Defeasible Logic Graphs for Decision Support

Similar documents
Graphical Representation of Defeasible Logic Rules Using Digraphs

Argumentation Semantics for Defeasible Logics

A Comparison of Sceptical NAF-Free Logic Programming Approaches

Agents, Epistemic Justification, and Defeasibility

Argumentation Semantics for Defeasible Logic

Strong and Default Negation in Defeasible Logic Programming

A Flexible Framework for Defeasible Logics

3. G. Antoniou, D. Billington, G. Governatori and M.J. Maher. A exible framework

Dialogue Games in Defeasible Logic

From: AAAI Technical Report FS Compilation copyright 1993, AAAI ( All rights reserved.

Research Report AI Defeasible Prolog. Donald Nute. Articial Intelligence Programs. The University of Georgia

A Semantic Decomposition of Defeasible Logics

A Knowledge Representation Language for Defeasible Argumentation 1 2

Defeasible Logic on an Embedded Microcontroller

Guide Note 15 Assumptions and Hypothetical Conditions

The Analytic Hierarchy Process. M. En C. Eduardo Bustos Farías

Review of the Plaistow and Ifold Site Options and Assessment Report Issued by AECOM in August 2016.

1. Department of Decision Sciences & Information Management, Katholieke Universiteit Leuven, Belgium

HOW TO CREATE AN APPRAISAL

Exposure Draft of Proposed Changes to ADVISORY OPINION 21 (AO-21), USPAP Compliance

Chapter 4 An Economic Theory of Property

Relating Concrete Argumentation Formalisms and Abstract Argumentation

Solutions to Questions

RE: Recommendations for Reforming Inclusionary Housing Policy

Intangibles CHAPTER CHAPTER OBJECTIVES. After careful study of this chapter, you will be able to:

Common Errors and Issues in Review

Network Analysis: Minimum Spanning Tree, The Shortest Path Problem, Maximal Flow Problem. Métodos Cuantitativos M. en C. Eduardo Bustos Farías 1

Joint Ownership And Its Challenges: Using Entities to Limit Liability

OPINION OF SENIOR COUNSEL FOR GLASGOW ADVICE AGENCY (HOUSING BENEFIT AMENDMENTS

CONFLICTING ELEMENTS

Ad-valorem and Royalty Licensing under Decreasing Returns to Scale

Normative Systems. The meeting point between Jurisprudence and Information Technology? Luigi Logrippo

Applying IFRS. A closer look at the new leases standard. August 2016

Landlord & Tenant Helpsheet

Building Control Regulations APPLICABILITY OF PROVISIONS OF S.I.9 OF 2014 TO HOUSE EXTENSIONS 16 January 2015 Eoin O Cofaigh

December 13, delivery: To: Subject: File Reference No

SUMMARY 1 - UNCITRAL INTELLECTUAL PROPERTY ISSUES JANUARY 08 EXPERTS MEETING. Neil Cohen and Steve Weise

Issues to Consider in Rights of First Refusal

Important Comments I. Request concerning the proposed new standard in general 1.1 The lessee accounting proposed in the discussion paper is extremely

Cube Land integration between land use and transportation

Data Verification. Professional Excellence Bulletin [PP-14-E] February 1995

National Association for several important reasons: GOING BY THE BOOK

Figure 1. The chart showing how the effort and cost of the design changes are affected as the project progresses (Anon.) Simulation tools are a key co

RE: Proposed Accounting Standards Update, Leases (Topic 842): Targeted Improvements (File Reference No )

A System for Nonmonotonic Rules on the Web

Grounded Consequence for Defeasible Logic

Comment Letter on Discussion Paper (DP) Preliminary Views on Leases

The Ethics and Economics of Private Property

SCOTTISH GOVERNMENT RESPONSE TO PRIVATE RENTED HOUSING (SCOTLAND) BILL STAGE 1 REPORT

Defeasible Reasoning About Beliefs and Desires

Agency Duties. Objectives. Upon completion of this section the student should be able to:

Six Steps to a Completed Appraisal Report

CASE LAW UPDATE, JUNE 2009

Visualization of Proofs in Defeasible Logic

Optimal Apartment Cleaning by Harried College Students: A Game-Theoretic Analysis

7829 Glenwood Avenue Canal Winchester, Ohio November 19,2013

A Note on the Efficiency of Indirect Taxes in an Asymmetric Cournot Oligopoly

Exposure Draft ED/2013/6, issued by the International Accounting Standards Board (IASB)

Estimating Commercial Land-Use Conversion: Case Study of Athens-Clarke County, Georgia

