16
UNCORRECTED PROOF 1 2 Using argumentation to model and deploy agent-based B2B applications 3 Jamal Bentahar a, * , Rafiul Alam a , Zakaria Maamar b , Nanjangud C. Narendra c 4 a Concordia University, Montreal, Canada 5 b Zayed University, Dubai, United Arab Emirates 6 c IBM India Research Lab, Bangalore, India 7 9 article info 10 Article history: 11 Available online xxxx 12 Keywords: 13 B2B 14 Argumentation theory 15 Agent communication 16 Conflict 17 Persuasion 18 19 abstract 20 This paper presents an agent-based framework for modeling and deploying Business-to-Business (B2B) 21 applications, where autonomous agents act on behalf of the individual components that form these appli- 22 cations. This framework consists of three levels identified by strategic, application, and resource, with 23 focus in this paper on the first two levels. The strategic level is about the common vision that indepen- 24 dent businesses define as part of their decision of partnership. The application level is about the business 25 processes that get virtually combined as result of this common vision. As conflicts are bound to arise 26 among the independent applications/agents, the framework uses a formal model based on computational 27 argumentation theory through a persuasion protocol to detect and resolve these conflicts. In this proto- 28 col, agents reason about partial information using partial arguments, partial attack, and partial acceptabil- 29 ity. Agents can then jointly find arguments that support a new solution for their conflicts, which is not 30 known by any of them individually. Termination, soundness, and completeness properties of this protocol 31 are provided. Distributed and centralized coordination strategies are also supported in this framework, 32 which is illustrated with an online-purchasing example. 33 Ó 2010 Elsevier B.V. All rights reserved. 34 35 36 1. Introduction 37 Today’s challenges in terms of performance and competitiveness 38 are putting businesses under a constant pressure of meeting chang- 39 ing requirements. This fuels the need for continuous merge and 40 sometimes re-engineering of business processes, resulting in Busi- 41 ness-to-Business (B2B) applications development. Briefly, a B2B 42 application is a set of business processes that make disparate 43 autonomous entities (e.g., departments, businesses) collaborate to 44 achieve a common set of goals. Despite the abundance of initiatives 45 on B2B applications [15,19,26,28], not much exist in terms of mod- 46 eling and deploying such applications from the perspective of using 47 intelligent and argumentative agents. By modeling, we mean iden- 48 tifying all the necessary components that connect assets of inde- 49 pendent entities that are engaged in a B2B scenario. By 50 deployment, we mean identifying all the necessary technologies 51 that allow the connection of these assets happen effectively. Finally, 52 by argumentation, we mean making agents that represent and 53 operate on behalf of businesses comply with a dialectical process 54 to affirm or disavow the conclusions that these agents wish to 55 reciprocally convey to their peers [4,5]. In a B2B scenario, argumen- 56 tation would broadly assist businesses, through representative 57 agents, engage in intense negotiation and persuasion sessions prior 58 to making any joint decisions. 1 The argumentation capability of an 59 agent representing a business, can assist this business in negotiating 60 with its peers during a conflict situation and in collaborating with 61 them to achieve agreements on their strategies. Although argumen- 62 tation has been extensively investigated in the last decade and many 63 interesting frameworks are proposed [3], limited efforts have been 64 put into using this theory in concrete applications [23]. This paper ad- 65 dresses this challenging issue, which consists of using argumentation 66 theory for multi-agent systems to develop B2B applications. In terms 67 of validation, theoretical proofs of some properties are provided and a 68 concrete case study from the industry illustrates the proposed frame- 69 work. This framework is an initiative within the emerging field of 70 developing intelligent software [11,13]. Many approaches in this field 71 are based on new software development techniques such as the Lyee 72 calculus and methodology [14]. Our approach is different; it uses 73 argumentation theory and agent technology. 74 This framework suggests three levels, resource, application, and 75 strategic 2 that are connected through rely-on and run-on-top-of rela- 76 tions (Fig. 1). These levels represent the way businesses generally 77 function: the strategic level, associated with a set of Strategic Argu- 78 mentative Agents (S AAs), sets the goals to reach (e.g., 10% revenue 79 increase), the application level, associated with a set of Application 80 Argumentative Agents (A AAs), sets the automatic and manual pro- 0950-7051/$ - see front matter Ó 2010 Elsevier B.V. All rights reserved. doi:10.1016/j.knosys.2010.01.005 * Corresponding author. Tel.: +1 514 848 2424; fax: +1 514 848 3171. E-mail address: [email protected] (J. Bentahar). 1 It is expected that joint decisions will be beneficial for all businesses, although personal interests might sometimes prevail, but this is outside this paper’s scope. 2 Decisions affecting a business growth are made at this level. Knowledge-Based Systems xxx (2010) xxx–xxx Contents lists available at ScienceDirect Knowledge-Based Systems journal homepage: www.elsevier.com/locate/knosys KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please cite this article in press as: J. Bentahar et al., Using argumentation to model and deploy agent-based B2B applications, Knowl. Based Syst. (2010), doi:10.1016/j.knosys.2010.01.005

Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

1

2

3

456

7

9

1011

12131415161718

1 9

3536

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Contents lists available at ScienceDirect

Knowledge-Based Systems

journal homepage: www.elsevier .com/ locate /knosys

OO

FUsing argumentation to model and deploy agent-based B2B applications

Jamal Bentahar a,*, Rafiul Alam a, Zakaria Maamar b, Nanjangud C. Narendra c

a Concordia University, Montreal, Canadab Zayed University, Dubai, United Arab Emiratesc IBM India Research Lab, Bangalore, India

202122232425262728

a r t i c l e i n f o

Article history:Available online xxxx

Keywords:B2BArgumentation theoryAgent communicationConflictPersuasion

2930313233

0950-7051/$ - see front matter � 2010 Elsevier B.V. Adoi:10.1016/j.knosys.2010.01.005

* Corresponding author. Tel.: +1 514 848 2424; faxE-mail address: [email protected] (J. Ben

Please cite this article in press as: J. Bentahar edoi:10.1016/j.knosys.2010.01.005

TED

PRa b s t r a c t

This paper presents an agent-based framework for modeling and deploying Business-to-Business (B2B)applications, where autonomous agents act on behalf of the individual components that form these appli-cations. This framework consists of three levels identified by strategic, application, and resource, withfocus in this paper on the first two levels. The strategic level is about the common vision that indepen-dent businesses define as part of their decision of partnership. The application level is about the businessprocesses that get virtually combined as result of this common vision. As conflicts are bound to ariseamong the independent applications/agents, the framework uses a formal model based on computationalargumentation theory through a persuasion protocol to detect and resolve these conflicts. In this proto-col, agents reason about partial information using partial arguments, partial attack, and partial acceptabil-ity. Agents can then jointly find arguments that support a new solution for their conflicts, which is notknown by any of them individually. Termination, soundness, and completeness properties of this protocolare provided. Distributed and centralized coordination strategies are also supported in this framework,which is illustrated with an online-purchasing example.

� 2010 Elsevier B.V. All rights reserved.

34

C

1

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

UN

CO

RR

E1. Introduction

Today’s challenges in terms of performance and competitivenessare putting businesses under a constant pressure of meeting chang-ing requirements. This fuels the need for continuous merge andsometimes re-engineering of business processes, resulting in Busi-ness-to-Business (B2B) applications development. Briefly, a B2Bapplication is a set of business processes that make disparateautonomous entities (e.g., departments, businesses) collaborate toachieve a common set of goals. Despite the abundance of initiativeson B2B applications [15,19,26,28], not much exist in terms of mod-eling and deploying such applications from the perspective of usingintelligent and argumentative agents. By modeling, we mean iden-tifying all the necessary components that connect assets of inde-pendent entities that are engaged in a B2B scenario. Bydeployment, we mean identifying all the necessary technologiesthat allow the connection of these assets happen effectively. Finally,by argumentation, we mean making agents that represent andoperate on behalf of businesses comply with a dialectical processto affirm or disavow the conclusions that these agents wish toreciprocally convey to their peers [4,5]. In a B2B scenario, argumen-tation would broadly assist businesses, through representativeagents, engage in intense negotiation and persuasion sessions prior

ll rights reserved.

: +1 514 848 3171.tahar).

t al., Using argumentation to m

to making any joint decisions. The argumentation capability of anagent representing a business, can assist this business in negotiatingwith its peers during a conflict situation and in collaborating withthem to achieve agreements on their strategies. Although argumen-tation has been extensively investigated in the last decade and manyinteresting frameworks are proposed [3], limited efforts have beenput into using this theory in concrete applications [23]. This paper ad-dresses this challenging issue, which consists of using argumentationtheory for multi-agent systems to develop B2B applications. In termsof validation, theoretical proofs of some properties are provided and aconcrete case study from the industry illustrates the proposed frame-work. This framework is an initiative within the emerging field ofdeveloping intelligent software [11,13]. Many approaches in this fieldare based on new software development techniques such as the Lyeecalculus and methodology [14]. Our approach is different; it usesargumentation theory and agent technology.

This framework suggests three levels, resource, application, andstrategic2 that are connected through rely-on and run-on-top-of rela-tions (Fig. 1). These levels represent the way businesses generallyfunction: the strategic level, associated with a set of Strategic Argu-mentative Agents (S � AAs), sets the goals to reach (e.g., 10% revenueincrease), the application level, associated with a set of ApplicationArgumentative Agents (A� AAs), sets the automatic and manual pro-

1 It is expected that joint decisions will be beneficial for all businesses, althoughpersonal interests might sometimes prevail, but this is outside this paper’s scope.

2 Decisions affecting a business growth are made at this level.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 2: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

OF

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

Fig. 1. The argumentative agent framework for B2B applications.

2 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

UN

CO

RR

EC

cesses (e.g., new auditing system) that permit fulfilling these objec-tives, and the resource level, associated with a set of Resource Argu-mentative Agents (R� AAs), sets the means that achieve theperformance of these processes. The framework associates compo-nents (that reside in one of the three levels) with agents equipped withargumentation capabilities to assist a specific component (i) persuadepeers of collaborating, (ii) interact with peers during business processimplementation, (iii) agree with peers on the collaboration outcomes,(iv) resolve conflicts that could impede collaboration, and (v) trackconflict resolution. Still in Fig. 1, the rely-on relation means mappingthe business goals onto concrete system applications, and run-on-top-of relation means performing these system applications’ businessprocesses subject to resource availabilities. In addition, both relationsmake issues at lower levels influence goals at higher levels. For exam-ple, lack of resources could result in reviewing expansion goals.

