=Paper= {{Paper |id=Vol-1451/paper4 |storemode=property |title=Testing Credulous and Sceptical Acceptance in Small-World Networks |pdfUrl=https://ceur-ws.org/Vol-1451/paper4.pdf |volume=Vol-1451 |dblpUrl=https://dblp.org/rec/conf/aiia/BistarelliRS15 }} ==Testing Credulous and Sceptical Acceptance in Small-World Networks== https://ceur-ws.org/Vol-1451/paper4.pdf
    Testing Credulous and Sceptical Acceptance in
               Small-World Networks

                Stefano Bistarelli, Fabio Rossi, Francesco Santini

          Dipartimento di Matematica e Informatica, Università di Perugia
                 [bista,rossi,francesco.santini]@dmi.unipg.it



       Abstract. In this paper we test how efficiently state-of-the art solvers
       are capable of solving credulous and sceptical argument-acceptance for
       lower-order extensions. As our benchmark we consider two different ran-
       dom graph-models to obtain random Abstract Argumentation Frame-
       works with small-world characteristics: Kleinberg and Watt-Strogatz. We
       test two reasoners, i.e., ConArg2 and dynPARTIX, on such benchmark,
       by comparing their performance on NP/co-NP-complete decision prob-
       lems related to argument acceptance in admissible, complete, and stable
       semantics.


1     Introduction
An Abstract Argumentation Framework (AAF ) [8], or System, is simply a pair
hA, Ri consisting of a set A of arguments, and of a binary relation R on A, called
the “attack” relation. An abstract argument is not assumed to have any specific
structure but, roughly speaking, an argument is anything that may attack or
be attacked by another argument. Two main styles of argumentation semantics
definition can be identified in the literature: extension-based and labelling-based.
In this work we exploit the extension-based approach, where a given semantics
definition (related to varying degrees of scepticism or credulousness) specifies
how to derive a set of extensions from an AAF, which basically consist in conflict-
free subsets of A with different properties.
    In this paper we are interested in the acceptance (or justification) state of
arguments: intuitively an argument is regarded as accepted if it is at least once
(credulously) or always (sceptically) present in all the extensions satisfying a
given semantics. The kind of semantics (from le least to the most binding), and
its acceptance state (e.g., credulous or sceptical) point to a strength evaluation
of an argument.
    In this work we move along the line activated in our previous works [5, 2,
4, 3]. Differently from these papers, here we extend [3] by considering networks
with small-world topologies [15, 18]: in [3] we present a benchmark assembled
with random trees, scale-free networks [1], and just random graphs [13]. The
motivation is to study topologies possibly shown by advanced social debating
platforms, as DebateGraph 1 , which allow a discussion to be less rigidly structured
1
    http://debategraph.org



                                        39
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

  than a tree, as instead commonly offered in today’s digital fora. Hence, in this
  paper we consider Kleinberg [15] and Watts-Strogatz [18] topologies.
      The problems we tackle in this work correspond to the credulous acceptance
  in admissible, complete, and stable semantics (all NP-complete problems), and
  the sceptical acceptance in the stable semantics (a coNP-complete problem). We
  test two different solvers ConArg2 [7] and dynPARTIX [10], in order to have
  a comparison between them and a more informative analysis on the most effi-
  cient relation “technology against AAF topology” (i.e., Constraint Programming
  against Dynamic Programming).
      Note that in this work we do not consider higher-order semantics, e.g., pre-
  ferred or grounded [8], which can be defined from lower-order ones by selecting
  only the maximal or minimal ones w.r.t. set inclusion; for instance, preferred ex-
  tensions are the maximal (w.r.t. set inclusion) admissible extensions. We leave
  their testing to future work (see Sec. 5).


  2    Preliminaries

  In this section we focus on the basic definitions of an AAF, and on the extension-
  based semantics that will be tested in our comparison (see Sec. 4).