IREDELL COUNTY 2015 APPRAISAL MANUAL

AIREN. A Decentralized Network where AI meets Real Estate

Minutes of the May 30, 2007 Board Meeting Transfers of Financial Assets: Linked-Presentation Model

BOUNDARY SURVEYS RE-SURVEYS

Valuing Land in Dispute Resolution: Using Coefficient of Variation to Determine Unit of Measurement

How to Read a Real Estate Appraisal Report

General Terms and Conditions for the Sale and Delivery of Software Support Services Edition

THE PURPOSE OF MEASUREMENTS IN BOUNDARY SURVEYS. (THE ETERNAL SUVRVEY QUESTION: HOW CLOSE IS CLOSE ENGOUGH?) By. Norman Bowers, P.S. & P.E.

The Relationship Between Micro Spatial Conditions and Behaviour Problems in Housing Areas: A Case Study of Vandalism

property even if the parties have no lease arrangement. This is often called an option contract.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

The purpose of the appraisal was to determine the value of this six that is located in the Town of St. Mary s.

Tutorial - Part IV Applications Serena Villata

Defeasible Logic for Automated Negotiation

The agent-based modeling approach to MFM: A call to join forces

RUDGE REVENUE REVIEW ISSUE XVI

RV SPACE RENTALS. The law treats long term (over 180 days) RV space rentals differently than short term space rentals.

Oregon State University Extension Service

Chapter 2 Rent and the Law of rent

SuperTRUMP with FASB ASC Topic 842, Leases

Law of Property Study Notes: Real Rights 2014 AfriConsult Group Page 1

File Reference No Re: Proposed Accounting Standards Update, Leases (Topic 842): Targeted Improvements

Tax Credit Management Abilities

A Framework for Multiagent Deliberation Based on Dialectical Argumentation

Trends in Affordable Home Ownership in Calgary

Technical Line FASB final guidance

[03.01] User Cost Method. International Comparison Program. Global Office. 2 nd Regional Coordinators Meeting. April 14-16, 2010.

LeaseCalcs: The Great Wall

CAN T STAND WAITING? BOTHERED BY LONG LINES? THEN ELECTRONIC RECORDING IS FOR YOU... AND IT MAY BE COMING SOON TO A RECORDER NEAR YOU!

History and Theory of Architecture

Fulfilment of the contract depends on the use of an identified asset; and

LAND APPEAL COURT OF QUEENSLAND

This Appendix was written to be read in its entirety and has been broken down into the following sections:

REMEDIES Copyright February State Bar of California

Outline. Section 21.6 (pp ) ISC

Heathrow Expansion. Land Acquisition and Compensation Policies. Interim Property Hardship Scheme. Policy Terms

December Arbon House, 6 Tournament Court, Edgehill Drive, Warwick CV34 6LG T F

Features Guide. Enhancements. Mortgage Calculators VERSION 7. May 2008

concepts and techniques

Easements, Covenants and Profits à Prendre Executive Summary

In several chapters we have discussed goodness-of-fit tests to assess the

Transcription:

Defeasible Logic Graphs for Decision Support Donald Nute Artificial Intelligence Center Department of Philosophy The University of Georgia Athens, GA 30602, U.S.A. Katrin Erk Department of Computer Science University of Koblenz Koblenz, Germany Abstract Knowledge based systems provide decision support by applying a previously developed representation of knowledge for a particular domain. We describe a method for representing knowledge about any domain using defeasible logic graphs. Because these graphs are based on a defeasible logic of the sort described in [9], they can represent uncertain or incomplete knowledge. We reason about the represented domain by propagating markers in the graph to show which propositions are true, false, or unestablished. We propose to construct an argumentation based software system incorporating defeasible logic graphs. We establish the formal foundations for such a system by showing that the inference mechanism for defeasible logic graphs is sound and complete with respect to defeasible logic. 1 Introduction Decison support systems include a wide variety of software systems designed to aid the user in making complex decisions. Knowledge based systems (KBS) that model inference about specific domains incorporate representations of the knowledge necessary to solve problems in their domains. We believe another kind of decision support tool is needed that allows users to model knowledge not already represented in the system. Such an argumentation based system (ABS) would provide tools to help the user represent knowledge about any domain in a graphic manner. It would incorporate an inference mechanism to help the user derive conclusions from the knowledge that has been modeled. The system would make the inference process visible to the user and allow the user to The second author gratefully acknowledges support from the Deutscher Akademischer Austauschdienst during her year at the University of Georgia. construct a variety of what-if scenarios easily and quickly. While a KBS applies preselected argument structures to the information provided by the user, an ABS would allow the user to construct and evaluate competing arguments on any subject before making a decision. Systems of this sort have been presented in P, 21. An ABS inference mechanism should support reasoning in uncertain domains and reasoning with incomplete information. Many knowledge based systems use certainty factors, probabilities, fuzzy logic, or other essentially quantitative methods for this kind of reasoning. Finding useful numbers for such systems is a major part of the knowledge acquisition process. An ABS should incorporate a qualitative approach to the representation of uncertain or incomplete information, one that does not require the user to assign numbers to pieces of knowledge. The inference scheme must be reasonably simple and intuitive. Fortunately, recent AI research provides formalisms for defeasible reasoning in which a line of argument can be defeated by another line of argument ([3, 4, 5,6, 7, 8, 9, 10, 111). Defeasible formalisms directly model the ways in which arguments can rebut or undercut each other. These systems represent the pieces from which arguments are constructed as rules having no numerical component. We will describe a visually oriented knowledge representation system and a defeasible inference mechanism that lends itself to implementation as an ABS. Knowledge is represented in a defeasible logic graph. A node in a graph represents the premise or conclusion of a rule. The a,rcs in the graph are arrows, and different kinds of arrows indicate different roles a rule can play in an argument. We reason with a graph by propagating the ma,rkers +, -, and? through the graph to mark which of the premises or conclusions are true, false, or impossible to establish from available information. The system of defeasible logic graphs is based on the family of defeasible logics developed in [9]. We 1060-3425196 $5.00 0 1996 IEEE 11

will state results that explain how the formal proof theory serves as a semantics for the defeasible logic graph system. Proofs for these results, which could not be included due to space limitations, are available in [12]. The method of defeasible logic graphs has not been implemented as a software program. In the final section of the paper, we describe the kind of ABS that could (and, we hope, will) incorporate the defeasible logic graph method. 2 The language We define atomic formulas in the usual way. A literal is any atomic formula or its negation. Where p is an atomic formula, we say p and wp are the complements of each other. lp denotes the complement of any literal p, positive or negative. Rules are a class of expressions distinct from formulas. Rules are constructed using three primitive symbols: -+, +, and +. Where A U {p} is a set of formulas, A-p is a strict rule, A=+p is a defeasible rule, and A w p is a defeater. In each case, we call A the antecedent of the rule and we call p the consequent of the rule. Where A = {q}, we denote A+p as g--+p, and similarly for defeasible rules and defeaters. Antecedents for strict rules and defeaters must be nonempty; antecedents for defeasible rules may be empty. We will call a rule of the form @=~p a presumption and represent it more simply as up. All rules are read as if-then statements. We read A-+p as If A, then definitely p, A=+p as If A, then evidently (normally, typically, presumably) p, +p as Presumably, p, and A -+ p as If A, then it might be that p. The role of a defeater is only to interfere with the process of drawing an inference from a defeasible rule. Defeaters never support inferences directly. If free variables occur in a rule, we interpret the rule as though all variables were bound by universal quantifiers that have the entire rule within their scope. So, for example, we read Fx+Gx as F S are typically G s. Rules themselves are conceived as policies for forming and revising beliefs. A typical example of a defeasible rule in English is Birds fly. We might accept this rule because most birds do fly. We might even call the English sentence true for this reason. But as a rule, we interpret the sentence to mean something like Take a thing s being a bird as evidence that it flies. This is an imperative and does not have a truth value. We understand a rule, not by knowing what would make it true or false, but by knowing what would be involved in complying with it. so defeasible rules have compliance conditions rather than true conditions. We expect that any suitable semantics for defeasible logic will be procedural and will derive directly from proof theory. For further discussion, see [13]. Our formal language lacks the power to describe some situations that we might find interesting, but it is adequate for a wide range of examples. Adding disjunction and existential quantification to the language would increase the expressive power and disjunctive permissions raise interesting logical issues, but these possibilities will not be considered here. 3 Defeasible logic Definition 1 A defeasible theory is a set of literals and rules. If T is a defeasible theory, then TR is the set of rules in T with nonempty antecedents. We only apply a defeasible rule when we think that it is not defeated. In a formal system for defeasible reasoning, we sometimes need to show that something is not derivable from available information in order to apply a defeasible rule. For example, we know that birds typically fly and penguins do not. We shouldn t use the first of these rules to infer that a particular bird flies when we have evidence that the bird is a penguin. To demonstrate that flight evidently follows from what information we have about a particular bird, we need to demonstrate that available information will not support the conclusion that the bird is a penguin. We write T t- p to indicate that p is derivable from T using only the strict rules in T. We write T k p to indicate that the derivation of p from T may require the use of defeasible rules in T. We use T -1 p to indicate that demonstrably p is not derivable from T using only the strict rules in T. And we use T 4 p to indicate that demonstrably p is not derivable from T using both the strict and defeasible rules in T. Read T k p as T proves p, T k p as T supports p, T -I p as T won t prove p, and T 4 p as T won? support p. Note that T -1 p is quite different from T y p (p is not strictly derivable from T), and T 4 p is quite different from T 6 p (p is not defeasibly derivable from T). Just because a conclusion is not derivable does not mean that we can demonstrate that it is not derivable. To define a defeasible logic C, we must specify when a defeasible theory T proves, won t prove, supports, or won t support a literal p in C. We do this by identifying C with a set of inference rules defining t-, -1, k, and -(. Definition 2 Where C is a set of rules defining!-, -1, k, and 4, T is a defeasible theory, and p is a 12

