As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
In this work, we develop a game-theoretic framework in which pro and con arguments are put forward. This framework intends to capture winning strategies for different defense criteria. In turn, each possible extension semantics satisfies a particular defense criterion. To ensure that only semantics satisfying given criteria are obtained, protocols for playing have to be defined, being the ensuing winning strategies full characterizations of the corresponding criteria. Admissibility and strong admissibility are two of those criteria proposed in the literature for the evaluation of extension semantics; here, we also introduce two weaker criteria, pairwise and weak cogency, for the evaluation of non-admissible semantics, and we define specific game protocolscapturing them.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.