  Definition 1 (Abstract AFs). An Abstract Argumentation Framework (AAF)
  is a pair F = hA, Ri of a set A of arguments and a binary relation R ⊆ A × A,
  called the attack relation. ∀a, b ∈ A, aR b (or, a  b) means that a attacks b.
  An AAF may be represented by a directed graph (an interaction graph) whose
  nodes are arguments and edges represent the attack relation. A set of arguments
  S ⊆ A attacks an argument a, i.e., S  a, if a is attacked by an argument of
  S, i.e., ∃b ∈ S.b  a.

      The following notion of defence [8] is fundamental to AAFs.

  Definition 2 (Defence). Given an AAF, F = hA, Ri, an argument a ∈ A is
  defended (in F ) by a set S ⊆ A if for each b ∈ A, such that b  a, also S  b
  holds. Moreover, for S ⊆ A, we denote by SR +
                                                 the set S ∪ {b | S  b}.

      The “acceptability” of an argument [8], defined under different semantics,
  depends on the frequency of its membership to some argument subsets, called
  extensions: such semantics characterise a collective “acceptability”. In Def. 3 we
  report only the semantics of interest in this study.

  Definition 3. Let F = hA, Ri be an AAF. A set S ⊆ A is conflict-free (in F),
  denoted S ∈ cf (F ), iff there are no a, b ∈ S, such that (a, b), (b, a) ∈ R. For
  S ∈ cf (F ), it holds that

   – S ∈ adm(F ), if each a ∈ S is defended by S;
   – S ∈ com(F ), if S ∈ adm(F ) and for each a ∈ A defended by S, a ∈ S holds;
   – S ∈ stb(F ), if for each a ∈ A\S, S  a, i.e., SR
                                                     +
                                                       = A;



                                          40
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks


  Table 1: Some known complexity results for the credulous and sceptical accep-
  tance [16, Ch. 5]: in bold, the problems we test in this study.
                                         adm com        stb
                         Credulous acc. NP-c NP-c NP-c
                         Sceptical acc. trivial P-c coNP-c



                     a          b         c          d          e

                         Fig. 1: A graphical example of an AAF.


      We recall that for each AAF, stb(F ) ⊆ com(F ) ⊆ adm(F ) holds, and that
  adm(F ) 6= ∅, and com(F ) 6= ∅ always hold, while stb(F ) = ∅ may happen
  instead.
  Definition 4 (Acceptance state). Given a semantics σ (e.g., stb) and a
  framework F , an argument a is i) sceptically accepted iff ∀E ∈ σ(F ), a ∈ E,
  and ii) credulously accepted if ∃E ∈ σ(F ), a ∈ E.
      Checking the credulous/sceptical acceptance of an argument is sometimes a
  (time) complex problem (e.g., with the grounded semantics they are polynomial):
  in Tab. 1 we report in bold the complexity class of the problems we tackle in
  this paper, i.e., the credulous acceptance in the admissible, complete, and stable
  semantics (all NP-complete problems), and the sceptical acceptance in the stable
  semantics (a coNP-complete problem).
      Consider the F = hA, Ri in Fig. 1, with A = {a, b, c, d, e} and R = {(a, b), (c, b),
  (c, d), (d, c), (d, e), (e, e)}. We have that stb(F ) = {{a, d}}. The admissible exten-
  sions of F are adm(F ) = {∅, {a}, {c}, {d}, {a, c}, {a, d}}, while the complete ones
  are com(F ) = {{a}, {a, c}, {a, d}}. For instance, argument a is both credulously
  and sceptically accepted in stb(F ) and com(F ), while it is only credulously ac-
  cepted in adm(F ).

  3      Tools and Graphs
  In this section we introduce how we performed our tests, by describing the
  analysed tools (Sec. 3.1) and the generated AAFs (Sec. 3.2).

