<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Testing Credulous and Sceptical Acceptance in Small-World Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefano Bistarelli</string-name>
          <email>bista@dmi.unipg.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabio Rossi</string-name>
          <email>rossi@dmi.unipg.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Santini</string-name>
          <email>francesco.santini@dmi.unipg.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dipartimento di Matematica e Informatica, Universita` di Perugia</institution>
        </aff>
      </contrib-group>
      <fpage>39</fpage>
      <lpage>46</lpage>
      <abstract>
        <p>In this paper we test how efficiently state-of-the art solvers are capable of solving credulous and sceptical argument-acceptance for lower-order extensions. As our benchmark we consider two different random graph-models to obtain random Abstract Argumentation Frameworks with small-world characteristics: Kleinberg and Watt-Strogatz. We test two reasoners, i.e., ConArg2 and dynPARTIX, on such benchmark, by comparing their performance on NP/co-NP-complete decision problems related to argument acceptance in admissible, complete, and stable semantics.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        An Abstract Argumentation Framework (AAF ) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], or System, is simply a pair
hA, Ri consisting of a set A of arguments, and of a binary relation R on A, called
the “attack” relation. An abstract argument is not assumed to have any specific
structure but, roughly speaking, an argument is anything that may attack or
be attacked by another argument. Two main styles of argumentation semantics
definition can be identified in the literature: extension-based and labelling-based.
In this work we exploit the extension-based approach, where a given semantics
definition (related to varying degrees of scepticism or credulousness) specifies
how to derive a set of extensions from an AAF, which basically consist in
conflictfree subsets of A with different properties.
      </p>
      <p>In this paper we are interested in the acceptance (or justification) state of
arguments: intuitively an argument is regarded as accepted if it is at least once
(credulously) or always (sceptically) present in all the extensions satisfying a
given semantics. The kind of semantics (from le least to the most binding), and
its acceptance state (e.g., credulous or sceptical) point to a strength evaluation
of an argument.</p>
      <p>
        In this work we move along the line activated in our previous works [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">5, 2,
4, 3</xref>
        ]. Differently from these papers, here we extend [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] by considering networks
with small-world topologies [
        <xref ref-type="bibr" rid="ref15 ref18">15, 18</xref>
        ]: in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] we present a benchmark assembled
with random trees, scale-free networks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], and just random graphs [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The
motivation is to study topologies possibly shown by advanced social debating
platforms, as DebateGraph1, which allow a discussion to be less rigidly structured
      </p>
      <sec id="sec-1-1">
        <title>1 http://debategraph.org</title>
        <p>
          than a tree, as instead commonly offered in today’s digital fora. Hence, in this
paper we consider Kleinberg [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] and Watts-Strogatz [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] topologies.
        </p>
        <p>
          The problems we tackle in this work correspond to the credulous acceptance
in admissible, complete, and stable semantics (all NP-complete problems), and
the sceptical acceptance in the stable semantics (a coNP-complete problem). We
test two different solvers ConArg2 [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and dynPARTIX [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], in order to have
a comparison between them and a more informative analysis on the most
efficient relation “technology against AAF topology” (i.e., Constraint Programming
against Dynamic Programming).
        </p>
        <p>
          Note that in this work we do not consider higher-order semantics, e.g.,
preferred or grounded [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], which can be defined from lower-order ones by selecting
only the maximal or minimal ones w.r.t. set inclusion; for instance, preferred
extensions are the maximal (w.r.t. set inclusion) admissible extensions. We leave
their testing to future work (see Sec. 5).
2
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>In this section we focus on the basic definitions of an AAF, and on the
extensionbased semantics that will be tested in our comparison (see Sec. 4).
Definition 1 (Abstract AFs). An Abstract Argumentation Framework (AAF)
is a pair F = hA, Ri of a set A of arguments and a binary relation R ⊆ A × A,
called the attack relation. ∀a, b ∈ A, aR b (or, a b) means that a attacks b.
An AAF may be represented by a directed graph (an interaction graph) whose
nodes are arguments and edges represent the attack relation. A set of arguments
S ⊆ A attacks an argument a, i.e., S a, if a is attacked by an argument of
S, i.e., ∃b ∈ S.b a.</p>
      <p>
        The following notion of defence [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is fundamental to AAFs.
