The influence of defeated arguments in defeasible argumentation
|
|
- Toby Gilbert
- 5 years ago
- Views:
Transcription
1 The influene of efeate arguments in efeasible argumentation Bart Verheij University of Limburg, Department of Metajuriia P.O. Box 616, 6200 MD Maastriht, The Netherlans fax: Abstrat Formal efeasible argumentation is urrently the subjet of ative researh. Formalisms of efeasible argumentation are haraterize by a notion of efeasible argument. The influene of arguments on whih onlusions an be rawn istinguishes formalisms of efeasible argumentation from nonmonotoni logis. This influene ours for two reasons: by the struture of an argument, an by interation with other arguments. In the proess of argumentation not all arguments are available at one. At eah stage of argumentation new arguments are taken into aount. In efeasible argumentation, where arguments an be efeate by other arguments, this results in the possible hange of the status of arguments, epening on whih arguments have been onsiere. Existing formalisms of efeasible argumentation o not provie a proess view on argumentation, or overlook the influene on this proess of the efeate arguments that have been taken into aount. In this paper we argue that a moel of the proess of argumentation requires that the arguments that are efeate at some stage of argumentation annot simply be ignore. Otherwise, ifferent stages of argumentation annot be istinguishe, an orers of argumentation an isappear. Keywors: efeasible argumentation, nonmonotoni logi 1 Introution Currently the formal stuy of efeasible argumentation gets muh attention [BoToKo93, Du93, HaVe94, Li93, Po94, Pr93a, Pr93b, Vr93, Ve95]. Formalisms of efeasible argumentation an be istinguishe from nonmonotoni logis in general. The prinipal istintion is that a notion of efeasible argument is entral. An argument is like a proof: It represents the argumentation from premises to onlusion, inluing the intermeiate steps. Unlike proofs, however, efeasible arguments are not strit, an an beome efeate by other arguments. There are two main reasons to take arguments into aount in efeasible argumentation. First, the struture of an argument influenes whether it is efeate or not. Seon, whether an argument is efeate is influene by other arguments. The struture of an argument The quality of an argument is influene by its struture. For instane, an argument with a number of weak steps is worse than an argument with fewer weak steps, an an argument that uses more information is better than (or as goo as) an argument that uses less. When one only looks at onlusions an reasons (the iret
2 preeessors of a onlusion in an argument) the influene of the struture of arguments is overlooke. Therefore, it is natural to etermine whih arguments an be base on a given set of information first, an then whih onlusions are justifie by those arguments. Other arguments By the interation of arguments some of the arguments taken into aount are unefeate, others efeate. For instane, arguments an impair other arguments, resulting in the efeat of the latter. Arguments an also reinfore eah other, so that they remain unefeate. Beause only unefeate arguments justify their onlusions, an the interation of arguments influenes whih arguments are efeate an whih unefeate, arguments have to be onsiere when one etermines the onlusions that follow from given information. Not all formalisms mentione use arguments for both reasons. Together these reasons an be use to istinguish formalisms of efeasible argumentation from others (see also setion 6). In the next setion we explain why efeate arguments annot be ignore at a stage in the proess of argumentation. In the setions thereafter we esribe a formalism appropriate for moeling the influene of efeate arguments. After a brief omparison with some other formalisms of efeasible argumentation, we en with the onlusion of this paper. 2 How efeate arguments influene argumentation An overlooke aspet of efeasible argumentation is the influene of the efeate arguments that have been taken into aount. A goo example an be given in ase of arual of arguments. 1 Arguments for a onlusion arue, if they reinfore eah other, an therefore together give better support to their onlusion than on their own. We give an example. Suppose we have the situation that there are three arguments, enote α 1, α 2 an β, available to a reasoner. It an be the ase that the arguments α 1 an α 2 are both on their own efeate by β, but together remain unefeate, an even efeat β. So, we have the following situation: The argument β efeats the argument α 1, if α 1 an β are the arguments onsiere. The argument β efeats the argument α 2, if α 2 an β are the arguments onsiere. The arguments α 1 an α 2 efeat the argument β, if α 1, α 2 an β are the arguments onsiere. 2 1 The term is use by Pollok [Po91]. Even though Pollok fins it a natural supposition that arguments arue, he surprisingly rejets it. Verheij [Ve95] argues that arguments o arue, an provies a formal moel for it. This paper extens that moel. 2 The following natural language example is taken from Verheij [Ve94]. Assume that John has robbe someone, so that he shoul be punishe (α 1 ). Nevertheless, a juge eies that he shoul not be punishe, beause he is a first offener (β). Or, assume that John has injure someone, an shoul therefore be punishe (α 2 ). Again, the juge eies he shoul not be punishe, being a first offener (β). Now assume John has robbe an injure someone at the same time, so that there are two arguments for punishing him (α 1, α 2 ). In this ase, the juge might eie that John shoul be punishe, even though he is a first offener (β).