In Fig. 1, horizontal relations permit linking similar levels ofseparate businesses. We refer to these relations by interconnectivi-ty, composition, and collaboration. Underneath each horizontal rela-tion’s name, an example of conflict that could arise in a B2Bscenario is provided for illustration purposes. Collaboration rela-tion bridges the strategic levels and focusses on how businessesadapt their goals and plans so that these businesses can now reachthe goals that result out of their decision of partnership. Composi-tion relation bridges the application levels and focusses on hownew business processes are developed, either from scratch or afterre-engineering existing processes. Finally, interconnectivity rela-tion bridges the resource levels and focusses on the means thatmake the performance of business processes happen despite distri-bution and heterogeneity constraints.

This paper is organized as follows. Section 2 introduces ouragent-based framework for B2B applications. Section 3 presentsthe argumentation model upon which this framework operates.Section 4 defines and discusses the argumentation-based protocolfor B2B conflict resolution and analyzes its formal and computa-tional properties. To illustrate the proposed framework through arunning example, an industrial case study (provided by IBM Re-search Division) is discussed in Section 5 along with its implemen-tation using Java and logic programming with Prolog. Prior toconcluding and presenting future work in Section 7, related workis discussed in Section 6.

2. The proposed framework for B2B applications

2.1. Brief description of levels and relations

The resource level includes data and software resources (e.g.,DBMS) that a business owns or manages, and the hardware re-sources upon which these software resources operate.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OThe application level is about the software applications thatbusinesses operate such as payroll. From a B2B perspective, theapplication level hosts a number of A� AAs according to the num-ber of these applications. The role of A� AAs is to (i) monitor theexternal business processes that will use software applicationsand (ii) initiate interaction sessions with other A� AAs. These ses-sions frame application compositions according to the guidelinesthat S � AAs set and resolve possible conflicts during these compo-sitions as depicted by composition relation in Fig. 1. For illustrationpurposes we assume that software applications are implementedas Web services [18], although other technologies could be used.

The strategic level is about the planning and decision-makingmechanisms that underpin the growth of a business. Like the appli-cation level, the strategic level hosts a number of S � AAs accordingto the number of active collaborations that a business initiates withits partners. The role of S � AAs is to (i) reason over the businessplans and (ii) initiate interaction sessions with other S � AAs as de-picted by collaboration relation in Fig. 1. These sessions aim at per-suading peers to participate in collaborations, reviewing policies incase of conflicts, optimizing some parameters such as distributionnetwork, etc. A� AAs feed S � AAs with details related to the exe-cution progress of business processes. Particularly, if a conflict dur-ing the composition process cannot be resolved at the applicationlevel, the A� AAs inform their respective S � AAs.

From an argumentation perspective, the S � AAs and A� AAsare equipped with the same reasoning capabilities. However theydiffer in terms of the knowledge they manage and the responsibil-ities they are in charge of. For example, to resolve conflicts at theapplication or strategic levels, the A� AAs or S � AAs use the samepersuasion and negotiation protocols but execute them differently.Protocols publicly describe the allowed moves, but how a certainmove is selected would dependent on the knowledge that feedthe agents’ private strategies.

Fig. 1 shows vertical and horizontal relations. In a B2B context,the focus is on horizontal relations. Interconnectivity relation tar-gets the resource level and allows (i) data to freely and securelyflow between businesses without any format, location, or semanticrestriction and (ii) disparate resources to trigger each other with-out any access rights, time-slot availabilities, or compatibilityrestrictions. Communication protocols incompatibility (e.g., Syn-chronous Optical Networking (SONET) vs. Synchronous DigitalHierarchy (SDH)), incompatible hardware transmission technolo-gies (e.g., circuit switching vs. multiplexing) and different modesof communication (e.g., connection-oriented communication vs.connectionless communication) are key examples of conflicts thatfall under the interconnectivity relation.

Composition relation targets the application level and exhibitshow business processes associated with A� AAs get ‘‘virtually”

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 3: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 3

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

CO

RR

EC

integrated without being subject to any functional or structuralchanges. Lack of common semantics (e.g., different measurementunits) is an example of conflict that falls under the compositionrelation. When it comes to Web services-based applications, com-position targets users’ requests that cannot be satisfied by any sin-gle, available Web service, whereas a composite Web serviceobtained by combining available Web services may be used.

Collaboration relation targets the strategic level and empha-sizes the mechanisms that the S � AAs set-up for coordinatingthe new B2B processes using the A� AAs. These processes arethe result of composing applications, stretch beyond businesses’boundaries, and have to consider the requirements/limitations ofthe resource and application levels per business. For example, inthe context of supply chain networks, many concrete conflicts thatfall under the collaboration relation can arise. Concrete examplesof such conflicts are: taxing policies incompatibility between man-ufactories and warehouses (e.g., various tax rates), incompatiblescheduling policies between suppliers and manufactories (e.g.,scheduling holidays during Christmas vs. summer) and incompat-ible inventory policies between distribution centers and retailers(e.g., lean vs. responsive inventory policies). Policies of businessescan be in contradiction, and some core business policies cannot beeasily re-engineered. By using argumentative agents, we aim athandling these issues. Through their argumentative reasoning,and interaction, negotiation, and persuasion abilities, these agentscould reason about these policies, identify possible conflicts, andupdate their policies to resolve these conflicts. They can, also, per-suade each other for the benefit of collaborating and sharing theirresources and determining alternative agents to work with, in casethe current conflicts cannot be addressed.

2.2. Forms of coordination

Coordination, via explicit interactions between argumentativeagents whether in the same or separate levels, is a pre-requisiteto any successful B2B application. We split coordination in theargumentative agent-based framework into two forms: vertical be-tween strategic and application levels via the rely-on relation, andhorizontal between strategic or application levels via the collabora-tion or composition relations, respectively. We discuss hereafterhow argumentation is injected into coordination using Figs. 2and 3 where plain lines and dotted lines denote interactions andconflict detection/resolution, respectively.

Vertical Coordination occurs within the boundaries of thesame business. Here a S � AA has the authority to execute a setof actions over an A� AA (Fig. 2): ‘‘select”, ‘‘ping”, ‘‘trigger”, ‘‘audi-t”, and ‘‘retract & select”.

– ‘‘select” action makes the S � AA identify the A� AA of an appli-cation that will pursue the interactions with other A� AAs aspart of the partnership decision;

UN 272

273

274

275

276

277

Fig. 2. Argumentation in vertical coordination.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OO

F

– ‘‘ping” action makes the S � AA check the liveness and readinessof an application through its A� AA; this is needed before thisapplication is suggested as a potential candidate for receivingrequests from other A� AAs;

– ‘‘trigger” action makes the S � AA forward the executionrequests to the A� AA of an application; these requests arrivefrom others A� AAs;

– ‘‘audit” action makes the S � AA monitor the performance of anapplication through its A� AA; this is needed if the S � AA hasto guarantee a certain QoS to other S � AAs;

– ‘‘retract & select” make the S � AA withdraw an applicationthrough its A� AA based on the outcome of ”audit” action(e.g., poor performance). This results in starting the search foranother application to offer to other partners.

Argumentation in vertical coordination is illustrated with twocases: Application-to-Strategic (this paper focus) and Strategic-to-Application.

Application-to-Strategic case highlights an A� AA that faces dif-ficulties in resolving conflicts and completing its operations. Forexample, the A� AA was put on hold for a long period of timedue to occupied resources or did not receive information in theright format from other businesses’ A� AAs. As a result, theA� AA notifies its S � AA so that both set-up an argumentationsession for the sake of discussing the current difficulties and thepotential solutions to put forward. This notification is representedwith ‘‘feedback” in Fig. 2. Supply chain management is a concreteillustration of such a coordination. In this context, a conflict canhappen between two partners about the delivery time. S � AAsand A� AAs of each player can argue to change the delivery timeto satisfy the whole supply chain. Briefly, we report on the wayconflict resolution progresses in this argumentation session.

Case 1. The S � AA has an argument supporting the fact that theconflict facing the A� AA could be resolved based onsimilar previous situations for example. Thus, theS � AA argues with the A� AA about the feasibility ofthis solution using persuasion ( Section 4.2). If theA� AA is not convinced (i.e., persuasion fails), theS � AA will decide to select another A� AA to continuethe uncompleted composition work of the A� AA thatwas withdrawn.

Case 2. The S � AA does not have any argument for or againstthe possibility of resolving the conflicts that the A� AAfaces. Thus, the S � AA and A� AA collaborate to find asolution through an inquiry dialogue game like the oneproposed in [7]. As defined by Walton and Krabbe [27],the inquiry dialogues rise from an initial situation of gen-eral ignorance and the purpose is to achieve the growthof knowledge and agreements.

If neither case (1) or (2) succeeds, the respective S � AAs of thecollaborative businesses try to work out a solution via horizontalcoordination. When a solution is found, the S � AAs check withthe same A� AAs if they are still available, or invite new S � AAsto take part in the composition to deploy at the application level.

Fig. 3. Argumentation in horizontal coordination.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 4: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

4 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

RR

EC

Strategic-to-Application case highlights a S � AA that expects theoccurrence of conflicts if appropriate actions are not taken on time.Examples of actions include reprimanding an A� AA that releasedprivate details to peers. Expecting conflicts is based on the differentfeedbacks that the S � AA receives from their A� AAs. This showsa preventive strategy to conflict occurrence. However, handlingpreventive strategies is beyond the scope of this paper.

Horizontal Coordination spreads over the boundaries of busi-nesses and thus, reflects B2B applications in a better way. We iden-tify two scenarios where each scenario involves either S � AAs orA� AAs. For the sake of simplicity, our description is restrictedto A� AAs. Here an A� AA has the authority to carry out a setof actions over another peer engaged in the same composition (Fig. 3): ‘‘ping” and ‘‘trigger”.

– ‘‘ping” action makes the A� AA check the liveness of a remoteapplication through its A� AA; this is needed before the formerA� AA submits requests;

– ‘‘trigger” action makes the A� AA submit its requests to aremote application through its A� AA.