  3.1     Tools
  dynPARTIX2 is a system based on decomposition and dynamic program-
  ming; it is motivated by the theoretical results in [10]. The underneath algo-
  rithms make use of the graph-parameter tree-width, which measures the “tree-
  likeness” of a graph. More specifically, tree-width is defined via the so-called
   2
       http://www.dbai.tuwien.ac.at/proj/argumentation/dynpartix/



                                          41
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

  tree-decompositions. A tree decomposition is a mapping from an AAF to a tree
  where the nodes in the tree contain bags of arguments from the AAF. Each ar-
  gument appears in at least one bag, adjacent arguments are together in at least
  one bag, and bags containing the same argument are connected. The benchmarks
  in [9] show that the run-time performance of dynPARTIX heavily depends on
  the tree-width of the considered graph: for example, with instances of small
  tree-width, dynPARTIX outperforms ASPARTIX [12], while with a high tree-
  width ASPARTIX still performs comparably (better on credulous acceptance,
  still worse on sceptical acceptance). In our tests we use the new 64-bit version
  (2.0) of dynPARTIX, which has recently become available.
       ConArg2. ConArg3 [7] is our solver based on the Java Constraint Program-
  ming solver4 (JaCoP), a Java library that provides a Finite Domain Constraint
  Programming paradigm [17]. The tool comes with a graphical interface, which
  visually shows all the obtained extensions for each problem. ConArg is able to
  solve also the weighted and coalition-based problems presented in [6]. Moreover,
  it can import/export AAFs with the same text format of ASPARTIX. Recently,
  we have extended the tool to its second version, i.e., ConArg2 (freely download-
  able from the same Web-page of ConArg), in order to improve its performance:
  we implemented all the models in Gecode5 , which is an open, free, and efficient
  C++ environment where to develop constraint-based applications. Hence, we
  model each semantics as a Constraint Satisfaction Problem (CSP ) [17]. We have
  also dropped the graphical interface, having a textual output only, with the pur-
  pose to have a tool exclusively oriented to performance. So far, on classical AAFs,
  ConArg2 is able to find all conflict-free, admissible, complete, stable, grounded,
  preferred, semi-stable, and ideal extensions; moreover, it solves the credulous
  and sceptical acceptance of arguments given the admissible, complete, and sta-
  ble semantics, and the existence of a stable extension (which is an NP-complete
  problem).


  3.2   Graphs

  The justification behind using Kleinberg and Watts-Strogatz models is that sev-
  eral works in the Argumentation literature investigate AAFs extracted from
  social networks [14]. However, benchmarks collected with such tools are still not
  available.
      To generate random graphs we adopted two different libraries. The first one
  is the Java Universal Network/Graph Framework (JUNG 6 ), which is a Java soft-
  ware library for the modelling, generation, analysis and visualization of graphs.
  With JUNG we generate Kleinberg [15] graphs. The second library we use is Net-
  workX 7 , and it consists of a Python software package for the creation, manipu-
   3
     http://www.dmi.unipg.it/conarg/
   4
     http://www.jacop.eu
   5
     http://www.gecode.org
   6
     http://jung.sourceforge.net
   7
     http://networkx.github.io



                                          42
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

                 Model/Nodes Edges Shortest Path Clustering C. Diam. InDeg. Cycles Min-Max Deg.
                   KL/16      47        1.6           0.3       2.9    5     Yes       5-11
                   KL/25      74        1.9          0.19        3     5     Yes       5-11
                   KL/36      107       2.2          0.14       3.9    5     Yes       5-11
                   KL/49      146       2.4          0.11        4     5     Yes       5-11
                   KL/64      191      2.57           0.8       4.2    5     Yes       5-12
                   KL/81      242       2.7          0.07       4.8    5     Yes       5-11
                   WS/25      50        2.4          0.22       4.7    2     Yes        2-8
                   WS/50      100       3.4          0.28       6.7    2     Yes        2-8
                   WS/80      240       2.6          0.09       4.9    3     Yes       3-13
                  WS/100      400       2.4          0.12        4     4     Yes       4-15


  Table 2: Analysis of the generated random-AFs: values are averaged over the
  generated 100 AFs in each class. The considered models are Kleinberg (KL) and
  Watts-Strogatz (WS).