3 There are six orers in whih the arguments an be taken into aount by a reasoner, suh as α 1, α 2, β or α 2, β, α 1. In figure 1, the six orers are shown in one iagram. Eah orner of the blok represents a stage in the proess of argumentation, an has a label representing whih arguments have been onsiere then. The 0 represents that no argument has been onsiere yet. An argument in brakets is efeate. Eah arrow enotes that an argument is being taken into aount. For instane, the arrow from α 2 to β (α 2 ) means that the argument α 2 beomes efeate after β has been taken into aount. 0 α 1 β α 2 β (α 1 ) α 1 α 2 β (α 2 ) α 1 α 2 (β) Figure 1: Consiering arguments in ifferent orers Now we ome to the influene of the efeate arguments. If we woul forget about the efeate arguments, as in other work on efeasible argumentation, we are left with the following (wrong) piture. Again, eah orner represents a stage of argumentation, but this time only the unefeate arguments at that stage are enote. Just as in the previous figure, eah arrow means that one argument is being taken into aount. 0 α 1 α 2 β α 1 α 2 Figure 2: The wrong piture This piture is wrong for two reasons: Different stages of argumentation have ollapse into one. For instane β, β (α 1 ) an β (α 2 ) an no longer be istinguishe. An orer of argumentation has isappeare. There is no iret arrow from β to α 1 α 2, beause it has beome unlear what it means to go from β to α 1 α 2 by taking a single extra argument into aount. In the orret piture the intermeiate stages β (α 1 ) an β (α 2 ) issolve this problem.
4 We summarize the influene of efeate arguments: If the efeate arguments taken into aount are overlooke, ifferent stages of argumentation annot be istinguishe, an orers of argumentation an isappear. 3 Arguments We start with the formal efinition of an argument. Our notion of an argument is relate to that of Lin an Shoham [LiSh89] an Vreeswijk [Vr91, Vr93], an is basially a tree of sentenes in some language. Our approah to efeasible argumentation is inepenent of the hoie of a language. Therefore, we treat a language as a set without any struture. A language oes not even ontain an element to enote negation or ontraition. This is not require, beause in our formalism ontraition is not the trigger for efeat. We briefly ome bak to this in the next setion. 3 Definition 3.1 A language is a set, whose elements are the sentenes of the language. An argument is like a proof, possibly with onitions. An argument supports its onlusion (relative to its onitions), but unlike a proof, an argument is efeasible. Any argument an be efeate by other arguments. Eah argument has a onlusion an onitions (possibly zero). An argument an ontain arguments for its onlusion. Arguments ontain sentenes, an have initial an final parts. A speial kin of argument is a rule. Definition 3.2 Let L be a language. An argument in the language L is reursively efine as follows: 1. Any element s of L is an argument in L. In this ase we efine Con(s) = s Cons(s) = Sents(s) = Initials(s) = Finals(s) = {s} 2. If Α is a set of arguments in L, s an element of L, an s Sents[Α], 4 then Α s is an argument in L. In this ase we efine Con(Α s) = s Cons(Α s) = Cons[Α] Sents(Α s) = {s} Sents[Α] Initials(Α s) = {Α s} Initials[Α] Finals(Α s) = {s} {Β s f: f is a surjetive funtion from Α onto Β, suh that α: f(α) Finals(α)} 5 Con(α) is the onlusion of α. An element of Cons(α), Sents(α), Initials(α), an Finals(α) is a onition, a sentene, an initial argument, an a final argument of α, respetively. The onlusion of an initial argument of α, other than the argument α itself, is an intermeiate onlusion of α. An argument in L is a rule, if it has the form S s, where S L an s L. For eah argument α we efine the set of arguments Subs(α), whose elements are the subarguments of α: Subs(α) = Initials[Finals(α)] 3 Lin an Shoham [LiSh89], Vreeswijk [Vr91, Vr93] an Dung [Du93] o more or less the same. Lin an Shoham use a language with negation, an Vreeswijk one with ontraition. Dung even goes a step further, an uses ompletely unstruture arguments. 4 If f: V W is a funtion an U V, then f[u] enotes the image of U uner f. 5 This means that the set Β arises by replaing eah argument in the set Α by one of its final arguments.
5 A proper subargument of an argument α is a subargument other than α. If α is a subargument of β, then β is a superargument of α. A subargument of an argument α that is a rule is a subrule of α. Notation If Α is finite, i.e. Α = {α 1, α 2,..., α n }, we write α 1, α 2,..., α n s for an argument Α s = {α 1, α 2,..., α n } s, if no onfusion an arise. Intuitively, if Α s is an argument (in some language L), the elements of Α are the arguments supporting the onlusion s. It may seem strange that also sentenes are onsiere to be arguments. An argument of the form s, where s is a sentene in the language L, represents the egenerate (but in pratie most ommon) kin of argument that a sentene is put forwar without any arguments supporting it. Some examples of arguments in the language L = {a, b,, } are {{a} b} an {{a}, {b} }. They are graphially represente in figure 3. a b a b Figure 3: Examples of arguments The onitions of the argument {{a}, {b} } are a an b. It has as its onlusion. Some of its initial arguments are b, {a} an the argument itself. Some of its final arguments are, {}, an {, {b} }. Among its subarguments are an {b}. The formal struture of our arguments iffers from those of Lin an Shoham [LiSh89] an Vreeswijk [Vr91, Vr93]. In these formalisms, eah onition of an argument an only be supporte by a single argument. Beause of our belief that arguments an arue, in our formalism onitions an be supporte by several arguments. 6 As a result, we an make weakenings (an strengthenings) of an argument expliit. Intuitively, an argument beomes weaker if less arguments support its onlusion an intermeiate onlusions. For instane, the argument {{b} } is a weakening of the argument {{a}, {b} }. The latter ontains {a} an {b} to support the intermeiate onlusion, while the former only ontains {b}. Definition 3.3 Let L be a language. For any argument α in the language L we reursively efine a set of arguments Weaks(α): 1. For α = s, s L, Weaks(s) = {s}. 2. For α = Α s, Α Args(L), s L, Weaks(Α s) = {Β s Β Weaks[Α] an Con[Β] = Con[Α]} An element of Weaks(α) is a weakening of α. A weakening of α, other than α, is a proper weakening of α. If α is a weakening of β, then β is a strengthening of α. Weakenings are in general not subarguments. For instane, {{a} } is not a subargument of {{a}, {b} }. 6 This is formally aomplishe by making the arguments supporting a onlusion a set of arguments, instea of a sequene.
