<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A First Comparison of Abstract Argumentation Systems: A Computational Perspective</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefano Bistarelli</string-name>
          <email>bista@dmi.unipg.it</email>
          <email>stefano.bistarelli@iit.cnr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabio Rossi</string-name>
          <email>rossi@dmi.unipg.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Santini</string-name>
          <email>francesco.santini@inria.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics and Computer Science, University of Perugia</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>EPI Contraintes</institution>
          ,
          <addr-line>INRIA Rocquencourt</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute of Informatics and Telematics (CNR)</institution>
          ,
          <addr-line>Pisa</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>241</fpage>
      <lpage>245</lpage>
      <abstract>
        <p>In this paper we introduce an initial comparison among three different implementations of Abstract Argumentation Systems: ASPARTIX, ConArg, and Dung-O-Matic. These tools are tested over f our different kinds of interaction graphs, corresponding to Erd˝os-Ren´yi networks, scale-free Barabasi networks, Watts-Strogatz, and Kleinb erg small-world networks. Our final goal is to thoroughly evaluate their performance (in this work we test complete and stable semantics only), and to find the most efficient one, but also, more in general, to better study this kind of problems from the computational point of view.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        An Abstract Argumentation Framework (AF), or System, as introduced in the
seminal paper by Dung [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], is simply a pair hA, Ri consisting of a set A whose
elements are called arguments, and of a binary relation R on A, called “attack”
relation. Several different semantics (i.e., extensions) can be obtained over
arguments by considering subsets of arguments with specific properties. An AF has
an obvious representation as a directed graph where nodes are arguments and
edges are drawn from attacking to attacked arguments.
      </p>
      <p>
        The main aim of this work is to better understand this kind of systems under
the perspective of their computational performance, in terms of networks with
different properties and size. Indeed, existent and future applications [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
exploiting AFs need to efficiently behave and scale over “large” networks wit h properties
close to real-world ones. In fact, in complex discussions it is not hard to find
50100 arguments at least, especially if we consider on-line open fora, o r discussion
groups. When we make these digital tribunes correspond to well-kn own social
networks, as Twitter or Facebook, but also to more structured debate-friendly
tools, as DebateGraph4, then the number of arguments can further increase due
to the a high number of users participating to a discussion. The different
intrinsic nature of these graphs leads to find more or less extensions of some kind,
      </p>
      <sec id="sec-1-1">
        <title>4 http://debategraph.org</title>
        <p>
          e.g., stable ones [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. In our tests we adopt two different types of small-world
networks (Kleinberg [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] and Watts-Strogatz [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]), one class of scale-free networks
(Barabasi [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]), and Erdo˝s-Ren´yi [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] networks (see Sec. 3.2).
        </p>
        <p>Our main goal is to compare three different tools that are more oriented to
a straight computation of extensions, than on providing support to negotiation
or decision-making. These tools correspond to ASPARTIX, ConArg , and
DungO-Matic, introduced in Sec. 3.
2</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Dung Argumentation</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], Dung has proposed an abstract framework for argumentation in which
the focus is on the definition of the argument status.
      </p>
      <p>Definition 1. An Argumentation Framework (AF) is a pair hA, Ri of a set A of
arguments and a binary relation R on A called the attack relation. ∀ai, aj ∈ A,
aiR aj means that ai attacks aj . An AF may be represented by a directed graph
(the interaction graph) whose nodes are arguments and edges represent the attack
relation. A set of arguments B attacks an argument a if a is attacked by an
argument of B. A set of arguments B attacks a set of arguments C if there is an
argument b ∈ B which attacks an argument c ∈ C.</p>
      <p>Dung gave several semantics to “acceptability”. These various se mantics
produce none, one or several acceptable sets of arguments, called “ extensions”. In
Def. 2 we define the concepts of conflict-free and stable extensio ns:
Definition 2. A set B ⊆ A is conflict-free in a given hA, Ri iff no two
arguments a and b in B exist such that a attacks b. A conflict-free set B ⊆ A is a
stable extension iff for each argument which is not in B, there exists an argument
in B that attacks it.</p>
      <p>The other semantics for “acceptability” rely upon the concept of d
efense:
Definition 3. Given hA, Ri, an argument b is defended by a set B ⊆ A (or B
defends b) iff for any argument a ∈ A, if a attacks b then B attacks a.</p>
      <p>An admissible set of arguments according to Dung must be a conflict- free set
which defends all its elements. Formally:
Definition 4. Given hA, Ri, a conflict-free set B ⊆ A is admissible iff each
argument in B is defended by B.</p>
      <p>
        Besides the stable semantics, three more semantics refining admissibility have
been introduced in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]:
Definition 5. Given a hA, Ri, a preferred extension is a maximal (w.r.t. set
inclusion) admissible subset of A. An admissible B ⊆ A is a complete extension
iff each argument which is defended by B is in B. The least (w.r.t. set inclusion)
complete extension is the grounded extension.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Tools and Graphs</title>
      <p>In the following of this section we describe our benchmark environment. We
organize the content into two subsections: Sec. 3.1 concerns a more detailed
description of the three tools we used in our comparison, while Sec. 3.2 describes
in detail the random networks we generated as benchmark.