      </p>
      <p>Definition 2 (Defence). Given an AAF, F = hA, Ri, an argument a ∈ A is
defended (in F ) by a set S ⊆ A if for each b ∈ A, such that b a, also S b
holds. Moreover, for S ⊆ A, we denote by SR+ the set S ∪ {b | S b}.</p>
      <p>
        The “acceptability” of an argument [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], defined under different semantics,
depends on the frequency of its membership to some argument subsets, called
extensions : such semantics characterise a collective “acceptability”. In Def. 3 we
report only the semantics of interest in this study.
      </p>
      <p>Definition 3. Let F = hA, Ri be an AAF. A set S ⊆ A is conflict-free (in F),
denoted S ∈ cf (F ), iff there are no a, b ∈ S, such that (a, b), (b, a) ∈ R. For
S ∈ cf (F ), it holds that
– S ∈ adm(F ), if each a ∈ S is defended by S;
– S ∈ com(F ), if S ∈ adm(F ) and for each a ∈ A defended by S, a ∈ S holds;
– S ∈ stb(F ), if for each a ∈ A\S, S a, i.e., SR+ = A;</p>
      <p>We recall that for each AAF, stb(F ) ⊆ com(F ) ⊆ adm(F ) holds, and that
adm(F ) 6= ∅, and com(F ) 6= ∅ always hold, while stb(F ) = ∅ may happen
instead.</p>
      <p>Definition 4 (Acceptance state). Given a semantics σ (e.g., stb) and a
framework F , an argument a is i) sceptically accepted iff ∀E ∈ σ(F ), a ∈ E,
and ii) credulously accepted if ∃E ∈ σ(F ), a ∈ E.</p>
      <p>Checking the credulous/sceptical acceptance of an argument is sometimes a
(time) complex problem (e.g., with the grounded semantics they are polynomial):
in Tab. 1 we report in bold the complexity class of the problems we tackle in
this paper, i.e., the credulous acceptance in the admissible, complete, and stable
semantics (all NP-complete problems), and the sceptical acceptance in the stable
semantics (a coNP-complete problem).</p>
      <p>Consider the F = hA, Ri in Fig. 1, with A = {a, b, c, d, e} and R = {(a, b), (c, b),
(c, d), (d, c), (d, e), (e, e)}. We have that stb(F ) = {{a, d}}. The admissible
extensions of F are adm(F ) = {∅, {a}, {c}, {d}, {a, c}, {a, d}}, while the complete ones
are com(F ) = {{a}, {a, c}, {a, d}}. For instance, argument a is both credulously
and sceptically accepted in stb(F ) and com(F ), while it is only credulously
accepted in adm(F ).
3</p>
    </sec>
    <sec id="sec-3">
      <title>Tools and Graphs</title>
      <p>In this section we introduce how we performed our tests, by describing the
analysed tools (Sec. 3.1) and the generated AAFs (Sec. 3.2).
3.1</p>
      <p>
        Tools
dynPARTIX2 is a system based on decomposition and dynamic
programming; it is motivated by the theoretical results in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The underneath
algorithms make use of the graph-parameter tree-width, which measures the
“treelikeness” of a graph. More specifically, tree-width is defined via the so-called
2 http://www.dbai.tuwien.ac.at/proj/argumentation/dynpartix/
tree-decompositions. A tree decomposition is a mapping from an AAF to a tree
where the nodes in the tree contain bags of arguments from the AAF. Each
argument appears in at least one bag, adjacent arguments are together in at least
one bag, and bags containing the same argument are connected. The benchmarks
in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] show that the run-time performance of dynPARTIX heavily depends on
the tree-width of the considered graph: for example, with instances of small
tree-width, dynPARTIX outperforms ASPARTIX [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], while with a high
treewidth ASPARTIX still performs comparably (better on credulous acceptance,
still worse on sceptical acceptance). In our tests we use the new 64-bit version
(2.0) of dynPARTIX, which has recently become available.