6 Different arguments an have the same subrules. The arguments in figure 4 all have the subrules {a}, {b}, {} an {} e. There is some reunany in the last argument, beause the arguments {{a} } an {{b} } are weakenings of the argument {{{a}, {b} } } e. In ase one of the three arguments supporting is efeate suh reunany an beome meaningful. a b a b e e a b a b e Figure 4: Different arguments with the same subrules In other formalisms ifferent arguments with the same subrules are not istinguishe. For instane, the formal arguments of Pollok [Po87-Po94], Simari an Loui [SiLo92], Prakken [Pr93a, Pr93b], an Bonarenko et al. [BoToKo93] are (more or less) sets of rules, so that the istintion is oneale. In the formalisms of Lin an Shoham [LiSh89] an Vreeswijk [Vr91, Vr93], the arguments in figure 4 are not base on the same subrules, beause the onitions of a rule are a sequene, an not a set. For example, they treat an, as ifferent rules. 4 Defeaters As sai before, in efeasible argumentation, arguments are efeasible. In our formalism, all arguments are efeasible. Exept for Dung [Du93], other authors have separate lasses of strit an efeasible arguments. Arguments remain unefeate, if there is no information that makes them efeate. So, if one wants a lass of strit arguments, for instane, to moel eutive argumentation, it an be efine, by not allowing information that leas to the efeat of the arguments in that lass. In our formalism this is easy, beause the efeat of arguments is the result of efeat information that is expliit an iret. Expliit efeat information Pollok's efeaters [Po87-Po94], Prakken's kins of efeat [Pr93a, Pr93b], Vreeswijk's onlusive fore [Vr91, Vr93], an Dung's attaks [Du93] are examples of expliit efeat information. Instea of hiing the information in a general proeure, for instane base on speifiity, expliit information etermines whih arguments beome efeate an whih remain unefeate. Expliit efeat information is require beause no general proeure an be flexible enough to be universally vali. Diret efeat information By iret efeat information, we mean information speifying onitions that iretly imply the efeat of one or more arguments. Pollok's efeaters an Dung's attaks are examples of iret efeat information. Examples of iniret efeat information are
7 Prakken's kins of efeat an Vreeswijk's onlusive fore. In their formalisms efeat of arguments is triggere by a onflit of arguments. If there is a onflit, one of the arguments involve is selete using the efeat information. The selete argument beomes efeate, an the onflit is resolve. We think that iniret efeat information is not suffiient. An important kin of efeat requiring iret efeat information is efeat by an unerutting argument [Po97]. An unerutting argument only efeats another argument, without ontraiting the onlusion. In our formalism the efeat information is speifie by expliit an iret efeaters. In ontrast with Pollok's efeaters [Po87-Po94], an Dung's attaks [Du93], our efeaters an expliitly represent ompoun efeat: a set of arguments for a onlusion an efeat another set of arguments, instea of only a single argument another single argument. This is neee for the aequate moeling of arual of arguments [Ve95]. A efeater onsists of two sets of arguments: The arguments in one set beome efeate if the arguments in the other set are unefeate. Definition 4.4 Let L be a language. A efeater of L has the form Α (Β), where Α an Β are sets of arguments of L, suh that 1. All arguments in Α have the same onlusion. 2. All arguments in Β have the same onlusion. 3. No argument in Α has a subargument or weakening that is an element of Β. The arguments in Α are the ativating arguments of the efeater. The arguments in Β are its efeate arguments. Α Β is the range of the efeater. 7 Notation A efeater Α (Β) with finite range, i.e. Α = {α 1, α 2,..., α n } an Β = {β 1, β 2,..., β m }, is written α 1 α 2... α n (β 1 β 2... β m ), if no onfusion an arise. The meaning of a efeater Α (Β) is that if the arguments in Α are unefeate, the arguments in Β must be efeate. For instane, the efeater a (b ) efeats the rule b, if the argument a is unefeate. By the thir requirement in the efinition a efeater annot efeat a subargument or strengthening of one of its ativating arguments. For instane, if the argument a b is ativating in a efeater, it annot efeat the argument b. If the argument a is ativating in a efeater, it annot efeat the argument {a, b }. As sai, our efeaters an represent ompoun efeat whih is neee in ase of arual of arguments. For instane, the example in setion 2 requires not only the regular efeaters β (α 1 ) an β (α 2 ), but also a efeater that represents ompoun efeat, namely α 1 α 2 (β). 5 Argumentation stages We are about to efine an argumentation theory. It formally represents whih arguments are available to a reasoner, an when arguments an beome efeate. Our notion of an argumentation theory is relate to that of an argument system [Vr91, Vr93] an of an argumentation framework [Du93]. A theory onsists of a language, arguments, an efeaters. The language of a theory speifies the sentenes that an be use in 7 Beause arguments are their own subarguments an strengthenings, the sets Α an Β an have no elements in ommon.
