<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computing Semi-Stable Semantics of AF by 0-1 Integer Programming</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mauricio Osorio</string-name>
          <email>osoriomauri@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Juan D az</string-name>
          <email>juana.diaz@udlap.mx</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alejandro Santoyo</string-name>
          <email>alejandro1.santoyo@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universidad de las Americas en Puebla</institution>
          ,
          <addr-line>Sta. Catarina Martir, Cholula, Puebla, 72820</addr-line>
          <country country="MX">Mexico</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Dung's abstract argumentation frameworks has been object of intense study not just for its relationship with logical reasoning but also for its uses within arti cial intelligence. One research branch in abstract argumentation has focused on nding new methods for computing its di erent semantics. We present a novel method, to the best of our knowledge, for computing semi-stable semantics using 0-1 integer programming, and also experimentally compare it with an answer set programming approach. Our results indicate that this new method performed well, and it has a great opportunity space for improving.</p>
      </abstract>
      <kwd-group>
        <kwd>Argumentation Frameworks</kwd>
        <kwd>Binary Programming</kwd>
        <kwd>Answer Set Programming</kwd>
        <kwd>Semi Stable Semantics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The main purpose of argumentation theory is to study the fundamental
mechanism humans use in argumentation and to explore ways to implement this
mechanism on computers. Currently formal argumentation research has been
strongly in uenced by abstract argumentation theory of Dung [6]. This approach
is mainly orientated to manage the interaction of arguments by introducing a
single structure called Argumentation Framework (AF). An AF basically is a
pair of sets: a set of arguments and a set of disagreements between arguments
called attacks. Indeed an AF can be regarded as a directed graph in which the
arguments are represented by nodes and the attack relations are represented by
arcs.</p>
      <p>In [6], four argumentation semantics were introduced: grounded, preferred,
stable, and complete semantics. The central notion of Dung's semantics is the
acceptability of the arguments. Even though each of these argumentation
semantics represents di erent patterns of selection of arguments, all of them are
based on the basic concept of admissible set. Informally speaking, an
admissible set presents a coherent and defendable point of view in a con ict between
arguments.</p>
      <p>One research branch in abstract argumentation has been to nd new
methods for computing its di erent semantics, i.e. the search for acceptable (w.r.t.
certain criteria) sets of arguments. Charwat et al. [10] surveys the approaches
that has been used so far for computing AF semantics, and divided them into
reduction and direct approaches. The direct approach consists in developing new
algorithms for computing AF semantics, but our interest is in the reduction
approach.</p>
      <p>The reduction approach consists in using the software that was originally
developed for other formalisms [10]. Thus, a given AF has to be formalized in
the targeted formalism, like: constraint-satisfaction [5], propositional logic [1],
or answer-set programming [3], [13].</p>
      <p>To the best of our knowledge, there is just a previous work [11] where
authors indirectly used 0-1 integer programming for computing preferred semantics,
since their approach was based on a mapping from an argumentation framework
AF into a logic program with negation as failure AF to Clark's completion
Comp( AF ) [12] to 0-1 integer program lc( AF ) [2], which then was solved by
a mathematical programming solver.</p>
      <p>In this work, we present a novel method, to the best of our knowledge, for
directly computing semi-stable (SS) semantics using 0-1 integer programming
with no mapping. Our results indicate that this new method performed well.</p>
      <p>The paper is organized as follows. Section 2 gives some background on
argumentation. Section 3 presents a procedure based on solving a series of 0-1 integer
programming problems for computing SS semantics. Finally, Section 4 presents
a brief description of results, some conclusions and future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>For space reasons, we assume that readers are familiar with the basic notions
of 0-1 integer programming and ASP. We will use some concepts of Dung's
argumentation approach. An AF captures the relationships between arguments.