literal, T l-r. p iff we can show T t- p using finitely many applications of the rules in C. We define T ix p, T k,p, and T 4 zp similary. Not just any set of rules for F, i, k, and -/ will define a reasonable logic. Since T I- p means p is derivable from T and T -1 p means p demonstrably is not derivable from T, a set of rules that allowed us to show both would be incoherent. The same is true for k and 4. Definition 3 C is a &feasible logic iff C is a set of rules defining I-, -I, k, and 4, and there is no defeasible theory T and literal p such that either T I-C p andt-icp,ortknpandtdcp. Mf: If 1. p E T, or 2. A-+p E T and for every a E A, T I- a, then T I- p. M-: If 1. petand 2. for every A--tp E T, there is a E A such that T -I a, then T -I p. E+: EE-: IfTl-p,thenTkp, IfT-lpandT~~p,thenT~p. Definition 4 M = {M+, M-, E+, EE-}. Theorem 1 M is a defeasible logic. The system M represents a minimal defeasible logic, one that includes little more than the monotonic core of a defeasible logic. This system is quite close to the minimal system defined in [9] except that the rule EE- replaces the slightly weaker rule E- in that paper. We could allow detachment of the consequent of a strict rule whenever its antecedent is defensibly derivable. But consider the case when we have competing strict rules and the antecedents of both are only defeasibly derivable. In this case, we will not detach the consequent of either strict rule. This localizes contradictions. We call defeasible logics with this feature semi-strict. ss+: If 1. T -I -lp, 2. there is A-+p E T such that for all a E A, T b a, and 3. for each B-d~p E T, there is b E B such that T--lb then T k p. Now we introduce a rule for detaching the consequent of a defeasible rule. DL.+: If there is A*p E T such that 1. T -1 -up, 2. for each a cf A, T b a, 3. for each B--+-p E T, there is b E B such that T 4 b, and. 4. for each C-*lp E T or C cu up E T, either (a) there is c E C such that T 4 (b) for each c E C, A IJ TR b a E A., C U TR 4 a, then T k p. c or c, and for some We want to a,dd SS+ and D&, to M, but we must also add a stron.ger rule than EE- that will allow us to conc1ud.e that a theory T won t support p in a wider range of cases. We need a rule that says we can do this when E+, SS+, and D$ can all be shown to fail. SD& If 1. T i p, 2. for each A-+p E T, either (a) there is a E A such that T 4 a, or (b) there is B--tip E T such that for all b E.B, T lb b, 3. for each CT+-p E T, either (a).there is c E C such that T 4 c, (b) there i.s D+lp D, T b d, or E T such that for each d E (c) there is E=+lp E T or Ewlp E T such that for each e E E, T + e, and either then T 4 p. i. for each c 6 C, E U TR b c, or ii. there is e E E such that C U TR 4 e, Definition 5 SD = M U {SS+, D$, SDS}. Theorem 2 SD is a defeasible logic. 13

