Abstract
This paper provides equational semantics for Dung's argumentation networks. The network nodes get numerical values in [0,1], and are supposed to satisfy certain equations. The solutions to these equations correspond to the “extensions” of the network. This approach is very general and includes the Caminada labelling as a special case, as well as many other so-called network extensions, support systems, higher level attacks, Boolean networks, dependence on time, and much more. The equational approach has its conceptual roots in the nineteenth century following the algebraic equational approach to logic by George Boole, Louis Couturat, and Ernst Schroeder.
Keywords
Introduction
This paper expands on our equational ideas introduced in (2009b, pp. 246–251). A short introduction to the results of this paper appears in Proceedings of ECSQARU’11, Springer LNAI Series, see Gabbay (2011).
This section introduces the ideas involved in the paper one by one through several subsections.
To achieve our goal, as outlined in Section 1.1, we adopt an equational approach, going back to the nineteenth century way of doing logic.
The equational approach has its conceptual roots in the nineteenth century following the algebraic equational approach to logic by Boole (1847), Couturat (1914), and Schröder (2000).
The equational algebraic approach was historically followed, in the first half of the twentieth century, by the Logical Truth (Tautologies) approach supported by giants such as G. Frege, D. Hilbert, B. Russell, and L. Wittgenstein. In the second half of the twentieth century, the new current approach has emerged, which was to study logic through it consequence relations, as developed by A. Tarski, G. Gentzen, D. Scott, and (for non-monotonic logic) D. Gabbay.
Aims of this paper
We have several good reasons for writing this paper.
To provide a general computational framework for Dung's argumentation networks; a framework in which the logical aspects, computational aspects, and the conceptual aspects involved in Dung's original proposal can be isolated, highlighted, and analysed, and thus paving the way for orderly responsible generalisations. The logical aspects involve the question of what is the logical content of an argumentation network and what inferences we can draw from it, see Gabbay (2009a) and our most recent paper (Gabbay). The computational aspects have to do with viewing the abstract argumentation networks as directed graphs or as finite models with binary relations on them and various algorithms for extracting subsets of such graphs or models. See, for example, Gabbay and Szalas (2009) on annotation theories. The conceptual aspect is the reason behind the computation, involving concepts such as conflict-free sets, admissibility, and a variety of extensions. See Caminada's conceptual survey slides (Caminada and Wu 2011) and especially slide 19. At present, Dung's networks are generalised in many ways by many capable researchers. Unfortunately, we have no general meta-level approach which the community can use for guidance and comparison. To generalise Dung's argumentation networks in a natural way and connect and compare it with other network communities, such as neural nets, Bayesian nets, biological–ecological nets, logical, labelled deductive nets, and so forth. See Baroni, Giacomi, and Guida (2005), Barringer and Gabbay (2010), Barringer, Gabbay, and Woods (2005, 2008). These networks have a different conceptual base but they look like abstract argumentation networks, i.e. they are directed graphs. We manipulate the graphs differently because they come from different applications. So, the question to ask is whether we can we find common ground (such as an equational approach to such graphs) which will bring the applications together at least on the formal mathematical side? To introduce in a natural way, various meta-operations on networks such as distributed networks (modal logic), time dependence, and fibring which exist in other types of networks and logics. To connect with pure mathematics, numerical analysis, and computational algebra. We will focus on Dung abstract argumentation semantics, although we also touch on some other semantics such as CF2 semantics in Gabbay (2012a).
The rest of this introductory section will explain the ideas of this paper through examples and discussion and later sections will develop the mathematical machinery involved.
Dung's (1995) argumentation networks have the form (S, R
A
), where S is a set of arguments, which for the current purposes we assume to be finite, and R
A
is a binary attack relation on S. We are interested in subsets E of S of arguments which are admissible, that is self-defending and conflict free, namely:
E is conflict free, namely for no x, y in E do we have that xR
A
y. E defends each of its elements: whenever for some x, we have xR
A
y and y is in E, there is some z in E defending y, i.e. we have z R
A
y. (E is self-defending.) E is complete if E contains all the elements it defends.
The smallest such complete E is called the grounded extension, a maximal E (there may be several different such maximal sets) is called a preferred extension, and if we are lucky, we may also have a stable extension E, namely one which attacks anything not on it.
Such extensions are perceived as indicating coherent logical positions which can defend themselves against attacks.
See Caminada and Gabbay (2009) and Gabbay and Szalas (2009) for surveys. The above set of definitions is the original set theoretic way of introducing extensions. There is another very useful equivalent way of defining extensions, using the Caminada labelling, see Caminada and Gabbay (2009) for a survey. The Caminada labelling is the approach compatible with our equational approach. It is described in the next subsection and it is the approach we are going to work with.
The conceptual vs. computational distinction
Consider the network of Figure 1

A simple network.
This network has two nodes
Caminada conditions:
If a= in and a attacks b then b= out. If all attackers x
i
of b are out (or if there are no attackers) then b= in. If all attackers x
i
of b are either out or undecided with at least one such attacker is undecided then b= undecided.
By looking at a Dung extension E, we are saying two things:
Computational statement: Assign values from <texlscub>in, out, undecided</texlscub> to all nodes in such a way that the above connections are observed. Conceptual statement: Let
Now consider Figure 2, where we add a third element and add the new relation of support R S , indicated by the double arrow.

Adding support.
We have
We now have two problems in this new expanded network with support.
Computational problem: How to assign values <texlscub>in, out, undecided</texlscub> or possibly additional labels such as weakly undecided, almost in, possibly out, etc. Conceptual problem: Extend conceptual meaning to “support” in the network. In other words, what do we mean by support. Of course, our conceptual analysis will influence what labels we use in the computational approach.
The answer to (1) is to extend the algorithm governing the assignment of values <texlscub>in, out, undecided, and other values</texlscub> to cover cases of support.
The answer to (2) is to modify the network to a new network by some conceptual considerations, which take into account of the support relation.
This can be done by modifying the notion of extension or the notion of attack or both.
Let us, by way of example, offer a minimalistic conceptual analysis of support, reading support as “endorse”. If x supports y, then x does not give more strength to the argument y, but only shares its fate, having endorsed it. Let us see what we can offer as a corresponding computational approach.
The computational aspect can be solved, for example, by keeping within the labels <texlscub>in, out, undecided</texlscub>, and by adding new rules (N1) and (N2).
If a supports b and a= out then b is out. If a supports b and b= in then a= in.
Modify (C2) to say
If all attackers x
i
of b are out (or if there are no attackers) and if b does not support any y then b= in.
Another possibility of understanding support is as a licence for attack and defence. Here, we are really adding strength to the supported node. We can declare, for example, one of the following:
A supported node cannot be attacked. (This reminds us of Bench-Capon's (2003) value-based networks.) A node which is not supported cannot attack. (See, for example, Oren, Reed, and Luck 2010).
The effect of (Q2) is to cancel the arrow b→a.
We thus get the following:
If we adopt (N1), (NC2), and (N2), we get the following extensions in Figure 2:
The above is just an example to explain the computational vs. conceptual aspects distinctions, see Section 3 for the analysis of support. If we adopt (Q2) then Figure 2 is again reduced to Figure 3, but for a different reason. (Q2) does not allow b to attack anything and (Q1) does not allow b to attack a but it can attack other points. Simplifying Figure 2.

