the same techniques, we obtain a similar impossibility result.

Theorem 4.34.

For |Arg|5\lvert\text{\it Arg}\,\rvert\geqslant 5, any unanimous, grounded, neutral, and independent aggregation rule FF that preserves stable extensions must be a dictatorship.

By comparison, we recall that the nomination rule preserves stable extensions of Dung’s argumentation frameworks [10].

4.3 Preservation of argument acceptability

Now, we move to study the preservation of acceptability of arguments. Before proceeding further, it is thus important to keep in mind that our model has assumed that each agent iNi\in N reports a set of supports _i\rightsquigarrow_{\_}i on the same set of arguments and attack relations. Given two BAFs _1\rightsquigarrow_{\_}1 and _2\rightsquigarrow_{\_}2, if _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, namely the supports of _1\rightsquigarrow_{\_}1 is a superset of _2\rightsquigarrow_{\_}2, then a d-admissible (s-admissible, c-admissible, respectively) set of _1\rightsquigarrow_{\_}1 remains d-admissible (s-admissible, c-admissible, respectively) in _2\rightsquigarrow_{\_}2.

Lemma 4.35.

Given two BAFs _1\rightsquigarrow_{\_}1 and _2\rightsquigarrow_{\_}2, if _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, then every d-admissible set of arguments of _1\rightsquigarrow_{\_}1 is a d-admissible set of _2\rightsquigarrow_{\_}2.

Lemma 4.36.

Given two BAFs _1\rightsquigarrow_{\_}1 and _2\rightsquigarrow_{\_}2, if _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, then every s-admissible set of arguments of _1\rightsquigarrow_{\_}1 is a s-admissible set of _2\rightsquigarrow_{\_}2.

Lemma 4.37.

Given two BAFs _1\rightsquigarrow_{\_}1 and _2\rightsquigarrow_{\_}2, if _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, then every c-admissible set of arguments of _1\rightsquigarrow_{\_}1 is a c-admissible set of _2\rightsquigarrow_{\_}2.

Fact 1.

Given a BAF \rightsquigarrow, if ΔArg\Delta\subseteq\text{\it Arg} is a d-preferred (s-preferred, c-preferred, respectively) extension of \rightsquigarrow, then Δ\Delta is a d-admissible (s-admissible, c-admissible, respectively) set of arguments of \rightsquigarrow.

Thus, every d-admissible (s-admissible, c-admissible, respectively) set of arguments is included in a d-preferred (s-preferred, c-preferred, respectively) extension. With this, we are ready to present the preservation results for argument acceptability under preferred semantics, including d-preferred semantics, s-preferred semantics, and c-preferred semantics. Note that in the following we say that an argument under a d-preferred extension, we mean that such argument is a member of a d-preferred extension.

Proposition 4.38.

The unanimity rule preserves the property of argument acceptability under d-preferred semantics.

Proposition 4.39.

The unanimity rule preserves the property of argument acceptability under either s-preferred or c-preferred semantics.

The proof is similar to the proof for Theorem 4.38. The only difference is that every s-admissible (c-admissible) set of _i\rightsquigarrow_{\_}i is a s-admissible set of F()F({\bm{\rightsquigarrow}}) is because of Lemma 4.36 (Lemma 4.37).

5 Related work

Previous work on obtaining argumentative consensus among a group of agents are mainly focus on abstract argumentation frameworks [11, 26, 10]. Among them, Chen and Endriss [10] study of the preservation of semantic properties during the aggregation of attack-relations of abstract argumentation frameworks. As a potential domain of application for the model they develop, they do not make explicit reference to bipolar argumentation frameworks. In addition, similar to us, they have made use of meta-properties proposed by Endriss and Grandi for graph aggregation [14], which serve as technical devices to obtain preservation results for semantic properties.

The problem of aggregating bipolar opinions has received interests in the literature. The idea of aggregating support-relations of bipolar argumentation frameworks has been outlined in a preliminary version of this paper [9]. Lauren et al[16] consider aggregating bipolar assumption-based argumentation frameworks under the assumption that agents propose the same set of arguments, but propose different sets of attacks and supports. Their focus is quota rules and oligarchic rules. Kontarinis et al[15] study designing mechanisms for “regulating” debates under the setting of each agent in the debate equipped with a bipolar argumentation framework. We note that in their settings, agents report the same set of arguments, but with possibly different attack- and support-relations.