8 arguments. The arguments of a theory are the arguments that are available. The efeaters of a theory represent the situations in whih arguments efeat other arguments. Definition 5.1 An argumentation theory is a triple (L, Args, Defs), where 1. L is a language, 2. Args is a set of arguments in L, lose uner initial arguments, 8 an 3. Defs is a set of efeaters of L, with their ranges in Args. 9 For instane, a theory that represents the example in setion 2 is efine as follows: L = {a 1, a 2, a, b}, Args = {a 1, a 1 a, a 2, a 2 a, b}, Defs = {β (α 1 ), β (α 2 ), α 1 α 2 (β)}, where α 1 = a 1 a, α 2 = a 2 a, β = b. So we have two separate arguments α 1 an α 2 that support the onlusion a, an an argument β that supports b. The efeaters say that α 1 an α 2 are on their own efeate by β, but together efeat β. We use this theory as an illustration of the oming efinitions. It is hosen, beause it is a key example of arual of arguments, an therefore suitable to show the influene of efeate arguments. It is however too simple to illustrate all aspets of the efinitions. The next efinition is that of an argumentation stage. It an represent the arguments that at a ertain stage in the proess of argumentation have been taken into aount, an whih of them are then efeate. (Later we efine argumentation stages that are aeptable with respet to a theory. These are the atual stages of argumentation that are mae possible by an argumentation theory.) Our efinition of an argumentation stage is relate to the argumentation strutures of Lin an Shoham, an Vreeswijk. They require however that it is a set without ontraiting arguments (see the isussion of iret efeat information in setion 4). Eah of the requirements in our efinition orrespons to a simple intuition on stages in argumentation. For instane, one requirement is that an argument an only be taken into aount if all its initial arguments alreay have been. The range of an argumentation stage onsists of the arguments taken into aount at that stage. Definition 5.2 Let (L, Args, Defs) be an argumentation theory. An argumentation stage of (L, Args, Defs) has the form Σ (Τ), where Σ an Τ are subsets of Args, suh that: 1. Σ is lose uner initial arguments. 2. No argument an be an element of both Σ an Τ. 3. No proper subargument of an element of Σ an be an element of Τ. 4. Not all proper weakenings of an element of Τ that has proper weakenings an be elements of Σ. The arguments in Σ are unefeate, an those in Τ efeate. The set Σ Τ is the range of Σ (Τ). Remark: efeaters an argumentation stages are the same in form. 8 The set of arguments is not lose uner 'rule appliation', as in other formalisms. Although the arguments of an ieal reasoner woul be, this is in general an unreasonable assumption. 9 The efeaters of a theory o not neessarily agree with eah other. For instane, both α (β) an β (α) an be efeaters of a theory. A lassi example of suh a situation is the Nixon iamon.
9 Some argumentation stages of the example theory are a 1 α 1 (β), a 2 β (a 1 α 2 ), an a 1 α 1 a 2 α 2 (β). Definition 5.2 is ruial: it reflets that there an be efeate arguments taken into aount at a stage of argumentation. Whih arguments of a theory beome efeate an whih not is etermine by its efeaters. Arguments are normally unefeate, but an at some stage of argumentation be efeate beause of relevant efeaters. A efeater is relevant at some argumentation stage if all its arguments have been taken into aount at that stage, or are parts of suh arguments. Formally, this means that its range is a subset of the final parts of the arguments taken into aount. Definition 5.3 Let (L, Args, Defs) be an argumentation theory, Α (Β) a efeater in Defs, an Σ (Τ) an argumentation stage of (Args, Defs). Α (Β) is relevant for Σ (Τ), if Α Β Finals[Σ Τ]. So, in the example theory, β (α 2 ) is relevant for a 2 β (a 1 α 2 ), an all three efeaters of the theory are relevant for a 1 α 1 a 2 α 2 (β). This notion of relevane of efeaters has no analogue in other formalisms. Normally, all efeaters are onsiere relevant. We an o better, beause our argumentation stages represent whih arguments are taken into aount. A efeater only justifies the efeat of its efeate arguments, if its ativating arguments are parts of unefeate arguments, i.e., if they are subarguments of unefeate arguments. The efeater is then ativate. Definition 5.4 Let (L, Args, Defs) be an argumentation theory, Α (Β) a efeater in Defs, an Σ (Τ) an argumentation stage of (Args, Defs). Α (Β) is ativate in Σ (Τ), if it is relevant an Α Finals[Σ]. In the argumentation stage a 2 β (a 1 α 2 ) the efeater β (α 2 ) is ativate. In the stage a 1 α 1 a 2 α 2 (β) all three efeaters are ativate. Argumentation stages only represent atual stages of the proess of argumentation, if they are aeptable with respet to an argumentation theory. An argumentation stage is aeptable, if The efeat of eah of the efeate arguments is justifie. The efault is namely that an argument is not efeate. Defeat is justifie by ativate efeaters. If the efeat of an argument is justifie, it must atually be efeate. Otherwise put, efeaters that are ativate in the stage must be obeye. No relevant efeater is unjustly ignore. This requirement nees yet another efinition. Relevant efeaters must be eativate, for instane, beause one of its ativating arguments is efeate. A efeater is eativate, if two onitions hol. First, there must be another efeater that justifies the efeat of one of its ativating arguments. (It is of ourse even suffiient that the efeat of a subargument or a strengthening of one of the ativating arguments is justifie.) However, α 1 α 2 (β) an β (α 1 ) o not eativate eah other. Only the former an eativate the latter. The reason for this is the arual of the arguments α 1 an α 2. The efeater α 1 α 2 (β) overrules β (α 1 ), an therefore annot be eativate by it. This leas to the seon onition: a efeater an only be eativate by a efeater it oes not overrule. Formally, this is apture in the following efinition.