      </p>
      <p>
        ConArg2. ConArg3 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is our solver based on the Java Constraint
Programming solver4 (JaCoP), a Java library that provides a Finite Domain Constraint
Programming paradigm [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The tool comes with a graphical interface, which
visually shows all the obtained extensions for each problem. ConArg is able to
solve also the weighted and coalition-based problems presented in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Moreover,
it can import/export AAFs with the same text format of ASPARTIX. Recently,
we have extended the tool to its second version, i.e., ConArg2 (freely
downloadable from the same Web-page of ConArg), in order to improve its performance:
we implemented all the models in Gecode5, which is an open, free, and efficient
C++ environment where to develop constraint-based applications. Hence, we
model each semantics as a Constraint Satisfaction Problem (CSP ) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. We have
also dropped the graphical interface, having a textual output only, with the
purpose to have a tool exclusively oriented to performance. So far, on classical AAFs,
ConArg2 is able to find all conflict-free, admissible, complete, stable, grounded,
preferred, semi-stable, and ideal extensions; moreover, it solves the credulous
and sceptical acceptance of arguments given the admissible, complete, and
stable semantics, and the existence of a stable extension (which is an NP-complete
problem).
3.2
      </p>
      <p>
        Graphs
The justification behind using Kleinberg and Watts-Strogatz models is that
several works in the Argumentation literature investigate AAFs extracted from
social networks [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. However, benchmarks collected with such tools are still not
available.
      </p>
      <p>
        To generate random graphs we adopted two different libraries. The first one
is the Java Universal Network/Graph Framework (JUNG 6), which is a Java
software library for the modelling, generation, analysis and visualization of graphs.
With JUNG we generate Kleinberg [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] graphs. The second library we use is
NetworkX 7, and it consists of a Python software package for the creation,
manipu
      </p>
      <sec id="sec-3-1">
        <title>3 http://www.dmi.unipg.it/conarg/</title>
        <p>4 http://www.jacop.eu
5 http://www.gecode.org
6 http://jung.sourceforge.net
7 http://networkx.github.io
Model/Nodes Edges Shortest Path Clustering C. Diam. InDeg. Cycles Min-Max Deg.</p>
        <p>KL/16 47 1.6 0.3 2.9 5 Yes 5-11
KL/25 74 1.9 0.19 3 5 Yes 5-11
KL/36 107 2.2 0.14 3.9 5 Yes 5-11
KL/49 146 2.4 0.11 4 5 Yes 5-11
KL/64 191 2.57 0.8 4.2 5 Yes 5-12
KL/81 242 2.7 0.07 4.8 5 Yes 5-11
WS/25 50 2.4 0.22 4.7 2 Yes 2-8
WS/50 100 3.4 0.28 6.7 2 Yes 2-8
WS/80 240 2.6 0.09 4.9 3 Yes 3-13</p>
        <p>
          WS/100 400 2.4 0.12 4 4 Yes 4-15
lation, and study of the structure, dynamics, and functions of complex networks.
With NetworkX we generate Watts-Strogatz [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] graphs.
        </p>
        <p>
          The Kleinberg [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] graph-model adds a number of directed long-range
random links to an n × n lattice network. Links have a non-uniform distribution
that favours edges to close nodes over more distant ones (in the number of hops).
In the implementation provided by JUNG, each node u has four local
connections, one to each of its neighbours, and in addition, one or more long-range
connections to some node v, where v is randomly chosen according to
probability proportional to d−θ where d is the lattice distance between u and v and θ is
the clustering exponent. In our generation we set θ = 0.9, in order to have a high
clustering coefficient. Given a node, each link is directed towards its neighbours:
edges are created in both directions between neighbours. Each long-distance edge
has the tail in the considered node.
        </p>
        <p>
          The Watts-Strogatz model [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] consists in a ring over n nodes. each node
in the ring is connected with its k nearest neighbours (k − 1 neighbours if k is
odd). Then shortcuts are created by replacing some edges as follows: for each
edge (u, v) in the underlying “n-ring with k nearest neighbours with probability
p replace it with a new edge (u, w) with uniformly random choice of existing
node w. Varying p makes it possible to interpolate between a regular lattice
(p = 0) and an Erd˝os-R´enyi graph (p = 1). In our graph generation we set
k = (n/10) − 2 and p = 0.1: in this way we obtain a high clustering coefficient
(the max is with k = n/2, i.e., a complete graph) without increasing the number
of edges (attacks) too much; we also obtain a graph structure closer to a lattice (p
is low). Note that, since NetworkX generates undirected Watts-Strogatz graphs,
we orient each edge in one of the two directions (0.5 of probability each).