6 Conclusion

In this paper, we have studied the aggregation of agents’ view in the context of bipolar argumentation. To be more specific, we have explored the problem of aggregating support-relations of bipolar argumentation frameworks by making use of the methodology of social choice theory. To achieve this, we have designed a model, in which agents are equipped with a set of arguments and a set of attacks, but with possibly different support-relations. We have shown which semantic properties of BAFs can be preserved by aggregation rules. We have proposed two BAF meta-properties, namely the property of “non-simplicity” and “disjunctiveness”, both of which are high level features of BAFs. We show that such meta-properties can be used to obtain impossibility results, namely for quickly proving what kind of aggregation rules (or no desirable aggregation rule) is collectively rational with respect to BAF properties.

For future work, it is worth having an investigation of further meta-properties. We point out that Lemma 4.31 is a variant of Theorem 16 in graph aggregation [14]. This indicates that there is space for other variants of impossibility results for different assumptions. The preservation of some desirable properties (for example, the property of being a d-preferred extension) during the aggregation of support-relations is difficult. Thus, it is worth studying whether such properties can be preserved in different settings. For instance, agents might be equipped with the same set of arguments, but with possibly different attack- and support-relations, and we aggregate attack- and support-relations by making use of different quota rules. Finally, recall that there are at least three interpretations of support, in this paper, we focus on the deductive support and necessary support. More interpretations of support, for example, evidential support, should be investigated.

Acknowledgements.

I would like to thank Ulle Endriss for his generous suggestions on an earlier version and his guidance at the beginning of this work. I also thank three anonymous reviewers for their constructive feedback. This work was supported by the China Postdoctoral Science Foundation (grant no. 2019M663352).