10 Definition 5.5 Let (L, Args, Defs) be an argumentation theory, Α (Β) an Γ ( ) efeaters in Defs, an Σ (Τ) an argumentation stage of (Args, Defs). Α (Β) eativates Γ ( ), if both are relevant for Σ (Τ), an the following hol: 1. There is an element of Β that is a subargument or a strengthening of an element of Γ. 2. Α is not a subset of, or Β is not a proper subset of Γ. We an finally efine when an argumentation stage is aeptable with respet to an argumentation theory. 10 The requirements in the efinition have alreay been briefly explaine just after efinition 5.4. Definition 5.6 Let (L, Args, Defs) be an argumentation theory, an Σ (Τ) an argumentation stage of (L, Args, Defs). Σ (Τ) is aeptable with respet to (Args, Defs), if the following hol: 1. If τ Τ, there is an ativate Α (Β) Defs, suh that τ Β. 2. If Α (Β) Defs is ativate, then Β Τ. 3. If Α (Β) Defs is relevant, but not ativate, then there is an ativate Γ ( ) Defs that eativates Α (Β). An aeptable argumentation stage of our example theory is β (a 1 α 1 ). The stage a 1 a 2 α 2 (β) is not aeptable, beause the efeat of β is not justifie, an beause β (α 2 ) is not eativate. An extension of an argumentation theory is an aeptable stage of argumentation that annot be ontinue. It must therefore be maximal with respet to set inlusion. 11 Definition 5.7 Let (L, Args, Defs) be an argumentation theory, an Σ (Τ) an argumentation stage of (L, Args, Defs). Σ (Τ) is an extension of (L, Args, Defs), if the following hol: 1. Σ (Τ) is aeptable with respet to (L, Args, Defs), an 2. There is no argumentation stage Σ' (Τ'), aeptable with respet to (L, Args, Defs), suh that Σ Τ is a proper subset of Σ' Τ'. The unique 12 extension of our example theory is a 1 α 1 a 2 α 2 (β). Even though the theory ontains the efeaters β (α 1 ), β (α 2 ) that an efeat α 1 an α 2 separately, they remain unefeate by supporting eah other. This is a real ase of the arual of the arguments α 1 an α 2, as an be seen by looking at other aeptable argumentation stages: β a 1 (α 1 ) an β a 2 (α 2 ). Here α 1 an α 2 are on their own efeate by β. The arguments α 1 an α 2 only remain unefeate if they reinfore eah other. 6 Other formalisms In orer to ompare our formalism with others, we en with an overview of some of its harateristis. 10 The way we efine aeptable efeasible argumentation stages is relate to the way Dung efines his amissible sets of arguments [Du93], an Pollok his partial status assignments [Po94]. However, these o not represent stages in the proess of argumentation. 11 Dung's preferre extensions [Du93] an Pollok's status assignments [Po94, p. 393] are efine similarly. 12 A theory an have any number of extensions: zero, one, or several.
11 The struture of arguments an influene whih arguments are efeate an whih are not (setion 1). Other arguments an influene whih arguments are efeate an whih are not (setion 1). The formalism is inepenent of the hoie of a language (setion 3). Defeat is the result of expliit efeat information (setion 4). Defeat information represents iret efeat (setion 4). Defeat is not triggere by a onflit. Stages in the proess of argumentation are represente (setion 5). Arguments an arue (setion 2, 3, 4, 5). Defeate arguments influene the proess of argumentation (setion 2, 4, 5). Table 1 relates these harateristis to some other formalisms. An entry in the table is rosse if the formalism in that olumn has the harateristi iniate in the row. BoToKo93 Du93 Pr93a, Pr93b HaVe94 LiSh89, Li93 Po87- Po94 Vr91, Vr93 Struture of argument Other arguments Language inepenent Expliit efeat information Diret efeat information Argumentation stages Arual of arguments Influene of efeate arguments Table 1: Formalisms of efeasible argumentation an their harateristis 7 Conlusion In this paper we have argue that the proess of argumentation is better moele if the arguments that are efeate at a ertain stage of argumentation are not ignore. This is espeially lear if several arguments for a onlusion arue: They an at early stages of argumentation be taken into aount, but be efeate by other arguments, an later exert their influene, an beome unefeate. We have provie a formalism that aptures these ieas. Key efinitions are those of argumentation stages (efinition 5.2), in whih the efeate arguments are expliitly taken into aount, an of relevane of efeaters (efinition 5.3), whih assures that only efeaters are use that ontain arguments atually onsiere. Aknowlegments This researh was partly finane by the Founation for Knowlege-base Systems (SKBS) as part of the B3.A projet. SKBS is a founation with the goal to improve the level of expertise in the Netherlans in the fiel of knowlege-base systems an to promote the transfer of knowlege in this fiel between universities an business ompanies.
