<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The ingredients of the argumentation reasoner pyglaf: python, circumscription, and glucose to taste</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mario Alviano</string-name>
          <email>alviano@mat.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics and Computer Science, University of Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <kwd-group>
        <kwd>abstract argumentation frameworks</kwd>
        <kwd>propositional circumscription</kwd>
        <kwd>minimal model enumeration</kwd>
        <kwd>incremental solving</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        accepted arguments, or on some other property of the extensions. Specifically,
grounded extensions [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] are subset-minimal with respect to the accepted
arguments, and conversely preferred extensions [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and ideal extensions [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] are
subset-maximal with respect to the accepted arguments. Other semantics of this
kind are semi-stable extensions [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and stage extensions [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], which require to
maximize the set of arguments in the range of the accepted arguments, that is,
those accepted and those attacked by some accepted argument.
      </p>
      <p>
        Circumscription [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] is a nonmonotonic logic formalizing common sense
reasoning by means of a second order semantics, which essentially enforces to
minimize the extension of some predicates. In the special case of propositional
theories, the simplest form of circumscription essentially selects subset minimal
models, while in the form introduced by Lifschitz [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] some atoms are used to
group interpretations, and other atoms are subject to minimization. With a
little abuse on the definition of circumscription, the minimization can be imposed
on a set of literals, so that a set of negative literals can be used to encode a
maximization objective function. Therefore, circumscription is a good candidate
as target language to solve computational problems of abstract argumentation
frameworks.
      </p>
      <p>
        This paper presents the argumentation reasoner pyglaf, which materializes
the above intuition. The reasoner is implemented in Python, and its interface is
fully compliant with the specification1 given for the Second International
Competition on Computational Models of Argumentation (ICCMA’17). pyglaf
implements linear reductions from many computational problems of abstract
argumentation framework to circumscription. The circumscribed theories are encoded
in the input format of circumscriptino [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a circumscription solver extending
the SAT solver glucose [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] with the unsatisfiable core algorithm one [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
enhanced by reiterated progression shrinking [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], native support for cardinality
constraints as in wasp [
        <xref ref-type="bibr" rid="ref20 ref5 ref6">5, 6, 20</xref>
        ], and polyspace model enumeration [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The
input format of circumscriptino is very similar to the DIMACS format, and
described on its web page (http://alviano.com/software/circumscriptino/).
The reductions are presented in Section 3, and cover all semantics mentioned in
this introduction but the ideal extension. Eventually, a linear reduction for ideal
semantics is obtained after computing the union of all admissible extensions of
the input graph; such a set is computed by means of iterative calls to the external
circumscription solver.
      </p>
      <p>
        An additional use case is given by the Dung’s Triathlon, a special track of
ICCMA’17 where the argumentation reasoners are asked to compute the grounded,
stable and preferred extensions of the input graph, in a single run of computation.
pyglaf addresses the triathlon by taking advantage of the following
observations [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]: the grounded extension is contained in all preferred extensions, and
all stable extensions are also preferred extensions. Hence, pyglaf first computes
the grounded extension, which is then used to simplify the circumscribed theory
associated with the enumeration of preferred extensions. As soon as a preferred
1 http://www.dbai.tuwien.ac.at/iccma17/SolverRequirements.pdf
a
b
c
e
d
f
extension is returned by circumscriptino, its stability is checked by means of
a linear time procedure implemented in Python.
      </p>
      <p>
        The implemented prototype is tested empirically on the instances of the
First International Competition on Computational Models of Argumentation
(ICCMA’15). For the enumeration of complete, stable, grounded, and preferred
extensions, the performance of pyglaf is almost aligned with the most efficient
argumentation reasoners of ICCMA’15. Semi-stable, stage, and ideal extensions
were not part of ICCMA’15, but they are supported by the reasoner ConArg2
[
        <xref ref-type="bibr" rid="ref10 ref11 ref12">12, 10, 11</xref>
        ], which is therefore compared with pyglaf: for the enumeration of
these extensions the performance of pyglaf is superior in terms of solved
instances as well as average running time. Finally, concerning the triathlon, the
performance of the proposed strategy is compared with the sequential addressing
of the three subproblems, showing a minimal gain in terms of solved instances
and average execution time.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        This section introduces the required background on abstract argumentation
frameworks [
        <xref ref-type="bibr" rid="ref15 ref19 ref21 ref22 ref27">21, 22, 15, 27, 19</xref>
        ] and on circumscription [
        <xref ref-type="bibr" rid="ref25 ref26">26, 25</xref>
        ].