De nition 1. [6] An AF is a pair AF := hAR; attacksi, where AR is a nite set
of arguments, and attacks is a binary relation on AR, i.e. attacks AR AR.</p>
      <p>We say that a attacks b (or b is attacked by a) if attacks(a; b) holds. Similarly,
we say that a set S of arguments attacks b (or b is attacked by S) if b is attacked
by an argument in S.</p>
      <p>Dung de ned his argumentation semantics based on the basic concept of
admissible set, which can be understood in terms of defense of arguments and
in terms of con ict-free sets, as follows:
De nition 2. [4] Let AF := hAR; attacksi be an argumentation framework,
A 2 AR and S AR, then:
1. A+ as fB 2 AR j A attacks Bg and
2. S+ as fB 2 AR j A attacks B f or some A 2 Sg.
3. A as fB 2 AR j B attacks Ag and
4. S as fB 2 AR j B attacks A f or some A 2 Sg.
5. S is con ict-free i S \ S+ = ;.
6. S defends an argument A i A S+.
7. F : 2AR ! 2AR as F (S) = fA 2 AR j A is def ended by Sg.</p>
      <p>It is possible to de ne the semantics in terms of admissible sets as follows:
De nition 3. [4] Let AF := hAR; attacksi be an argumentation framework and
S AR be a con ict-free set of arguments, then:
1. S is admissible i S F (S).
2. S is a complete extension i S = F (S).
3. S is a preferred extension i S is a maximal (w.r.t. set inclusion) complete
extension.</p>
      <p>The SS semantics is similar to the preferred semantics [4], but instead of
maximizing S it is required to maximize S [S+, as states the following de nition:
De nition 4. [4] Let AF := hAR; attacksi be an argumentation framework and
S AR be a con ict-free set of arguments, then: S is called a SS extension i
S is a complete extension where S [ S+ is maximal</p>
      <p>The semi-stable semantics accepts an equivalente statements, as follows:
Proposition 1. [4] Let AF := hAR; attacksi be an argumentation framework
and let S AR. The following statements are equivalent: 1).- S is a complete
extension such that S [ S+ is maximal (De nition No. 4), and 2).- S is an
admissible set such that S [ S+ is maximal.
3</p>
      <p>Computing SS Semantics by 0-1 Integer Programming
In this section we show: the 0-1 integer programming formulation for the SS
semantics problem, its encoding in FICO Xpress Mosel1 language and also
explain the objective function and constraints, as well as the iterative process for
computing all the SS semantics' extensions.
3.1</p>
      <p>Semi-Stable Semantics Problem Formulation
First of all, consider that it is required to have a mechanism to work with attacks
more suitable than working with the adjacency matrix of a given AF, then we
de ne:
De nition 5. Let AF := hAR; attacksi be an argumentation framework, then:
Ri = fj 2 AR : (j; i) 2 attacksg 8i 2 AR, is the set of nodes attacking node i,
and R = fRi : i 2 ARg.</p>
      <p>Considering De nitions 2, 3, and 5 we restate the admissible set de nition in
order to be able to derive the linear constraint that assures admissibility.
De nition 6. Let AF := hAR; attacksi be an argumentation framework, and
set S AR, then S is admissible i 8i 2 S; 8j 2 Ri ; 9k 2 S; ((k; j) 2 attacks)).