References

  • [1]
  • [2] Kenneth J. Arrow (1963): Social Choice and Individual Values, 2nd edition. John Wiley and Sons. First edition published in 1951.
  • [3] Philippe Besnard & Anthony Hunter (2008): Elements of Argumentation. MIT Press, 10.7551/mitpress/9780262026437.001.0001.
  • [4] Gustavo M. Bodanza, Fernando A. Tohmé & Marcelo R. Auday (2017): Collective Argumentation: A Survey of Aggregation Issues around Argumentation Frameworks. Argument & Computation 8(1), pp. 1–34, 10.3233/AAC-160014.
  • [5] Guido Boella, Dov Gabbay, Leon van der Torre & Serena Villata (2010): Support in abstract argumentation. In: Proceedings of the Third International Conference on Computational Models of Argument (COMMA-10), Frontiers in Artificial Intelligence and Applications, IOS Press, pp. 40–51, 10.3233/978-1-60750-619-5-111.
  • [6] Claudette Cayrol & Marie-Christine Lagasquie-Schiex (2005): Gradual valuation for bipolar argumentation frameworks. In: European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, pp. 366–377, 10.1007/1151865532.
  • [7] Claudette Cayrol & Marie-Christine Lagasquie-Schiex (2005): On the acceptability of arguments in bipolar argumentation frameworks. In: European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, pp. 378–389, 10.1007/1151865533.
  • [8] Claudette Cayrol & Marie-Christine Lagasquie-Schiex (2013): Bipolarity in argumentation graphs: Towards a better understanding. International Journal of Approximate Reasoning 54(7), pp. 876–899, 10.1016/j.ijar.2013.03.001.
  • [9] Weiwei Chen (2020): Aggregation of Support-Relations of Bipolar Argumentation Frameworks (Extended Abstract). In: Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2020), IFAAMAS.
  • [10] Weiwei Chen & Ulle Endriss (2019): Preservation of Semantic Properties in Collective Argumentation: The Case of Aggregating Abstract Argumentation Frameworks. Artificial Intelligence 269, pp. 27–48, 10.1016/j.artint.2018.10.003.
  • [11] Sylvie Coste-Marquis, Caroline Devred, Sébastien Konieczny, Marie-Christine Lagasquie-Schiex & Pierre Marquis (2007): On the Merging of Dung’s Argumentation Systems. Artificial Intelligence 171(10–15), pp. 730–753, 10.1016/j.artint.2007.04.012.
  • [12] Phan Minh Dung (1995): On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and nn-Person Games. Artificial Intelligence 77(2), pp. 321–358, 10.1016/0004-3702(94)00041-X.
  • [13] Paul E. Dunne, Pierre Marquis & Michael Wooldridge (2012): Argument Aggregation: Basic Axioms and Complexity Results. In: Proceedings of the 4th International Conference on Computational Models of Argument (COMMA), IOS Press, 10.3233/978-1-61499-111-3-129.
  • [14] Ulle Endriss & Umberto Grandi (2017): Graph Aggregation. Artificial Intelligence 245, pp. 86–114, 10.1016/j.artint.2017.01.001.
  • [15] Dionysios Kontarinis, Elise Bonzon, Nicolas Maudet & Pavlos Moraitis (2011): Regulating Multiparty Persuasion with Bipolar Arguments: Discussion and Examples. In: Modèles Formels de l’Interaction, pp. 119–129.
  • [16] Stefan Lauren, Francesco Belardinelli & Francesca Toni (2021): Aggregating Bipolar Opinions. In: Proceedings of the 20th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
  • [17] Christian List & Philip Pettit (2002): Aggregating Sets of Judgments: An Impossibility Result. Economics and Philosophy 18(1), pp. 89–110, 10.1017/S0266267102001098.
  • [18] Bernard Monjardet (1983): On the use of ultrafilters in social choice theory. Social choice and welfare 5, pp. 73–78, 10.1016/B978-0-444-86487-1.50012-5.
  • [19] Klaus Nehring & Clemens Puppe (2007): The structure of strategy-proof social choice—Part I: General characterization and possibility results on median spaces. Journal of Economic Theory 135(1), pp. 269–305, 10.1016/j.jet.2006.04.008.
  • [20] Farid Nouioua & Vincent Risch (2010): Bipolar argumentation frameworks with specialized supports. In: 2010 22nd IEEE International Conference on Tools with Artificial Intelligence, 1, IEEE, pp. 215–218, 10.1109/ICTAI.2010.37.
  • [21] Farid Nouioua & Vincent Risch (2011): Argumentation frameworks with necessities. In: Proceedings of the International Conference on Scalable Uncertainty Management, Springer, pp. 163–176, 10.1007/978-3-642-23963-214.
  • [22] Nir Oren, Michael Luck & Chris Reed (2010): Moving between argumentation frameworks. In: Proceedings of the 2010 International Conference on Computational Models of Argument (COMMA-2010), IOS Press, 10.3233/978-1-60750-619-5-379.
  • [23] Nir Oren & Timothy J. Norman (2008): Semantics for evidence-based argumentation. Proceedings of the 2008 International Conference on Computational Models of Argument (COMMA-2008) 172, p. 276.
  • [24] Iyad Rahwan & Guillermo R. Simari (2009): Argumentation in Artificial Intelligence. Springer-Verlag, 10.1007/978-0-387-98197-0.
  • [25] Iyad Rahwan & Fernando A. Tohmé (2010): Collective Argument Evaluation as Judgement Aggregation. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
  • [26] Fernando A. Tohmé, Gustavo A. Bodanza & Guillermo R. Simari (2008): Aggregation of Attack Relations: A Social-choice Theoretical Analysis of Defeasibility Criteria. In: Proceedings of the 5th International Symposium on Foundations of Information and Knowledge Systems (FoIKS), Springer-Verlag, 10.1007/978-3-540-77684-04.
  • [27] Kristijonas Čyras, Claudia Schulz & Francesca Toni (2017): Capturing Bipolar Argumentation in Non-flat Assumption-Based Argumentation. In: International Conference on Principles and Practice of Multi-Agent Systems, pp. 386–402, 10.1007/978-3-319-69131-223.

Appendix: Remaining Proofs

In this appendix we present the proofs omitted from the body of the paper.

Proof of Proposition 4.22

Let =(_1,,_n){\bm{\rightsquigarrow}}=(\rightsquigarrow_{\_}1,\ldots,\rightsquigarrow_{\_}n) be a profile of BAFs, in which _i\rightsquigarrow_{\_}i satisfies the essential constraint for all iNi\in N. Let FF be an aggregation rule that is grounded. For the sake of contradiction, we suppose that the essential constraint is violated in F()F({\bm{\rightsquigarrow}}). Without loss of generality, we suppose that both ABA\rightharpoonup B and ABA\rightsquigarrow B get accepted in F()F({\bm{\rightsquigarrow}}). From the assumption, we know that every agent agrees ABA\rightharpoonup B. In the meantime, at least one agent accepts ABA\rightsquigarrow B under grounded aggregation rules, which cannot be the case. Thus, we have the proposition.   \Box