We still need computational principles for Figure 3, though in this simple figure the only option is E1.
This subsection is intended to motivate the formal equation section, Section 2. We give here several examples of the equational approach.
Let (S, R
A
) be a Dung network. So If a is not attacked (i.e. If Let us take, for example, the same Thus, we get
For any
The equation
If one of x
i
(x
i
are the attackers of a) is in then a is out. If all the attackers are out then a is in. If at least one of the attackers of a is undecided and none of the attackers of a are in then a is undecided.
If we have a Caminada labelling, can we find a function
Let us now give a formal definition.
Possible equational systems
Let (S, R
A
) be a networks and let a be a node and let
We list below several possible equational systems, we write
Let us further introduce a fourth system of equations which we call
Consider Figure 1 again.
Let
The equations are (using
If we choose α, this fixes β.
For α=1, we get β=0. For α=0, we get β=1. For 0<α<1, we get 0<β<1.
We thus get the three extensions, if we read any value strictly between 0 and 1 as undecided.
Consider Figure 4. Here, the equation is (for
Thus, the extension is
Consider Figure 5
Let
The equations are under all options
From 1 and 3, we get
The extension is
Consider Figure 6. Again we get, for
Let us use the set
From (1) and (2), we get
Therefore, from (3) we get
Therefore,
This gives us the extension
Let us now consider
From (1) and (2), we get
Therefore, from (3) we get
We now consider Eqmax. We get
From (1) and (2), we get
From (3), we get
Therefore,
Let us now check
(1) and (2), we get
and from (3), we get
Therefore
and hence
Actually, there is a rationale to what is happening in the previous Example 1.5. Consider the network of Figure 6.
Start by assuming a=in. Then b is unambiguously out. Now the question of whether c is in or out is not clear cut. We may wish to adopt a new policy in this case, different from the traditional one. c is not attacked by b but it does attack itself. So our new policy can consider whether to make c out or undecided. It cannot be in. That c is out is the best solution.
The other alternative, that a is out, entails b is in, therefore certainly c is out and so a must be in, a contradiction.
So the best solution is a=in, b=out, and c=out, as suggested by the equational network. Although the equational approach need not be compatible with Dung's approach, it being different and new, it is worth noting that in this case, it does not contradict the Dung extension which says all undecided, but further refines it, as we have argued.
Let us look at the situation in terms of admissible extensions. The set
Suppose we introduce and use two new concepts:
c is
E is
By exploiting the right concepts of
Consider Figure 7 and use the set
We have, under
Thus, from (1) and (2) we get
So
So we get the extension
It is clear from Equation (3) that there is no way of letting 0<α<1 and 0<β<1 (i.e. making a and b undecided) and satisfying the
Let us consider the other Eq options.
Under Eqmax, we get
From (1) and (2), we get
the only solution is β=0.
Under
From (1) and (2), we get
We get
Consider Figure 8 and use
Here, we have
Therefore,
Note that Eqmax and
We now examine the case of
The only solution is
We saw in Examples 1.5 and 1.7 and in Remark 1.6 that the functions of
The solution to these equations is
We get the same agreement for Example 1.7. We shall prove a general theorem in the next section.
Let us do another example using all four options for equations, namely
Consider Figure 9. We are looking for We use
The equations are
There are programs like Maple which can solve the equations of this sort and give all the solutions. We used one and got
Let's solve the equations by hand. We get from (3):
From (4) and (1), we get that
So from (5) and (2), we get
Hence, From (5) we get
From (3) we get
The interest in this case is that we are getting all kinds of values which shows that these equations are sensitive to the nature of the loops involved!
We use Eqmax: Then from (2), So So From (2) we get
So the final solution in this case is We use α=0. Then from 2, we get So the answer for case α=0 is that also β=0 and γ=1. α≠0. Can this case arise? From 1 we get
Thus, the solution is This is compatible with Remark 1.6. We use
The equations are
We distinguish two cases:
The equations are
We check some cases.
The equations are:
We first note that the values α=0 or α=1 or β=0 or β=1 cannot be solutions and so in our calculations, we can divide by α or β or 1−α or 1−β.
From Equation (1), we get a contradiction if α is either 0 or 1, and from Equation (2), we get a contradiction if β is either 0 or 1.
From (3) and (1), we get
Solving (4) for β we get
Therefore, So
Let Then x is s fifth root of unity, i.e. it solves the equation x5−1=0. The fifth roots of unity can be solved by radicals, the only real solution is x=1, which makes
Therefore
We continue. Solving (2) for α we get
From (5a) and (6a), we get
The other solutions are complex numbers and are not relevant to us1
The other solutions are
We shall show that these two equational systems may not yield the same extensions. The network is described in Figure 10.
Extensions according to Eqmax.
Let us compute the equations according to Eqmax and their possible solutions.
The equations are (we write “x” instead of
a=1−b. d=1−c. e=1−d.
We get From (4) and (5)
c=e.
From (1) and (2), we get
The only solutions to (7) are b=0 and b=½.
Case b=0
We get from (1) that
Case b=½
Therefore from (1)
Summary for Eqmax
We get two extensions
Compare this result with Theorem 2.7.
Extensions according to
We now deal with Figure 10 using a=1−b. d=1−c. e=1−d.
We can have one solution with a=1. 1 yields b=0, which agrees with 2. From 3 and (5), we get c=d and from (4), we get c=½ and so
We now ask is there a solution with a<1? Equations 1 and 2 must agree. From 1
Summary of extensions for
We can have only one extension
Let us now introduce support into our networks. Let us consider Figure 2 again.
The computational problem in our context is simply to say what equation to give for nodes like a in Figure 2 which is also additionally supported. The conceptual problem remains the same.
Let us propose an equation for support, just as an example. Suppose we have the situation as follows:
All of the attackers of node a are All the nodes supported by a are
Then, we require the following equation, obtained by modifying the
Let us write the equations for Figure 2.
Let ν=α.
We get that α is arbitrary and ν=α and
Note that there is a principle involved here in how to obtain equations which include support from equations which include attacks. Take any equation for attacks of nodes x
i
and y
j
on a node a, which include the participation of the node y as an attacker. Then
Now suppose we change the role of y from attacker to supporter, then the equation changes by substituting “
So the principle we used can be summarised as follows: The support by
Boolean functions, Abstract dialectical framework of Brewka and Woltran 2010
The function
Let
We chose basically to use
Note that since our graph (S, R A ) is a Dung network, it comes with the convention that points which are not attacked should get the value 1.
Thus the function
To render this example most general, we need to give up this convention, and regard (S, R A ) as a general directed graph.
We can of course still retain the Dung convention, in which case the Boolean equations need to respect that certain points have pre-determined value of 1.
Compare with Brewka and Woltran (2010) and Brewka, Dunne, and Woltran (2011).
Note that this type of function already appears in Barringer et al. (2005). Boolean functions are discussed in Boella et al. (2011b, 2010), where it is shown how to translate Brewka and Woltran (2010) Boolean conditions into ordinary Dung networks using methods of Gabbay (2009b). See also Example 2.11 and Remark 2.17.
Order among attackers
Note that in the Boolean functions Example 1.13, the local functions
Formal theory of the equational approach to argumentation networks
In this section, we formally develop our equational approach. We start with equational networks based on the unit real interval [0, 1]. We then consider Boolean equations and compare with the work of Brewka and Woltran.
Conceptually, the nodes and the equations attached to them is the network and the solutions to the equations are the complete extensions, as we have seen in the examples of Section 1.
The meaning of the real numbers attached to nodes varies from one application to another and depends on the nature of the network. If the networks describe liquid flow, then the numbers are relative capacities. If the networks describe some ecology (for example, a biological predator prey network), then the numbers represent percents of populations in equilibrium. If the network is a logical network, then the numbers are truth values.
In the case of argumentation networks, numbers strictly between 0 and 1 generally mean that the node is undecided. However, the numbers can be connected to the geometry of the network and the type of loops there are in it. We saw such examples in the previous section where we got different solutions for different loops (compare, for example, the solutions to the networks in Figures 5, 6, and 9). We still need to investigate the connection between loops and solutions, we have no theorems in this area. See, however, our discussions and examples in Gabbay (2012a,b).