Argumentation in horizontal coordination is illustrated withtwo cases: Application-to-Application and Strategic-to-Strategic.

Application-to-Application case stresses an A� AA that identifiesa conflict after interacting with peers. Conflicts could be of manytypes like different security policies, different semantics (e.g., dif-ferent measurement units, different ontologies, etc.), conflictingquality of service, different costs associated with an application,etc.A� AAs try to resolve these conflicts via argumentation using a

combination of persuasion and inquiry (Section 4.2). the A� AA en-gage in pure persuasion if one of them has already a solution thatcould be accepted by the other with respect to the beliefs it has.However, merging persuasion with inquiry allows these agents toreach a joint argument.

Strategic-to-Strategic case highlights a S � AA that identifies aconflict and tries to resolve it with its S � AA partner. Some con-flicts at this level concern penalty policies (e.g., collaboration’s con-tract terms and conditions not respected) and payment policies.This case also stresses the situation where two S � AAs of the col-laborative businesses try to work out a solution of a conflict re-ported by the respective A� AAs. This conflict cannot beresolved by vertical coordination. To this end, the S � AAs engagein persuasion and inquiry sessions (Section 4.2).

Before detailing the protocol for persuasion and inquiry, we dis-cuss our argumentative agents framework for B2B applicationsthat is based on computational argumentation theory.

O

382

383

384

385

386

387

388

389

391391

392

393

394

UN

C3. Formal argumentation framework

3.1. Background

This section discusses the argumentation system that framesthe internal operations in our B2B framework. This discussion in-cludes the configuration featuring argumentative agents as well.We use an abstract formal language L to express agents’ beliefs.Here abstract means that beliefs could be propositional formulaslike in [20], Horn clauses like in [4], or a set of facts and rules likein [7] and [12]. The use of an abstract language would make ourframework generic and capable to capture properties that otherframeworks concentrate on. The set of well-formed formulasðwff Þ built from L is denoted byWF . Agents build arguments usingtheir beliefs. The set ArgðLÞ contains all those arguments. Similarlyto [1,8,9], we abstractly define argumentation as a dialectical pro-cess that underpins the exchange of ‘‘for/against” arguments that

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OO

F

lead to some conclusion. Since we use an abstract language, weare not interested in the internal form of an argument. Formally,we define our argumentation framework as follows:

Definition 1 (Argumentation Framework). An abstract argumenta-tion framework is a pair A; ATh i, where A # ArgðLÞ and AT # A� Ais a binary relation over A that is not necessarily symmetric. Fortwo arguments a and b, we use AT ða; bÞ instead of AT 2 ða; bÞ toindicate that a is an attack against b.

For example, an argument may be defined as a deduction of aconclusion from a given set of rules, or as a pair ðH; hÞ where h isa sentence in WF and H a subset of a given knowledge base suchthat (i) H ‘ h, (ii) H is consistent, and (iii) there is no subset of Hwith properties (i) and (ii). Like in formal argumentation theory(see for example [2,22,23]), we do not consider in this paper fuzzyarguments that could have a subjective nature. This means, whenan argument is represented during an interaction, the agents cancheck whether an argument os legal or not. For example, if argu-ments are deducted from a given set of rules, the interacting agentsare supposed to share the same rules so they can check if thedeductions are valid, and if arguments are pairs, they can checkif the three aforementioned conditions (i, ii, and iii) are satisfied.Consequently, as commonly supposed in the argumentation the-ory, the agents share the same definition of attack relation. Thismeans, an argument a attacks another argument b iff AT ða; bÞholds for all the interacting agents. In fact, as conflicts betweenarguments might occur, we need to define what an acceptable argu-ment is. Dealing with fuzzy arguments could make the frameworkstronger and more flexible. However, this will raise complicated is-sues on how the arguments can be commonly accepted. Consider-ing such issues is out of scope of this paper, and one of the majorplans for our future work. To define the notion of acceptable argu-ments, we first define the notions of ‘‘defense” and ‘‘admissible setof arguments” (from [9,10]):

Definition 2 (Defense). Let A # ArgðLÞ be a set of arguments overthe argumentation framework, and let S # A. An argument a isdefended by S iff 8b 2 A if AT ðb; aÞ, then 9c 2 S : AT ðc; bÞ.

Definition 3 (Admissible Set). Let A # ArgðLÞ be a set of argumentsover the argumentation framework. A set S # A of arguments isadmissible iff:

(1) 9= a; b 2 S such that AT ða; bÞ and(2) 8a 2 S a is defended by S.

In other words, a set of arguments is admissible iff it is conflict-freeand can counter-attack every attack.

Example 1. Let A ¼ fa; b; c; dg and AT defined as follows:AT ðb; aÞ; AT ðc; aÞ; AT ðd; bÞ; AT ðd; cÞ. The sets: ;; fdg, andfa; dg are all admissible. However, the sets fbg and fd; cg are notadmissible.

Definition 4 (Characteristic Function). Let A # ArgðLÞ be a set ofarguments and let S be an admissible set of arguments over theargumentation framework. The characteristic function of the argu-mentation framework is:

F : 2A ! 2A

FðSÞ ¼ faja is defended by Sg

The following proposition shows a property of the characteristicfunction F. The proof is straightforward from Definitions 3 and 4.

Proposition 1. For all admissible set of arguments S, S # FðSÞ.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 5: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 5

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Definition 5 (Extensions). Let S be an admissible set of arguments,and let F be the characteristic function of the argumentationframework.

� S is a complete extension ðScoÞ iff S ¼ FðSÞ.� S is the grounded extension ðSgrÞ iff S ¼ FðSÞ and S is minimal

(w.r.t. set-inclusion) (grounded extension corresponds to theleast fixed point of FÞ.

� S is a preferred extension ðSprÞ iff S ¼ FðSÞ and S is maximal(w.r.t. set-inclusion).

T

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513514

UN

CO

RR

EC

Example 2. Let us consider the same argumentation framework asin Example 1. We have:

� Fð;Þ ¼ fdg, so the admissible set ; is not a complete extension.� FðfdgÞ ¼ fa; dg, so the admissible set fdg is not a complete

extension.� Fðfa; dgÞ ¼ fa; dg, so the admissible set fa; dg is a complete

extension.

In this example, the only complete extension fa; dg is thegrounded extension and is also the only preferred extension.

Example 3. Let A ¼ fa; b; cg and AT defined as follows: AT ða; bÞand AT ðb; aÞ. The sets: fcg; fa; cg, and fb; cg are the completeextensions of the argumentation framework. The minimal com-plete extension fcg is the grounded extension, and the maximalcomplete extensions fa; cg and fb; cg are the preferred extensions.

According to Definition 5, an admissible set S is a completeextension if and only if S is a fixed point of the function F, whichmeans that all arguments defended by S are also in S. Also, thegrounded extension is the least fixed point of F. Consequently, thegrounded extension contains all the arguments that are not at-tacked (the arguments that are defended by the empty set: Fð;Þ),all the arguments that are defended by these non-attacked argu-ments FðFð;ÞÞ ¼ F2ð;Þ, all the arguments that are defended by thedefended arguments (F3ð;Þ), and so on until a fixed point isachieved. The grounded extension corresponds to the intersectionof all the complete extensions. Finally, a preferred extension is amaximal complete extension that cannot be augmented by addingother arguments while staying complete.

We have the following direct proposition:

Proposition 2. Let hA;AT i be an argumentation framework.9!SgrinhA; AT i.

In other words, there exists a single grounded extension for the ab-stract argumentation framework. We can now define what the accept-able arguments in our system are.

Definition 6 (Acceptable Arguments). Let A # ArgðLÞ be a set ofarguments, and let G ¼ Sgr . An argument a over A is acceptable iffa 2 G.

According to this acceptability semantics, which is based on thegrounded extension, if we have two arguments a and b such thatAT ða; bÞ and AT ðb; aÞ, then a and b are both non-acceptable. In aB2B scenario, this can happen when two A� AAs present two con-flicting arguments about the type of security policies to use for thecurrent transaction: a weak policy that is simple to implement andless expensive or a strong policy that is hard to implement andmore expensive. This notion is important in B2B applications sinceagents should agree on an acceptable opinion, which is supportedby an acceptable argument when a conflict arises. However, duringthe argumentative conversation, agents could use non-acceptablearguments as an attempt to change the status of some argumentspreviously uttered by the addressee, from acceptable to non-

515

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OO

F

acceptable. This idea of using non-acceptable arguments in the dis-pute does not exist in the persuasion and inquiry protocols in theliterature. For this reason, we introduce two new types of argu-ments based on the preferred extensions to capture this notion.We call these arguments semi-acceptable and preferred semi-accept-able arguments.

Definition 7 ((Preferred) Semi-Acceptable Arguments). Let G be thegrounded extension in the argumentation framework, and letE1; . . . ; En be the preferred extensions in the same framework. Anargument a is:

� Semi acceptable iff a R G and 9Ei; Ej with ð1 6 i; j 6 nÞ such thata 2 Ei ^ a R Ej.

� Preferred semi-acceptable iff a R G and 8Eið1 6 i 6 nÞa 2 Ei.

In other words, an argument is semi-acceptable iff it is notacceptable and belongs to some preferred extensions, but not to allof them. An argument is preferred semi-acceptable iff it is notacceptable and belongs to all the preferred extensions. Thepreferred semi-acceptable arguments are stronger than the semi-acceptable, and the grounded arguments are the strongest argu-ments in this classification.

Example 4. Let A ¼ fa; b; c; dg and AT is defined as follows:AT ða; bÞ; AT ðb; aÞ; AT ða; cÞ; AT ðb; cÞ, and AT ðc; dÞ.

� ; is the grounded extension in this argumentation framework.� The argumentation framework has two preferred extensions:fa; dg and fb; dg. The arguments a and b are then semi-accept-able, and the argument d is preferred semi-acceptable.

A concrete scenario of this example in a B2B setting would be asfollows: Suppose a transaction Tr along with three possiblesecurity policies: s1; s2, and s3. The four arguments a; b; c and dare as follows:

� a: s1 is the most suitable policy for the transaction Tr.� b: Alone, s2 is not sufficient to secure the transaction Tr, but by

combining it with s3 it becomes the most suitable.� c: s2 is less expensive than s1.� d: s1 is not expensive to implement, and is sufficient to secure

the transaction Tr.