Proof of Lemma 4.23

We again let =(_1,,_n){\bm{\rightsquigarrow}}=(\rightsquigarrow_{\_}1,\ldots,\rightsquigarrow_{\_}n) be a profile of BAFs, let ΔArg\Delta\subseteq\text{\it Arg} be the set of arguments under consideration, and let FF be an aggregation rule that is grounded. For the sake of contradiction, we suppose that Δ\Delta is closed in _i\rightsquigarrow_{\_}i for all iNi\in N and not closed in F()F({\bm{\rightsquigarrow}}), i.e., there is an argument AΔA\in\Delta and an argument BArg\ΔB\in\text{\it Arg}\backslash\Delta such that ABA\rightsquigarrow B in F()F({\bm{\rightsquigarrow}}). As rules under considering are grounded, there is at least one agent _i\rightsquigarrow_{\_}i for which A_iBA\rightsquigarrow_{\_}iB is the case. This will lead to the situation that Δ\Delta not being closed in _i\rightsquigarrow_{\_}i, contradicting our assumption.   \Box

Proof of Proposition 4.24

Recall that the unanimity rule is the quota rule FF with the quota of nn. Let =(_1,,_n){\bm{\rightsquigarrow}}=(\rightsquigarrow_{\_}1,\ldots,\rightsquigarrow_{\_}n) be a profile of BAFs. Let ΔArg\Delta\subseteq\text{\it Arg} be the set of arguments under consideration. For the sake of contradiction, we suppose that Δ\Delta is conflict-free in _i\rightsquigarrow_{\_}i for all iNi\in N, and is not conflict-free in F()F({\bm{\rightsquigarrow}}). This means that there are two arguments A,BΔA,B\in\Delta such that AA supported or secondary attacks BB in F()F({\bm{\rightsquigarrow}}).

We now show that in the scenario where AA is supported attacking BB, i.e., there is a sequence of arguments in F()F({\bm{\rightsquigarrow}}) such that A_1,,A_mA_{\_}1\rightsquigarrow,\ldots,\rightsquigarrow A_{\_}m, A_mBA_{\_}m\rightharpoonup B in which A_1=AA_{\_}1=A, our proposition holds. From the assumption we know that (A_mB)_i(A_{\_}m\rightharpoonup B)\in\rightharpoonup_{\_}i for all iNi\in N. In addition, every agent agrees A_1,,A_mA_{\_}1\rightsquigarrow,\ldots,\rightsquigarrow A_{\_}m. Thus, every agent agrees A_1,,A_mA_{\_}1\rightsquigarrow,\ldots,\rightsquigarrow A_{\_}m, A_mBA_{\_}m\rightharpoonup B, i.e., Δ\Delta is not conflict-free in _i\rightsquigarrow_{\_}i for all iNi\in N, in contradiction to our earlier assumption.

For the scenario where AA is secondary attacking BB, we note that the proof is similar to the proof of the one where AA is supported attacking BB. Thus, we have the proposition.   \Box

Proof of Proposition 4.27

Let FF be the unanimity rule. Let =(_1,,_n){\bm{\rightsquigarrow}}=(\rightsquigarrow_{\_}1,\ldots,\rightsquigarrow_{\_}n) be a profile of bipolar argumentation frameworks. Let ΔArg\Delta\subseteq\text{\it Arg} be the set of arguments under consideration.

We suppose that Δ\Delta is d-admissible in _i\rightsquigarrow_{\_}i for all iNi\in N. Then, Δ\Delta is conflict-free in _i\rightsquigarrow_{\_}i for all iNi\in N as well. By Proposition 4.24, Δ\Delta is conflict-free in F()F({\bm{\rightsquigarrow}}). By the assumption that all agents report the same set of attacks, we get that for each argument AΔA\in\Delta, AA is defended by Δ\Delta in _i\rightsquigarrow_{\_}i for all iNi\in N. It follows that AA is defended by Δ\Delta in F()F({\bm{\rightsquigarrow}}) as well. Thus, Δ\Delta is d-admissible in F()F({\bm{\rightsquigarrow}}).

We omit the relative easy proof for s-admissibility.   \Box

Proof of Lemma 4.31

Take any property PP that is non-simple and disjunctive. Take any aggregation rule FF that is unanimous, grounded, neutral, independent and preserves PP. By the assumption that FF is neutral and independent, FF is determined by a set of winning coalitions 𝒲2N\mathcal{W}\subseteq 2^{N}. What we need to do is proving that 𝒲\mathcal{W} is an ultrafilter, i.e., to show that 𝒲\mathcal{W} is closed under intersection, 𝒲\mathcal{W} satisfies maximality, and 𝒲\emptyset\notin\mathcal{W}.

𝒲\emptyset\notin\mathcal{W}

This is a direct consequence of the assumption that FF is grounded.

