Corrupt Strategic Argumentation: The Ideal and the Naive

@inproceedings{Maher2016CorruptSA,
  title={Corrupt Strategic Argumentation: The Ideal and the Naive},
  author={Michael J. Maher},
  booktitle={Australasian Conference on Artificial Intelligence},
  year={2016}
}
  • Michael J. Maher
  • Published in
    Australasian Conference on…
    5 December 2016
  • Computer Science
Previous work introduced a model of corruption within strategic argumentation, and showed that some forms of strategic argumentation are resistant to two forms of corruption: collusion and espionage. Such a result provides a (limited) basis on which to trust agents acting on our behalf. That work addressed several argumentation semantics, all built on the notion of admissibility. Here we continue this work to three other well-motivated semantics: the ideal, naive, and stage semantics. The… 
Structural Constraints for Dynamic Operators in Abstract Argumentation
TLDR
This paper aims to support development of dynamic operators on formal models in abstract argumentation by providing constraints imposed on the modification of the structure that can be used to incorporate information that has been abstracted away.
Complexity Results and Algorithms for Extension Enforcement in Abstract Argumentation
TLDR
This work provides a nearly complete computational complexity map of fixed-argument extension enforcement under various major AF semantics, with results ranging from polynomial-time algorithms to completeness for the second-level of thePolynomial hierarchy.

References

SHOWING 1-10 OF 18 REFERENCES
Resistance to Corruption of General Strategic Argumentation
TLDR
From these results, it is identified that strategic argumentation under the aims and semantics the authors study is resistant to espionage.
Resistance to Corruption of Strategic Argumentation
TLDR
It is shown that strategic argumentation under the grounded semantics is resistant to corruption – specifically, collusion and espionage – in a sense similar to Bartholdi et al's notion of a voting scheme resistant to manipulation.
Complexity of Exploiting Privacy Violations in Strategic Argumentation
TLDR
This paper presents a much simpler proof of the show that a certain element of reasoning within strategic argumentation is NP-complete, and introduces some computational problems arising from violation of the privacy of a player in a strategic argumentations game, and establishes their complexity.
Computing ideal sceptical argumentation
Two Approaches to Dialectical Argumentation: Admissible Sets and Argumentation Stages
TLDR
This paper proposes a model of the stages of argumentation, related to that of Verheij, and concludes that the argumentation stage approach can give more insight in the procedural nature of dialectical argumentation than the admissible set approach.
An Abstract, Argumentation-Theoretic Approach to Default Reasoning
SCC-recursiveness: a general schema for argumentation semantics
The computational complexity of ideal semantics
  • P. Dunne
  • Computer Science
    Artif. Intell.
  • 2009
Expanding Argumentation Frameworks: Enforcing and Monotonicity Results
TLDR
This paper addresses the problem of revising a Dung-style argumentation framework by adding finitely many new arguments, and proves some monotonicity results for a special class of expansions with respect to the cardinality of the set of extensions and the justification state.
...
...