Self loop.

Odd three loop.

Odd loop with a self looping element.
Real equational networks
(1) An argumentation base is a pair (S, R
A
) where
(2) A real equation function in k variables
Sometimes we also have condition (c) below, as in ordinary Dung networks, but not always. (3) An equational argumentation network over [0, 1] has the form
(S, R
A
) is a base.
For each
If
An extension is a function
If
Existence theorem, the finite case
Let
Let n be the number of elements of S. For each a∈S consider
This is a continuous function on a compact cube of n dimensional space and has therefore, by Brouwer's fixed point theorem, a fixed point
Let
For Brouwer's fixed point theorem, see Wikipedia.2
See http://en.wikipedia.org/wiki/Brouwer_fixed_point_theorem (Sobolev 2001).
The perceptive reader should note that Theorem 2.2 ensures that some solution “extension” exists for any continuous function assigning to each argument a value in [0, 1] on the basis of values assigned to all other arguments (the attack relation is irrelevant for the result). While this ensures that one has not to care for existence problems in defining equations, it also means that both meaningful and meaningless (in the sense that they have nothing to do with the notion of extension) equations provide some result. It is therefore an important issue to identify criteria for selecting meaningful equations for argumentation semantics. We provided some interesting examples in Definition 1.1, but in future work a generalisation to families of equations will be considered. The most significant among them are the De Morgan Norms (the word “norm” is used here in the functional analysis sense). Such norms are used as fuzzy versions of the classical connectives
Let Given some fixed values for some nodes, is there a solution to the equations of the network respecting these values?
Let (S, R
A
) be a Dung argumentation network. Let
Then there exists, by Theorem 2.2 an extension function
Note that what the above does is to find a system of equations characterising exactly a single extension.
The general problem is, given an argumentation network and a selection of some but not all of its extensions, can we write a system of equations which will yield exactly the selected extensions?
We do not know the answer to this question.
To get exactly all the extensions, i.e. all the Caminada labelling, we use the next theorem, Theorem 2.7.
Consider the function
Let
Let λ be a complete Caminada extension for (S, R
A
). Let
We show that Assume x1 attacks a and Assume a has no attackers then Otherwise let, as before, Assume Hence Let λ be a proper Caminada extension. We show that If a has no attackers then λ(a)= in and Let If for some i, x
i
= in then Also in this case But If all If all Hence,
▪
Theorem 2.7 does not hold for
Critical translations of logic programmes and Boolean networks
This subsection deals with reductions of one argumentation network to another. The key notion is that of a critical subset. The perceptive reader might wonder about the relevance of this subsection to the equational approach. Why are we having this subsection in this paper? After all these reductions are purely logical, we transfer the equational approach with them. The answer is that this is exactly the point. Any system which can be translated into argumentation theory can be endowed with the equational approach. The details of the translation yield the equations. This is why we show here how to translate logic programmes. We can get answer set solutions to logic programmes using equations. This is a new angle worth developing!
Critical subsets
Let
The notion of critical subset is important for meta-level considerations. Given a new type of network
Consider the situation in Figure 11.
Assume a Boolean condition of the form
Consider the Boolean function
We now implement Figure 11 as a critical subset of Figure 12.
We distinguish three cases:
Case 1: some nodes x do attack the node a, as shown in Figure 11.
Case 2: a is not attacked at all and
Case 3: a is not attacked at all but
We now treat each case
Case 1: We have new points as follows
Points For every
the other points in Figure 12 are
The point x
r
is connected to y
i, r
if
This is done for i=1, …, k and s=1, …, n.
Let us now calculate
We get
Case 2. In this case do nothing. The graph for node a is node a as it is.
Case 3. In this case, we want a graph that will give a value 0. So we take a two point graph, with the points a and the point u a , with point u a attacking a.
So to summarise, Figure 12 can be either of three figures according to which case occurs for the node a.
We now show how to embed a general equational Boolean net
Let a∈S and let
Note also that u
a
is a unique attacker of a (Cases 1 and 3) and appears only in
Let
Then, (T, ρ) is the required Dung networks. Note that for each a we are adding at most n3 points.
Let us do a simple example, see Figure 13
The conditions are:
We have
From (1) and (2), we get
Following (4)–(7) gives
Notice that y a , z a , u a are just “transmitters” of values from b to a.
Note that what we called Boolean nets in Example 2.11, where we give up the Dung convention and regard the network as just a general directed graph, are actually logic programmes.
A propositional logic programme contains clauses of the form
For a fixed literal a, there may be several such clauses with a as the head. We can therefore write them all together as a disjunction of the form
We also have
Compare the above with equation (*) of Example 2.11.
Following the discussion in Example 2.11, the equations we get for the logic programme (**) are the following
where
The equations are with the variables If x
r
is a head of a clause without a body then If x
r, i, j
is not a head of a clause then
Embedding logic programmes into argumentation networks
We wrote in Remark 2.14 Equations (♯1)–(♯3) directly for the logic programme and did not say how to translate the logic programme as a critical subset of some argumentation network. This translation we do now: we need first to transform the original logic programme above to a new equivalent logic programme in which every literal is a head of a clause.
We do this as follows:
There may be literals x in the old logic programme which appear in body of clauses but are themselves not heads of any clause. In this case, we provide a clause for x of the form
Thus, we get a new programme with one more literal, ⊤, and some additional clauses, and this new programme is equivalent to the original, and in this programme every literal (except ⊤) has a Boolean equation like (**) associated with it.
Now we construct a Boolean network (S, R A ) as follows:
The set S of nodes are all the literals of the new logic programme. Let x
r
be any literal in S different from ⊤. Assume x
r
is connected in the new logic programme via (**) to the literals x
r, i, j
. Then, let Let the Boolean equation for x
r
be (**).
We now have a Boolean network and we use Construction 2.12 to embed it as a critical subset of a Dung network.
The overall result is the embedding of the original logic programme as a critical subset of a Dung network.
We noted in Gabbay and d'Avila Garcez (2009) that ordinary Dung networks can be translated to logic programmes in a very direct manner. If
The equational approach allows us to give fuzzy values to logic programmes. The much discussed loop problem resolves itself automatically. Consider Example 1.10. Figure 9 considered as a logic programme yields
