313 research outputs found

    "Minimal defence": a refinement of the preferred semantics for argumentation frameworks

    Full text link
    Dung's abstract framework for argumentation enables a study of the interactions between arguments based solely on an ``attack'' binary relation on the set of arguments. Various ways to solve conflicts between contradictory pieces of information have been proposed in the context of argumentation, nonmonotonic reasoning or logic programming, and can be captured by appropriate semantics within Dung's framework. A common feature of these semantics is that one can always maximize in some sense the set of acceptable arguments. We propose in this paper to extend Dung's framework in order to allow for the representation of what we call ``restricted'' arguments: these arguments should only be used if absolutely necessary, that is, in order to support other arguments that would otherwise be defeated. We modify Dung's preferred semantics accordingly: a set of arguments becomes acceptable only if it contains a minimum of restricted arguments, for a maximum of unrestricted arguments.Comment: 8 pages, 3 figure

    Abstract Games of Argumentation Strategy and Game-Theoretical Argument Strength

    Get PDF
    We define a generic notion of abstract games of argumentation strategy for (attack-only and bipolar) argumentation frameworks, which are zero-sum games whereby two players put forward sets of arguments and get a reward for their combined choices. The value of these games, in the classical game-theoretic sense, can be used to define measures of (quantitative) game-theoretic strength of arguments, which are different depending on whether either or both players have an “agenda” (i.e. an argument they want to be accepted). We show that this general scheme captures as a special instance a previous proposal in the literature (single agenda, attack-only frameworks), and seamlessly supports the definition of a spectrum of novel measures of game-theoretic strength where both players have an agenda and/or bipolar frameworks are considered. We then discuss the applicability of these instances of game-theoretic strength in different contexts and analyse their basic properties

    Inference from controversial arguments

    Get PDF
    International audienceWe present new careful semantics within Dung's theory of argumentation. Under such careful semantics, two arguments cannot belong to the same extension whenever one of them indirectly attacks a third argument while the other one indirectly defends the third.We argue that our semantics lead to a better handling of controversial arguments than Dung's ones in some settings. We compare the careful inference relations induced by our semantics w.r.t. cautiousness; we also compare them with the inference relations induced by Dung's semantic

    Towards Computational Persuasion via Natural Language Argumentation Dialogues

    Get PDF
    Computational persuasion aims to capture the human ability to persuade through argumentation for applications such as behaviour change in healthcare (e.g. persuading people to take more exercise or eat more healthily). In this paper, we review research in computational persuasion that incorporates domain modelling (capturing arguments and counterarguments that can appear in a persuasion dialogues), user modelling (capturing the beliefs and concerns of the persuadee), and dialogue strategies (choosing the best moves for the persuader to maximize the chances that the persuadee is persuaded). We discuss evaluation of prototype systems that get the user’s counterarguments by allowing them to select them from a menu. Then we consider how this work might be enhanced by incorporating a natural language interface in the form of an argumentative chatbot

    Noise Cancellation: Viral Fine Tuning of the Cellular Environment for Its Own Genome Replication

    Get PDF
    Productive replication of DNA viruses elicits host cell DNA damage responses, which cause both beneficial and detrimental effects on viral replication. In response to the viral productive replication, host cells attempt to attenuate the S-phase cyclin-dependent kinase (CDK) activities to inhibit viral replication. However, accumulating evidence regarding interactions between viral factors and cellular signaling molecules indicate that viruses utilize them and selectively block the downstream signaling pathways that lead to attenuation of the high S-phase CDK activities required for viral replication. In this review, we describe the sophisticated strategy of Epstein-Barr virus to cancel such “noisy” host defense signals in order to hijack the cellular environment

    Genomic and Proteomic Analyses of the Fungus Arthrobotrys oligospora Provide Insights into Nematode-Trap Formation

    Get PDF
    Nematode-trapping fungi are “carnivorous” and attack their hosts using specialized trapping devices. The morphological development of these traps is the key indicator of their switch from saprophytic to predacious lifestyles. Here, the genome of the nematode-trapping fungus Arthrobotrys oligospora Fres. (ATCC24927) was reported. The genome contains 40.07 Mb assembled sequence with 11,479 predicted genes. Comparative analysis showed that A. oligospora shared many more genes with pathogenic fungi than with non-pathogenic fungi. Specifically, compared to several sequenced ascomycete fungi, the A. oligospora genome has a larger number of pathogenicity-related genes in the subtilisin, cellulase, cellobiohydrolase, and pectinesterase gene families. Searching against the pathogen-host interaction gene database identified 398 homologous genes involved in pathogenicity in other fungi. The analysis of repetitive sequences provided evidence for repeat-induced point mutations in A. oligospora. Proteomic and quantitative PCR (qPCR) analyses revealed that 90 genes were significantly up-regulated at the early stage of trap-formation by nematode extracts and most of these genes were involved in translation, amino acid metabolism, carbohydrate metabolism, cell wall and membrane biogenesis. Based on the combined genomic, proteomic and qPCR data, a model for the formation of nematode trapping device in this fungus was proposed. In this model, multiple fungal signal transduction pathways are activated by its nematode prey to further regulate downstream genes associated with diverse cellular processes such as energy metabolism, biosynthesis of the cell wall and adhesive proteins, cell division, glycerol accumulation and peroxisome biogenesis. This study will facilitate the identification of pathogenicity-related genes and provide a broad foundation for understanding the molecular and evolutionary mechanisms underlying fungi-nematodes interactions