2.1
      </p>
      <p>Abstract argumentation framework
An abstract argumentation framework (AF) is a directed graph G whose nodes
are arguments, and whose arcs represent an attack relation. Let arg (G) and
att (G) denote respectively the set of nodes and arcs in G. The size of G, denoted
|G|, is defined as the number of its nodes and arcs, that is, |G| := |arg (G)| +
|att (G)|. An extension E is a set of arguments. The range of E in G is EG+ :=
E ∪ {x | ∃yx ∈ att (G) with y ∈ E}. (When G is clear from the context, the
range of E in G is simply denoted E+.)
Example 1. Let G be the graph reported in Figure 1. Hence, arg (G) = {a, b, c, d,
e, f }, att (G) = {aa, ab, ba, cd, dc, ce, de, ef }, and |G| = 6 + 8 = 14. The following
are some extensions of G that will be used later in the paper: E1 = ∅, E2 = {d, f },
E3 = {b, d, f }, E4 = {b}, E5 = {b, c, f }, and E6 = {c, f }. The associated ranges
are the following: E1+ = ∅, E2+ = {c, d, e, f }, E3+ = {a, b, c, d, e, f }, E4+ = {a, b},
E5+ = {a, b, c, d, e, f }, and E6+ = {c, d, e, f }.</p>
      <p>Let G be an AF, and E ⊆ arg (G). The following semantics are of interest for
this paper:
– E is conflict-free if there are no x, y ∈ E with xy ∈ att (G). Let CF(G)
denote the set of conflict-free extensions of G.
– E is admissible if E ∈ CF(G), and for all yx ∈ att (G) such that x ∈ E, there
is zy ∈ att (G) such that z ∈ E. Let ADM(G) denote the set of admissible
extensions of G.
– E is complete if E ∈ ADM(G), and satisfies the following property: if x ∈
arg (G) is such that for all yx ∈ att (G) there is zy ∈ att (G) with z ∈ E, then
x ∈ E. Let CO(G) denote the set of complete extensions of G.
– E is stable if E ∈ CO(G), and EG+ = arg (G). Let ST(G) denote the set of
stable extensions of G.
– E is grounded if E ∈ CO(G), and there is no E ∈ CO(G) such that E ⊂ E.</p>
      <p>Let GR(G) denote the set of grounded extensions of G.
– E is preferred if E ∈ CO(G), and there is no E ∈ CO(G) such that E ⊃ E.</p>
      <p>Let PR(G) denote the set of preferred extensions of G.
– E is semi-stable if E ∈ CO(G), and there is no E ∈ CO(G) such that</p>
      <p>E +G ⊃ EG+. Let SST(G) denote the set of semi-stable extensions of G.
– E is stage if E ∈ CF(G), and there is no E ∈ CF(G) such that E +G ⊃ EG+.</p>
      <p>Let STG(G) denote the set of stage extensions of G.
– E is ideal if E ∈ ADM(G), E ⊆ PR(G), and there is no E ∈ ADM(G)
such that E ⊆ PR(G) and E ⊃ E. Let ID(G) denote the set of ideal
extensions of G.</p>
      <p>In particular, the last seven semantics above are those considered in the
Second International Competition on Computational Models of Argumentation
(ICCMA’17).</p>
      <p>Example 2 (Continuing Example 1). The set of complete extensions of G is
EC3+O(=GE)5=+ ={Ea1r,g.(. G.,)E.T6}h.eEse3 aarnedalEso5 tahree
palrseofetrhreeds,tsaebmlei-esxtatebnles,ioannsdosftGagebeecxatuensesions of G. E1 is evidently the grounded extension. Finally, the ideal extension
is {b}.</p>
      <p>For an argument x ∈ arg (G), and a set S of extensions, x is credulously
accepted in S, denoted S |=c x, if there is E ∈ S such that x ∈ E. Argument x
is skeptically accepted in S, denoted S |=s x, if x ∈ E for all E ∈ S.