4 Defeasible graphs The argumentation based system we envision will allow the user to build a graph that represents defeasible theories. Initial assumptions of the theory and the antecedents and consequents of rules in the theory become nodes in the graph, and rules in the theory become links in the graph. The user will build a graph by interacting with the screen with the keyboard and the mouse. Our defeasible language allows variables, but our ABS will only support graphs whose structure is propositional. In the rest of this paper, atom will mean a propositional constant and literal will mean an atom or its negation. Since users will only construct finite graphs, we restrict ourselves to graphs corresponding to finite theories. Special problems arise when there are loops in the reasoning. If we linked compound nodes to all the atoms that occur in them, these loops would show up in graphs as cyclical paths. We restrict our investigations to acyclic graphs. We will mark a node in a graph with a + to indicate that it is (evidently) true and with a - to indicate that it is (evidently) false. We will sometimes establish that a particular literal cannot be shown to be true. We will indicate this by marking that literal with?. When we use a graph to reason, we first mark some nodes with + or - to show our initial assumptions. Then we propagate markers through the graph. We want to develop a method for doing this which is sound and complete relative to our defeasible logic. Definition 6 A defeasible graph is a labeled graph satisfying the following conditions. Each node in the graph is labeled with finitely many literals or with the symbol T. No two nodes have the same label. Each arc in the graph is labeled -+, -/+, +, +, *, or +. If an arrow points toward a node or if a node is isolated, then the node is labeled with an atom. -t, +, or u are positive links, while -j+, +, and + are negative links. Where p is a literal, we mean by node p in graph G the node in G (if there is one) labeled p. Where A is a set of literal, we mean by node A in graph G the node in G if there is one labeled by the literals in A. A compound node is a node labeled with a negative literal or with more than one literal. An isolated node is a node that has no arrows pointing toward it or away from it. The node that an arrow points away from is the antecedent of that arrow, and the node it points toward is its consequent. Definition 7 A defeasible graph G is acyclic iff there is no sequence ~1,..., on. of links in G satisfying the following conditions: 1. 2. for each i < n, if ci is a positive (negative) link with head p, then p (-p) is a member of the antecedent of ui+r, and if on is a positive (negative) link with head p, then p (-p) is a member of the antecedent of ~1. Definition 8 A marked graph is a defeasible graph in which some of the nodes are marked +, -, or?. Definition 9 Let G be a marked graph and let p be an atom. The marked graph G* is the result of marking p with + (-) in G iff p is unmarked in G and G is exactly like G except that (a) p is marked + (-) in G*; (b) for each unmarked compound node A in G* if i. p E A (-p E A), ii. for every atom a E A, a is marked G*, and + in iii. for every literal -a E A, a is marked - in G*, then A is marked + in G*; and (c) for each unmarked compound node B in G*, if -p E B (p E B) then B is marked - in G. The marked graph G* is the result of marking p with? in G iff p is unmarked in G and G* is exactly like G except that (a) p is marked? in G*, and (b) for each unmarked compound node A in G such that p E A, A is marked? in G*. The marked graph G* is the result of marking p with? in G iff p is either unmarked in G or p is marked? in G, and G* is exactly like G except that for each unmarked compound node A in G such that -p E A, A is marked? in G*. If a node in graph G is marked +, we will say the node is satisfied in G. If a node in graph G is marked - or?, we will say the node is failed in G. We will say an arrow is satisfied (failed) in G if the antecedent of the arrow is satisfied (failed) in G. 14

Definition 10 Let T be a defeasible theory. Then the initial graph for T (in symbols, GT) is the marked graph satisfying the following conditions. n f For each atom or set of literals z, there is a node labeled z iff either z is the consequent or antecedent of some rule in T, or x is an atom and either x E T or -x E T. A-+p is in GT(A+p is in GT, A-tp is in GT) iff A--+p E T (A+p E T, Aup E T). A+p is in GT(A+p is in GT, A+p is in GT) iff A+ wp E T (A+ -p E T, A+ -p E T). For each node n, either (a) n is labeled by an atom p, p E T, and n is marked +, or (b) n is labeled by an atom p, mp E T, and n is labeled -, or (c) n is not marked. Once we have generated the initial graph for a theory, we need a mechanism for marking additional nodes to represent the inferences the graph supports. Let s look at some examples that illustrate some of the features this mechanism should have. /-\ 0 b 4- P+ Figure 1: The Tweety Triangle are adults, normally are not employed, and normally do not support themselves. Jane is a university student and Jane is employed. The propositional version of this theory is {a=+e, e=+-s, U=M, UZJ -e, u=+ NS, u, e}. The initial graph is shown in Figure 2. Example 1 (Tweety Triangle) Birds normally fly and penguins normally don t, but penguins are birds. Tweety is a penguin. The corresponding defeasible theory is {Bx+Fx, Px=+ N Fx, Px+Bx, Pt}. But what we are really interested in is the corresponding propositional theory {b+f, p+ -f, ~4, p}. The initial graph is shown in Figure 1. In the Tweety Triangle, we begin with a single node marked +. Only a satisfied positive arrow points toward b (Tweety is a bird). So we have evidence that Tweety is a bird and no evidence to the contrary. We mark node b with +. Now we have conflicting evidence about whether Tweety flies: a satisfied positive arrow and a satisfied negative arrow pointing toward node f. We resolve the conflict by noting that there is a satisfied positive arrow pointing from p to b. So we could infer (as we just did) that Tweety is a bird from the information that he is a penguin. Given the knowledge represented in the graph, p provides more specific information than b. So p+f is the superior arrow and we mark f with -. Example 2 (The University Student) Adults are normally employed and employed people normally support themselves. But university students normally Figure 2: The University Student In Example 2, we begin with u and e marked +. We only have a satisfied positive arrow pointing toward a; so we conclude that Jane is probably an adult and mark a with +,. Now we have conflicting evidence about s. There is a path from u to e made up entirely of satisfied positive arrows, which suggests that u is more specific than e. But we also have a satisfied negative arrow directly from u to e. So the argument to show that 2~ is more specific than e is itself defeated. We must mark s with a?. Example 3 (The Election) The Right Party and 15