To a certain extent, the argument d is stronger than a and bbecause it is defended by these two arguments against the onlyattacker c, and a and b attack each other. From a chronologicalpoint of view, we can imagine the following scenario leading tobuild these four arguments at the application level of twobusinesses represented by A� AA1 and A� AA2, respectively.First, A� AA1 presents the argument d, then A� AA2 attacks bymoving forward the argument c. A� AA1 replies by attacking cusing the argument a. At that stage, the arguments a and d aregrounded. A� AA2 tries then to degrade one of these twoarguments by attacking a using b. A� AA2 is aware that by usingb to attack a, b is at the same time attacked by a. The idea here isjust to change the status of the argument presented by A� AA1

from acceptable to semi-acceptable.

Proposition 3. Let A # ArgðLÞ be a set of arguments, and letSD ¼ fa 2 Aj 8b 2 AAT ðb; aÞ ) AT ða; bÞ&9= c 2 A : AT ðc; bÞg.8a 2 SD; a is semi-acceptable.

In other words, the arguments defending themselves by only them-selves against all the attackers are semi-acceptable.

Proof. See Appendix. h

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 6: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

592

6 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Proposition 4. Complete extensions are not closed underintersection.

Proof. See Appendix. h

Definition 8 (Eliminated Arguments). Let A # ArgðLÞ be a set ofarguments, a 2 A be an argument, and EL be the set of eliminatedarguments over the argumentation framework. Also, let E1; . . . ; En

be the preferred extensions in the same framework. a 2 EL iffa R Ei; 8i 2 ½1; n�.

In other words, an argument is eliminated iff it does not belongto any preferred extension in the argumentation framework. Wehave the following proposition:

Proposition 5. Let a be an argument in A, and AC; PS; and SA berespectively the sets of acceptable, preferred semi-acceptable, andsemi-acceptable arguments over the argumentation framework.a 2 EL iff a R AC [ PS [ SA.

In other words, an argument is eliminated iff it is not acceptable,not preferred semi-acceptable, and also not semi-acceptable.

Proof. See Appendix. h

Consequently, arguments take four exclusive statuses namelyacceptable, preferred semi-acceptable, semi-acceptable, and elimi-nated. The dynamic nature of agent interactions is reflected by the changes in the statuses of the uttered arguments.

T593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

UN

CO

RR

EC

3.2. Partial arguments and conflicts for B2B applications

In a B2B scenario, it happens that the argumentative agentsS � AAs and A� AAs do not have complete information aboutsome facts. In a similar situation, they can build partial argumentsfor some conclusions out of their beliefs. We define a partial argu-ment as follows:

Definition 9 (Partial Arguments). Let x be a wff in WF . A partialargument denoted by ap

x is part of an argument a 2 A, which missesan argument (or a proof) for x. In other words, by adding a proofsupporting x to ap

x an argument is obtained.

For example, if arguments are defined as deductions from a setof rules, x will represent some missing rules, and if arguments aredefined as pairs ðH; hÞ, x will represent a subset of H.

Example 5. Let us suppose that arguments are defined as pairsðH; hÞ using propositional logic. a ¼ ððm; m! nÞ; nÞ is an argumentfor n and ap

x ¼ ððm! nÞ; nÞ is a partial argument for n missing thesupport for x ¼ m.a ¼ ððm; m! n; n! l; l! rÞ; rÞ is an argumentfor r and ap

x ¼ ððn! l; l! rÞ; rÞ is a partial argument for r missingthe support for x ¼ n. In this case, a possible support isððm; m! nÞ; nÞ.

In a B2B scenario, an example where partial arguments areneeded is when A� AA1 of business B1 knows that securitypolicy s2 that another business B2 uses can be substituted bypolicy s1 that B1 uses if some conditions are met whendeploying s2. Thus, A� AA1 can build a partial argumentsupporting the fact that B2 can use s1. To be an argument, thispartial argument needs a support that implementing s2 in B2

meets these conditions.The idea behind building partial arguments by an agent is to

check if the other agent can provide the missing part or a part ofthis missing part so that the complete argument could be jointlybuilt (progressively). This idea which is a part of the inquirydialogue will be made clear in the persuasion protocol defined inSection 4.2.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OO

F

As for arguments, we need to define what an acceptable partialargument is. This acceptability is defined in the same way as forarguments. We use the notation ap

x :x to denote the resultingargument of combining the partial argument ap

x and an argumentsupporting x supposing that this latter exists.

Definition 10 (Partial Attack). Let apx be a partial argument over

the argumentation framework. AT ðapx ; bÞ iff AT ðap

x :x; bÞ andAT ðb; ap

xÞ iff AT ðb; apx :xÞ.

Definition 11 (Acceptable Partial Arguments). A partial argumentap

x is acceptable (preferred semi-acceptable, semi-acceptable) iffap

x :x is acceptable (preferred semi-acceptable, semi-acceptable).

Example 6. Let R ¼ fn! m; r ! l; l! t; :lg be a propositionalknowledge base. The partial argument ððn! mÞ; mÞ is acceptable,however the partial argument ððr ! l; l! tÞ; tÞ is not acceptablesince the argument ððr; r ! l; l! tÞ; tÞ is attacked by the argumentð:l; :lÞ.

Proposition 6. Let a be an argument in A. If a is acceptable, then8x 2 WFap

x is acceptable.

Proof. See Appendix. h

After specifying the argumentation model, We define the no-tions of conflict and conflict resolution in our B2B framework asfollows:

Definition 12 (Conflict). Let p and q be two wffs in WF . There is aconflict between two argumentative agents a and b about p and qin the B2B framework iff one of them (e.g., aÞ has an acceptableargument a for p (denoted a " pÞ and the other (i.e., bÞ has anacceptable argument b for q ðb " qÞ such that AT ða; bÞ or AT ðb; aÞ.We denote this conflict by ap�bq.

For example, if p and q represent each a security policy s1 and s2

such that s1 and s2 cannot be used together, then there is a conflictif one agent has an acceptable argument for using s1 while theother agent has an acceptable argument for using s2 (the twoarguments are conflicting). This conflict arises when both agentsneed to agree on which security policy to use.

Before defining the notion of conflict resolution, we need todefine the notions of interaction and outcome of interaction. Anutterance u made by an agent a in a given interaction is denotedu,a.

Definition 13 (Interaction). Let a and b be two argumentativeagents. An interaction (denoted by Ia; bÞ between a and b in the B2Bframework is an ordering sequence of utterances u1; u2; . . . ; un

such that ui,a) uiþ1,b and ui,b) uiþ1,a. CSa (resp. CSb) isthe set (called commitment store) containing the arguments usedby a (resp. b) during the interaction.

Definition 14 (Conflict Resolution). Let p and q be two wffs in WFand a and b be two argumentative agents in the B2B frameworksuch that ap�bq. Also let Ia; b be an interaction in this framework.The conflict ap�bq is resolved by the interaction Ia; b iff the outcomeof Ia; b is a formula r 2 WF such that 9a 2 CSa; b 2 CSb : a " r; b " rand a and b are both acceptable.

In the aforementioned security example, the conflict is resolvediff (i) after interaction, one of the agents can build an acceptableargument from its knowledge base and the arguments exchangedduring this interaction, supporting the use of the other agent’s pol-icy, or (ii) when both agents agree on the use of a new policy suchthat each agent can build an acceptable argument, from its knowl-edge base and the exchanged arguments, supporting the use of this

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 7: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

631

632

633

634

635

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

653653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 7

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

policy. The idea here is that by exchanging arguments, new solu-tions (and arguments supporting these solutions) can emerge. Inthis case, the agents should update their beliefs by withdrawing at-tacked (i.e., eliminated) assumptions. However, there is still a pos-sibility that each agent keeps its own viewpoint at the end of theconversation.

T

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

735735

736

737

738

740740

741

742

743

744

745

746

747

748

749

750

751

UN

CO

RR

EC

4. Argumentative persuasion for B2B

4.1. Notations

The outcome of an interaction to resolve a conflict in a B2B set-ting depends on the status of the formula representing the conflicttopic. As for arguments, a wff has four statuses depending on thestatuses of the arguments supporting it (an argument supports aformula if this formula is the conclusion of that argument). A wffis acceptable if there exists an acceptable argument supporting it.If not, and if there exists a preferred semi-acceptable argumentsupporting it, then the formula is preferred semi-acceptable.Otherwise, the formula is semi-acceptable if a semi-acceptableargument supporting it exists, or eliminated if such an argumentdoes not exist. Let St be the set of these statuses. We define the fol-lowing function that returns the status of a wff with respect to aset of arguments:

D :WF � 2A ! St

Generally, the interactions that are needed in a B2B scenario in-volve two argumentative agents. For simplicity, we will not refer inthe remainder of the paper to agent types (strategic or application),but denote participating agents by a and b. Each agent has a possi-bly inconsistent belief base Ra and Rb, respectively, that containsfor example, all the policies upon which these agents should rea-son when they manage businesses as explained in the previoussections. Although the argumentation framework presented in Sec-tion 3 does not assume that arguments are truthful, we supposethat the agents participating in resolving B2B conflicts are truthtelling. This means they (i) reveal only the arguments they havein their knowledge bases and (ii) are perfectly cooperative. Pro-moting truth telling in the proposed framework using for instancegame-theoretical techniques, and considering non-cooperativeagents are plans for future work.

Agents use their argumentation systems to decide about thenext move to play (e.g., accept or attack the arguments put forwardduring their interactions). When an agent accepts an argumentthat an addressee suggests, this agent updates its knowledge baseby adding the elements of this argument and removing all the ele-ments that attack this argument. The acceptability we considerhere is purely argumentative as specified in Definition 6. However,if businesses have different power positions in their relationship,the proposed approach still stands if the power positions areclearly stated as shared and agreed upon rules. This simply meansthat acceptability should also consider these rules. For example, anagent can accept an argument if it is associated with a power. Fur-thermore, an argument a can attack another argument b withoutbeing attacked by this argument (i.e., by b) if a is given by an agenthaving a superior power position. However, if these rules are notshared and agreed upon, they can still be used simply by not beingcooperative, which is an assumption for the soundness of ourapproach.