        </p>
        <p>For each set of 100 networks we also collected the following parameters, shown
in Tab. 2: the Average Number of Edges, the Average Shortest Path (between
all the couples of nodes), the Average Clustering Coefficient (the fraction of
all the possible triangles through a node), the Average Diameter, the Average
InDegree, the presence of Simple Cycles (closed paths where no node appears
twice, except that the first and last node are the same), and the Max and Min
degree for a node over the whole class.</p>
        <p>Credulous
Performance results have been collected on an Intel(R) Core(TM) i7 CPU 970
@3.20GHz (6 core, 2 threads per core), and 16GB of RAM. For both the tools,
the output has been redirected to /dev/null, and the standard error to file.
To test dynPARTIX we adopted its 64-bit version, by calling commands like
./dynpartix -f barabasi graph -s admissible --skept d. Flag -f
specifies the input file, -s the considered semantics (admissible in this case), and
--skept sets argument with id d to be checked for sceptical acceptance. We
could flag -n semi, i.e., the semi-normalised tree-decomposition (more
performant than the default normalised one, as stated by the authors of dynPARTIX)
only for the admissible semantics, because it is not currently implemented for
the other two semantics. We set a timeout of 300 seconds to interrupt the search
of each of the two tools.</p>
        <p>In Fig. 2 and Fig. 3 we show the tests collected on the whole database
presented in Tab. 2, for the credulous and sceptical acceptance respectively. For
each of the reported number of nodes (on the x axis), the left y axis reports the
CPU time averaged over 100 different instances of AAFs, and 10% random
arguments chosen on that class. Acceptance and non-acceptance have been forced
to be equally distributed within such random sample (5% each). On the right
y axis we also report the percentage of instances that are not solved within the
timeout (“% Unsuccessful”).
100
90
80
76540000 lfssscecuunU
30 %
20
10
0
100
90
80
76540000 lfssseccuunU
30 %
20
10
0
60
.) 50
c
(see 40
m
iT 30
U
PC 20
g
vA 10
0</p>
        <p>
          As we can appreciate from Fig. 2 and Fig. 3, we can state that constraint
propagation in ConArg2 works very well with credulous/sceptical acceptance
of arguments: most of the problems are solved almost instantaneously, while
dynPARTIX is not able to return an answer within the timeout. Note that the
performance of dynPARTIX on sceptical acceptance are proven to be better
(with low tree-width graphs) or comparable (with high tree-width graphs) to
the performance of ASPARTIX, while ASPARTIX works definitely better with
high tree-width and credulous acceptance [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
5
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>In the paper we have compared two reasoners (dynPARTIX and ConArg2). The
main goal has been to study how efficiently state-of-the-art reasoners behave
on hard problems related to credulous and sceptical acceptance in lower-order
semantics, i.e., admissible, complete, and stable.</p>
      <p>
        In the future we will implement in ConArg2 all the other hard problems
related to higher-order semantics [16, Ch. 5]; in particular, credulous/sceptical
acceptance in preferred (NP-c/Π2P -c), semi-stable (Σ2P -c/Π2P -c), and stage
semantics (Σ2P -c/Π2P -c), with the purpose to compare our tool with dynPARTIX
again, but also with CEGARTIX8 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], since it computes sceptical acceptance
for the preferred semantics, and both sceptical and credulous acceptance for
semi-stable and stage semantics. Moreover, in order to have an engine as more
comprehensive as possible, we plan to solve other hard problems (not currently
implemented in any other solver) related to the preferred semantics, e.g., its
verification (co-NP-complete), and non-emptiness (NP-complete).
      </p>
      <p>To solve higher-order semantics, we will need to work on branch-and-bound
search itself, with the result to better manage maximality/minimality of set
inclusion directly at the search level; the reason is that it is usually not possible
to express such requirements as constraints.
8 http://www.dbai.tuwien.ac.at/proj/argumentation/cegartix/</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Barabasi</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Albert</surname>
          </string-name>
          .
          <article-title>Emergence of scaling in random networks</article-title>
          .
          <source>Science</source>
          ,
          <volume>286</volume>
          (
          <issue>5439</issue>
          ):
          <fpage>509</fpage>
          -
          <lpage>512</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>Benchmarking hard problems in random abstract AFs: The stable semantics</article-title>
          .
          <source>In Computational Models of Argument - Proceedings of COMMA</source>
          , volume
          <volume>266</volume>
          <source>of FAIA</source>
          , pages
          <fpage>153</fpage>
          -
          <lpage>160</lpage>
          . IOS Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>Efficient solution for credulous/sceptical acceptance in lower-order Dung's semantics</article-title>
          .