the Left Party will enter candidates in the Presidential election. Presumably, the Rightists will nominate Arnold and not Barber or Cook. But the Rightists likely will not nominate Arnold if Douglas does not support him. If the Rightists don t nominate Arnold, apparently they will nominate Barber. Douglas is unlikely to support either Arnold or Barber if Cook votes for Douglas crime bill, and apparently Cook will vote for Douglas bill. Olson is expected to win the Leftist nomination if she runs; but apparently she will stay out of the race. If Olson is not a candidate, the Leftists will likely nominate Nelson. And if the Leftists nominate neither Nelson nor Olsen, they will likely go with Miller. If Olsen goes up against Barber or Cook in the election, Olsen should win. Barber should take the election from Nelson, but Nelson should win if Douglas doesn t support Barber. The defeasible theory describing this example is {Jra, =I=b, =bg waj+ta, Wa=N-b, vf+sa, v+sb, Jv, co*lo, +co, wo*ln, {-lo,-zn}*lm, ra-wr, rb-+or, {or, ~o}*po, {rb, ~nkwb, (6 ~n)=l+m, (6 In, Nsb}+pn, {rb, In, -sb}+pb}. The initial graph is shown in Figure 3. The Election is a fairly complex example. We first mark all the T nodes +. Now TC, v, and co each have exactly one satisfied arrow pointing toward them. We mark v with + and we mark I-C and co with -. But since co is marked -, we mark N co with +. This should allow us to mark In with +. Furthermore, since v is marked + and the only arrows pointing toward sa and sb are negative arrows with v as antecedent, we mark sa and sb with -. But then we should mark Nsa with +. ra now has a satisfied positive and a satisfied negative arrow pointing toward it. But T contains no information and thus must be less specific than any other antecedent. So by specificity we mark ra with - and mark -a with +. Similarly, we can now mark rb with +. Evidently Barber will be the Right Party candidate and Nelson will be the Left Party candidate. The node labeled err in our graph represents the proposition that the Rightists nominate either Arnold or Barber. By treating this disjunction as an atomic proposition, we sneak a disjunction into our graph. Since we only have positive arrows pointing toward or and one of them is satisfied, we mark OT with +. Now we can mark {rb, ln} and {rb, In, Nsb} with +. Since the latter is clearly more specific than the former, we mark pn with + and pb with -. It appears that Nelson will be the next President. We mark all the other nodes with? since we cannot show them to be either evidently true or evidently false. These examples use presumptions and other defea- sible rules almost exclusively. In fact, strict rules and defeaters do not occur that often in natural examples. If we had a strict and a defeasible arrow pointing toward the same conclusion, one positive, one negative, and both satisfied, we should prefer the strict arrow. This is built into our defeasible logic and should be a part of our inference mechanism for defeasible graphs. For more patterns of defeasible arguments, see [9]. 5 Extensions of defeasible graphs We define monotonic extensions of the initial graph for a defeasible theory T, intuitively, as graphs generated by marking nodes which are strictly derivable from the theory T. Definition 11 Let T be any defeasible theory. Then G is a monotonic extension of GT iff either 1. G = GT, or 2. for some monotonic extension G* of GT, there is a satisfied A+p in G* (A+p in G*) such that p is unmarked in G* and G is the result of marking p with + (-) in G*. Definition 12 Let T be a defeasible theory and let G be a monotonic extension of GT. Then G is a maximal monotonic extension of GT iff for every monotonic extension G* of GT and every node p in G*, if p is marked in G, then p is marked similarly in G. It doesn t matter in what order we mark the strict consequences of a theory in the corresponding defeasible graph. Once a strict arrow in a graph is satisfied, nothing can prevent us from marking the consequent of the arrow either + or -. Thus, we get the following theorem. Theorem 3 For each finite, defeasible theory T, there exists a unique maximal monotonic extension of GT. Definition 13 GL is the maximal monotonic extension of the defeasible theory T. Each monotonic extension of GTcorresponds to the result of finitely many applications of the rule Mf to T. Gs corresponds to the result of applying M+ repeatedly until there is no further opportunity to apply it. Theorem 4 If T is a finite defeasible theory and p is an atom, then 16