Each agent a has also a commitment store (CSa) that is publiclyaccessible for consultation but only updated by the owner agent.The commitment stores are empty when interaction starts, and up-dated by adding arguments and partial arguments that the agentsexchange. CSa refers to the commitment store of agent a at the cur-rent moment.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

The possibility for an agent a to build an acceptable argument a(respectively an acceptable partial argument ap

x ) from its knowl-edge base and the commitment store of the addressee b is denotedby ARðRa [ CSbÞ . a (respectively ARðRa [ CSbÞ . ap

x). Building apartial argument ap

x from a knowledge base means that no argu-ment for or against x can be built. ARðRa [ CSbÞ7a (respectivelyARðRa [ CSbÞ7ap

x ) means that agent a cannot build an acceptableargument a (respectively an acceptable partial argument ap

x) fromRa [ CSb. The symbols D and 4 associated with the semi-accept-

able (partial) arguments are defined in the same way.

ED

PR

OO

F4.2. Protocol specification

In our B2B framework, the agents engage in persuasion and in-quiry dialogues to resolve conflicts. Atkinson et al. [2], Pasquieret al. [21], and Prakken [22] propose persuasion protocols for mul-ti-agent systems. However, these protocols consider only pure per-suasion without inquiry stages and do not address completeness(or pre-determinism) property [20]. We propose a persuasion pro-tocol that includes inquiry stages in our B2B framework, in whichpre-determinism is considered. The protocol is modeled with dia-logue games [16,17]. Dialogue games are interactions betweenplayers (agents), in which each player moves by performing utter-ances according to a pre-defined set of rules. Let us define the no-tions of protocol and dialogue games.

Definition 15. ProtocolA protocol is a pair hC; Diwith C a finite setof allowed moves and D a set of dialogue games.

The moves in C are of c different types (c > 0). We denote byMiða; b; a; tÞ a move of type i played by agent a and targeting agentb at time t regarding a content a. We consider four types of movesin our protocol: Assert, Accept, Attack, and Question. Generally, inthe persuasion protocol the agents exchange arguments. Exceptthe Question move whose content is not an argument, the contentof other moves is an argument aða 2 ArgðLÞÞ. When replying to aQuestion move, the content of Assert move can also be a partialargument or ? when the agent does not know the answer. Weuse another particular move Stop with no content. It could be usedby an agent to stop the interaction.

Intuitively, a dialogue game in D is a rule indicating the possiblemoves that an agent could play following a move done by an ad-dressee. This is specified formally as follows:

Definition 16. Dialogue Game A dialogue game Dg is either of theform:

Miða;b; ai; tÞ )_

0<j6ni

Mjðb;a; aj; t0Þ

where Mi and Mj are in C; t < t0 and ni is the number of allowedmoves that b could perform after receiving a move of type i froma; or of the form:

)_

0<j6n

Mjða;b; aj; t0Þ

where Mj are in C; t0 is some initial time, and n is the number of al-lowed moves that a could perform initially.

According to this definition, a dialogue game could be eitherdeterministic (if n ¼ 1 and 8ini ¼ 1) or non-deterministic. Becauseagents are autonomous, we consider here non-deterministic dia-logue games, in that, for example, given an incoming move of typei, the receiving agent needs to choose amongst the ni possible re-plies (ni > 1). As proposed in [4,6,7], we combine public dialoguegames with private strategies so that the agents become determin-istic. To this end we introduce the conditions within dialoguegames, each associated with a single reply.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 8: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

752

753

755755

756

757

758

760760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775777777

778

780780

781

782

783

784

785

786

787

788

790790

791

792

794794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

816

817

818

819

820

821

822

823

824

825

826

827

828

829

830

831

832

833

834

835

836

837

838

839

840

841

842

843

844

845

846

847

848

849

850

851

852

853

854

855

8 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

UN

CO

RR

EC

Definition 17. Strategic Dialogue Game A strategic dialoguegame SDg is a conjunction of rules, specified either as follows:^

0<j6ni

Miða; b; a; tÞ ^ Cj ) Mjðb;a; aj; t0Þ� �

where t < t0 and ni is the number of allowed communicative actsthat b could perform after receiving a move of type i from a; or asfollows:^

0<j6n

Cj ) Mjða;b; aj; t0Þ� �

where t0 is the initial time and n is the number of allowed movesthat a could play initially.

In order to guarantee determinism, conditions Cj need to bemutually exclusive [25]. The agents use their argumentation sys-tems to evaluate, in a private manner, conditions Cj. These argu-mentation systems are based on the private agents’ beliefs andthe public commitments recorded in the commitment stores.

To simplify the notations, we omit the time parameter form themoves and use the notation [CS as an abbreviation of CSa [ CSb. Inour B usiness-to-B usiness Persuasive Protocol (B2B � PP), theagents are not allowed to play the same move (with the same con-tent) more than once. The strategic dialogue games we consider inthis protocol are:

4.2.1. Initial game

Cin 1 ) Assertða; b; aÞwhere:Cin 1 ¼ 9p; q 2 WF : ap�bq ^ ARðRaÞ . a ^ a " p

Although generic, this game is derived from B2B settings wherea business detects a conflict with another business. The persuasionstarts when a conflict is detected and one of the two businesses/agents asserts an acceptable argument that supports its position.In the remainder of this section, we suppose that the persuasiontopic is represented by the wff p.

4.2.2. Assertion game

Assertða;b;lÞ ^ Cas1 ) Attackðb;a; bÞ^Assertða;b; mÞ ^ Cas2 ) Questionðb;a; xÞ^Assertða;b; mÞ ^ Cas3 ) Acceptðb;a; aÞ^Assertða;b; mÞ ^ Cas4 ) Stopðb;aÞ

where l is an argument or partial argument, m is an argument, par-tial argument, or ? and:

Cas1 ¼ Opat1as1_ ð:Opat1

as1^ Opat2

as1Þ

Opat1as1¼ 9b 2 A : ARðRb [ CSaÞ . b

^ Dðp;[CSÞ– Dðp;[CS [ fbgÞOpat2

as1¼ 9b 2 A : ARðRb [ CSaÞDb

^ Dðp;[CSÞ– Dðp;[CS [ fbgÞCas2 ¼ :Cas1 ^ ðOpqu1

as2_ ð:Opqu1

as2^ Opqu2

as2ÞÞ

Opqu1as2¼ 9bp

x ; bpx :x 2 A : ARðRb [ CSaÞ . bp

x

^ Dðp;[CSÞ– Dðp;[CS [ fbpx :xgÞ

Opqu2as2¼ 9bp

x ; bpx :x 2 A : ARðRb [ CSaÞDbp

x

^ Dðp;[CSÞ– Dðp;[CS [ fbpx :xgÞ

Cas3 ¼ 9a 2 A : ARðRb [ CSaÞ . a ^ a " p^ :Opqu1

as2^ :Opqu2

as2

Cas4 ¼ :Opat1as1^ :Opqu1

as2^ :Opqu2

as2^ :Cas3

^ 8b 2 A;ARðRb [ CSaÞDb)Dðp;[CSÞ ¼ Dðp;[CS [ fbgÞ

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

PR

OO

F

In this game, the content of Assert could be an argument, par-tial argument, or ‘‘?”. The last two choices are particularly derivedfrom B2B aplications, where businesses have only partial infor-mation about each other’s activities and should exchange ques-tions to reveal the unkown information that could help inresolving the business conflict. We recall that the two businessesare cooperative because they have interest in resolving the con-flict. Indeed, businesses/agents can use this move to assert newarguments in the initial game or to reply to a question in thequestion game, which is a part of inquiry in our protocol. Themove that agent b can play as a reply to the Assert move dependson the content of this assertion. When a asserts an argument or apartial argument, CSa changes by adding the advanced (partial)argument. Agent b can attack agent a if b can generate an accept-able argument from its knowledge base and the a’s commitmentstore so that this argument will change the status of the persua-sion topic. Consequently, in this protocol the agents do not attackonly the recently advanced argument, but any advanced argu-ment during the interaction, which is still acceptable or (pre-ferred) semi-acceptable (Opat1

as1). This makes the protocol more

flexible and efficient (for example agents can try different argu-ments to attack a given argument). If such an acceptable argu-ment cannot be generated, b will try to generate a (preferred)semi-acceptable argument changing the status of pðOpat2

as1Þ. The

idea here is that if b eliminates a’s arguments, it will try to makethem (preferred) semi-acceptable. This is due to the followingproposition whose proof is straightforward from the definitionof semi-acceptable arguments and the fact that only four statusesare possible.

Proposition 7. If b plays the Attack move with a semi-acceptableargument, then the a’s attacked argument changes the status fromacceptable to semi-acceptable, and the persuasion topic changes thestatus from acceptable to semi-acceptable or preferred semi-acceptable.

We notice that in the Assertion game changing the status of p isa result of an attack relation:

Proposition 8. In the Assertion game we have: 8b 2 A; Dðp; [CSÞ –Dðp; [CS [ fbgÞ ) 9a 2 [CS : AT ðb; aÞ.

If b cannot play the Attack move, then before checking theacceptance of an a’s argument, it checks if no acceptable and then no(preferred) semi-acceptable argument in the union of the knowledgebases can attack this argument (inquiry part). For that, if b cangenerate a partial argument changing the status of p, then it willquestion a about the missing assumptions (Opqu1

as2and Opqu2

as2). This new

feature provides a solution to the ‘‘pre-determinism” problem identi-fied in [20]. If such a partial argument does not exist, and if b cangenerate an acceptable argument supporting p, then it plays theAccept move (Cas3).

Proposition 9. An agent plays the Accept move only if it cannot playthe Attack move and cannot play the Question move.

Proof. See Appendix. h

Agent b plays the Stop move when it cannot accept an a’s argu-ment and cannot attack it. This happens when an agent has a semi-acceptable argument for p and another semi-acceptable argumentagainst p, so the status of p in the union of the commitment storeswill not change by advancing the b’s argument (Cas4). Finally, wenotice that if the content of Assert move is ?, b cannot play the At-tack move. The reason is that such an Assert is played after a ques-tion in the Question game, and the agents play Question moves onlyif an attack is not possible. Using simple logical calculus, we canprove the following proposition:

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 9: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

856

857

858

859

861861

862

864864

865

866

867

868

869

870

871

872

873

874

875

876

878878

879

881881

882

883

884

885

886

887

888

889

890

891

892

893

895895

896

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 9

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Proposition 10. An agent plays the Stop move iff it cannot playanother move.