  lation, and study of the structure, dynamics, and functions of complex networks.
  With NetworkX we generate Watts-Strogatz [18] graphs.
       The Kleinberg [15] graph-model adds a number of directed long-range ran-
  dom links to an n × n lattice network. Links have a non-uniform distribution
  that favours edges to close nodes over more distant ones (in the number of hops).
  In the implementation provided by JUNG, each node u has four local connec-
  tions, one to each of its neighbours, and in addition, one or more long-range
  connections to some node v, where v is randomly chosen according to probabil-
  ity proportional to d−θ where d is the lattice distance between u and v and θ is
  the clustering exponent. In our generation we set θ = 0.9, in order to have a high
  clustering coefficient. Given a node, each link is directed towards its neighbours:
  edges are created in both directions between neighbours. Each long-distance edge
  has the tail in the considered node.
       The Watts-Strogatz model [18] consists in a ring over n nodes. each node
  in the ring is connected with its k nearest neighbours (k − 1 neighbours if k is
  odd). Then shortcuts are created by replacing some edges as follows: for each
  edge (u, v) in the underlying “n-ring with k nearest neighbours with probability
  p replace it with a new edge (u, w) with uniformly random choice of existing
  node w. Varying p makes it possible to interpolate between a regular lattice
  (p = 0) and an Erdős-Rényi graph (p = 1). In our graph generation we set
  k = (n/10) − 2 and p = 0.1: in this way we obtain a high clustering coefficient
  (the max is with k = n/2, i.e., a complete graph) without increasing the number
  of edges (attacks) too much; we also obtain a graph structure closer to a lattice (p
  is low). Note that, since NetworkX generates undirected Watts-Strogatz graphs,
  we orient each edge in one of the two directions (0.5 of probability each).
       For each set of 100 networks we also collected the following parameters, shown
  in Tab. 2: the Average Number of Edges, the Average Shortest Path (between
  all the couples of nodes), the Average Clustering Coefficient (the fraction of
  all the possible triangles through a node), the Average Diameter, the Average
  InDegree, the presence of Simple Cycles (closed paths where no node appears
  twice, except that the first and last node are the same), and the Max and Min
  degree for a node over the whole class.


                                                    43
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

                                                                                   Credulous

                                 Kleinberg - Stable                    Kleinberg - Admissible                            Kleinberg - Complete
                       50                                   200 50                                      200                                          100
                                                                                                              240
                       45                                   180 45                                      180 220                                      90
 Avg CPU Time (sec.)




                       40                                   160 40                                      160 200                                      80
                                                                                                        140 180




                                                                                                                                                           % Unsuccessful
                       35                                   140 35                                                                                   70
                                                                                                            160
                       30                                   120 30                                      120                                          60
                                                                                                            140
                       25                                   100 25                                      100 120                                      50
                       20                                   80   20                                     80 100                                       40
                       15                                   60   15                                     60    80                                     30
                                                                                                              60
                       10                                   40   10                                     40                                           20
                                                                                                              40
                       5                                    20   5                                      20    20                                     10
                       0                                    0    0                                      0      0                                     0
                            36      49      64        81              25      36        49        64                16           25             36

                                                                                    #Nodes


                                  Watts - Stable                           Watts - Admissible                             Watts - Complete
                                                            100 70                                      100 120                                      100
                       24
                       22                                   90                                          90                                           90
                                                                 60                                           100
 Avg CPU Time (sec.)




                       20                                   80                                          80                                           80
                       18                                        50




                                                                                                                                                           % Unsuccessful
                                                            70                                          70                                           70
                                                                                                              80
                       16
                                                            60                                          60                                           60
                       14                                        40
                       12                                   50                                          50    60                                     50
                                                                 30
                       10                                   40                                          40                                           40
                       8                                                                                      40
                                                            30   20                                     30                                           30
                       6
                                                            20                                          20                                           20
                       4                                         10                                           20
                       2                                    10                                          10                                           10
                       0                                    0    0                                      0      0                                     0
                            25       50          80   100             25       50            80   100               25           50             80

                                                                                    #Nodes


            Fig. 2: Avg. time dynPARTIX (                                           ), ConArg2 (                    ), % Unsuc. instances dyn-
            PARTIX ( ).