It is worthwhile to investigate an equational approach to fuzzy logic programming.
Note that Brewka and Woltran (2010) introduce and study what they call abstract dialectical framework (what we call Boolean nets or logic programmes). They need to define extensions for their networks. We got Boolean functions either as a side effect of fibring in Gabbay (2009b) or as a natural equational example in the current paper. We find our extensions by solving equations or by critically translating into ordinary Dung networks. Brewka and Woltran need to do something similar. Their options are as follows:
Define the new notions of extensions for their networks and provide algorithms as Dung did for framework; or Use the present paper with Brouwer's fixed point theorem and use MATLAB or MAPLE or NSolve to find the solution; these solutions might be more refined than the extensions they would get in Brewka and Woltran (2010), as we have seen in Remark 1.6; or Another option is contained in Gabbay (2009b) on fibring argumentation networks. In this paper, I studied what happens when we substitute one Dung network inside another. In the course of this study, I got networks with Boolean conditions of the form
a is out if
These notions are used in Example 2.11 of this paper.
and the form
and to find the extensions of such networks I translated in detail with examples the Boolean conditions into ordinary Dung networks and defined the notion of critical subsets, etc.
Note that for equational networks, we do not need the translation and the additional nodes. They disappear from the final equation, as we saw in the calculations of Example 2.11.
See also Example 3.7.
The reader is advised to consult our paper (Gabbay), especially Section 2.4.entitled: Why are we not surprised by results of Gabbay, Brewka, and Woltran?
The paper shows the equivalence between Dung's argumentation networks and classical logic with the Peirce–Quine dagger connective, and therefore Dung's argumentation is as expressive as classical logic, Dung's networks can represent any Boolean network or logic programme, as shown in Gabbay.
The question of how to use the equations for finding extensions will be discussed in a later section.
We can always find all solutions to the equations and this will give us all the extensions and then use extra secondary examination to classify them. However, this is not what we mean.
We want to modify the equations to give us the desired extensions as solutions.
We can do this now for finding stable extensions as follows.
The stable extensions give either 0 or 1 values to all nodes. This means that the new variable y defined below must solve to value 0:
Summary Remark 2.20 (Advantages of the equational approach)
We now list the advantages of our approach:
First let us highlight the fact that given a traditional argumentation network with attacks only, we regard it as a graphical generator of equations, and we use equations as a conceptual framework. We no longer talk about concepts such as defense, acceptability, admissible extensions, etc. but talk instead about solutions to the equations.
Therefore, conceptually, we have
an extension is a solution to the equations and different extensions (grounded, preferred, stable, semi-stable, etc.) are characterised by further constraints/equations on these solutions functions using say Lagrange Multipliers, see Section 6 below. To find all possible extensions, we solve equations. We feed the equations into existing well-known mathematical programs such as MAPLE or MATLAB or NSolve and get the solutions. See also Remark 2.19. There are many papers which calculated computational complexity of finding various extensions, when we reduce the problem to that of solving equations in MAPLE or MATLAB or NSolve, complexity is not reduced, it can only increase. What do we gain then?
A new uniform framework, not only for argumentation networks, but also for other types, ecological, flow, etc. Possibility of finding different heuristics for equations which will work faster for most cases, giving an advantage over non-equational algorithms. Ordinary people such as lawyers, etc.; to the extent that they use argumentation at all and are not averse to formal logic, they may find that it is psychologically easier to plug the problem into the computer, go and make a cup of tea and then check the results. Furthermore, if we insist on certain arguments being in or out, we can experimentally feed this into the equations and test the effect on other arguments. MATLAB itself does not generate all the solutions automatically but requires initial input, which is an advantage if we have a special set of arguments in mind. For example, the question of whether a set of arguments belongs to some extension (being credulous) of a certain type or whether the set belongs to all extensions of a certain type (being sceptical) can very naturally be handled in the equational framework. To generate all extensions, we need to keep plugging initial conditions into MATLAB; that is, plug in all possible candidates for extensions (this is exponential in the number of nodes but we saw in Remark 2.15 and Construction 2.12 that any Boolean set of functions can be embedded in argumentation networks, and so the complexity is exponential anyway). Another possibility is to use NSolve which does generate solutions, see http://reference.wolfram.com/mathematica/ref/NSolve.html. Another disadvantage of this is that we might get approximate solutions. So if we get x=0.999, we ask is this for real or is the solution supposed to be x=1? On the other hand, an advantage of using such programmes is that it makes it easy to incorporate argumentations feature into other larger AI programmes, as almost anything allows for solving equations. We have a framework for introducing support as we shall see in the next section. Note the word of caution and comments in Section 3.1.
Within this framework, we note the following:
Analysis of support
The purpose of this section is to develop equations for networks of the form (S, R A , R S ), where R A is the attack relation and R S is the support relation. Figure 2 is an example of such a system, but in this section we will have proper equational theory and many examples.
Caution about support
We begin with a word of caution. Our equational model for attack ends up with numbers between 0 and 1 labelling the nodes of the graph (S, R
A
) with x=1 meaning “x is in” and x=0 meaning “x is out”. The value
The equations are:
We therefore see that
So the idea we might consider is that of the clear support of any node y of a node a can be read from the functional equations. The reading may not be immediate, as can be seen from Figure 16, but we are able to define what support is!
In Figure 16, the equations are:
Hence,
Our cautionary comment is that this is the wrong approach!
The numbers we get for the nodes as the result of the equation have no qualitative meaning beyond the fact that they indicate which points are in, out, or undecided. They do not indicate strength of argument and therefore cannot be used to indicate support.
To make this point crystal clear, consider again Figure 9. We got solutions for this figure, namely:

Double loop.

Symmetrical double loop.

Asymmetric loop.

A loop for example 1.11.

A general attack situation.

A figure containing Figure 11.