Maximality

Take any set of agents CNC\subseteq N. Consider a profile in which exactly the individuals in CC propose sup_1\text{\it sup}_{\_}1 and exactly those in N\CN\backslash C propose sup_2\text{\it sup}_{\_}2. Since PP is disjunctive, we know that one of sup_1\text{\it sup}_{\_}1 and sup_2\text{\it sup}_{\_}2 must be part of F()F({\bm{\rightsquigarrow}}). Hence C𝒲C\in\mathcal{W} or N\C𝒲N\backslash C\in\mathcal{W}.

Closure under intersection

Take any two winning coalitions C_1,C_2𝒲C_{\_}1,C_{\_}2\in\mathcal{W}. Assume toward a contradiction that C_1C_2𝒲C_{\_}1\cap C_{\_}2\notin\mathcal{W}. Consider a profile in which exactly the individuals in C_1C_{\_}1 propose sup_1\text{\it sup}_{\_}1, exactly the individuals in C_2C_{\_}2 propose sup_2\text{\it sup}_{\_}2, and exactly the individuals in N\(C_1C_2)N\backslash(C_{\_}1\cap C_{\_}2) propose sup_3\text{\it sup}_{\_}3. Now, since C_1C_{\_}1 and C_2C_{\_}2 are winning coalitions, sup_1\text{\it sup}_{\_}1 and sup_2\text{\it sup}_{\_}2 must be part of F()F({\bm{\rightsquigarrow}}). Hence, due to C_1C_2𝒲C_{\_}1\cap C_{\_}2\notin\mathcal{W} and 𝒲\mathcal{W} satisfying maximality, we have N\(C_1C_2)𝒲N\backslash(C_{\_}1\cap C_{\_}2)\in\mathcal{W}. Since the individuals in N\(C_1C_2)N\backslash(C_{\_}1\cap C_{\_}2) propose sup_3\text{\it sup}_{\_}3, we have sup_3F()\text{\it sup}_{\_}3\in F({\bm{\rightsquigarrow}}). But we have assumed that FF preserves non-simplicity, i.e., sup_1,sup_2,sup_3\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3 cannot be accepted together in F()F({\bm{\rightsquigarrow}}). Thus, C_1C_2𝒲C_{\_}1\cap C_{\_}2\in\mathcal{W}.   \Box

Proof of Theorem 4.32

Suppose |Arg|5\lvert\text{\it Arg}\,\rvert\geqslant 5. Let PP be the properties representing a given set of arguments being either a d-preferred, a s-preferred or a c-preferred extension. Thus, by Lemma 4.31, we need to show that PP is non-simple and disjunctive in this case.

AABBCCDDEEsup_1sup_{\_}1sup_2sup_{\_}2sup_3sup_{\_}3 AABBCCDDEEsup_1sup_{\_}1sup_2sup_{\_}2
Non-simplicity Disjunctiveness

Figure 3: Scenarios used in the proof of Theorem 4.32
Non-simplicity

Let Arg={A,B,C,D,E,}\text{\it Arg}=\{A,B,C,D,E,\ldots\}, let ={DE,ED,BB,CC}\rightharpoonup=\{D\rightharpoonup E,E\rightharpoonup D,B\rightharpoonup B,C\rightharpoonup C\}. Now we focus on Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} as the subset of arguments that may (or may not) form either a d-preferred, a s-preferred or a c-preferred extension. We define Sup=\text{\it Sup}=\emptyset, sup_1=(AB)\text{\it sup}_{\_}1=(A\rightsquigarrow B), sup_2=(BC)\text{\it sup}_{\_}2=(B\rightsquigarrow C), and sup_3=(CD)\text{\it sup}_{\_}3=(C\rightsquigarrow D). This scenario is depicted in the top part of Figure 3. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2,sup_3}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}. It is not difficult for the reader to verify that, for S{sup_1,sup_2,sup_3}S\not=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, BB and CC are self-attacking, DD is attacked by EE. Thus, they are unacceptable with respect to {A,E}\{A,E\}, i.e., Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is a d-preferred, a s-preferred and a c-preferred extension. On the other hand, for S={sup_1,sup_2,sup_3}S=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is not a d-preferred nor a s-preferred or c-preferred extension as EE is set-attacked by AA. Thus, PP is non-simple.