1 http://www.fico.com/en/wp-content/secure_upload/</p>
      <p>Xpress-Mosel-User-Guide.pdf</p>
      <p>Si =
(0 if i 62 S</p>
      <p>1 if i 2 S
Si+ =
(0 if i 62 S+
1 if i 2 S+
8 i 2 AR
8 i 2 AR
De nition 7. The set M = fi 2 AR : Si = 1 in the optimal solutiong, and C =
fi 2 AR : Si = 0 in the optimal solutiong is M's complement.</p>
      <p>Accordingly, we de ne the decision variable for S+, as follows:</p>
      <p>Now consider that decision variables in a mathematical program are a set of
quantities that need to be determined by the solver in order to solve the problem,
i.e. when the best values of the decision variables have been identi ed in order
to maximize or minimize (optimal solution) the objective function. Therefore,
the rst step is to de ne the required binary decision variables.</p>
      <p>Considering that De nition 4 and Proposition 1 state a SS extension in terms
of an admissible set S such that S [ S+ is maximal, then it is required a decision
variable for S and other for S+, as follows:
De nition 9. The set M u = fi 2 AR : Ui = 1 in the optimal solutiong, and
Cu = fi 2 AR : Ui = 0 in the optimal solutiong is Mu's complement.</p>
      <p>If the 0-1 program formulation with a given AF has an optimal solution, then
we can think of the SS semantics in terms of a serie of solutions that the model
nds in each iteration, as follows:
fM u1; M u2; :::; M uqg : jM u1j
jM u2j
:::
jM uqj
which states that the M u1 has the largest possible cardinality, and that jM u1j
jM u2j ::: jM uqj such that jM uqj has the smallest possible cardinality.</p>
      <p>Thus, It is also required a decision variable for a couple of either/or
constraints [9] which we will add per each iteration (see section 3.3) in order to help
to assure S + S+ maximality w.r.t. set inclusion, i.e. they help us just to avoid
that solution M ut+1 be di erent than solution found in iteration t; t 1; : : : ; 1
or any subset of them, as follows:</p>
      <p>This way, the optimal solution to the 0-1 integer problem formulation for the
SS semantics can be stated in terms of maximizing S [ S+.</p>
      <p>De nition 8. The set M + = fi 2 AR : Si+ = 1 in the optimal solutiong, and
C+ = fi 2 AR : Si+ = 0 in the optimal solutiong is M +' complement.</p>
      <p>
        It is required to have a decision variable for the union of this sets, as follows:
Ui =
(0 if i 62 S [ S+
1 if i 2 S [ S+
8i 2 AR
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
otherwise
r = 1; : : : ; t
1
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
      </p>
      <p>
        Taking into account that a mathematical solver searches in the solution space
for one optimal solution for a given problem formulation, then if we want all the
extensions of a given AF, it is required to solve a series of binary programming
models, one for each extension. Since an AF semantics is made up of several
sets, we use M ut to denote the solution of the binary subproblem in iteration t,
and q to denote the amount of preferred extensions that a given AF has, such
that q 1 and q 2 N. The 0-1 integer problem formulation to compute the tth
semi-stable extension of a given AF is the following, including (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ):
max f (S) =
      </p>
      <p>X (Si + Si+)
i2AR
Subject to:</p>
      <p>
        In (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) we have the decision variables de nition and
constraints (
        <xref ref-type="bibr" rid="ref14">14</xref>
        ), (15), (16), (17) de ne the problem's domain. The following
paragraphs explain each constraint of the SS semantics problem formulation:
Maximality with regard to set inclusion. The model's objective function
(OF)(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) guarantees us that we will nd a maximum cardinality set, which will
be the solution M ut. This set is made up of S [ S+. Constraints (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ),
and (
        <xref ref-type="bibr" rid="ref13">13</xref>
        ) along with the objective function will avoid that M t+1 and M ut+1 be
any subset of M t and M ut respectively, thus they guarantee us maximality with
Si + Sj
      </p>
      <p>X Sk
1</p>
      <p>Si
k2Rj
Si+
Si+</p>
      <p>Sj
X Sj
j2Ri</p>
      <p>1
Ui = Si + Si+
X Si
i2Cr
( X
i2Cur
Si 2 f0; 1g
S+</p>
      <p>i 2 f0; 1g
Ui 2 f0; 1g
Yi 2 f0; 1g
i2Mur
( X Ui) + 1</p>
      <p>Ui) + jM urj</p>
      <p>jARj Yr
jARj (1</p>
      <p>
        Yr)
8i 2 AR; 8j 2 Ri
8i 2 AR; 8j 2 Ri
8i 2 AR; 8j 2 Ri
regard to set inclusion. Subsection 3.3 explains how constraints (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) and (
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
were de ned and why they are added after the computation of each additional
extension in order to compute the whole semantics.
