A Bayesian Approach to Argument-Based Reasoning for Attack Estimation

Authors: Hiroyuki Kido, Keishi Okamoto

IJCAI 2017 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Experimental The accuracy of correctness of the Bayesian network model is demonstrated by analysing properties of estimated attack relations and by illustrating the applicability of the proposed model to online forums. The study illustrates and discusses using arguments and their votes to estimate attack relations. A situation is considered in which individuals argue for and against a government-controlled casino in an online forum. Figure 4 shows five arguments put forward by the individuals. ... Table 1 shows the votes of 20 agents for and against each of the five arguments.
Researcher Affiliation Academia Hiroyuki Kido Institute of Logic and Cognition Sun Yat-sen University kido@mail.sysu.edu.cn Keishi Okamoto Department of Information Systems National Institute of Technology, Sendai College okamoto@sendai-nct.ac.jp
Pseudocode No The paper does not contain any structured pseudocode or algorithm blocks.
Open Source Code No The paper does not provide any explicit statements about the availability of open-source code for the described methodology, nor does it include any links to code repositories.
Open Datasets No The paper presents a table of votes (Table 1) used for illustrating applicability, stating 'Table 1 shows the votes of 20 agents for and against each of the five arguments.' However, it does not provide any concrete access information (link, DOI, repository, or citation to an established benchmark) for this or any other publicly available dataset used for training or evaluation.
Dataset Splits No The paper does not provide specific dataset split information (exact percentages, sample counts, citations to predefined splits, or detailed splitting methodology) for training, validation, or testing.
Hardware Specification No The paper does not provide any specific hardware details such as GPU/CPU models, processor types, or memory amounts used for running its experiments.
Software Dependencies No The paper does not provide specific ancillary software details, such as library or solver names with version numbers, needed to replicate the experiment.
Experiment Setup Yes When m equals 2 and p equals 0.5, it is termed as a Laplace estimator that assumes two formulae acc and acc such that one formula is satisfied by the extension and the other formula is not. for all arguments X and Y , {X, Y } corresponds to the abbreviation of {(X, Y ), (Y , X)}. For the sake of clarity, only symmetric attack relations without an odd loop are considered in the estimation.