I PO I Figure 3: The Election 1. Tl-piffpismarked+inGL,and 2. T t--p iff p is marked - in G$. Definition 14 For each defeasible theory T, Gc is exactly like GG except that 1. if T is in GT, then T is marked + in GT, and 2. if a literal p occurs unmarked in GL and there is no positive (negative) link which has p as its head in GG, then p (-p) is marked? in Gg. Condition (1) in Definition 14 merely notes that the node marked T is true since T just means true. This is just a convenient device to satisfy all presumptions. Condition (2), on the other hand, corresponds to applying rule SDS as many times as possible to our graph after we have marked all the monotonic consequences. If a node is marked?, we know that we will never be able to mark it +. So we can establish at this point that certain links are failed. Theorem 5 If T is a finite defeasible theory, p is a literal in GT, and p is marked? in G& then T -1 p, and T 4 p. Definition 15 Let T be any defeasible theory. Then G is a defeasible extension of GT iff any of the following hold. 1. G = G;. 2. For some defeasible extension G* of GT and some atom p, G is the result of marking p with f (-) in G, and there is A-tp (A+p) in GT such that (a) A is satisfied in G*, (b) for all B-j+p (B--+p) in GT, B is failed in G*. 3. For some defeasible extension G* of GT and some atom p, G is the result of marking p with + (-) in G, and there is A=+-p (A+p) in GT such that (a) A is satisfied in G*, 17

(b) for all B-/+p (B+p) and in GT, B is failed in G*, (c) for all Cpp or C+p (C=+p or C-p) in GT, either i. C is failed in G*, or ii. A is at least as GT-specific is not as GT-specific as A. as C, and C 4. For some defeasible extension G* of GT and some atom p, G is the result of marking p (-p) with? in G, and (a) for each A--+p (A+p) i. A is failed in G*, or ii. there is B-j+p (B+p) is satisfied in G*, and in GT, either in GTsuch that B (b) for each link C=+ (C+p) in GT, either ii. 1.... 111. C is failed in G*, there is a D-/+p (D-+p) D is satisfied in G*, or in GTsuch that there is E=/+p or E+p (E+p or E-vtp) in GTsuch that E is satisfied in G and either 0 E is at least as GT-specific as C, or l C is not as GT-specific as E. Definition 16 Let T be any defeasible theory and let A and B be any sets of literals. T(A) = {R : R E T, R is a rule, and the antecendent of R is non-empty} U A. A is at least as GT-specific as B iff A and B are nodes in GTand either B = T or there is a defeasible extension G of GT(*) in which B is marked +. A is not as GT-specific as B iff A and B are nodes in GTand there is a defeasible extension G of GTtA) in which B is failed. Conditions (a), (3), and (4) in Definition 15 correspond roughly to the rules SSf, SDS, and SD, in our defeasible logic. The specificity definitions could be inserted directly into conditions (3) and (4) but are stated separately here to make Definition 15 more readable. 6 Soundness and completeness Theorem 6 [Soundness] Let T be a defeasible theorem, p an atom, and G a defensible extension of GT. 1. If p is marked + in G, then T /- p. 2. If p is marked - in G, then T b -p. 3. If p is marked? in G*, then T 4 p. 4. If -p is marked? in G*, then T 4 -p. Theorem 7 [Completeness, first version] Let T be a finite defeasible theory such that GTis acyclic, and let p be any atom. 1. If T b p, then there is a defeasible extension G* of GTsuch that p is satisfied in G*. 2. If T b -p, then there is a defeasible extension G* of GTsuch that p is marked - in G*. 3. If T 4 p, then there is a defeasible extension G* of GTsuch that p is failed in G*. 4. If T 4 wp, then there is a defeasible extension G of GTsuch that p is marked + in G* or -p is marked? in G*. Definition 17 Let T be a defeasible theory and let G be a defeasible extension of GT. Then G is a maximal defeasible extension of GTiff for every defeasible extension G of GTand every node p in G*, if p is marked in G*, then p is marked similarly in G. Theorem 8 Let T be a finite defeasible theory. Then GThas a unique maximal defeasible extension. Definition 18 Let T be a finite defeasible theory. Then Gg is the maximal defeasible extension of GT. Theorem 9 [Completeness, second verson] Let T be a finite defeasible theory such that GTis acyclic, and let p be any atom. 1. If T k p, then p is satisfied in Gs. 2. If T b -p, then p is marked - in Gz. 3. If T 4 p, then p is failed in Gg. 4. If T 4 wp, then p is marked + in G$ or -p is marked? in G $. 18