Example 3 (Continuing Example 2). S |=s b and S |=s f holds for S being
ST(G), PR(G), SST(G), STG(G). For the same S, S |=c d and S |=c c, but
S |=s d and S |=s c.
2.2</p>
      <p>Circumscription
Let A be a fixed, countable set of atoms including ⊥. A literal is an atom possibly
preceded by the connective ¬. For a literal , let denote its complementary
literal, that is, p = ¬p and ¬p = p for all p ∈ A; for a set L of literals, let L be
{ | ∈ L}. Moreover, for a set L of literals and a set A of atoms, the restriction
of L to symbols in A is L|A := L ∩ (A ∪ A).</p>
      <p>Formulas are defined as usual by combining atoms and the connectives ¬,
∧, ∨, →, ↔. A theory is a set T of formulas including ¬⊥; the set of atoms
occurring in T is denoted by atoms(T ). The size of formulas and theories is
defined as the number of occurring literals; formally: for p ∈ A, |p| := 1; for φ
and ψ formulas, and ◦ ∈ {∧, ∨, →, ↔}, |¬φ| := |φ|, and |φ ◦ ψ| := |φ| + |ψ|; for
a theory T , |T | := φ∈T |φ|.</p>
      <p>An assignment is a set A of literals such that A ∩ A = ∅. An interpretation
for a theory T is an assignment I such that (I ∪ I) ∩ A = atoms(T ). Relation
|= is defined as usual: for p ∈ A, I |= p if p ∈ I; for φ and ψ formulas, I |= ¬φ
if I |= φ, I |= φ ∧ ψ if I |= φ and I |= ψ, I |= φ ∨ ψ if I |= φ or I |= ψ, and
I |= φ → ψ if I |= ψ whenever I |= φ; I |= φ ↔ ψ if I |= ψ whenever I |= φ, and
vice versa; for a theory T , I |= T if I |= φ for all φ ∈ T . I is a model of a theory
T if I |= T . Let models(T ) denote the set of models of T . (Models will be also
represented by the set of their atoms, as their negative literals are implicit.)
Example 4. Let T1 be the theory {¬⊥, a ∨ b, c ∨ d → ¬a ∧ b}. The size of T1 is
|T1| = 1 + 2 + 4 = 7. The models of T1 are the following: {a}, {b}, {a, b}, {b, c},
{b, d}, and {b, c, d}.</p>
      <p>Circumscription applies to a theory T , a set P of literals, and a set Z of
atoms; literals in P are subject to minimization, while atoms in Z are irrelevant.
Formally, relation ≤P Z is defined as follows: for I, J interpretations of T , I ≤P Z
J if both I|A\(P ∪P ∪Z) = J |A\(P ∪P ∪Z) and I ∩ P ⊆ J ∩ P . I ∈ models(T ) is a
preferred model of T with respect to ≤P Z if there is no J ∈ models(T ) such that
I ≤P Z J and J ≤P Z I. Let CIRC (T, P, Z) denote the set of preferred models of
T with respect to ≤P Z .</p>
      <p>Example 5 (Continuing Example 4). CIRC (T1, {a, b, c, d}, ∅) contains the
minimal models of T1: {a}, and { }</p>
      <p>b . Minimization can be restricted to few atoms:
CIRC (T1, {b}, {a, c, d}) contains only { }
a . Atoms not in P nor in Z are used
to group interpretations: CIRC (T1, {b}, {c, d}) contains {a}, but also { }
b , {b, c},
{b, d}, and {b, c, d}. Finally, CIRC (T1, {¬a, ¬b}, {d}) contains the following
models: {a, b}, {b, c}, and {b, c, d}.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Linear reductions</title>
      <p>The constructions presented in this section associate arguments of the input AF
G with atoms of a theory T , so to have a trivial one-to-one mapping between
extensions of G and models of T . In particular, a set S of extensions of G and a
set S of models of T are said equivalent with respect to G, denoted S ≡G S , if
S = {I ∩ arg (G) | I ∈ S }.</p>
      <p>In order to maintain the theory compact, additional atoms are possibly