      </p>
      <p>Con ict-Freeness Note that the de nition of a con ict-free set in De nition 2
item 5 is not stated in terms of attacks's directions but just in terms of attacks
between arguments, without considering the directions of them. In this way, such
a de nition is considering an arc just as an edge, and therefore the whole AF
can be regarded as an undirected graph, at least with regard to the con ict-free
set problem.</p>
      <p>
        Note that the expression Si + Sj 1, in constraint (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ), will be just ful lled
when Si = 1 or Sj = 1 but not both and when Si = 0 and Sj = 0, therefore at
most one arguments will be selected which guarantees us that solution will be a
con ict-free set.
      </p>
      <p>
        Admissibility. The intuition of De nitions 1, 2 and 3 is that an admissible set
S should defend each of its arguments, and De nition 6 just restates it in terms
of De nition 5. Note that in De nition 6 the existential quanti er suggests that
constraint (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) should be Pk2Rj Sk 1, but we used Pk2Rj Sk Si since
the constraint must be ful lled 8i 2 AR 2. This way, the translation from this
de nition to constraint (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) is a straightforward task, which guarantees us that
the set M t is admissible.
      </p>
      <p>
        Creation of S+. So far, we have a con ict-free and admissible set, and it is
still required to build Si+ as in De nition 2 item 2 8i 2 M +. It should be done
by decision variables (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) such that the objective function can be executed. This
way, Si+ should take on value 1 if argument i is attacked by some argument
j 2 Ri such that Sj = 1. This is the same that d = di _ d2 : : : _ dn as a logical
expression which can be linearized as follows [9]:
d
d
d
di
X di
1
i
i = 1; : : : ; n
i = 1; : : : ; n
(18)
(19)
(20)
Note that (18) and (19) become (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) respectively while (20) is redundant
due to (15). Thus, constraints (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ), (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) and (15) will determine the values of
decision variables (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) from values on decision variables (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        Thus, M 1 is a con ict-free and admissible set, considering that (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) guarantees
a maximum cardinality set, and according to De nition 4 and Preposition 1, M 1
is a SS extension.
      </p>
      <p>
        Construction of U = S + S+. In order to avoid that M ut+1 be a subset of
M ut, it is required to have as decision variables the union of (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), as
de ned in (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ). To this end, and in order to ease this process, consider that it
is not possible that Si = 1 and Si+ = 1 at the same time, since it would mean
k2Rj Sk
argument i since Si 2 Solution.
2 There are two special cases: Si = 0 and Si = 1. In the rst one, it does not matter
the total of Pk2Rj Sk because Si 62 Solution, thus in the second case we will have
P 1 which means that there will be at least one argument defending
that M is not a con ict-free set. Thus, the value that Ui will take on should be
Si + Si+. Considering De nition 9, constraint (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ) guarantees that M u will have
the whole solution.
3.2
      </p>
      <sec id="sec-2-1">
        <title>Semi Stable Extensions Program</title>
        <p>
          Notice that the problem formulation made up of (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )-(
          <xref ref-type="bibr" rid="ref10">10</xref>
          ), and (
          <xref ref-type="bibr" rid="ref14">14</xref>
          )-(17) already
can be used for computing the rst SS extension of a given AF. To this end,
this program should be coded using a mathematical programming language like
mosel 3, which is a straightforward task, since the mathematical language was
developed for expressing mathematical formulas, and even though we can not
show the complete code for space reasons, the following code stands for the whole
mathematical model:
z:= sum(i in arguments) (S(i) + Sp(i))
forall(i in arguments, j in R(i)) S(i) + S(j) &lt;= 1
forall(i in arguments, j in R(i)) sum(k in R(j)) S(k) &gt;= S(i)
forall(i in arguments, j in R(i)) Sp(i) &gt;= S(j)
forall(i in arguments) Sp(i) &lt;= sum(j in R(i)) S(j)
forall(i in arguments) U(i) = S(i) + Sp(i)
forall(i in arguments) S(i) is_binary
forall(i in arguments) Sp(i) is_binary
forall(i in arguments) U(i) is_binary
forall(i in t-1) Y(i) is_binary
maximize(z)
        </p>
        <p>We will denote this program as BIP in order to make reference to it.