Illustrating Example 2.13.
For comparison, let us view Figure 9 as arising from some ecology on an island. a, b and c are species which prey on one another.
a can eat b but can also cannibalise themselves. b can eat c and also b and c can eat only a. Of course, there should be some ecological balance where the number
The equation
One can see immediately that the set of equations Eqmax is not suitable for the ecological model. Predators combine their effect, not politely allow the strongest to do the job.
These kinds of ecological and other flow networks were studied extensively in Barringer et al. (2005) and contained the equational argumentation networks as a limiting case. In this context, we can indeed say that y supports x if an increase in
We recommend that the reader should look at our papers Barringer et al. (2005) and Barringer, Gabbay, and Woods (2012) and also Barringer et al. (2008), we believe that they are of value to the argumentation community.3
We have in these papers not only weighted nodes (arguments) and weighted arrows (attacks), but also higher level attacks, temporal dependence, and a lot more. These notions are being reproduced now by many authors. See, for example, Baroni, Cerutti, Giacomin, and Guida (2009) and Dung (1995) for higher level attacks originating in Barringer et al. (2005), and our discussions and further development in Gabbay (2009a,b,c). These papers are part of a general methodological approach to applied logic and connect many areas together.
We saw in Section 3.1 that we need a conceptual motivation for support rather than use the equations produced by the attack. So let us offer a model and compare its results with the literature. Our starting point is a network of the form (S, R
A
, R
S
), where S is a set of arguments,
Let us start with the simplest of diagrams, Figure 17

Translating Figure 13.

Caution about support.

Illustrating Equational support.

Attack and support.
The argument a is attacked by x and is supported by y.
This is discussed extensively in Barringer et al. (2005, Section 4.1) with a view (Barringer et al. 2005) that equations should be sought which allow x and y to cancel each other if they have the same strength.
We shall not go into this in this paper. See, however, Remark 4.9 in Section 4.
Our graph networks have no strength and so there is nothing we can say about Figure 17. We can adopt a risk-averse approach and say if a is attacked by anything then a is out. This is certainly the attitude of government funding bodies; one negative review and your application is out! So the risk-averse approach will allow for the extension a= out, x=y= in.
Let us offer a definition. We adopt a risk-averse approach!
Let (S, R
A
, R
S
) be an argumentation network with attack and support. Define two auxiliary relations for the purpose of defining equations. The definition will be schematic, dependent on a parameter relation R, which will allow us to perform iterations. Let
Option 1
Option 2
The meaning of
Figure 18 explains the situation.
In Figure 18, node u0 attacks x directly, it is therefore both ρ1(R A ) and ρ2(R A ) threat to x.
u1 attacks z which is at the end of a chain of support from x. According to ρ1(R A ), u1 is a threat to x. It undermines x’s credibility.
u2 attacks a great grandparent supporter of x. Again it can be a threat to x.
The process can be iterated. We can look at
Let
We can use
A policy of handling support will choose

More elaborate attack and support.
Let (S, R
A
, R
S
) be a support network and let
We understand the empty product to yield 1 (i.e.
Note that our later discussions of higher level attacks in Section 4 below also suggest further equations for support. See Remarks 4.9 and 4.10.
We now examine examples from the literature. We use ρ.
Figure 4 from Boella et al. 2011b
Consider Figure 19.
We have that
We have no need to explicitly write the equations here, as the results are clear.
For comparison with the literature, note that according to Boella et al. (2011b, 2010) (which does not use equations but meta-level variables), we do get
We shall comment that the equational approach is very simple, while Cayrol and Lagasquie-Schiex (2005, 2010) and Oren et al. (2010) are very involved. See Remark 2.20.
It is still open to characterise other approaches such as Cayrol, Oren, or Brewka in terms of equations.

Support down the line of attack.
Consider Figure 20
In Figure 20, node d ρ1(R
A
) attacks node a. Node d also ρ1(R
A
) attacks nodes b and c. Thus, the only extension according to ρ1(R
A
) equations is

Support up the line of attack.
Consider the following example for the purpose of comparison, see Figure 21.
These are the fighting parents, a and b example, who each support their child c.
a ρ2(R A ) attacks b and c.
b ρ2(R A ) attacks a and c.
However, if we do not use ρ2, then ρ1 does not affect c.
So
According to ρ1(R
A
), equations in the extensions are a=1, b=0, c=1. a=0, b=1, c=1. a=½, b=½, c=1. According to Boella et al. (2011b), c is always in and According to Oren et al., we have arguments as sets, so we have two possibilities. See Figures 22 and 23. Note that Oren et al. (2010) always adds an almighty source of support 𝒩. Cayrol and Lagasquie-Schiex (2005, 2010) get essentially the same as Oren.

Floating support.

Aggregating support and looping.

Aggregating support and self looping.
Brewka and Woltran example in Figure 24 is an interesting key example. It is also discussed in Boella et al. (2011b) as Figures 5 and 18 of Boella et al. (2011b).
Here it is:
Brewka and Woltran put this forward as a counter example to Cayrol, who supports the extension
Brewka and Woltran give a specific meaning to this example and argue that the attack of w on r is stronger than the support of c to r. As we discussed in Section 3.1, when we add strength to our networks we are playing a different game. In Boella et al. (2011b), we interpret Brewka and Woltran's argument as a higher order attack as in Figure 25.
The double arrow attacks the support arrows.
This type of double arrow was extensively used in Barringer et al. (2005) and Gabbay (2009c) and was also independently used by Modgil (2009) and treated by Baroni, Cerutti, Giacomin, and Guida (2009).
It is what I call a reactive arrow, originally introduced by Gabbay in 2004, see Gabbay (2008) and widely applied in many areas, such as deontic logic, automata theory, multi-agent systems, formal grammars, and so forth.
It is a different game altogether and we shall analyse its equational semantics in a later section.

Support to the middle of the attack line.

The need for higher level attacks.
In their paper, Brewka and Woltran (2010) gave the following Boolean example, see Figure 26. The connection with support is that the condition on c is that c= in provided that the values of a and b are different. So if b= out then the arrow

Boolean dependence.

Implementing Boolean dependence.
The case of higher level attacks is the strong evidence for the success of the equational approach. The historical story runs as follows.
In Barringer et al. (2005), we introduced networks with higher level attacks of any kind. Figure 28 is a typical situation.