introduced. Specifically, for each argument x, an atom ax is possibly introduced
to represent that x is attacked by some argument that belongs to the computed
extension:

ax ↔
yx∈att(G)
y
x ∈ arg (G)
Note that if there is no yx ∈ att (G), then yx∈att(G) y is essentially ⊥, that
is, atom ax is constrained to be false. Other atoms possibly introduced by our
constructions are of the form rx, to enforce that argument x belongs to the range
EG+ of the computed extension E:</p>
      <p>
attacked (G ) := </p>
      <p>
range(G ) := 
(1)
(2)
(3)
(4)

 (5)

(6)

rx → x ∨
yx∈att(G)
y
x ∈ arg (G)
Example 6 (Continuing Example 2). For the graph G in Figure 1, the following
formulas are possibly introduced:
S1 := {aa ↔ a ∨ b, ab ↔ a, ac ↔ d, ad ↔ c, ae ↔ c ∨ d, af ↔ e};
S2 := {ra → a ∨ b, rb → b ∨ a, rc → c ∨ d, rd → d ∨ c, re → e ∨ c ∨ d, rf → f ∨ e}.
In fact, note that S1 is attacked (G), and S2 is range(G).</p>
      <p>The notion of conflict-free, admissible, complete, and stable extensions are
encoded by the following sets of formulas:
conflict -free(G) := {¬⊥} ∪ {¬x ∨ ¬y | xy ∈ att (G)}
admissible(G) := conflict -free(G) ∪ attacked (G) ∪ {x → ay | yx ∈ att (G)}


complete(G) := admissible(G) ∪ 

ay → x</p>
      <p>x ∈ arg (G)
</p>
      <p>yx∈att(G)
stable(G) := complete(G) ∪ range(G) ∪ {rx | x ∈ arg (G)}
In particular, note that in (4) truth of an argument x implies that all
arguments attacking x are actually attacked by some true argument. In (5), instead,
whenever all attackers of an argument x are attacked by some true argument,
argument x is forced to be true. Finally, in (6) all atoms of the form rx are
forced to be true, so that the range of the computed extension has to cover all
arguments.</p>
      <p>Example 7 (Continuing Example 6). Consider the following sets of formulas:
S3 := {¬⊥, ¬a, ¬a ∨ ¬b, ¬c ∨ ¬d, ¬c ∨ ¬e, ¬d ∨ ¬e, ¬e ∨ ¬f };
S4 := {a → aa, a → ab, b → aa, c → ad, e → ac, d → ac, e → ad, f → ae};
S5 := {aa ∧ ab → a, aa → b, ad → c, ac → d, ac ∧ ad → e, ae → f }.</p>
      <p>Note that S3 is conflict -free(G), S3 ∪ S1 ∪ S4 is admissible(G), S3 ∪ S1 ∪ S4 ∪ S5
is complete(G), and S3 ∪ S1 ∪ S4 ∪ S5 ∪ S2 ∪ {ra, rb, rc, rd, re, rf } is stable(G).</p>
      <p>The following circumscribed theories capture the complete, stable, grounded,
preferred, semi-stable, and stage semantics of G:
co(G) := CIRC (complete(G), ∅, Z)
st (G) := CIRC (stable(G), ∅, Z)
gr (G) := CIRC (complete(G), arg (G), {ax | x ∈ arg (G)})
pr (G) := CIRC (complete(G), arg (G), {ax | x ∈ arg (G)})
sst (G) := CIRC (complete(G) ∪ range(G), {¬rx | x ∈ arg (G)}, Z)
stg (G) := CIRC (conflict -free(G) ∪ range(G), {¬rx | x ∈ arg (G)}, Z)
(7)
(8)
(9)
(10)
(11)
(12)
where Z is arg (G) ∪ {ax | x ∈ arg (G)}. Note that the notion of complete and
stable extensions does not really involve any preference relation, and therefore
the set of literals to be minimized is empty in (7) and (8). Grounded and preferred
extensions are instead obtained by imposing complementary objective literals:
true arguments are minimized in (9) to capture grounded extensions, and false
arguments are minimized in (10) to capture preferred extensions. Finally, in (11)
and (12) false atoms in the range of the computed extensions are minimized,
where computed extensions are respectively complete extensions and
conflictfree extensions.</p>
      <p>Example 8 (Continuing Example 7). Let Z be {a, b, c, d, e, f, aa, ab, ac, ad, ae, af }.