T

898898

899

900

901

902

903

904

905

906

907

908

909

910

911

912

913

914

915

916

917

919919

920

921

922

923

924

925

926

927

928

929

930

931

932

933

934

935

936

937

938

939

940

941

942

943

944

945

946

947

948

949

950

951

UN

CO

RR

EC

4.2.3. Attack game

Attackða;b; aÞ ^ Cat1 ) Attackðb;a; bÞ^Attackða;b; aÞ ^ Cat2 ) Questionðb;a; xÞ^Attackða;b; aÞ ^ Cat3 ) Acceptðb;a; aÞ^Attackða;b; aÞ ^ Cat4 ) Stopðb;aÞ

where:

Cat1 ¼ Opat1at1_ ð:Opat1

at1^ Opat2

at1Þ

Opat1at1¼ Opat1

as1

Opat2at1¼ Opat2

as1

Cat2 ¼ :Cat1 ^ ðOpqu1at2_ ð:Opqu1

at2^ Opqu2

at2ÞÞ

Opqu1at2¼ Opqu1

as2

Opqu2at2¼ Opqu2

as2

Cat3 ¼ ARðRb [ CSaÞ . a ^ :Opqu1at2^ :Opqu2

at2

Cat4 ¼ :Opat1at1^ :Opqu1

at2^ :Opqu2

at2^ :Cat3

^ 8b 2 A;ARðRb [ CSaÞDb)Dðp;[CSÞ ¼ Dðp;[CS [ fbgÞ

The conditions associated with the Attack game are similar tothe ones defining the Assert game. The Attack move also includesthe case where the business/agent that initiates the persuasionputs forward a new argument, which is not attacking any existingargument but changing the status of the persuasion topic. This isparticularly useful in B2B applications when the advanced argu-ments cannot be attacked/defended, so that the business conflictcannot be resolved. However, by trying another way to convincethe addressee, the initiator business/agent can achieve the purposeof resolving successfully the conflict.

4.2.4. Question game

Questionða;b; xÞ ^ Cqu1 ) Assertðb;a; aÞ^Questionða;b; xÞ ^ Cqu2 ) Assertðb;a; yp

x0 Þ^Questionða;b; xÞ ^ Cqu3 ) Assertðb;a; ?Þ

where:

Cqu1 ¼ 9a 2 A : ARðRb [ CSaÞ . a ^ ða " x _ a " �xÞCqu2 ¼ 9yp

x0 ; ypx0 :x

0 2 A : ARðRb [ CSaÞ . ypx0

^ ðypx0 " x _ yp

x0 " �xÞCqu23 ¼ :Cqu1 ^ :Cqu2

Business/agent b can answer the a’s question about the contentx by asserting an argument for or against x. If not, it answers by apartial argument if it can generate it. Otherwise, it answers by ?,which means that it does not know if x holds or not. This gameis particularly derived from B2B applications where the informa-tion about the involved businesses are limited. The game is playedwhen a business/agent has a partial argument and asks the otherbusiness/agent about the missing part that is needed to achievean acceptable resolution of the conflict, so that the answer couldbe the complete missing part, a part of it, or nothing.

4.2.5. Stop game

Stopða;bÞ ^ Cst1 ) Questionðb;a; xÞ^Stopða;bÞ ^ Cst2 ) Stopðb;aÞ

where:

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

DPR

OO

F

Cst1 ¼ Opqu1st1_ ð:Opqu1

st1^ Opqu2

st1ÞÞ

Opqu1st1¼ Opqu1

as2

Opqu2st1¼ Opqu2

as2

Cst2 ¼ :Cst1

Before answering the a’s Stop move by another Stop to termi-nate the persuasion, b checks if no other partial arguments chang-ing the status of p could be generated. Consequently, the Stop moveis played only if no such argument could be generated, whichmeans that the conflict cannot be resolved. As mentioned above,checking the existence of other partial arguments is particularlyuseful for B2B applications as the shared information are usuallypartial and incomplete.

4.3. Protocol analysis

In this section, we prove the termination, soundness, and com-pleteness of B2B � PP and discuss its computational complexity.

Theorem 1. B2B � PP always terminates either successfully byAccept or unsuccessfully by Stop.

Proof. See Appendix. h

When the protocol terminates, we define its soundness andcompleteness as follows:

Definition 18 (Soundness - Completeness). A persuasion protocolabout a wff p is sound and complete iff for some arguments a for oragainst p we have:

ARðRa [ RbÞ . a() ARð[CSÞ . a

E

Theorem 2. The protocol B2B-PP is sound and complete.

Proof. See Appendix. h

As discussed earlier, the agents are supposed to be truth tellingand cooperative. The following theorem gives the result if such anassumption is not considered.

Theorem 3. The soundness and completeness of the protocol B2B-PPdo not hold if agents are not truth telling.

Proof. See Appendix. h

This means if the agents are not truth telling, the interactionoutcome cannot be determined, as it could be anything.

The computational complexity of the protocol can be computedconsidering two issues: (1) the complexity of computing argu-ments, partial arguments, and their acceptability; and (2) the com-plexity of playing the games. An important issue in this complexityis the underlying logical language used to specify arguments. It hasbeen proved in [4] that when Horn clauses are used, the complex-ity of computing arguments and their acceptability is polynomial ifthe knowledge base is consistent or is under the form of definiteHorn. Because partial arguments are also arguments that miss gi-ven parts, the complexity of their computation along with theiracceptability is also polynomial in the case of Horn clauses. We no-tice that for the purpose of B2B applications, Horn clauses, whichare disjunction of literals (an elementary or atomic propositionor its negation) with at most one positive literal (also written asimplication), are sufficient to represent and reason about knowl-edge that the three businesses levels presented in Fig. 1 use duringargumentative conversations.

The complexity of playing the games can be reduced to thecomplexity of deciding about the next move given the previousmove and the content of the agent’s knowledge base and the

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 10: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

UN

CO

RR

EC

TED

PR

OO

F

Fig. 4. Specification of the purchase-order scenario.

Fig. 5. Scenario description.

10 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Please cite this article in press as: J. Bentahar et al., Using argumentation to model and deploy agent-based B2B applications, Knowl. Based Syst. (2010),doi:10.1016/j.knosys.2010.01.005

Page 11: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

PR

OO

F

952

953

954

955

956

957

958

959

960

961

962

963

964

965

966

967

968

969

970

971

972

973

974

975

976

977

978

979

980

981

982

983

984

985

986

987

988

989

Fig. 6. Sample of interactions between A� AA of Inv-Mgmt-WS and A� AA of Shipper-WS.

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 11

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

shared commitment store. From the game specification, decidingthe next move is argumentation-based with a polynomial com-plexity. Combining the different games is clearly polynomial asthe last replied move decides about the game to be played. There-fore, given the fact that businesses/agents’ knowledge bases are fi-nite and repeated games with the same content is prohibited, thecomplexity of the protocol B2B-PP is polynomial.

C 990

991

992

993

994

995

996

997

998

999

1000

1001

1002

1003

1004

1005

1006

1007

1008

1009

1010

1011

1012

1013

1014

1015

1016

UN

CO

RR

E5. Case study

5.1. Description and analysis

Our running example (provided by IBM Research Division) illus-trates an online purchase-order application using Web servicestechnology [24] (Fig. 4). This application, widely used in B2B set-tings and supply chain management, is inspired by SpendMap Pur-chase Order Software3. A customer places an order for products viaCustomer-WS (WS for Web service). Based on this order, Cus-tomer-WS obtains details on the customer’s purchase history fromCRM-WS (Customer Relationship Management) of Business B1. Next,Customer-WS forwards these details to B1’s Billing-WS, whichcalculates the customer’s bill based on these details (e.g., consideringif the customer is eligible for discounts) and sends the bill to CRM-

WS. This latter prepares the detailed purchase-order based on the billand sends Inv-Mgmt-WS (Inventory Management) of B1 this orderfor fulfillment. For those products that are in stock, Inv-Mgmt-WSsends Shipper-WS of B2 a shipment request. Shipper-WS is nowin charge of delivering the products to the customer. For those notin stock, Inv-Mgmt-WS sends Supplier-WS of B3 a supply messageto the requisite, which provides the products to Shipper-WS forsubsequent shipment to the customer.

From a B2B perspective, the above application shows how dif-ferent businesses need to collaborate in order to fulfill customers’needs, as per the three horizontal relations of Fig. 1. This applica-

1017

10183 www.spendmap.com/page.asp?intNodeID = 967&intPageID = 1055&slogon =

Bpurch.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

ED

tion could be affected by several types of conflicts. For example,B2’s Shipper-WS may not deliver the products as agreed withB1’s Inv-Mgmt-WS, perhaps due to lack of trucks. This is an appli-cation level conflict that needs to be resolved using our B2B-PP bywhich, Shipper-WS tries to persuade Inv-Mgmt-WS about thenew shipment time and then, inform Customer-WS of the newdelivery time. If not, Shipper-WS may change its policies by can-celling its partnership agreements without prior notice. This is astrategic level conflict, that calls for either asking B2 to whichShipper-WS belongs to review its policies, or if that does notwork, selecting an alternate shipper.

Let aB1 be the A� AA of Inv-Mgmt-WS and bB2be the A� AA of

Shipper-WS. The resolution of the application level conflict alongwith the use of dialogue games are hereafter provided:

1. bB2identifies the conflict and plays the Initial game by asserting

an acceptable argument a about lack of trucks from its RbB2sup-

porting its position: AssertðbB2; aB1 ; aÞ.

2. aB1 has an argument b attacking bB2’s argument, which is about

the available trucks that can be borrowed from a company andcould be used to ship the products. aB1 plays then the Assertiongame by advancing the Attack move: AttackðaB1 ; bB2

; bÞ.3. bB2

replies by playing the Attack game. Because it does not havean argument to change the status of the persuasion topic, buthas a partial argument for that, which is about the high priceof these particular trucks that could be not accepted by aB1 , itadvances the move: QuestionðbB2

; aB1 ; xÞ where x representsaccepting or not the new prices. The idea here is that bB2

canattack aB1 , if it refuses the new prices that others have accepted.