Disjunctiveness

Let Arg={A,B,C,D,E}\text{\it Arg}=\{A,B,C,D,E\ldots\}, let ={BC,BD,CE,DE}\rightharpoonup=\{B\rightharpoonup C,B\rightharpoonup D,C\rightharpoonup E,D\rightharpoonup E\}. We focus on Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} as the subset of arguments that may (or may not) form a s-preferred extension. We define Sup=\text{\it Sup}=\emptyset, sup_1=(AC)\text{\it sup}_{\_}1=(A\rightsquigarrow C), sup_2=(AD)\text{\it sup}_{\_}2=(A\rightsquigarrow D). This scenario is depicted in the bottom part of Figure 3. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\}. For SS\not=\emptyset, Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} is a d-preferred, a s-preferred, and a c-preferred extension. On the other hand, for S=S=\emptyset, Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} is not a s-preferred nor a d-preferred or a c-preferred extension as EE is defended by BB. Thus, PP is disjunctive.   \Box

Proof of Theorem 4.33

Similar to Theorem 4.32, we still need to show that the property of being a d-preferred, a s-preferred, or a c-preferred extension is non-simple and disjunctive when the interpretation of support is necessary support.

Non-simplicity

Let Arg={A,B,C,D,E,}\text{\it Arg}=\{A,B,C,D,E,\ldots\}, let ={DE,ED,BB,CC}\rightharpoonup=\{D\rightharpoonup E,E\rightharpoonup D,B\rightharpoonup B,C\rightharpoonup C\}. Now we focus on Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} as the subset of arguments that may (or may not) form either a d-preferred, a s-preferred or a c-preferred extension. We define Sup=\text{\it Sup}=\emptyset, sup_1=(BA)\text{\it sup}_{\_}1=(B\rightsquigarrow A), sup_2=(CB)\text{\it sup}_{\_}2=(C\rightsquigarrow B), and sup_3=(DC)\text{\it sup}_{\_}3=(D\rightsquigarrow C), as illustrated in the top part of Figure 4. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2,sup_3}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}. It is not difficult for the reader to verify that, for S{sup_1,sup_2,sup_3}S\not=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, BB and CC are self-attacking, DD is attacked by EE. Thus, they are unacceptable with respect to {A,E}\{A,E\}. In the meantime, AA is not attacked by any other argument, EE defends itself, {A,E}\{A,E\} is conflict-free, i.e., Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is a d-preferred, a s-preferred, and a c-preferred extension. On the other hand, for S={sup_1,sup_2,sup_3}S=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is neither a d-preferred nor a s-preferred nor c-preferred extension as EE secondary attacks AA. Thus, PP is non-simple.

Disjunctiveness

Let Arg={A,B,C,D}\text{\it Arg}=\{A,B,C,D\ldots\}, let ={BC,BD}\rightharpoonup=\{B\rightharpoonup C,B\rightharpoonup D\}. We focus on Arg{A,C,D}\text{\it Arg}\setminus\{A,C,D\} as the subset of arguments that may (or may not) form a s-preferred extension. We define Sup=\text{\it Sup}=\emptyset, sup_1=(CA)\text{\it sup}_{\_}1=(C\rightsquigarrow A), sup_2=(DA)\text{\it sup}_{\_}2=(D\rightsquigarrow A), as illustrated in the bottom part of Figure 4. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\}. For SS\not=\emptyset, BB secondary attacks AA and directly attacks CC and DD. Thus, Arg{A,C,D}\text{\it Arg}\setminus\{A,C,D\} is a d-preferred, a s-preferred, and a c-preferred extension. On the other hand, for S=S=\emptyset, Arg{A,C,D}\text{\it Arg}\setminus\{A,C,D\} is neither a s-preferred nor a d-preferred nor a c-preferred extension as AA is not attacked by any other argument and thus should be included in every d-preferred (s-preferred, c-preferred) extension. Thus, PP is disjunctive.

AABBCCDDEEsup_1sup_{\_}1sup_2sup_{\_}2sup_3sup_{\_}3 AACCDDBBsup_1sup_{\_}1sup_2sup_{\_}2
Non-simplicity Disjunctiveness
Figure 4: Scenarios used in Theorem 4.33.

\Box

Proof of Theorem 4.34

Suppose |Arg|5\lvert\text{\it Arg}\,\rvert\geqslant 5. Let PP be the BAF-properties representing a given set of arguments being a stable extension. We need to demonstrate that PP is non-simple and disjunctive in this case.