            4               Tests and Discussion
            Performance results have been collected on an Intel(R) Core(TM) i7 CPU 970
            @3.20GHz (6 core, 2 threads per core), and 16GB of RAM. For both the tools,
            the output has been redirected to /dev/null, and the standard error to file.
            To test dynPARTIX we adopted its 64-bit version, by calling commands like
            ./dynpartix -f barabasi graph -s admissible --skept d. Flag -f speci-
            fies the input file, -s the considered semantics (admissible in this case), and
            --skept sets argument with id d to be checked for sceptical acceptance. We
            could flag -n semi, i.e., the semi-normalised tree-decomposition (more perfor-
            mant than the default normalised one, as stated by the authors of dynPARTIX)
            only for the admissible semantics, because it is not currently implemented for
            the other two semantics. We set a timeout of 300 seconds to interrupt the search
            of each of the two tools.
                In Fig. 2 and Fig. 3 we show the tests collected on the whole database pre-
            sented in Tab. 2, for the credulous and sceptical acceptance respectively. For
            each of the reported number of nodes (on the x axis), the left y axis reports the
            CPU time averaged over 100 different instances of AAFs, and 10% random ar-
            guments chosen on that class. Acceptance and non-acceptance have been forced
            to be equally distributed within such random sample (5% each). On the right
            y axis we also report the percentage of instances that are not solved within the
            timeout (“% Unsuccessful”).


                                                                                      44
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

                                                                          Sceptical

                                          Kleinberg - Stable                                Watts - Stable
                                60                                  100                                            100
                                                                                  24
                                                                    90            22                               90
                                50
          Avg CPU Time (sec.)




                                                                    80            20                               80
                                                                                  18




                                                                                                                         % Unsuccessful
                                                                    70                                             70
                                40
                                                                                  16
                                                                    60                                             60
                                                                                  14
                                30                                  50            12                               50
                                                                    40            10                               40
                                20                                                8
                                                                    30                                             30
                                                                                  6
                                                                    20                                             20
                                10                                                4
                                                                    10            2                                10
                                0                                   0             0                                0
                                     36      49      64        81                      25     50        80   100


  Fig. 3: Avg. time dynPARTIX (                                           ), ConArg2 (             ), % Unsuc. instances dyn-
  PARTIX ( ).



     As we can appreciate from Fig. 2 and Fig. 3, we can state that constraint
  propagation in ConArg2 works very well with credulous/sceptical acceptance
  of arguments: most of the problems are solved almost instantaneously, while
  dynPARTIX is not able to return an answer within the timeout. Note that the
  performance of dynPARTIX on sceptical acceptance are proven to be better
  (with low tree-width graphs) or comparable (with high tree-width graphs) to
  the performance of ASPARTIX, while ASPARTIX works definitely better with
  high tree-width and credulous acceptance [9].


  5      Conclusion
  In the paper we have compared two reasoners (dynPARTIX and ConArg2). The
  main goal has been to study how efficiently state-of-the-art reasoners behave
  on hard problems related to credulous and sceptical acceptance in lower-order
  semantics, i.e., admissible, complete, and stable.
      In the future we will implement in ConArg2 all the other hard problems re-
  lated to higher-order semantics [16, Ch. 5]; in particular, credulous/sceptical
  acceptance in preferred (NP-c/Π2P -c), semi-stable (Σ2P -c/Π2P -c), and stage se-
  mantics (Σ2P -c/Π2P -c), with the purpose to compare our tool with dynPARTIX
  again, but also with CEGARTIX8 [11], since it computes sceptical acceptance
  for the preferred semantics, and both sceptical and credulous acceptance for
  semi-stable and stage semantics. Moreover, in order to have an engine as more
  comprehensive as possible, we plan to solve other hard problems (not currently
  implemented in any other solver) related to the preferred semantics, e.g., its
  verification (co-NP-complete), and non-emptiness (NP-complete).
      To solve higher-order semantics, we will need to work on branch-and-bound
  search itself, with the result to better manage maximality/minimality of set
  inclusion directly at the search level; the reason is that it is usually not possible
  to express such requirements as constraints.
   8
       http://www.dbai.tuwien.ac.at/proj/argumentation/cegartix/