4. aB1 plays the Question game and answers the question byasserting an argument c in favor of the increased shipmentcharges: AssertðaB1 ; bB2

; cÞ:5. bB2

plays the Assertion game, and from RbB2[ CSaB1

, it acceptsthe argument and agrees to deliver the products as per theagreed schedule with the new price, which is represented byd: AcceptðbB2

; aB1 ; dÞ. Consequently, the persuasion terminatessuccessfully by resolving the conflict.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 12: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

1019

1020

1021

1022

1023

1024

1025

1026

1027

1028

1029

1030

1031

1032

1033

1034

1035

1036

1037

1038

1039

1040

1041

1042

12 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

Figs. 5 and 6 illustrate the scenario details with the exchangedarguments.

1043

1044

1045

1046

1047

1048

1049

1050

1051

1052

1053

1054

1055

1056

1057

1058

1059

1060

1061

1062

5.2. Implementation

We have implemented a proof-of-concept prototype of our B2Bframework using Jadex Agent System (a Java-based programminglanguage for autonomous agents) and applied it to the case studyscenario. Fig. 7 depicts a screenshot of the prototype illustratingthe involved agents and computation of the arguments in the sce-nario. The two involved agents in this scenario (described in Fig. 6)are Inv Mgmt and Shipper. The console output shows the differentcomputed arguments and their extensions.

Computing the different argument extensions and acceptablearguments and partial arguments is an essential part of our frame-work and thus, the prototype. This process has been implementedusing InterProlog, an open source Java front-end and functionalenhancement for Prolog. Because both Jadex Agent System andInterProlog are Java-based, they are compatible and can communi-cate. The computed arguments and their extensions are then con-veyed by InterProlog to Jadex Agent System that implements the B2Bapplication. The Input Screen in Fig. 8-a is a Java Swing GUI used tospecify the agents’knowledge bases, their partial arguments, andthe conflicts between arguments. Then, the acceptable arguments

UN

CO

RR

EC

T

Fig. 7. A screenshot from the prototype -invo

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

OF

and the way to resolve the conflict in the B2B setting is shown afterrunning the system as illustrated in Fig. 8-b. The arguments used inthe figure are taken from the case study where the meaning ofevery argument is defined in a separate text file, for example argu-ment 0a0 is about lack of trucks, which implies delayed delivery.

In this particular running example, agent Inventory (Inv Mgmt)has two arguments 0b0 and 0c0 in the knowledge base, which are notattacked. In addition, argument 0b0 attacks and argument 0e0 attacks0b0 (the symbol 0#n0 is used as a separator). The final text field is forsupport; for instance support for 0x0 is 0c0 (this is captured in theframework by the assertion in Question game). The process of com-puting the extensions and resolving the conflicts is illustrated inFig. 9. In this figure, (1) check partial, (2) check ques, (3)Find Extension, and (4) ques ans are Java methods having the fol-lowing respective purposes: (1) filter partial arguments to returnonly arguments; (2) ask for missing information; (3) find groundedor preferred extensions from the argumentation framework; and(4) find support for information asked.

PR

O

6. Related work

Recent years have seen a continuing surge of interest in design-ing and deploying B2B applications. Service-oriented architectureis the most widely methodology that have been used in this field

ED

lved agents and computing arguments-.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 13: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

TED

PR

OO

F1063

1064

1065

1066

1067

1068

1069

1070

1071

1072

1073

1074

1075

1076

1077

1078

1079

1080

1081

1082

1083

1084

1085

1086

1087

1088

1089

1090

1091

1092

1093

1094

1095

1096

1097

1098

1099

1100

1101

1102

1103

1104

1105

1106

1107

1108

1109

1110

1111

1112

1113

1114

1115

1116

1117

1118

1119

1120

1121

Fig. 8. (a) Input screen, (b) Resolving conflict scenario.

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 13

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

UN

CO

RR

EC[15,19,26,28]. In Ref. [15] the author proposes the exploitation of

Web services and intelligent agent techniques for the design anddevelopment of a B2B eCommerce application. A multi-party mul-ti-issue negotiation mechanism is developed for this application.This negotiation is a Pareto optimal negotiation based on gametheory. This proposal aims at achieving an agreement by comput-ing concessions and generating offers in order to maximize theutility of the participating agents. However, unlike our argumenta-tion-based framework, this mechanism cannot be used to resolvegeneral conflicts as those discussed in Sections 2 and 3. In [19],the authors develop a methodology for B2B design applicationsusing Web-based data integration. The aim is the creation of adapt-able semantics oriented meta-models to facilitate the design ofmediators by considering several characteristics of interoperableinformation systems such as extensibility and composability. Themethodology is used to build cooperative environments involvingthe integration of Web data and services. Unlike our methodology,this proposal does not consider conflicts that can arise during thecooperation phase and only addresses the cooperation from tech-nological point of view.

On the other side, and from an argumentation viewpoint, someinteresting protocols for persuasion and inquiry have been pro-posed. [2] propose Persuasive Argument for Multiple Agents (PAR-MA) Protocol, which enables participants to propose, attack, anddefend an action or course of actions. This protocol is specifiedusing logical consequence and denotational semantics. The focusof this work is more on the semantics of the protocol rather thanthe dynamics of interactions. [7] propose a dialogue game inquiryprotocol that allows two agents to share knowledge in order toconstruct an argument for a specific claim. There are many funda-mental differences between this protocol and ours. Inquiry and

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

persuasion settings are completely different since the objectivesand dynamics of the two dialogues are different. In [7], argumenta-tion is captured only by the notion of argument with no attackrelation between arguments. This is because agents collaborateto establish joint proofs. However, in our system, agents can reasonabout conflicting assumptions, and they should compute differentacceptability semantics, not only to win the dispute, but also toreason internally in order to remove inconsistencies from theirassumptions. From the specification perspective, there are no sim-ilarities between the two protocols. Our protocol is specified as aset of rules about which agents can reason using argumentation,which captures the agents’ choices and strategies. However, in[7] the protocol is specified in a declarative manner and the strat-egy is only defined as a function without specifying how the agentscan use it. The adopted moves in the two proposals are also differ-ent. Another technical, but fundamental difference in the two pro-tocols is the possibility in our protocol of considering not only thelast uttered argument, but any previous argument which allowsagents to consider and try different ways of attacking each other.

7. Conclusions and future work

In this paper, a 3-level framework for B2B applications is pre-sented. The three levels namely strategic, application and resourceare populated with argumentative agents. The first contribution ofthis paper is the development of a framework to set-up collabora-tions among autonomous businesses (via strategic level), and exe-cute and manage these collaborations (via application level).Inevitably, given the autonomous and dynamic nature of busi-nesses, conflicts are bound to arise. The second contribution is

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 14: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

RR

EC

TED

PR

OO

F

1122

1123

1124

1125

1126

1127

1128

1129

1130

1131

1132

1133

1134

1135

1136

1137

1138

1139

1140

1141

1142

1143

1144

1145

1146

1147

1148

1149

Fig. 9. Process of computing the extensions and resolving the conflicts.

14 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

UN

COthe proposition of a sound and complete persuasion protocol for

resolving such conflicts. This protocol, that includes inquiry stagesis argumentation-based.

Future work would include considering a negotiation protocolduring argumentation and scaling up and demonstrating our argu-mentation-based model on larger examples. Additional researchvenues would be enriching this model with fuzzy concepts andnew criteria of acceptability and with contextual ontologies whenmodeling knowledge bases of individual agents. Promoting truthtelling in our argumentation-based framework and consideringnon-cooperative agents are other plans for future investigation.

1150

1151

1152

1153

1154

1155

1156

Acknowledgements

The first author is partially supported by Natural Sciences andEngineering Research Council of Canada (NSERC), Fonds québécoisde la recherche sur la nature et les technologies (NATEQ), andFonds québécois de la recherche sur la société et la culture(FQRSC). The authors would also like to thank the reviewers fortheir very helpful comments and suggestions.

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

Appendix. Proof of Proposition 3

Without loss of generality, let a; a1; . . . ; an be arguments in a gi-ven argumentation framework such that a1; . . . ; an are the onlyattackers of a and a is the only attacker of these arguments.According to Definition 6, the argument a is not acceptable sinceit is attacked and not defended, directly or indirectly by a non-at-tacked argument. Because it is defended, a belongs to some pre-ferred extensions. However, a does not belong to all of them. Forexample, a does not belong to the preferred extension to whichthe arguments a1; . . . ; an belong since these arguments belong alsoto some preferred extensions because they are defended. a is thensemi-acceptable. �

Proof of Proposition 4

We prove this proposition by a counter example usingExample 4. In this example fa; dg and fb; dg are completeextensions (preferred extensions). However, fdg is not a com-plete extension. �

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 15: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

T

1157

1158

1159

1160

1161

1162

1163

1164

1165

1166

1167

1168

1169

1170

1171

1172

1173

1174

1175

1176

1177

1178

1179

1180

1181

1182

1183

1184

1185

1186

1187

1188

1189

1190

1191

1192

1193

1194

1195

1196

1197

1198

1199

1200

1201

1202

1203

1204

1205

1206

1207

1208

1209

1210

1211

1212

1213

1214

1215

1216

1217

1218

1219

1220

1221

1222

1223

1224

1225

1226

1227

1228

1229

1230

1231

1232

1233

1234

1235

1236

1237

1238

1239

1240

1241

1242

1243

1244

1245

1246

1247

1248

1249

1250125112521253125412551256125712581259

J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx 15

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

CO

RR

EC

Proof of Proposition 5

By Definition 5, the grounded extension is included in all pre-ferred extensions. Consequently, using Definition 8, an eliminatedargument is not acceptable. Also, according to Definition 7, aneliminated argument is not semi-acceptable and not preferredsemi-acceptable. �

Proof of Proposition 6

Suppose that 9x 2 WF : apx is not acceptable. Therefore, a part of

the non-missing part of apx is not acceptable. Because this part is

also a part of a, then a is not acceptable. Contradiction! �

Proof of Proposition 9

To prove this we should prove that Cas3 ) :Cas1 ^ :Cas2. Usingthe logical calculation, we can easily prove that :Cas1 ^ :Cas2 ¼:Cas1 ^ :Opqu1

as2^ :Opqu2

as2. Also, if an agent b can build an acceptable

argument a from Ab [ CSa, then it cannot build an acceptable or(preferred) semi-acceptable argument attacking a from the sameset. Therefore, ARðAb [ CSaÞ . a) :Cas1. Thus the result follows.�

Proof of Theorem 1

Agents’ knowledge bases are finite and repeating moves withthe same content is prohibited. Consequently, the number of Attackand Question moves that agents can play is finite. At a given mo-ment, agents will have two possibilities only: Accept if an accept-able argument can be built from CSa [ CSb, or Stop, otherwise.Therefore, the protocol terminates successfully by Accept, or unsuc-cessfully by Stop when Accept move cannot be played, whichmeans that only semi-acceptable arguments are included inCSa [ CSb. �

Proof of Theorem 2

For simplicity and without loss of generality, we suppose thatagent a starts the persuasion.