7 Implement at ion We plan to develop an ABS in LPA-Prolog running under Microsoft Windows based on the method of defeasible logic graphs described in this paper. LPA- Prolog provides good support for the graphical interface and an excellent environment for development of the underlying inference mechanism. The system will use a drag-and-drop method to build a graph from standard components. We plan to use coior to distinguish the different kinds of links in the graph and to indicate the markings of the nodes. We think this use of color should make it easy for the user to understand the graph quickly. The user will be able to attach both a short descriptor and text of moderate length to a node. The short descriptor will appear in the graph, but the longer text will be readily available. A table of literals will also be built together with their marks. Users will explore different scenarios by marking different initial sets of assumptions with + or -. The system will build the defeasble theory internally as the graph is built. It will be able to complete the marking of the graph at the user s command, identify nodes which can be marked at each step, or deduce the value of a given node selected by the user. An advantage of the proposed ABS is that it will be sound and complete with respect to defeasible logic. The defeasible logic SD has been implemented as an extension of Prolog called d-prolog [14]. An important difference between d-prolog and the method of defeasible graphs described here is that d-prolog is a backward-chaining inference engine while an inference mechanism based on defeasible graphs would be forward-chaining. Other systems which might be described as ABSs ([l, 21) include a hypertext system. Documents containing the underlying information and knowledge are linked to components in the user s graphical representation of propositions and their support relations. We do not plan a hypertext component in our prototype ABS. In principle, this could be added later or our prototype could provide an alternative defeasible inference system for existing systems that support such hypertext links. References [l] Conklin, J., and Begemena, M. L. gibis: A Tool for All Reasons. J. American Society for Information Systems 40, 140-152, 1989. I31 Colburn, T. Defeasible Reasoning and Logic Programming. Minds and Machines 1, 417-436, 1991. Hua, H., and Kimbrough, S. On Hypermediabased Argumentation Decision Support Systems. Unpublished manuscript. Delgrande, J. An Approach to Default Reasoning Based on a First-order Conditional Logic: Revised Report. Artificial Intelligence 36, 63-90, 1988. Geffner, H. On the Logic of Defaults. AAAI-89. Morgan Kaufmann, Los Altos, California, 1989. Geffner, H. and Pearl, J. A Framework for Reasoning with Defaults. In H. Kyburg, R. Loui, and G. Carlson (eds.), Knowledge Representation and Defeasible Reasoning. Studies in Cognitive Systems. Kluwer Academic Publishers, Boston, 1990. Kimbrough, S. and Hua, H. On Nonmonotonic Reasoning with the Method of Sweeping Presumptions. Minds and Machines 1, 393-416, 1991. Loui, R. Defeat Among Arguments: A System of Defeasible Inference. Computational Intelligence 3, 100-106, 1987. Nute, D. Basic Defeasible Logic. In L. Farms de1 Cerro and M. Penttonen (eds.), Intensional Logits for Programming. Oxford University Press, Oxford, 1992. [lo] Nute, D. Defeasible Logic. In D. Gabbay and C. Hogger (eds.), Handbook of Logic for Artificial Intelligence and Logic Programming, Vol. III. Oxford University Press, Oxford, 1994. [ll] Pollock, J. How to BuiZd a Person. Bradford/MIT Press, Cambridge, 1990. [12] Nute, D. and Erk, K. Defeasible Logic Graphs. Technical Report, Artificial Intelligence Center, The University of Georgia, Athens, GA. (In preparation.) [13] Nute, D. Inference, Rules, and Instrumentalism. International Journal of Expert Systems Research and Applications 5, 267-274., 1993. [14] Nute, D. Defeasible Prolog. Working Papers of the 1993 AAAI Fall Symposium on Automated Deduction and Nonstandard Logics. AAAI Technical Report FS-93-01, AAAI Press, Menlo Park, CA, 1993. 19