12 I thank Jaap Hage, Arno Loer an Gerar Vreeswijk for our stimulating an lively arguments about argumentation. Referenes [BoToKo93] A. Bonarenko, F. Toni an R. A. Kowalski, An assumption-base framework for non-monotoni reasoning, in Logi programming an non-monotoni reasoning. Proeeings of the seon international workshop, L. M. Pereira an A. Neroe (es.), MIT Press, Cambrige (Massahusetts), 1993, pp [Du93] P. M. Dung, On the aeptability of arguments an its funamental role in nonmonotoni reasoning, logi programming, an human s soial an eonomial affairs, manusript, [HaVe94] J. Hage an B. Verheij, Reason-Base Logi: a logi for reasoning with rules an reasons, to appear in Law, Computers an Artifiial Intelligene, Vol. 3 (1994), No. 2, report SKBS/B3.A/ [LiSh89] F. Lin an Y. Shoham, Argument Systems: a uniform basis for nonmonotoni reasoning, in Proeeings of the First International Conferene on Priniples of Knowlege Representation an Reasoning, R. J. Brahman, H. J. Levesque an R. Reiter (es.), Morgan Kaufmann Publishers, San Mateo (California), 1989, pp [Li93] F. Lin, An argument-base approah to nonmonotoni reasoning. Computational Intelligene, Vol. 9 (1993), No. 3, pp [Po87] J. L. Pollok, Defeasible reasoning, Cognitive Siene 11 (1987), pp [Po90] J. L. Pollok, A theory of efeasible reasoning, International Journal of Intelligent Systems, Vol. 6 (1990), pp [Po91] J. L. Pollok, Self-efeating arguments, Mins an Mahines 1 (1991), pp [Po92] J. L. Pollok, How to reason efeasibly, Artifiial Intelligene 57 (1992), pp [Po94] J. L. Pollok, Justifiation an efeat, Artifiial Intelligene 67 (1994), pp [Pr93a] [Pr93b] [SiLo92] [Ve94] H. Prakken, Logial tools for moelling legal argument, H. Prakken, Amsteram, H. Prakken, A logial framework for moelling legal argument, in The Fourth International Conferene on Artifiial Intelligene an Law. Proeeings of the Conferene, ACM, New York, 1993, pp G. R. Simari an R. P. Loui, A mathematial treatment of efeasible reasoning an its appliations, Artifiial Intelligene 53 (1992), pp H. B. Verheij, Reason Base Logi an legal knowlege representation, in Proeeings of the Fourth National Conferene on Law, Computers an Artifiial Intelligene, I. Carr an A. Narayanan (es.), University of Exeter, 1994, pp , report SKBS/B3.A/94-5. [Ve95] B. Verheij, Arual of arguments in efeasible argumentation, in Duth/German Workshop on Nonmonotoni Reasoning. Proeeings of the Seon Workshop, Delft University of Tehnology, Utreht University, 1995, pp , report SKBS/B3.A/ [Vr91] G. Vreeswijk, Abstrat argumentation systems: preliminary report, in Proeeings of the First Worl Conferene on the Funamentals of Artifiial Intelligene, D. M. Gabbay an M. De Glas (es.), Angkor, Paris, 1991, pp
13 [Vr93] G. Vreeswijk, Stuies in efeasible argumentation, G. A. W. Vreeswijk, Amsteram, 1993.
Arguments and Defeat in Argument-Based Nonmonotonic Reasoning
Arguments and Defeat in Argument-Based Nonmonotonic Reasoning Bart Verheij University of Limburg, Department of Metajuridica P.O. Box 616, 6200 MD Maastricht, The Netherlands bart.verheij@metajur.rulimburg.nl,
More informationSolutions to Tutorial 2 (Week 9)
The University of Syney Shool of Mathematis an Statistis Solutions to Tutorial (Week 9) MATH09/99: Disrete Mathematis an Graph Theory Semester, 0. Determine whether eah of the following sequenes is the
More informationLAB 4: Operations on binary images Histograms and color tables
LAB 4: Operations on binary images Histograms an olor tables Computer Vision Laboratory Linköping University, Sween Preparations an start of the lab system You will fin a ouple of home exerises (marke
More informationConflicts Analysis for Inter-Enterprise Business Process Model
Conflits Analysis for nter-enterprise Business Proess Moel Wei DNG, Zhong TAN, Jian WANG, Jun ZHU, Haiqi LANG,Lei ZHANG {ingw, tianz, wangwj, zhujun, lianghq, lzhang}@n.ibm.om BM China Researh Lab, BM
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationUnsupervised Segmentation of Stereoscopic Video Objects: Proposal. and Comparison of Two Depth-Based Approaches
Unsupervise Segmentation of Stereosopi Vieo Objets: Proposal an Comparison of Two Depth-Base Approahes Klimis S. Ntalianis an Athanasios S.Drigas Net Meia Lab, NCSR Demokritos, Athens, Greee E-mail: kntal@image.ntua.gr
More information1 Disjoint-set data structure.