AABBCCDDEEsup_1sup_{\_}1sup_2sup_{\_}2sup_3sup_{\_}3 AABBCCDDEEsup_1sup_{\_}1sup_2sup_{\_}2
Non-simplicity Disjunctiveness

Figure 5: Scenarios used in the proof of Theorem 4.34
Non-simplicity

Let Arg={A,B,C,D,E,}\text{\it Arg}=\{A,B,C,D,E,\ldots\}, let ={DE,EB,EC,ED}\rightharpoonup=\{D\rightharpoonup E,E\rightharpoonup B,E\rightharpoonup C,E\rightharpoonup D\}. We focus on Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} as the subset of arguments that may (or may not) form a stable extension. We define Sup=\text{\it Sup}=\emptyset. sup_1=(AB)\text{\it sup}_{\_}1=(A\rightsquigarrow B), sup_2=(BC)\text{\it sup}_{\_}2=(B\rightsquigarrow C), and sup_3=(CD)\text{\it sup}_{\_}3=(C\rightsquigarrow D). This scenario is depicted in the top part of Figure 5. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2,sup_3}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}. The reader should be able to verify that, indeed, for S{sup_1,sup_2,sup_3}S\not=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is a stable extension. For example, for S={sup_1,sup_2}S=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\}, BB, CC, and DD are attacked by EE. In the meantime, {A,E}\{A,E\} is conflict-free, i.e., Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is a stable extension. On the other hand, for S={sup_1,sup_2,sup_3}S=\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2,\text{\it sup}_{\_}3\}, Arg{B,C,D}\text{\it Arg}\setminus\{B,C,D\} is not a stable extension as EE is set-attacked by AA. Thus, PP is non-simple.

Disjunctiveness

Let Arg={A,B,C,D,E}\text{\it Arg}=\{A,B,C,D,E\ldots\}, let ={BC,BD,CE,DE}\rightharpoonup=\{B\rightharpoonup C,B\rightharpoonup D,C\rightharpoonup E,D\rightharpoonup E\}. We focus on Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} as the subset of arguments that may (or may not) form a stable extension. We define Sup=\text{\it Sup}=\emptyset, sup_1=(AC)\text{\it sup}_{\_}1=(A\rightsquigarrow C), sup_2=(AD)\text{\it sup}_{\_}2=(A\rightsquigarrow D). This scenario is depicted in the bottom part of Figure 5. Consider all BAFs of the form BAF=Arg,,SupS\text{\it BAF}=\langle\text{\it Arg},\rightharpoonup,\text{\it Sup}\cup S\rangle with S{sup_1,sup_2}S\subseteq\{\text{\it sup}_{\_}1,\text{\it sup}_{\_}2\}. The reader should be able to verify that, indeed, for SS\not=\emptyset, Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} is a stable extension. On the other hand, for S=S=\emptyset, Arg{C,D,E}\text{\it Arg}\setminus\{C,D,E\} is not a stable extension as EE is defended by BB. Thus, PP is disjunctive.   \Box

Proof of Lemma 4.35

Let ΔArg\Delta\subseteq\text{\it Arg} be a d-admissible set of _1\rightsquigarrow_{\_}1. We need to show that Δ\Delta is a d-admissible set of _2\rightsquigarrow_{\_}2. To achieve this, we need to demonstrate that in _2\rightsquigarrow_{\_}2, (ii) Δ\Delta is conflict-free, and (iiii) Δ\Delta defends all of its members.

For (ii), we need to show that Δ\Delta is conflict-free in _2\rightsquigarrow_{\_}2. If not, then there are two arguments A,BΔA,B\in\Delta such AA directly, supported, or secondary attacks BB. If AA directly attacks BB in _2\rightsquigarrow_{\_}2, then AA directly attacks BB in _1\rightsquigarrow_{\_}1 as the pair of BAFs report the same set of attacks, which contradicts the assumption that Δ\Delta is conflict-free in _1\rightsquigarrow_{\_}1. If AA supported attacks BB in _2\rightsquigarrow_{\_}2, then there is a sequence of argument (A_1,,A_n)(A_{\_}1,\ldots,A_{\_}n) such that A_1A_2,,A_n1A_nA_{\_}1\rightsquigarrow A_{\_}2,\ldots,A_{\_}{n-1}\rightharpoonup A_{\_}n, A=A_1A=A_{\_}1, and A_n=BA_{\_}n=B. As _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2 and A_n1A_nA_{\_}{n-1}\rightharpoonup A_{\_}n is the case, we know that A_1A_2,,A_n1A_nA_{\_}1\rightsquigarrow A_{\_}2,\ldots,A_{\_}{n-1}\rightharpoonup A_{\_}n in _2\rightsquigarrow_{\_}2 as well, which means that there are two arguments A,BΔA,B\in\Delta such that AA supported attacks BB, contradicting the fact that Δ\Delta is conflict-free in _1\rightsquigarrow_{\_}1. If AA supported attacks BB in _2\rightsquigarrow_{\_}2, this case is similar to the case that AA supported attacks BB, which will lead to that Δ\Delta failing to satisfy conflict-freeness in _1\rightsquigarrow_{\_}1. Thus, Δ\Delta is conflict-free in _2\rightsquigarrow_{\_}2.