    HpARI protein secreted by a helminth parasite suppresses interleukin-33

    Get PDF
    Infection by helminth parasites is associated with amelioration of allergic reactivity, but mechanistic insights into this association are lacking. Products secreted by the mouse parasite Heligmosomoides polygyrus suppress type 2 (allergic) immune responses through interference in the interleukin-33 (IL-33) pathway. Here, we identified H. polygyrus Alarmin Release Inhibitor (HpARI), an IL-33-suppressive 26-kDa protein, containing three predicted complement control protein (CCP) modules. In vivo, recombinant HpARI abrogated IL-33, group 2 innate lymphoid cell (ILC2) and eosinophilic responses to Alternaria allergen administration, and diminished eosinophilic responses to Nippostrongylus brasiliensis, increasing parasite burden. HpARI bound directly to both mouse and human IL-33 (in the cytokine's activated state) and also to nuclear DNA via its N-terminal CCP module pair (CCP1/2), tethering active IL-33 within necrotic cells, preventing its release, and forestalling initiation of type 2 allergic responses. Thus, HpARI employs a novel molecular strategy to suppress type 2 immunity in both infection and allergy. Osbourn et al identified HpARI, a protein secreted by a helminth parasite that is capable of suppressing allergic responses. HpARI binds to IL-33 (a critical inducer of allergy) and nuclear DNA, preventing the release of IL-33 from necrotic epithelial cells

    Coordinated Regulation of Intestinal Functions in C. elegans by LIN-35/Rb and SLR-2

    Get PDF
    LIN-35 is the sole C. elegans representative of the pocket protein family, which includes the mammalian Retinoblastoma protein pRb and its paralogs p107 and p130. In addition to having a well-established and central role in cell cycle regulation, pocket proteins have been increasingly implicated in the control of critical and diverse developmental and cellular processes. To gain a greater understanding of the roles of pocket proteins during development, we have characterized a synthetic genetic interaction between lin-35 and slr-2, which we show encodes a C2H2-type Zn-finger protein. Whereas animals harboring single mutations in lin-35 or slr-2 are viable and fertile, lin-35; slr-2 double mutants arrest uniformly in early larval development without obvious morphological defects. Using a combination of approaches including transcriptome profiling, mosaic analysis, starvation assays, and expression analysis, we demonstrate that both LIN-35 and SLR-2 act in the intestine to regulate the expression of many genes required for normal nutrient utilization. These findings represent a novel role for pRb family members in the maintenance of organ function. Our studies also shed light on the mechanistic basis of genetic redundancy among transcriptional regulators and suggest that synthetic interactions may result from the synergistic misregulation of one or more common targets

    Mutual Inhibition between Kaposi's Sarcoma-Associated Herpesvirus and Epstein-Barr Virus Lytic Replication Initiators in Dually-Infected Primary Effusion Lymphoma

    Get PDF
    Background: Both Kaposi’s sarcoma-associated herpesvirus (KSHV) and Epstein-Barr virus (EBV) are members of the human gamma herpesvirus family: each is associated with various human cancers. The majority of AIDS-associated primary effusion lymphoma (PEL) are co-infected with both KSHV and EBV. Dually-infected PELs selectively switch from latency to lytic replication of either KSHV or EBV in response to chemical stimuli. KSHV replication and transcription activator (K-RTA) is necessary and sufficient for the switch from KSHV latency to lytic replication, while EBV BZLF1 gene product (EBV-Z) is a critical initiator for induction of EBV lytic replication. Methodology/Principal Findings: We show K-RTA and EBV-Z are co-localized and physically interact with each other in dually-infected PELs. K-RTA inhibits the EBV lytic replication by nullifying EBV-Z-mediated EBV lytic gene activation. EBV-Z inhibits KSHV lytic gene expression by blocking K-RTA-mediated transactivations. The physical interaction between K-RTA and EBV-Z are required for the mutual inhibition of the two molecules. The leucine heptapeptide repeat (LR) region in K-RTA and leucine zipper region in EBV-Z are involved in the physical interactions of the two molecules. Finally, initiation of KSHV lytic gene expression is correlated with the reduction of EBV lytic gene expression in the same PEL cells. Conclusions/Significance: In this report, how the two viruses interact with each other in dually infected PELs is addressed. Our data may provide a possible mechanism for maintaining viral latency and for selective lytic replication in dually infected PELs, i.e., through mutual inhibition of two critical lytic replication initiators. Our data about putative interactions between EBV and KSHV would be applicable to the majority of AIDS-associated PELs and may be relevant to the pathogenesis of PELs
    corecore