CS 124 Setion #4 Union-Fin, Greey Algorithms 2/20/17 1 Disjoint-set ata struture. 1.1 Operations Disjoint-set ata struture enale us to effiiently perform operations suh as plaing elements into sets, querying
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationKeeping Things Simple: Finding Frequent Item Sets by Recursive Elimination
Keeping Things Simple: Fining Frequent Item Sets y Reursive Elimination Christian Borgelt Department of Knowlege Proessing an Language Engineering Shool of Computer Siene, Otto-von-Guerike-University of
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationPredicting Project Outcome Leveraging Socio-Technical Network Patterns
203 7th European Conferene on Software Maintenane an Reengineering Preiting Projet Outome Leveraging Soio-Tehnial Network Patterns Dii Surian, Yuan Tian, Davi Lo, Hong Cheng an Ee-Peng Lim Shool of Information
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationResearch Report. IBM Research. SAML Artifact Information Flow Revisited. RZ 3643 (# 99653) 01/03/06 Computer Science 17 pages
RZ 3643 (# 99653) 01/03/06 Computer Siene 17 pages Researh Report SAML Artifat Information Flow Revisite Thomas Groß an Birgit Pfitzmann IBM Researh GmbH Zurih Researh Laboratory 8803 Rüshlikon Switzerlan
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationSearching for Entities: When Retrieval Meets Extraction
Searhing for Entities: When Retrieval Meets Extration Qi Li, Daqing He Shool of Information Sienes, University of Pittsburgh Pittsburgh, Pennsylvania, U. S. {qili, aqing}@sis.pitt.eu Abstrat. Retrieving
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationAn Efficient Image Distortion Correction Method for an X-ray Digital Tomosynthesis System
An Effiient Image Distortion Corretion Metho for an X-ray Digital Tomosynthesis System J.Y. Kim Dept. of Mehatronis Engineering, Tongmyong University of Information Tehnology, 55 Yongang-ong, Nam-gu, Busan
More informationPLANE-BASED CAMERA CALIBRATION WITHOUT DIRECT OPTIMIZATION ALGORITHMS. Jorge A. Sánchez, Eduardo A. Destefanis, Luis R. Canali
PLANE-BASED CAMERA CALIBRAION WIHOU DIREC OPIMIZAION ALGORIHMS Jorge A. Sánhez, Euaro A. Destefanis, Luis R. Canali Centro e Investigaión en Informátia para Ingeniería, Univ. enológia Naional, Faulta Regional
More informationDepartment of Electrical and Computer Engineering University of Wisconsin Madison. Fall
Department of Eletrial and Computer Engineering University of Wisonsin Madison ECE 553: Testing and Testable Design of Digital Systems Fall 2014-2015 Assignment #2 Date Tuesday, September 25, 2014 Due
More informationA Unified Subdivision Scheme for Polygonal Modeling
EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.
More informationOptimization of Image Processing in Video-based Traffic Monitoring
http://x.oi.org/0.5755/j0.eee.8.8.634 Optimization of Image Proessing in Vieo-base Traffi Monitoring Fei Zhu, Jiamin Ning, Yong Ren, Jingyu Peng Shool of Computer Siene an Tehnology, Soohow University,
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationColouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.
Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland
More informationAnchoring quartet-based phylogenetic distances and applications to species tree reconstruction
Anhoring quartet-base phylogeneti istanes an appliations to speies tree reonstrution Erfan Sayyari an Siavash Mirarab Department of Eletrial an Computer Engineering University of California at San Diego
More informationAdvanced Algorithms for Fast and Scalable Deep Packet Inspection
Avane Algorithms for Fast an Salale Deep Paket Inspetion Sailesh Kumar Washington University sailesh@arl.wustl.eu Jonathan Turner Washington University jon.turner@wustl.eu John Williams Ciso Systems jwill@iso.om
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationGeneralized Buffering of PTL Logic Stages using Boolean Division and Don t Cares
Generalize Buffering of PTL Logi Stages using Boolean Division an Don t Cares Rajesh Garg Sunil P Khatri Department of ECE, Texas A&M University, College Station, TX 77843 Abstrat Pass Transistor Logi
More information1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.