3.3</p>
      </sec>
      <sec id="sec-2-2">
        <title>Semi Stable Semantics</title>
        <p>Note that once the model is implemented in a mathematical programming
language, the program just compute one SS extension. In order to compute an
additional extension it is required to solve the model again, but adding
additional constraints to avoid getting previous solutions, which will force to get
another di erent extension. In this setting, it is required to iterate to nd all
the extensions of a given AF until there is no a feasible solution. Thus, we have
to take care of getting no subsets of M t (Case No. 1), and no proper subsets of
M ut (Case No. 2).</p>
        <p>Case No. 1. Then, in order to nd the constraint that we have to add to avoid
that M t+1 M t, consider De nitions 7, and let P be the solution in iteration
t + 1, and M the solution in iteration t, thus:</p>
        <p>P</p>
        <p>M $ 8x(x 2 P ! x 2 M ) $ 8x(x 62 P _ x 2 M )
P 6 M $ 9x(x 2 P ^ x 62 M ) $ 9x(x 2 P ^ x 2 C)
(21)
(22)
3 http://www. co.com/en/products/ co-xpress-optimization-suite/</p>
        <p>
          The intuition of this result is that it is required that solution in iteration t + 1
has at least one element from solution's complement in iteration t. Constraint
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          ) is de ned from this intuition. Note that the mosel code must take care of
the special case where jM j = jARj.
        </p>
        <p>Case No. 2. Additionally, we have to add other constraint to avoid that
M ut+1 M ut. In order to nd such a constraint(s), consider De nition 9 and
let P be the solution in iteration t + 1, and M u the solution in iteration t, thus:
P
P 6</p>
        <p>M u $ 8x(x 2 P ! x 2 M u) ^ 9x(x 62 P ^ x 2 M u)</p>
        <p>$ 8x(x 2= P _ x 2 M u) ^ 9x(x 62 P ^ x 2 M u)
M u $ 9x(x 2 P ^ x 62 M u) _ 8x(x 2 P _ x 62 M u)
$ 9x(x 2 P ^ x 2 Cu) _ 8x(x 2 P _ x 62 M u)
(23)
(24)
(25)
(26)</p>
        <p>Note that the intuition of the expression in (22) should be the same as that of
the rst part of the disjunction in (26). Consider also that we wanted to nd an
expression that led us to a linearized constraint to avoid getting proper subsets
of previous solutions. Thus, we can have a proper subset when jP j &lt; jM uj holds,
and therefore apply the expression 9x(x 2 P ^ x 2 Cu), otherwise apply the
expression 8x(x 2 P _ x 62 M u), whose intuition is that the new solution P can
have any element, which means that it requires no constraint. Thus, we have just
to work with the rst part of the disjunction. Therefore, we have to linearize the
expression [9]:
if jP j &lt; jM uj then X Ui
1 $ not (jP j &lt; jM uj) _ X Ui
1
i2Cu
$ jP j
$</p>
        <p>X
i2Mur</p>
        <p>Ui
jM uj _ X Ui</p>
        <p>i2Cu
jM urj _
i2Cu</p>
        <p>1
X
i2Cur</p>
        <p>Ui
1
which means that the model should apply either Pi2Mur Ui jM urj or Pi2Cu Ui
1, but to satisfy the simultaneousness assumption of binary integer programming,
they must be transformed considering the following general format [9]:
f (x1; x2; : : : ; xn)</p>
        <p>By
g(x1; x2; : : : ; xn)</p>
        <p>
          B(1
y)
where B is a big number, in our case B = jARj, and y is the binary variables
de ned in (17). This transformation becomes constraints (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ) and (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ).
        </p>
        <p>
          Now, let SSE a set of all the SS extensions of a given AF, and M C a set
of additional (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ), (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ), and (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) constraints, then the algorithm for computing
the q extensions of a given AF is the following:
1 Set SSE = ;, M C = ;;
2 Solve BIP [ M C;
3 while optimal solution found do
4 Let M; M +; and M u the optimal solution, and C; C+; and Cu its
complements respectively.;
Add M to SSE;
Add Pi2C Si
Add ((PPi2Mur Ui) + jM urj jARj Y (r)8r = 1; : : : ; t
Add i2Cur Ui) + 1 jARj (1 Y (r))8r = 1; : : : ; t
        </p>
        <p>
          Solve BIP [ M C;
Theorem 1. Let AF be an argumentation framework, R as de ned in 5,
M; M +; and M u is a solution of BIP , and SSE is computed as described in
Algorithm No. 1, then SSE is the set of all SS extensions of AF .