It can be checked that CIRC (S3 ∪ S1 ∪ S4 ∪ S5, ∅, Z) contains, for i ∈ [1..6], the
model Ei ∪ {ax | x ∈ Ei+}, and only these models. Similar for the other
circumscribed theories resulting by applying (8)–(12) to graph G in Figure 1.</p>
      <p>
        The ideal semantics cannot be captured by reductions similar to those above.
However, every AF G is associated with a unique ideal extension, which can be
equivalently defined as follows (Proposition 3.6 by Caminada [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]): Let X be
the set of admissible extensions of G that are not attacked by any admissible
extensions, that is, X := {E ∈ ADM(G) | E ∈ ADM(G) such that yx ∈
att (G), x ∈ E, y ∈ E }. E is the ideal extension of G if E ∈ X, and there is no
E ∈ X such that E ⊇ E. Hence, assuming that the union U of all admissible
extensions of G is provided in input, the following linear construction can be
defined:
id (G, U ) := CIRC (admissible(G) ∪ arg (G) \ Y , Y , ∅)
(13)
where Y is U \ {x | ∃yx ∈ att (G), y ∈ U }.
      </p>
      <p>Example 9 (Continuing Example 7). The union of all admissible extensions of
graph G in Figure 1 is U = {b, c, d, f }. Hence, Y = {b, f }, and id (G, U ) is
CIRC (S3 ∪ S1 ∪ S4 ∪ {¬a, ¬c, ¬d, ¬e}, {¬b, ¬f }, ∅) = {{b}}.
3.1</p>
      <p>Properties
Correctness of the reductions presented in this section is a direct consequence of
the fact that equations (3)–(6) encode the definitions of conflict-free, admissible,
complete, and stable extensions in propositional logic.</p>
      <p>Theorem 1 (Correctness). Let G be an AF. The following equivalences hold:
CO(G) ≡G co(G), ST(G) ≡G st (G), GR(G) ≡G gr (G), PR(G) ≡G pr (G),
SST(G) ≡G sst (G), STG(G) ≡G stg (G), and ID(G) ≡G id (G, E∈ADM(G) E).</p>
      <p>Compactness of the reductions follows from the fact that equations (3)–(6)
have linear size with respect to the size of G.</p>
      <p>Theorem 2 (Compactness). Let G be an AF. The size of the theories in
(7)–(13) is linear in |G|.</p>
      <p>Credulous acceptance can be also reduced to circumscription for complete,
stable, and preferred extensions.</p>
      <p>Theorem 3 (Credulous). Let G be an AF, and x be an argument. The
following properties hold:
– CO(G) |=c x iff CIRC (complete(G)∪{x}, ∅, arg (G)∪{ay | y ∈ arg (G)}) = ∅;
– ST(G) |=c x iff CIRC (stable(G) ∪ {x}, ∅, arg (G) ∪ {ay | y ∈ arg (G)}) = ∅;
– PR(G) |=c x iff CIRC (complete(G) ∪ {x}, arg (G), {ax | x ∈ arg (G)}) = ∅.</p>
      <p>Similarly, skeptical acceptance can be reduced to circumscription for
complete, and stable extensions.</p>
      <p>Theorem 4 (Skeptical). Let G be an AF, and x be an argument. The following
properties hold:
– CO(G) |=s x iff CIRC (complete(G)∪{¬x}, ∅, arg (G)∪{ay | y ∈ arg (G)}) = ∅;
– ST(G) |=s x iff CIRC (stable(G) ∪ {¬x}, ∅, arg (G) ∪ {ay | y ∈ arg (G)}) = ∅.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Implementation</title>
      <p>The reductions presented in the previous section have been implemented in the
reasoner pyglaf (http://alviano.com/software/pyglaf/). The underlying
programming language is Python, and the external circumscription solver is
circumscriptino. The communication between pyglaf and circumscriptino is
handled in the simplest possible way, that is, via stream processing. This
design choice is principally motivated by the fact that the communication is often
minimal, limited to a single invocation of the circumscription solver.</p>
      <p>The interface of pyglaf is fully compliant with the specification given for
the Second International Competition on Computational Models of
Argumentation (ICCMA’17). Abstract argumentation frameworks can be encoded in
trivial graph format (tgf) as well as in aspartix format (apx). The following data</p>
      <p>Algorithm 1: Compute the union of admissible extensions of an AF G
1 T := admissible(G); // fix the underlying theory
2 Z := arg(G) ∪ {ax | x ∈ arg(G)}; // fix the set of irrelevant atoms
3 U := ∅; // initialize the union of all admissible extensions
4 repeat
5 Compute I ∈ CIRC (T, arg(G) \ U, Z); // prefer arguments not in U
6 I := I ∩ arg(G); // restrict to arguments of G
7 U := U ∪ I; // possibly extend the union
8 until I ⊆ U; // terminate when no argument is added to U