C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationSequential Incremental-Value Auctions
Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationIntroductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test
Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/
More informationA Full-Featured, Error Resilient, Scalable Wavelet Video Codec Based on the Set Partitioning in Hierarchical Trees (SPIHT) Algorithm
A Full-Feature, Error Resilient, Salable Wavelet Vieo Coe Base on the Set Partitioning in Hierarhial Trees (SPIHT) Algorithm Sungae Cho an William A. Pearlman Center for Next Generation Vieo Researh Rensselaer
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationCS2100 Computer Organisation Tutorial #8: MSI Components Answers to Selected Questions
C Computer Organisation Tutorial #8: MI Components Answers to elete Questions. Realize the following funtion with (a) an 8: multiplexer, an (b) a 4: multiplexer using the first input variables as the seletor
More informationwith respect to the normal in each medium, respectively. The question is: How are θ
Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent
More informationMath 2201 Unit 3: Acute Triangle Trigonometry. Ch. 3 Notes
Rea Learning Goals, p. 17 text. Math 01 Unit 3: ute Triangle Trigonometry h. 3 Notes 3.1 Exploring Sie-ngle Relationships in ute Triangles (0.5 lass) Rea Goal p. 130 text. Outomes: 1. Define an aute triangle.
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationComparing Fisheye and Full-Zoom Techniques for Navigation of Hierarchically Clustered Networks
Comparing Fisheye an Full-Zoom Tehniques for Navigation of Hierarhially Clustere Networks Doug Shaffer*, Zhengping Zuo, Lyn Bartram, John Dill, Shelli Dus, Saul Greenerg*, Mark Roseman* 1 * Dept of Computer
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationExploiting Structure in Parsing to 1-Endpoint-Crossing Graphs
Exploiting Struture in Parsing to 1-Enpoint-Crossing Graphs Roin Kurtz an Maro Kuhlmann Department of Computer an Information Siene Linköping University, Sween roin.kurtz@liu.se an maro.kuhlmann@liu.se
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationFuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis
Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationThe Thresholding MLEM Algorithm
Journal of Meial an Biologial Engineering, 24(2: 85-9 85 The Thresholing MLEM Algorithm Keh-Shih Chuang, Meei-Ling Jan,2 Jay Wu Sharon Chen Yu-Ching Ni Ying-Kai Fu 2 epartment of Nulear Siene, National
More informationImage-based Automatic Object Localisation in ispace Environment
Magyar Kutatók 10. Nemzetközi Szimpóziuma 10 th International Symposium of Hungarian Researhers on Computational Intelligene an Informatis Image-base Automati Objet Loalisation in ispae Environment Péter
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationMultitarget Data Association with Higher-Order Motion Models
Multitarget Data Assoiation with Higher-Orer Motion Moels Robert T. Collins The Pennsylvania State University University Park, PA 16802, USA Abstrat We present an iterative approximate solution to the
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationTorpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control
orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationBayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs
Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:
More informationParametric Abstract Domains for Shape Analysis
Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University
More informationFuzzy Pre-semi-closed Sets
BULLETIN of the Malaysian Mathematial Sienes Soiety http://mathusmmy/bulletin Bull Malays Math Si So () 1() (008), Fuzzy Pre-semi-losed Sets 1 S Murugesan and P Thangavelu 1 Department of Mathematis, Sri
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationInterconnection Styles
Interonnetion tyles oftware Design Following the Export (erver) tyle 2 M1 M4 M5 4 M3 M6 1 3 oftware Design Following the Export (Client) tyle e 2 e M1 M4 M5 4 M3 M6 1 e 3 oftware Design Following the Export
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationThe Happy Ending Problem
The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationmahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen
The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends
More informationOPERATING INSTRUCTIONS FOR. COPA (Computer Aided Photoelastic Analysis) PROGRAMME: VERSION 3. Philip Siegmann & Eann Patterson
OPERATNG NSTRUCTONS FOR COPA (Computer Aie Photoelasti Analysis) PROGRAMME: VERSON 3 Philip Siegmann & Eann Patterson ntroution This oument aompanies a new piee of software initially proue in the Experimental
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationMeasurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method
Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH
More informationDirected Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and
Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,
More informationImproved Circuit-to-CNF Transformation for SAT-based ATPG
Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationEmbedded Video Compression with Error Resilience and Error Concealment
Embee Vieo Compression with Error Resiliene an Error Conealment Sungae Cho a an William A. Pearlman a a Center for Next Generation Vieo Department of Eletrial, Computer, an Systems Engineering Rensselaer
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationAn Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results
An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302
More informationDynamic Algorithms Multiple Choice Test
3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN
International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN 2278-773 47 Phrase Based Doument Retrieving y Comining Suffix Tree index data struture and Boyer- Moore faster
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More information2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationChemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment
hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology
More informationLARGE-SCALE INVERSE MICROWAVE BACKSCATTER MODELING OF SEA ICE
LARGE-SCALE INVERSE MICROWAVE BACKSCATTER MODELING OF SEA ICE Quinn P Remun Mirowave Earth Remote Sensing Laboratory Brigham Young University Provo Utah Abstrat Polar sea ie harateristi provie important
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationA Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing
A Novel Timestamp Ordering Approah for Co-existing Traditional and Cooperative Transation Proessing Author Sun, Chengzheng, Zhang, Y., Kambayashi, Y., Yang, Y. Published 1998 Conferene Title Proeedings
More informationAdobe Certified Associate
Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals
More information