For (iiii), we need to show that for every argument AΔA\in\Delta, if BAB\rightharpoonup A, then there is a CΔC\in\Delta such that CBC\rightharpoonup B, i.e, Δ\Delta defends all its members in _2\rightsquigarrow_{\_}2. Clearly, this is true as _1\rightsquigarrow_{\_}1 and _2\rightsquigarrow_{\_}2 report the same set of attacks, and Δ\Delta defends all its members in _1\rightsquigarrow_{\_}1.   \Box

Proof of Lemma 4.36

We need to show that a s-admissible set of arguments ΔArg\Delta\subseteq\text{\it Arg} of _1\rightsquigarrow_{\_}1 is a s-admissible set of _2\rightsquigarrow_{\_}2. To arrive at this goal, we need to demonstrate that in _2\rightsquigarrow_{\_}2, (ii) Δ\Delta is conflict-free, (iiii) Δ\Delta defends all of its members, and (iiiiii) Δ\Delta is safe. For (ii) and (iiii), the proofs are the same as the ones in Lemma 4.35. It remains to show that Δ\Delta is safe in _2\rightsquigarrow_{\_}2. If not, then there is an argument BArgB\in\text{\it Arg} such that Δ\Delta set-attacks BB and Δ\Delta set-supports BB, or BΔB\in\Delta. If Δ\Delta set-supports BB. there are two arguments AΔA\in\Delta such AA directly, supported, or secondary attacks BB. Using the construction similar to Lemma 4.35, it is easy to verify that under this assumption, Δ\Delta set-attacks BB in _1\rightsquigarrow_{\_}1. According to the assumption that _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, Δ\Delta set-supports BB in _1\rightsquigarrow_{\_}1. Then, Δ\Delta is not safe in _1\rightsquigarrow_{\_}1, contradiction.   \Box

Proof of Lemma 4.37

Once again, we need to show that every c-admissible set Δ\Delta of arguments of _1\rightsquigarrow_{\_}1 is a c-admissible set of _2\rightsquigarrow_{\_}2. To arrive at this goal, we need to show that in _2\rightsquigarrow_{\_}2 (ii), Δ\Delta is conflict-free, (iiii) Δ\Delta defends all of its members, and (iiiiii) Δ\Delta is closed. For (ii) and (iiii), the proofs are the same as the ones in Lemma 4.35. It remains to show that Δ\Delta is closed in _2\rightsquigarrow_{\_}2. If not, then there is an argument AΔA\in\Delta and an argument BArgB\in\text{\it Arg} such that AA supports BB, and BΔB\notin\Delta. According to the assumption that _1_2\rightsquigarrow_{\_}1\supseteq\rightsquigarrow_{\_}2, AA supports BB, and BΔB\notin\Delta in _1\rightsquigarrow_{\_}1, we get that Δ\Delta is not closed in _1\rightsquigarrow_{\_}1, contradiction.   \Box

Proof of Proposition 4.38

Let AArgA\in\text{\it Arg} be the argument under consideration, and we suppose that AA is acceptable under a d-preferred extension of _i\rightsquigarrow_{\_}i for all iNi\in N. Let FF be the unanimity rule. Clearly, F()F({\bm{\rightsquigarrow}}) is a subset of _i\rightsquigarrow_{\_}i for all iNi\in N. Without loss of generality, we take _i\rightsquigarrow_{\_}i to be the BAF under consideration. Then, _iF()\rightsquigarrow_{\_}i\supseteq F({\bm{\rightsquigarrow}}). Furthermore, AA is acceptable under a d-preferred extension Δ_1Arg\Delta_{\_}1\subseteq\text{\it Arg} of _i\rightsquigarrow_{\_}i i.e., AΔ_1A\in\Delta_{\_}1. Note that Δ_1\Delta_{\_}1 is a d-admissible set as well. According to Lemma 4.35, Δ_1\Delta_{\_}1 is a d-admissible set of F()F({\bm{\rightsquigarrow}}) as well. By Fact 1, we know that there is a d-preferred extension Δ_2Arg\Delta_{\_}2\subseteq\text{\it Arg} of F()F({\bm{\rightsquigarrow}}) such that Δ_2Δ_1\Delta_{\_}2\supseteq\Delta_{\_}1, and AA is a member of Δ_2\Delta_{\_}2. That is to say, AA is acceptable under a d-preferred extension of F()F({\bm{\rightsquigarrow}}). We are done.   \Box