2012
DOI: 10.1007/s10472-012-9317-7
|View full text |Cite
|
Sign up to set email alerts
|

Modelling defeasible and prioritized support in bipolar argumentation

Abstract: Cayrol and Lagasquie-Schiex introduce bipolar argumentation frameworks by introducing a second relation on the arguments for representing the support among them. The main drawback of their approach is that they cannot encode defeasible support, for instance they cannot model an attack towards a support relation. In this paper, we introduce a way to model defeasible support in bipolar argumentation frameworks. We use the methodology of meta-argumentation in which Dung's theory is used to reason about itself. Du… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(39 citation statements)
references
References 20 publications
0
36
0
Order By: Relevance
“…sets of arguments) (e.g. see [17,4,18,6,23,10,14]) or in terms of numerical notions of strength (e.g. see [8,1]).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…sets of arguments) (e.g. see [17,4,18,6,23,10,14]) or in terms of numerical notions of strength (e.g. see [8,1]).…”
Section: Introductionmentioning
confidence: 99%
“…In particular, we plan to study the evidential argumentation frameworks of [19], BAFs that employ attacks from sets of arguments, e.g. [16,23]), and works that aim to model defeasible and/or recursive support, e.g. [23,12].…”
mentioning
confidence: 99%
“…The meaning of N cb could be that the support from c to b is not active. A similar idea can be found in [28,12] for the more general purpose of representing recursive and defeasible attacks and supports.…”
Section: A Meta-framework Encoding Necessary Supportmentioning
confidence: 92%
“…Then, higher-order attacks have been considered for representing preferences between arguments (second-order attacks in [76]), or for modelling situations where an attack might be defeated by an argument, without contesting the acceptability of the source of the attack [7]. Attacks to attacks and supports have been first considered in [64] with higher level networks, then in [92]; and more generally, in [42] an Attack-Support Argumentation Framework is proposed which allows for nested attacks and supports, i.e. attacks and supports whose targets can be other attacks or supports, at any level.…”
Section: Def 3 (Ebaf) An Evidence-based Argumentation Framework (Ebmentioning
confidence: 99%