structures are populated during the parsing of the input graph G: a list arg
of the arguments in arg (G); a dictionary argToIdx, mapping each argument x
to its position in arg; a dictionary att, mapping each argument x to the set
{y | xy ∈ att (G)}; a dictionary attR, mapping each argument x to the set
{y | yx ∈ att (G)}. The first element of the list arg, in position 0, is not used to
simplify the alignment between arguments of G and variables of the produced
circumscribed theory. Within these data structures, the theories in (7)–(13) can
be constructed in amortized linear time. Actually, their CNF representation is
easily built without introducing any additional atom, as all formulas in the
previous section are either implications of the form A → B, or equivalences of
the form p ↔ A, where p is an atom and A, B are sets of literals.
Ideal extension. The linear reduction for the computation of the ideal extension
requires the union of all admissible extensions as an input parameter. Such a
set U is computed by means of Algorithm 1. Initially, U is empty, and
circumscriptino is asked to compute a first admissible extension that maximize
the accepted arguments. The accepted arguments are then added to U , another
admissible extension is computed by circumscriptino. However, this time the
maximization only involves the arguments that do not belong to U , so to expand
U as much as possible. This process is repeated until the admissible extension
returned by circumscriptino is covered by set U , as such extension witnesses
that all admissible extensions are a subset of U .</p>
      <p>Credulous and skeptical acceptance. Credulous acceptance is addressed according
to Theorem 3 for complete, stable, and preferred extensions. Similarly,
skeptical acceptance is addressed according to Theorem 4 for complete, and stable
extensions. Grounded and ideal extensions are unique, and therefore credulous
(and skeptical) acceptance are addressed by checking the presence of the query
argument in the computed extension. Actually, for the ideal extension, a
negative answer is possibly produced already if the query argument is not part of
the union of all admissible extensions. The remaining acceptance problems are
addressed naively by extension enumeration.</p>
      <p>
        Dung’s Triathlon. The triathlon is addressed by Algorithm 2 based on the
following observations: the grounded extension is contained in every preferred
extension (Theorem 25 by Dung [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]), and every stable extension is a preferred
      </p>
      <p>
        Algorithm 2: Grounded, stable and preferred extensions of G
1 Compute Igr ∈ co(G); // first of all, compute the grounded extension
2 stable := ∅; // initialize the set of stable extensions
3 preferred := ∅; // initialize the set of preferred extensions
// simplification: Igr is contained in all preferred extensions
4 T := complete(G) ∪ {x ∈ arg(G) | x ∈ Igr}; P := arg(G); Z := {ax | x ∈ arg(G)};
5 for I ∈ CIRC (T, P, Z) do // enumerate preferred extensions
6 preferred := preferred ∪ {I}; // found new preferred extension
7 if for all x ∈ arg(G) \ I there is yx ∈ att(G) such that y ∈ I then
8 stable := stable ∪ {I}; // the preferred extension is also stable
9 return (Igr, stable, preferred);
extension (Lemma 15 by Dung [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]). Accordingly, the algorithm starts by
computing the unique grounded extension Igr of the input graph. After that, a theory
whose models are complete extensions is built, and simplified by enforcing truth
of all arguments in Igr. The objective literals are the negation of all arguments,
so that preferred extensions will be computed by circumscriptino. Every
preferred extension returned by circumscriptino is finally checked for stability
by means of a linear time Python function.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Experiments</title>
      <p>
        In order to assess empirically the implemented reasoner, instances from the
First International Competition on Computational Models of Argumentation
(ICCMA’15) were tested on the enumeration of all extensions for several
semantics. The performance of pyglaf is compared with the following reasoners that