Higher level attacks on attacks.
Figure 28 can represent any kind of network, not necessarily an argumentation network. It can be part of a Kripke model, an electrical network, a biological ecological network, etc. In each case, the arrows have their own meaning. The paper by Barringer et al. (2005) also allowed for value annotations to the nodes and arrows and gave algorithms for the propagation of these values.
In the case of argumentation networks, the nodes are arguments and the arrows mean attacks. The values (annotations) can correspond to the equational labellings and the propagation of values are governed by the properties of the equations.
The aim of this section is to interpret (give equational semantics) to higher level attacks, in the case of argumentation networks.
Let us look again at Figure 28, reading it as an argumentation frame.
In Figure 28, the argument c attacks the attack from a to b (we use the notation
The question we ask is how to define the possible acceptable extensions for
Modgil (2007) independently defined a higher level attack networks where arrows emanating from nodes can attack other arrows (like

The Hanh Modgil disputed example.
Meanwhile, two other papers (Baroni et al. 2009; Gabbay 2009c) addressed the semantics of higher level attacks in the Dung style. For a survey and discussion, see Gabbay (2009c).
We shall offer two equational systems for higher level attacks which will settle in two pages the long and tortuous discussions and definitions of the above papers.4
Hanh et al. point out that their approach is sceptical generalisation of the standard argumentation framework, while others such as Sanjay's, Gabbay's, or Baroni et al.’s are rather credulous. Hence, in each extension of these approaches, there is a sceptical part that is one of Hanh et al.’s extensions. Hanh et al. also point out that Sanjay's generalisation of grounded semantics is rather more liberal than theirs, and hence his characteristic function is not monotonic.
Note that since we are writing equations, we are guaranteed the existence of extensions!
To be able to present our case, we need some definitions.
An ordinary argumentation frame has the form
A level (0, 1) argumentation frame has the form
Level (0, n) argumentation frames are defined as follows
(a) A pair
If z∈S and α is level (0, n) attack then (z,α) is a level (0, n+1) attack. A level (0, n) argumentation frame has the form
To explain our ideas and address Figure 29, let us first define equations for level (0, 1) attacks only. A typical situation is described in Figure 30.
The attackers of b are
We now offer the following two options for equations for
Option
Option
We now see what kind of extensions we get for Figure 29.

A typical situation for higher level attacks.
We first use the a=1−b. c2=1−c2. c=1. c1=1. From (2)–(4), we get c=c1=1. From (5), we get b=b1 and from (6), we get The only solution is b1=b=0. From (1) we get a=1. Thus, the only extension is a=c=c1=1, b=b1=0, This corresponds to the Modgil extension. We now use H1Eqmax. The equations are
a=1−b. c2=1−c2. c=1. c1=1. We get There are two solutions We also get two corresponding solutions for a: a=½ and a=1. We thus have the second extension for the case of
We now address the general case of arbitrarily high level of attacks on attacks. To do this right, we need high level of induction and it can be complicated, as you can see from Figure 31.
This iteration can go on for many levels and we cannot practically handle it for each b and write very long iterated equations. We need an idea, a trick, to go around it. Fortunately, we have it already in Barringer et al. (2005), see Example 2.3 of Barringer et al. (2005) in which we calculate the values for Figure 33 (our Figure 32 is Figure 5 in Barringer et al. 2005). The idea is very natural and very simple.
In the paper by Barringer et al. (2005), we have arrows attacking arrows and both arrows and nodes were annotated with numbers. The numbers annotating nodes correspond to strength (when the node is an argument this is the strength of argument) and the numbers annotating arrows indicate strength of transmission. We now quote directly from Barringer et al. (2005), reproducing Figures 4 and 5 of Barringer et al. (2005) as our own Figures 32 and 33 here in this paper, and quote what we wrote about them in Barringer et al. (2005).
Begin quotation from Barringer et al. (2005):
In Figure 33, ϵ is the transmission factor, weakening b in a way that takes account of x: a. b is also attacked by d with factor β. However, factor ϵ is attacked by argument c, which is itself attacked by d, with transmission factor α. This model has two innovations.
The strength of nodes and the transmission factor. The idea that the transmission factor can itself be attacked. What kind of network does Figure 32 represent? First, note that the strength of nodes is actually a colouring of them. One might expect us to introduce a transmission factor between colours, then in Figure 32 ϵ could depend only on x and y. We choose to make ϵ depend on the nodes, taking into consideration that the transmission factor depends on the nature of the argument and not just on their strengths. The option of attacking transmission factors enables us to delete attacks, one by one, by attacking (lowering) their transmission factor.
So what do we do in our case of Figures 30 and 31, we regard the arrows of any kind for example
All we need to do now is to give the equation for an attack of the form of Figure 32.
But this situation and the equation for it is very obvious and intuitive. If an argument a of strength x attacks an argument b with transmission factor
One can see that (*) is
By analogy, we use max as our other option.
So to summarise, here is the algorithm for writing equations for an arbitrary higher level argumentation network.

Arbitrarily high level attacks.

A simple numerical attacks with transmission rate.

A more complex numerical network.
Given a higher level network as in Definition 4.1, we define the equations for it in steps as follows:
Insert a transmission factor View all higher order attacks on arrows as attacks on the transmission factor of the arrow. So the transmission factor becomes a sort of pseudo-node. For any pseudo-node β, whether it is a real node or a transmission factor, let Figure 34 represent all of attacks on it. The attack arrows have their own transmission factors as indicated in Figure 34. Note that for the purpose of writing the equations, transmission factors are not regarded as nodes. They are regarded as nodes only when they are attacked and play the role of β. Therefore, in Figure 34, the transmission factors are to be seen as such and not as pseudo-nodes. We now have two options for equations.
Option
Option
Step 4. Solve the equations for the variables If If If
Transmission factors can also be attacked.
This is a typical case for solving equational problems for variables
The perceptive reader will note the simplicity of our equations as compared with the complexity of the definitions of admissibility and extensions of Baroni, Hanh et al., Modgil and others!
The perceptive reader will further note that our current paper constitutes a positive response to a comment from Section 6 of Baroni et al. (2009): The idea of encompassing attacks to attacks in abstract argumentation framework has been first considered in Barringer et al. (2005), in the context of an extended framework encompassing argument strengths and their propagation. In this quite different context, deserving further development, Dung style semantics issues have not been considered.
Let us do Figure 28. Use
The equations are:
a=1 (not attacked). Simplifying the equations, we get d=1−b. c=0. The extension is

A network with attacks on transmission factors.
Consider Figure 36
Let ϵ be the transmission
The transmission
So
Although a attacks itself, it also attacks its own attack and so a is in.

A higher level self loop.
The previous Example 4.7 can be generalised as in Figure 37. This figure was put forward by Hanh et al. (2010) as an example showing how their approach to higher level attacks differs from Gabbay (2009c) and Baroni et al. (2009).
We quote from Hanh et al. (2010) (we adjust the figure references to ours here).
For illustration, consider a framework in Figure 37 consisting of attacks α1=(A, A) and αi+1=(A,α
i
) for i≥1. It is rather hard to imagine any practical interpretation of this framework. Hence, as a sceptical reasoner, one would not want to draw any conclusion, i.e. does not accept A. An agent arguing for A has to rely on an infinite line of defence α2,α4…. The semantics of both Gabbay and Baroni et al. has a unique preferred extension<texlscub>A,α2,α4…</texlscub>, while our semantics has the empty set as the only extension. The example suggests that extended argumentation in a too literal form would allow counter-intuitive extensions.
Let us see what equations we get for our example.