Let us first prove the ) direction: ARðAa [AbÞ . a)ARð[CSÞ . a.

In the protocol, the persuasion starts when a conflict over p oc-curs. Consequently, the case where Aa . a and Ab . a does not hold.The possible cases are limited to three:

1. Aa . a and Ab7a. In this case, agent a starts the persuasion overp by asserting a. Agent b can either play the Attack move or theQuestion move. Because ARðAa [Ab . aÞ all the b’s argumentswill be counter-attacked. For the same reason, b cannot play

12601261126212631264126512661267

UNthe Stop move. Consequently, at the end, b will play an Accept

move. It follows that ARð[CS . aÞ.2. Aa7a and Ab . a. In this case, agent a starts the persuasion by

asserting an acceptable argument b in its knowledge baseagainst pðAa . bÞ. This argument will be attacked by agent b,and the rest is identical to case 1 by substituting agent roles.

12681269127012711272

3. Aa7a and Ab7a. To construct argument a out of Aa [ Ab, twocases are possible. Either, (1) agent a has an acceptable partialargument aY

@ for p and agent b has the missing assumptions(or some parts of the missing assumptions, and agent a has

1273127412751276127712781279

the other parts), or (2) the opposite (i.e., agent b has an accept-able partial argument aY

@ for p and agent a has the missingassumptions (or some parts of the missing assumptions, andagent b has the other parts)). Only the second case is possiblesince the first one is excluded by hypothesis. For simplicity,

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

PR

OO

F

we suppose that agent a has all the missing assumptions, other-wise the missing assumptions will be built by exchanging thedifferent partial arguments. Agent a starts the persuasion byasserting an acceptable argument b in its knowledge baseagainst p. Agent b can either play an Attack or a Question move.If attack is possible, then agent a can either counter-attack orplay the Stop move. The same scenario continues until agent aplays Stop, and then agent b plays a Question Move. Agent aanswers now the question by providing the missing assump-tions, after which agent b attacks and agent a can only acceptsince ARðAa [ Ab . aÞ. It follows that ARð[CS . aÞ.

Let us now prove the ( direction: ARð[CSÞ . a) ARðAa [ AbÞ . a.

In the protocol, to have ARð[CSÞ . a one of the two agents, sayagent a, puts forward the argument a and the other, agent b, ac-cepts it. On the one hand, to advance an argument, agent a playsthe Assert move (in the initial or question rules) or Attack move(in the assertion or attack rules). In all these cases, we have:ARðAa [ CSbÞ . a and there is no partial acceptable argumentattacking a from Aa [ SCb. On the other hand, to accept an argu-ment (in the assertion or attack rules), agent b should check thatARðAb [ CSaÞ . a, there is no other arguments changing the statusof the persuasion topic, and there is no partial acceptable argumentattacking a from Ab [ SCa. Therefore we obtain: ARðAa [ CSb[Ab [ CSaÞ . a. Because CSa #Aa and CSb #Ab we are done. �

EDProof of Theorem 3

Suppose for simplicity reasons that the agents’ knowledge basescontain directly arguments and partial arguments. The following isa counterexample proving that if the agents are not truth telling,the protocol will not be sound and complete. Suppose that agenta starts the protocol such that: Ra ¼ fb; c; xg; Rb ¼ fa; dp

xg;AT ða; bÞ; AT ðc; aÞ; AT ðd; cÞ; CSa ¼ fb; c; �xg; CSb ¼ fa; dp

xg. In thisexample, after playing the Question move about x by agent b, agenta answers by asserting �x, instead of x. We have thenARð[CSÞ . b ^ ARðRa [ RbÞ7b (the protocol is not sound) andARðRa [ RbÞ . a ^ARð[CSÞ7a (the protocol is not complete). �

References

[1] L. Amgoud, Y. Dimopoulos, P. Moraitis, A unified and genaral framwork forargumentation-based negotiation, in: The International Conference onAutonomous Agents and Multiagent Systems, ACM Press, 2007.

[2] K. Atkinson, T. Bench-Capon, P. McBurney, A dialogue game protocol for multi-agent argument over proposals for action, Journal of Autonomous Agents andMulti-Agent Systems 11 (2) (2007).

[3] T. Bench-Capon, P. Dunne, Argumentation in artificial intelligence, ArtificialIntelligence 171 (10–15) (2007).

[4] J. Bentahar, Z. Maamar, D. Benslimane, P. Thiran, An argumentation frameworkfor communities of web services, IEEE Intelligent Systems 22 (6) (2007).

[5] J. Bentahar, B. Moulin, M. Bélanger, A taxonomy of argumentation models usedfor knowledge representation, Artificial Intelligence Review, DOI: 10.1007/s10462-010-9154-1, 2010.

[6] J. Bentahar, F. Toni, J.-J. Meyer, J. Labban, A security framework for agent-basedsystems, Journal of Web Information Systems 3 (4) (2007) 341–362.

[7] E. Black, A. Hunter, A generative inquiry dialogue system, in: The InternationalConference on Autonomous Agents and Multiagent Systems, ACM Press, 2007.

[8] A. Bondarenko, P. Dung, R. Kowalski, F. Toni, An abstract, argumentation-theoretic approach to default reasoning, Artificial Intelligence 93 (1–2) (1997)63–101.

[9] P. Dung, The acceptability of arguments and its fundamental role in non-monotonic reasoning and logic programming and n-person game, ArtificialIntelligence 77 (1995) 321–357.

[10] P. Dung, P. Mancarella, F. Toni, Computing ideal sceptical argumentation,Artificial Intelligence, Special Issue on Argumentation in Artificial Intelligence171 (10–15) (2007) 642–674.

[11] H. Fujita, Special issue on techniques to produce intelligent_secure software,Knowledge-Based Systems 20 (7) (2007) 614–616.

[12] A. Garcia, G. Simari, Defeasible logic programming: an argumentativeapproach, Theory and Practice of Logic Programming 4 (1) (2004) 95–138.

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),

Page 16: Using argumentation to model and deploy agent …users.encs.concordia.ca/~bentahar/Publications/KBS (2010...KNOSYS 1895 No. of Pages 16, Model 5G 1 February 2010 ARTICLE IN PRESS Please

12801281128212831284128512861287128812891290129112921293129412951296129712981299

13001301130213031304130513061307130813091310131113121313131413151316131713181319

16 J. Bentahar et al. / Knowledge-Based Systems xxx (2010) xxx–xxx

KNOSYS 1895 No. of Pages 16, Model 5G

1 February 2010ARTICLE IN PRESS

[13] V. Gruhn, H. Fujita, Special issue on intelligent software design, Knowledge-Based Systems 19 (2) (2006) 105–106.

[14] B. Ktari, H. Fujita, M. Mejri, D. Godbout, Toward a new software developmentenvironment, Knowledge-Based Systems 20 (7) (2007) 683–693.

[15] R. Lau, Towards a web services and intelligent agents-based negotiationsystem for b2b ecommerce, Electronic Commerce Research and Applications 6(3) (2007).

[16] N. Maudet, B. Chaib-draa, Commitment-based and dialogue game-basedprotocols, new trends in agent communication languages, KnowledgeEngineering Review 17 (2) (2002) 157–179.

[17] P. McBurney, S. Parsons, Games that agents play: a formal framework fordialogues between autonomous agents, Journal of Logic, Language, andInformation 11 (3) (2002) 315–334.

[18] N. Milanovic, M. Malek, Current solutions for web service composition, IEEEInternet Computing 8 (6) (2004). November/December.

[19] C. Nicolle, K. Yétongnon, J. Simon, XML integration and toolkit for b2bapplications, Journal of Database Management 14 (4) (2003).

[20] S. Parsons, M. Wooldridge, L. Amgoud, On the outcomes of formal inter-agentdialogues, in: Proceedings of The International Conference on AutonomousAgents and Multiagent Systems, ACM Press, 2003.

UN

CO

RR

EC

T

1320

Please cite this article in press as: J. Bentahar et al., Using argumentation to mdoi:10.1016/j.knosys.2010.01.005

OF

[21] P. Pasquier, I. Rahwan, F. Dignum, L. Sonenberg, Argumentation andpersuasion in the cognitive coherence theory, in: The 1st InternationalConference on Computational Models of Argument, IOS Press, 2006.

[22] H. Prakken, Formal systems for persuasion dialogue, The KnowledgeEngineering Review 24 (2) (2005).

[23] I. Rahwan, P. McBurney, Argumentation technology, IEEE Intelligent Systems22 (6) (2007).

[24] E.H. Sabri, A.P. Gupta, M.A. Beitler, Purchase order management best practices:process, technology, and change management, J. Ross Publishing, 2006.

[25] F. Sadri, F. Toni, P. Torroni, dialogues for negotiation: agent varieties anddialogue sequences, In The International Workshop on Agents, Theories,Architectures and Languages, 2001.

[26] Y. Udupi, M. Singh. Contract enactment in virtual organizations: acommitment-based approach, In The 21st National Conference on ArtificialIntelligence, 2006.

[27] D.N. Walton, E.C.W. Krabbe, Commitment in dialogue: basic concepts ofinterpersonal reasoning, Suny Series in Logic and Language, 1995.

[28] A. Williams, A. Padmanabhan, B. Blake. Local consensus ontologies for b2b-oriented service composition. In The International Joint Conference onAutonomous Agents and Multiagent Systems 2003.

ED

PR

O

odel and deploy agent-based B2B applications, Knowl. Based Syst. (2010),