Proof. Sketch: From the above discussion consider the following items:
1. By OF (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) we know that M [ M + is a maximum cardinality set.
2. By constraints (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ), (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) we know that M is a con ict-free and admissible set.
3. By constraints (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) and (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) we know that M + is made up from M .
4. By constraint (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) we know that M u = M [ M +.
5. By De nition 4 and Proposition 1 we know that if a set M is a con ict-free
and admissible set, and M [ M + is maximal then M is a SS extension.
6. Now, notice that in each iteration, due to the constraint added to M C in
steps 6, 7 and 8 in iteration t, the solution M u (if exists), obtained in step
4 must not be a superset or subset of any previous solutions already in SSE,
and M u must be of maximum cardinality among the solutions that satisfy
BIP [ M C, therefore M u is maximal w.r.t. set inclusion.
        </p>
        <p>In order to measure the performance of the 0-1 integer program, it was
compared with an ASP approach: the ASPARTIX 4 [8] which we will call just ASP1,
and we used the solver Clingo5. Additionally, the approach based on 0-1
integer programming will be called BIP, and we used the ad-hoc Xpress6 solver.
The instances that were used during all the experiments were taken from the
ASPARTIX web page 7.</p>
        <p>As a summary, BIP approach had a performance quit similar to the ASP
approach for arbitrary instances8, but had problems until 60-arguments instances
for 4-grid and 8-grid instances. This result shows that the BIP approach
performed well and it has a great opportunity space for improving.
4 The program code is available at ASPARTIX's web page. It is worth mentioning
that ASPARTIX is the de facto benchmark for argumentations systems
5 http://potassco.sourceforge.net
6 http://www.
co.com/en/Products/DMTools/Pages/FICO-Xpress-Optimization</p>
        <p>Suite.aspx
7 http://www.dbai.tuwien.ac.at/research/project/argumentation/systempage
8 There is a complete explanation of each kind of instance in [7]
We have presented a novel method for computing SS semantics using binary
integer programming, the performance was good although the ASP approach
outperformed it.</p>
        <p>However, it is well known that binary integer programs can be improved, in
order to compute more e ciently its objective function, by using mathematical
programming techniques such as relaxation or adding strong valid inequalities.
It means that it is possible to improve the performance of this novel approach
for computing SS semantics.</p>
        <p>This new approach constitutes an alternative for computing AF semantics
using mathematical programming, and even though we used an state of the art
mathematical programming solver, there exists several libraries for java, C++
and other general purpose languages.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <article-title>Handbook of satis ability</article-title>
          . In Armin Biere, Marijn Heule, Hans van Maaren, and Toby Walsh, editors,
          <source>Handbook of Satis ability</source>
          , volume
          <volume>185</volume>
          of
          <article-title>Frontiers in Arti cial Intelligence and Applications</article-title>
          . IOS Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Colin</given-names>
            <surname>Bell</surname>
          </string-name>
          , Anil Nerode, Raymond T. Ng, and
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Subrahmanian</surname>
          </string-name>
          .
          <article-title>Mixed integer programming methods for computing nonmonotonic deductive databases</article-title>
          .
          <source>Journal of the ACM</source>
          ,
          <volume>41</volume>
          (
          <issue>6</issue>
          ):
          <volume>1178</volume>
          {
          <fpage>1215</fpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Gerhard</given-names>
            <surname>Brewka</surname>
          </string-name>
          , Thomas Eiter, and
          <string-name>
            <given-names>Miroslaw</given-names>
            <surname>Truszczynski</surname>
          </string-name>
          .
          <article-title>Answer set programming at a glance</article-title>
          .