An infinite higher level self loop.
Case n= infinity from Figure 37, we get
or equivalently
We can see that A=1 is a solution.
Let us now continue to examine more cases, let us suppose that we have in Figure 37 only a finite number of higher level attacks.
Case n=3 The graph has the nodes
What do we get?
Clearly α3=1, since it is not attacked.
Hence,
This means that all nodes can be taken as undecided except α3.
Case n=4 The graph has the nodes
We have
We have one solution There is also another solution of the degree 4 equation,
Again in this case, we get all nodes except the top α4 are undecided.
Case n=m. In this case, the general equation for A is
The equations for higher level attacks allow us to interpret the notion of support in an equational way. Our interpretation of support in Section 3 was qualitative. We did not write equations for the support arrows but used them to define new attack relations (called threats) in Definition 3.1, and then wrote equations using the threat relation. So for example, we had nothing to say about Figure 17.
We can now put forward a new idea:
Equational Support
a supports b if a attacks the transmission factor of any c attacking b
Thus, we read Figure 17 as Figure 38.
The equation for support is therefore

A higher level representation of Figure 17.
Let E be a set of arguments. Let e, b be arguments. e is the E directed support of the node b iff e attacks the transmission factor for any a∈E which attacks b.
Thus, Figure 39 would reduce to Figure 40.
We shall address directional equational support in the next section.

Directed support.

Reducing directed support to higher level attack.
A very natural next step in our equational approach is that of approximation. Whenever you have equations and their numerical solutions in mathematics, it is natural to examine approximations where certain aspects are neglected. In our case, the argumentation network is given equational semantics, the complete extensions sets are the solutions to the equations, therefore it is natural to look at the approximate solutions. What we get is a notion of approximate complete extensions. We can regard as being in those nodes getting a value near 1 (the notion of near needs to be defined) and to regard as being out those nodes getting a value near 0. Of course, these “approximate extensions” may not satisfy the usual constraints, e.g. a node may be undecided with an attacker being in (actually, approximately in), but we have to accept that.
We shall see that this section naturally relates to an important recent paper of Dunne, Hunter, McBurney, Parsons, and Wooldridge (2011).
Our starting point is Remark 1.6, where the notion of Admissible sets is changed to that of
E is Suspect–Admissible if whenever a in E is attacked by c then either c is Suspect or E attacks c.
The above notion of Suspect was introduced in Remark 1.6 qualitatively using the loops in the attack relation, i.e. it is a geometrical notion.
If we are dealing with networks with transmission factors, as we have dealt extensively in Barringer et al. (2005), we can use the transmission factor to define the notion of Negligible
The attack of node a on node b is Negligible if its transmission factor is very small.
E is Approximately Admissible if whenever an element b in E is attacked by c then either the attack of c on b is Negligible or E attacks c via an attack which is not Negligible.
It is easy to see that the effect of using this notion is equivalent to disregarding all attacks with negligible transmission.
This immediately connects with Dunne et al. (2011), see their Definition 6.
In fact from our point of view where extensions are solutions of equations, the notion of Approximate Admissibility is automatically taken care of by the equations, because for a very low transmission factor ϵ of x attacking y, the expression ϵ. x which appears in the equations, is very near zero and has almost no effect on the equations.
Thus, the correct notion for us is to take as in not just the points x for which
Frankly, there is not much more to say about this, except to compare with Dunne et al. (2011).
Dunne et al. (2011) have not used any of the machinery of Barringer et al. (2005). In Barringer et al. (2005), networks had transmission values (corresponding to weights) and calculations and propagations of values were performed, with extensive study of the influence of loops.
They say in their paper and I quote: So, whilst there is gathering momentum for representing and reasoning with the strength of arguments or their attacks, there is not a consensus on the exact notion of argument strength or how it should be used. Furthermore, for the explicit representation of extra information pertaining to argument strength, we see that the use of explicit numerical weights is under-developed. So, for these reasons, we would like to present weighted argument systems as a valuable new proposal that should further extend and clarify aspects of this trend towards considering strength, in particular the explicit consideration of strength of attack between arguments.
I saw their paper a few months ago just before it was going into print. I contacted the authors and I am grateful that they managed some last minute adjustments of their text.
We include one example comparing our approximation approach with that of Dunne et al. (2011).
Dunne et al. 2011, Figure 2
We show the connection by treating Dunne et al. (2011, Figure 2) using our system.
Consider Figure 41
In Figure 41, the weights are from the numbers x from the set
Now looking at Figure 41 with weights adjusted, clearly the problem is the loop
and
The equations just for this loop are therefore
If we take the approximate extension E′ of all nodes of values from 30/46, we get
E corresponds to disconnecting the attack of a4 on a5 and E′ corresponds to also disconnecting the attack of a5 on a4.
This is in full agreement with Dunne et al. (2011).

A weighted network.
We now list the advantages of our method over Dunne et al. (2011). First advantage is that we can approximate without weights. Consider the loop of Example 1.10. Here, we have no weights and no transmissions. The numbers come from the equations, yet because we have numbers we can approximate.
Second advantage is that there are approximations which are not generated by weights and cancelled links, but only from numbers. Some numbers arise from multiple attacks. Some numbers come from the equations.
Most importantly, when we accept nodes with numbers near 1 as “in”, we are not changing the values of other nodes!
So, for example, in Example 1.10 and Figure 9, we can accept node c as “in” on account of it being the only one with a value more than 0.5, but this does not make the value of node a 0.
Note by the way that
A much more important application of these approximations is the handling of loops.
The equational view of semantics (preferred, stable, semi-stable, grounded)
This section deals with numerical and computational aspects of our equational models, and how they can calculate semantic extensions.
We begin with options for calculating extensions in ordinary Dung networks and their comparison with Caminada labelling. Our embarkation point is a table from Caminada and Gabbay (2009).
See Table 1.
Argument labellings and Dung-style semantics.
Argument labellings and Dung-style semantics.
We now write equations whose solutions give the correct extensions. We assume a set of equations Eq which is sound for Dung semantics, such as offered in Definition 1.1.
Our network is (S, R
A
). Assume, in case we want to refer to the points of S explicitly, that
We begin with a word of explanation and orientation addressed to the perceptive reader. In the set theoretic context of Dung extensions and semantics, there is uniformity and beauty in defining the semantics and the extensions, in terms of maximality and minimality of complete admissible sets. One can also define new types of semantics such as CF2 or stage or ideal or sceptical semantics, again using set theoretic concepts such as conflict freeness and intersections of extensions.
So, for example, a preferred extension is defined as a maximal complete extension.
When we move to the world of equations, we can get the basic complete extensions as functions
However, in the context of equations, we are tempted to use further equations and constraints and get the semantics directly as solutions of equations with constraints. This can get messy and we lose uniformity.
What we gain is that we can use solvers to find the maximal solutions.
What we lose, for example, is that we cannot form infinite products of functions, which correspond to infinite intersections of extensions.
Note also that if we use equations which are different from Eqmax, we obtain something not corresponding to Dung complete semantics, but something analogous to it for the type of equations used. Let us call it pseudo-complete semantics. Then, it may be interesting to investigate notions like pseudo-stable or pseudo-grounded semantics in a purely numerical context. We leave this to future work.
Case complete extensions. Solve the Eqmax equations. Any solution
Case stable extensions. Add a new variable y such that y ¬∈S, and write the additional equation
If the solution
This is a neater condition than the one mentioned in Remark 2.19, which was more explanatory than efficient.
Case of semi-stable extensions. This case minimises the undecided. We do the following.
Consider the quantity
In μ we regard all elements of S as variables. The equation μ=0 has a solution. We regard μ=0 as a constraint and minimise the expression
This can be done using the method of Lagrange multipliers (see Wikipedia).
Case of grounded extensions. This is like the semi-stable case except that we minimise the expression 1−ν.
In a brilliant recent paper, Dvorak and Woltran (2011) investigate translations of one type of extension into another. This has bearing to this section together with our notion of Critical Translations (Definition 2.9 in Section 2.2).
Time-dependent networks
There are two ways to make a system time dependent.
Make each atomic component depend on time. Take snapshots of the system at different times.
If we follow the first method for the case of argumentation networks, we will make each argument strength time dependent and the transmission factors also time dependent. So, for example, if we look again at Figure 32 as a typical figure, and make it time dependent, then the coefficients x: a and y: b become time dependent, as does the transmission factor
If we follow the second approach, we again use a time variable t but our networks have the form (S
t
, R
A, t
), where
The first approach is more general. We can take a time-dependent model of the first approach and get from it a model of the second approach. If we allow x(t) and
Thus, we get a model (S t , R A, t ) according to the second approach.
Note that if we do not involve the time element in the equations of the attack, all we would have is lots of non-interacting networks sitting around. So to get some interaction, let us review the basic temporal configurations and the options they afford us.
Figure 42 is a typical situation, we allow for three nodes for simplicity.