3.1</p>
      <sec id="sec-3-1">
        <title>Tools</title>
        <p>
          ASPARTIX. The ASPARTIX 5 system [
          <xref ref-type="bibr" rid="ref6 ref7">7, 6</xref>
          ] is an ASP-based tool for
computing acceptable extensions for a broad range of formalizations of Dung’s AFs
and generalisations, e.g., value-based AFs [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. ASPARTIX relies on a fixed
disjunctive Datalog program (ASP also includes default negation) which takes an
instance of an argumentation framework as input, and uses an ASP solver (as
DLV) for computing the type of extension specified by the user. ASPARTIX
is able to solve admissible, stable, complete, grounded, preferred, semi-stable,
ideal, stage, cf2, resolution-based grounded and stage2 extens ions.
ConArg. ConArg6 [
          <xref ref-type="bibr" rid="ref3 ref4">4, 3</xref>
          ] is a constraint-based tool based on the Java Constraint
Programming solver7 (JaCoP ), a Java library that provides the Java user with
a Finite Domain Constraint Programming paradigm [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. All the properties
describing conflict-free, admissible, complete, stable, grounded and preferred
extensions have been modeled and implemented with constraints. In this paper we
consider a (faster) command-line version of ConArg. To model all t he
semantics presented in Sec. 2 we used MiniZinc8, which is a medium-level constraint
modelling language that can be mapped onto different existing solvers.
Dung-O-Matic. Dung-O-Matic 9 is an abstract argument computation engine
implemented by the javaDungAF Java class. Dung-O-Matic supports Dung’s
AFs and several of their semantics, namely admissible, complete, eager, grounded,
ideal, preferred, semi-stable, and finally stable. In order to find ea ch of the
proposed extensions, this tool implements a different algorithm presented in
literature; for instance, the grounded semantics is computed with the original
algorithms presented by Dung in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Networks</title>
        <p>Due to the lack of well-established benchmarks using real interactio n graphs,
we decided to randomly generate our test networks. To generate random graphs
we adopted two different tools. The first one is Java Universal Network/Graph
Framework (JUNG, http://jung.sourceforge.net), which is a Java software
library for the modeling, generation, analysis and visualization of graphs. With</p>
        <sec id="sec-3-2-1">
          <title>5 http://www.dbai.tuwien.ac.at/proj/argumentation/systempage/</title>
          <p>6 https://sites.google.com/site/santinifrancesco/tools/ConArg.zip
7 http://www.jacop.eu
8 http://www.minizinc.org
9 http://www.arg.dundee.ac.uk/?page_id=279</p>
          <p>
            JUNG we generated Barabasi [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ] and Kleinberg [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] networks. The second library
we used is named NetworkX (http://networkx.github.io), and it consists of
a Python software package for the creation, manipulation, and study of the
structure, dynamics, and functions of complex networks. With this tool we were
able to generate Erdo˝s-Ren´yi [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ] and Watts-Strogatz [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. We use two different
libraries because of their different capabilities: with JUNG we are able to
randomly generate directed Barabasi and Kleinberg networks, while NetworkX does
not cover Kleinberg networks at all, and only provides undirected Barabasi ones.
On the other side, NetworkX offers both Watts-Strogatz and Erd o˝s-Ren´yi
networks (not present in JUNG). Four examples of these networks are represented
in Fig. 1. Our attention is more focused on testing small-world networ ks because
we consider real large interaction-graphs as coming from social ne tworks [
            <xref ref-type="bibr" rid="ref10 ref9">10, 9</xref>
            ].