          <source>Commun. ACM</source>
          ,
          <volume>54</volume>
          (
          <issue>12</issue>
          ):
          <volume>92</volume>
          {
          <fpage>103</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Martin</surname>
            <given-names>W. A.</given-names>
          </string-name>
          <string-name>
            <surname>Caminada</surname>
            , Walter Alexandre Carnielli, and
            <given-names>Paul E.</given-names>
          </string-name>
          <string-name>
            <surname>Dunne</surname>
          </string-name>
          .
          <article-title>Semistable semantics</article-title>
          .
          <source>J. Log. Comput.</source>
          ,
          <volume>22</volume>
          (
          <issue>5</issue>
          ):
          <volume>1207</volume>
          {
          <fpage>1254</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Rina</given-names>
            <surname>Dechter</surname>
          </string-name>
          .
          <article-title>Constraint Processing</article-title>
          . Morgan Kaufmann Publishers Inc.,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Phan</given-names>
            <surname>Minh Dung</surname>
          </string-name>
          .
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Arti cial Intelligence</source>
          ,
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <volume>321</volume>
          {
          <fpage>358</fpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Wolfgang</given-names>
            <surname>Dvorak</surname>
          </string-name>
          , Sarah Alice Gaggl, Johannes Peter Wallner, and
          <string-name>
            <given-names>Stefan</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Making use of advances in answer-set programming for abstract argumentation systems</article-title>
          .
          <source>CoRR, abs/1108.4942</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Uwe</given-names>
            <surname>Egly</surname>
          </string-name>
          , Sarah Alice Gaggl, and
          <string-name>
            <given-names>Stefan</given-names>
            <surname>Woltran</surname>
          </string-name>
          . Aspartix:
          <article-title>Implementing argumentation frameworks using answer-set programming</article-title>
          . In M. Garcia
          <string-name>
            <surname>de la Banda</surname>
          </string-name>
          and E. Pontelli, editors,
          <source>International Conference of Logic Programming (ICLP)</source>
          , volume
          <volume>5366</volume>
          of Lecture Notes of Computer Science, pages
          <volume>734</volume>
          {
          <fpage>738</fpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. FICO.
          <article-title>MIP Formulations and Linearizations</article-title>
          .
          <source>Fair Isaac Corporation</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sarah</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Gaggl Johannes P. Wallner Stefan Wolfran Gunter Charwat</surname>
            ,
            <given-names>Wolfgang</given-names>
          </string-name>
          <string-name>
            <surname>Dvorak</surname>
          </string-name>
          .
          <article-title>Implementing abstract argumentation: A survey</article-title>
          .
          <source>Technical report, Institut Fur Information Systeme</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Alejandro Santoyo Mauricio Osorio.
          <article-title>Preferred extensions as minimal models of clark's completion semantics</article-title>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Juan Carlos Nieves, Mauricio Osorio, and
          <string-name>
            <given-names>Ulises</given-names>
            <surname>Cortes</surname>
          </string-name>
          .
          <article-title>Preferred Extensions as Stable Models</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          ,
          <volume>8</volume>
          (
          <issue>4</issue>
          ):
          <volume>527</volume>
          {
          <fpage>543</fpage>
          ,
          <year>July 2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>Francesca</given-names>
            <surname>Toni</surname>
          </string-name>
          and
          <string-name>
            <given-names>Marek</given-names>
            <surname>Sergot</surname>
          </string-name>
          .
          <article-title>Argumentation and answer set programming</article-title>
          .
          <source>In Marcello Balduccini and Tran</source>
          Cao Son, editors,
          <source>Logic Programming</source>
          ,
          <source>Knowledge Representation, and Nonmonotonic Reasoning</source>
          , pages
          <volume>164</volume>
          {
          <fpage>180</fpage>
          . Springer-Verlag, Berlin, Heidelberg,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Laurence</surname>
            <given-names>A. Wolsey. Integer</given-names>
          </string-name>
          <string-name>
            <surname>Programming</surname>
          </string-name>
          .
          <source>Discrte Mathematics and Optimization</source>
          . John Wiley &amp; Sons, Inc.,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>