A typical temporal attack configuration.
Let us assume that
Equation (*) does not express any interaction in time. Suppose we want to add some temporal interactions, what option can we offer?
We can make the attract at time t depend also on the rate of change at t.
Surely if the strength of the attack is on the decline, it is less effective. So we can look at the derivatives
If the rate is increasing, we make the attack of x i (t) on y a bit stronger, otherwise a bit weaker.
Imagine that you are trying to buy a house and the price of the house is attacking the argument that you should own your house (rather than rent). If prices are going up, the argument for buying now is stronger. If they are going down, it is weaker, all compared with a temporal situation where prices are not changing.
Let us use the same notation that is used in physics. ẋ
i
(t) is the value of the definative at t. Similarly
Define r
i
(t) and s
i
(t) as follows.
If If If So Define s
i
(t) similarly using Now consider the attack x
i
(t) on y(t). We want to modify the original expression
Final comment
The equational approach allows us to take into consideration the rate of change of the strength of the attacks. This is not possible or even expressible in the traditional Dung networks.
Let us now see what options we have in the snapshot approach. To simplify, let us assume three points of time, and simple networks, as in Figure 43.

Temporal snapshot approach.
Note the following:
If there is no connection between the times, then this is just a flat network without regard to time. Even if we add attacks from future to past, e.g.
The only way is to say that, for example
This approach is investigated in my paper with Gabbay and Modgil (2009). See also my paper with Barringer and Gabbay (2010).
Discussion
Let us put forward how we see the results of this paper. This is my personal view and it explains the methodology of this paper.
There are several areas in logic where major monotonic and fixed point operations take place. For example,
Logic programming, where the content of the logic programme is determined by fixed points of suitable monotonic operations on the Herbrand universe. Pure logic (e.g. classical or Ł ukasiewicz logics), where the deductive closure of theories is determined by fixed points of the consequence operations. Default logics, autoepistemic logics and the like where the extensions are defined as fixed points of certain operations. In each of the above areas, let us identify roughly two major “components”.
The unit operational concepts. The fixed point extensions as defined using (a). In logic programming, (a) is the Horn clause and negation as failure. In pure logic, (a) is the notion of proof rules (or immediate consequence). In default logic, (a) is the default rule. (b) is more or less defined using (a) in a predictable way. In the year 1995, Dung (1995) came with another area: Argumentation frames.
His basic concept (a) was attack and admissibility, and using that he defined fixed points and extensions. His seminal paper contains more. He identified his own (a) notions in the (a) notions of default logic and in logic programming and thus was able to present default logic and logic programming in the framework of argumentation.
In my view all of these areas, (1)–(4) belong to the same family of systems and share a set-theoretic fixed point approach.
Being in the same family manifests itself also in the predictability and ease of translation from one system (of (1)–(4)) to the other. This was already pointed out in Gabbay (2009a,b) and Gabbay and d'Avila Garcez (2009) and in Sections 2.2 and 8.2 of this paper. It was also pointed out by other researchers, such as Brewka and Woltran (2010) and Brewka et al. (2011).
In fact in my very recent paper (Gabbay), I show that Dung argumentation theory has the power of classical propositional logic, and this of course explains its expressive power.
The equational approach is a different family. It has its root in the early nineteenth century and it is not set theoretic. The fixed point feature does manifest itself in the equational approach through Brouwer's fixed point theorem, but otherwise the equational approach can go in different directions. We now elaborate on these new directions:
Connections with other purely numerical networks such as flow or ecology networks. The extensions in the set-theoretic family are the solutions to equations in the equational approach. The equations can be solved in different ways.
We can impose constraints. We can insist on the solutions to follow certain algorithmic restrictions. We already saw that we need this to implement defaults, but we also can get new results in Logic, as shown in D'Agostino and Gabbay (2011). We can approximate solutions, as we mention in Section 5 of this paper.
Comparison with other papers
Some initial results are put forward to Gratie and Maqda Florea (2011) in the preliminary submission. In communication with them, it appears that they were not aware of Gabbay (2009b). Also translations into argumentations networks, like the ones in Sections 2.2, were already introduced in Gabbay's (2009b) paper and independently in Brewka et al.’s (2011) paper. For further development of the Equational idea see Gabbay, D.M. (2012c), ‘The Equational Approach to CF2 Semantics’, to appear in COMMA 2012.
Gabbay, D.M. (2012d), ‘The Equational Approach to Logic Programs’, to appear in LNCS 7265 Festschrift for Vladimir Lifschitz, eds. E. Erdem, J. Lee, Y. Lierler, and D. Pearce, pp. 279–295.
Gabbay, D.M. (2012e), ‘What is Negation as Failure Paper Written in 1985’, revised version published in Sergot Festschrift, eds. A. Artikis et al., LNAI 7360, Heidelberg: Springer, pp. 52–78.
Gabbay, D.M. Meta-Logical Investigations in Argumentation Networks, Research Monograph for Springer.
Footnotes
Acknowledgements
I am grateful to Martin Caminada, Nachum Dershowitz, Phan Minh Dung, David Makinson, Alex Rabinowich, and Serena Villata for helpful discussions. I am also indebted to the referees for their penetrating comments and methodological criticisms. Research done under ISF project: Integrating Logic and Network Reasoning.