          <source>In 26th International Conference on Tools with Artificial Intelligence, ICTAI</source>
          , pages
          <fpage>800</fpage>
          -
          <lpage>804</lpage>
          . IEEE Computer Society,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>Enumerating extensions on random abstractafs with argtools, aspartix, conarg2, and dung-o-matic</article-title>
          .
          <source>In Computational Logic in Multi-Agent Systems - 15th International Workshop</source>
          , CLIMA XV, volume
          <volume>8624</volume>
          <source>of LNCS</source>
          , pages
          <fpage>70</fpage>
          -
          <lpage>86</lpage>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>A first comparison of abstract argumentation reasoning-tools</article-title>
          .
          <source>In ECAI 2014 - 21st European Conference on Artificial Intelligence</source>
          , volume
          <volume>263</volume>
          <source>of FAIA</source>
          , pages
          <fpage>969</fpage>
          -
          <lpage>970</lpage>
          . IOS Press,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>A common computational framework for semiringbased argumentation systems</article-title>
          .
          <source>In ECAI 2010 - 19th European Conference on Artificial Intelligence</source>
          , volume
          <volume>215</volume>
          <source>of FAIA</source>
          , pages
          <fpage>131</fpage>
          -
          <lpage>136</lpage>
          . IOS Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          .
          <article-title>Conarg: A constraint-based computational framework for argumentation systems</article-title>
          .
          <source>In 23rd International Conference on Tools with Artificial Intelligence, ICTAI</source>
          , pages
          <fpage>605</fpage>
          -
          <lpage>612</lpage>
          . IEEE Computer Society,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          .
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. W. Dvoˇra´k, M. Morak,
          <string-name>
            <given-names>C.</given-names>
            <surname>Nopp</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          . dynpartix
          <article-title>- A dynamic programming reasoner for abstract argumentation</article-title>
          .
          <source>In Applications of Declarative Programming and Knowledge Management</source>
          , pages
          <fpage>259</fpage>
          -
          <lpage>268</lpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. W. Dvora´k, R. Pichler, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Towards fixed-parameter tractable algorithms for abstract argumentation</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>186</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. W. Dvoˇr´ak, M. Ja¨rvisalo,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Complexity-sensitive decision procedures for abstract argumentation</article-title>
          .
          <source>Artif</source>
          . Intell.,
          <volume>206</volume>
          :
          <fpage>53</fpage>
          -
          <lpage>78</lpage>
          , Jan.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. U. Egly,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Answer-set programming encodings for argumentation frameworks</article-title>
          .
          <source>Argument &amp; Computation</source>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          ):
          <fpage>147</fpage>
          -
          <lpage>177</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. P.
          <article-title>Erdo˝s and</article-title>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>R´enyi. On the evolution of random graphs</article-title>
          .
          <source>Bulletin of the International Statistical Institute</source>
          ,
          <volume>38</volume>
          (
          <issue>4</issue>
          ):
          <fpage>343</fpage>
          -
          <lpage>347</lpage>
          ,
          <year>1961</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gabbriellini</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Torroni</surname>
          </string-name>
          .
          <article-title>Arguments in social networks</article-title>
          .
          <source>In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '13</source>
          , pages
          <fpage>1119</fpage>
          -
          <lpage>1120</lpage>
          . IFAAMAS,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>C.</given-names>
            <surname>Martel</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          .
          <article-title>Analyzing Kleinberg's (and other) small-world models</article-title>
          .
          <source>In Proceedings of the ACM symposium on Principles of distributed computing, PODC</source>
          , pages
          <fpage>179</fpage>
          -
          <lpage>188</lpage>
          . ACM,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. I. Rahwan and
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          .
          <source>Argumentation in Artificial Intelligence</source>
          . Springer Publishing Company,
          <source>Incorporated, 1st edition</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>F.</given-names>
            <surname>Rossi</surname>
          </string-name>
          , P. van Beek, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Walsh</surname>
          </string-name>
          .
          <article-title>Handbook of Constraint Programming (Foundations of Artificial Intelligence)</article-title>
          . Elsevier Science Inc.,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Watts</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Strogatz</surname>
          </string-name>
          .
          <article-title>Collective dynamics of 'small-world' networks</article-title>
          .
          <source>Nature</source>
          ,
          <volume>393</volume>
          (
          <issue>6684</issue>
          ):
          <fpage>440</fpage>
          -
          <lpage>442</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>