4
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Preliminary Tests and Conclusion</title>
      <p>In Fig. 2 and Fig. 3 we show a first comparison among the three systems
presented in Sec. 3.1, testing complete and stable extensions respectively. On the
x-axis we report the exact number of nodes of each set of networ ks we use: in
each set, we considered 50 random networks for each of the four classes reported
in Sec. 3.2, for a total of 200 networks. On the y-axis we report th e average
CPU time to compute all the complete/stable extensions on that given set of
networks. These first tests show that ConArg performs better than the other
two systems, even if ASPARTIX has comparable results.</p>
      <p>Performance has been collected using an Intel(R) Core(TM) i7 2.4Ghz
processor, with 16Gb of RAM. To run ASPARTIX, we have used the last version
of DLV (December 2012) with Gringo v3.0.5 and ClaspD v1.1.4 as extensions.</p>
      <p>
        In this work we have commenced a study on the computational efficiency
of nowadays tools dealing with AFs [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Our will is to extend this study
under several lines. First, we will show tests on more computationally- demanding
semantics (e.g., preferred extensions), we will test hard problems in
Argumentation (e.g., deciding if a set is a preferred extension is CO-NP-comple te), and,
finally, we will better define the link with small-world networks, by findin g the
most appropriate random-network model. At last, we will test thes e tools over
larger networks (e.g., 1, 000 arguments), to check how feasible it is to use them in
a real application, as, for instance, large-scale agreements via mic rodebates [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Barabasi</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Albert</surname>
          </string-name>
          .
          <article-title>Emergence of scaling in random networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>286</volume>
          (
          <issue>5439</issue>
          ):
          <fpage>5095</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>T. J. M. Bench-Capon</surname>
          </string-name>
          .
          <article-title>Persuasion in practical argument us ing value-based argumentation frameworks</article-title>
          .
          <source>J. Log. Comput.</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ):
          <fpage>4294</fpage>
          -
          <lpage>48</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>A common computational framework for semiringbased argumentation systems</article-title>
          .
          <source>In European Conference on Artificial Intelligence</source>
          , volume
          <volume>215</volume>
          <source>of Frontiers in A.I. and Applications</source>
          , pages
          <fpage>1311</fpage>
          -
          <lpage>36</lpage>
          . IOS Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>Conarg: A constraint-based computational framework for argumentation systems</article-title>
          .
          <source>In ICTAI</source>
          , pages
          <fpage>6056</fpage>
          -
          <lpage>12</lpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          .
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person ga mes</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <fpage>3213</fpage>
          -
          <lpage>57</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. W. Dvoark´,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Maki ng use of advances in answer-set programming for abstract argumentati on systems</article-title>
          .
          <source>CoRR, abs/1108.4942</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>U.</given-names>
            <surname>Egly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          . ASPARTIX:
          <article-title>Implementing argumentation frameworks using answer-set programming</article-title>
          .
          <source>In International Conference on Logic Programming (ICLP)</source>
          , pages
          <fpage>7347</fpage>
          -
          <lpage>38</lpage>
          . LNCS, Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P.</given-names>
            <surname>Erd</surname>
          </string-name>
          <article-title>˝os and A. Ren´yi. On the evolution of random graphs</article-title>
          .
          <source>Bull. Inst. Internat. Statist</source>
          ,
          <volume>38</volume>
          (
          <issue>4</issue>
          ):
          <fpage>3433</fpage>
          -
          <lpage>47</lpage>
          ,
          <year>1961</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gabbriellini</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          .
          <article-title>Large scale agreements via microdebates</article-title>
          .
          <source>In AT</source>
          , volume
          <volume>918</volume>
          <source>of CEUR Workshop Proceedings</source>
          , pages
          <fpage>3663</fpage>
          -
          <lpage>77</lpage>
          . CEUR-WS.org,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gabbriellini</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          .
          <article-title>Arguments in social networks</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>11191</fpage>
          -
          <lpage>120</lpage>
          . IFAAMAS,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>C.</given-names>
            <surname>Martel</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          . Analyzing Kleinbergs'
          <article-title>(and othe r) small-world models</article-title>
          .
          <source>In PODC '04</source>
          , pages
          <fpage>1791</fpage>
          -
          <lpage>88</lpage>
          , New York, NY, USA,
          <year>2004</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , P. van Beek, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Walsh</surname>
          </string-name>
          .
          <article-title>Handbook of Constraint Programming (Foundations of Artificial Intelligence)</article-title>
          . Elsevier Science Inc., New York, NY, USA,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Watts</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Strogatz</surname>
          </string-name>
          .
          <article-title>Collective dynamics of s“m all-world” networks</article-title>
          .
          <source>nature</source>
          ,
          <volume>393</volume>
          (
          <issue>6684</issue>
          ):
          <fpage>4404</fpage>
          -
          <lpage>42</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>