                                                                            45
S.Bistarelli et al. Testing Credulous and Sceptical Acceptance in Small-World Networks

  References
   1. A. L. Barabasi and R. Albert. Emergence of scaling in random networks. Science,
      286(5439):509–512, 1999.
   2. S. Bistarelli, F. Rossi, and F. Santini. Benchmarking hard problems in random
      abstract AFs: The stable semantics. In Computational Models of Argument - Pro-
      ceedings of COMMA, volume 266 of FAIA, pages 153–160. IOS Press, 2014.
   3. S. Bistarelli, F. Rossi, and F. Santini. Efficient solution for credulous/sceptical
      acceptance in lower-order Dung’s semantics. In 26th International Conference on
      Tools with Artificial Intelligence, ICTAI, pages 800–804. IEEE Computer Society,
      2014.
   4. S. Bistarelli, F. Rossi, and F. Santini. Enumerating extensions on random abstract-
      afs with argtools, aspartix, conarg2, and dung-o-matic. In Computational Logic in
      Multi-Agent Systems - 15th International Workshop, CLIMA XV, volume 8624 of
      LNCS, pages 70–86. Springer, 2014.
   5. S. Bistarelli, F. Rossi, and F. Santini. A first comparison of abstract argumen-
      tation reasoning-tools. In ECAI 2014 - 21st European Conference on Artificial
      Intelligence, volume 263 of FAIA, pages 969–970. IOS Press, 2014.
   6. S. Bistarelli and F. Santini. A common computational framework for semiring-
      based argumentation systems. In ECAI 2010 - 19th European Conference on Ar-
      tificial Intelligence, volume 215 of FAIA, pages 131–136. IOS Press, 2010.
   7. S. Bistarelli and F. Santini. Conarg: A constraint-based computational frame-
      work for argumentation systems. In 23rd International Conference on Tools with
      Artificial Intelligence, ICTAI, pages 605–612. IEEE Computer Society, 2011.
   8. P. M. Dung. On the acceptability of arguments and its fundamental role in
      nonmonotonic reasoning, logic programming and n-person games. Artif. Intell.,
      77(2):321–357, 1995.
   9. W. Dvořák, M. Morak, C. Nopp, and S. Woltran. dynpartix- A dynamic pro-
      gramming reasoner for abstract argumentation. In Applications of Declarative
      Programming and Knowledge Management, pages 259–268. Springer, 2013.
  10. W. Dvorák, R. Pichler, and S. Woltran. Towards fixed-parameter tractable algo-
      rithms for abstract argumentation. Artif. Intell., 186:1–37, 2012.
  11. W. Dvořák, M. Järvisalo, J. P. Wallner, and S. Woltran. Complexity-sensitive
      decision procedures for abstract argumentation. Artif. Intell., 206:53–78, Jan. 2014.
  12. U. Egly, S. A. Gaggl, and S. Woltran. Answer-set programming encodings for
      argumentation frameworks. Argument & Computation, 1(2):147–177, 2010.
  13. P. Erdős and A. Rényi. On the evolution of random graphs. Bulletin of the
      International Statistical Institute, 38(4):343–347, 1961.
  14. S. Gabbriellini and P. Torroni. Arguments in social networks. In Proceedings of the
      2013 International Conference on Autonomous Agents and Multi-agent Systems,
      AAMAS ’13, pages 1119–1120. IFAAMAS, 2013.
  15. C. Martel and V. Nguyen. Analyzing Kleinberg’s (and other) small-world mod-
      els. In Proceedings of the ACM symposium on Principles of distributed computing,
      PODC, pages 179–188. ACM, 2004.
  16. I. Rahwan and G. R. Simari. Argumentation in Artificial Intelligence. Springer
      Publishing Company, Incorporated, 1st edition, 2009.
  17. F. Rossi, P. van Beek, and T. Walsh. Handbook of Constraint Programming (Foun-
      dations of Artificial Intelligence). Elsevier Science Inc., 2006.
  18. D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks.
      Nature, 393(6684):440–442, 1998.




                                            46