participated in the competition: ArgSemSAT (version 1.0rc3; [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]) and
LabSATSolver (version 0.1; [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]), based on SAT encodings of Caminada’s labeling
approach [
        <xref ref-type="bibr" rid="ref13 ref16">13, 16</xref>
        ]; aspartix-d (version ICCMA’15; [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]), based on reductions to
answer set programming; ConArg2 (version 1.0; [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]), based on reductions to
constraint satisfaction; prefMaxSAT (version 0.1rc3; [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]), based on iterative
calls to a MaxSAT solver; prefASP (version ICCMA’15; [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]), similar to
prefMaxSAT, but based on answer set programming. The experiments were run
on an Intel Xeon 2.4 GHz with 16 GB of memory, and time and memory were
limited to 10 minutes and 15 GB, respectively.
      </p>
      <p>Complete and stable extensions. For these two semantics the set of objective
literals is empty. Aggregated results are reported on Table 1. The performance
of pyglaf is essentially aligned to the performance of ArgSemSAT and
LabSATSolver: they run out of time on the same instance of 4 st small. All
instances are solved by aspartix-d, while ConArg2 collected several timeouts.
Similar results are obtained for the enumeration of stable extensions, which was
completed for all instances by all tested reasoners but ConArg2.
Grounded and preferred extensions. For the computation of grounded and
preferred extensions the underlying propositional theory has models representing
complete extensions of the input graph. Complementary objective literals are
used: accepted arguments are minimized to obtain the grounded extension, while
nonaccepted arguments are minimized to obtain preferred extensions.
Aggregated results are reported on Table 2. The grounded extension is unique, and
computed very efficiently by pyglaf, ArgSemSAT, and LabSATSolver.
Several timeouts are instead collected by aspartix-d and ConArg2. As for
preferred extensions, a very good performance is exhibited by pyglaf,
ArgSemSAT, and LabSATSolver, running out of time only on one instance (the same
instance for which they cannot enumerate all complete extensions). Preferred
extensions can be also enumerated by the reasoners prefMaxSAT and
prefASP. The first reasoner collected several timeouts, while prefASP resulted
very efficient and solved all testcases.</p>
      <p>Other extensions and Dung’s Triathlon. The enumeration of semi-stable, stage
and ideal extensions is supported by ConArg2, but not by the other reasoners
(at least in the versions found on the web). Hence, for these two semantics
the comparison is restricted to pyglaf and ConArg2. Aggregated results are
reported on Table 3. The performance of pyglaf is in general better than that
of ConArg2, especially on the enumeration of semi-stable and ideal extensions.
Several timeouts are collected by pyglaf on the enumeration of stage extensions
due to their large number. It is interesting to observe that for the stage semantics
pyglaf requires around one order of magnitude less memory than ConArg2.
Concerning the triathlon, the improvement on the naive approach of executing
the three computational tasks sequentially is minimal: the gain is limited to one
solved instance, and few seconds of computation on average.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Related work</title>
      <p>
        There are many argumentation reasoners; the closest to the present work are
ArgSemSAT [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and LabSATSolver [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], which are based on iterative calls to
an external SAT solver. These two solvers encode in propositional logic the
Caminada’s labeling approach [
        <xref ref-type="bibr" rid="ref13 ref16">13, 16</xref>
        ], which maps each argument to a label among
in, out, and undec. A similar strategy is implemented by prefMaxSAT [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
and prefASP [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], which encode Caminada’s labeling respectively in MaxSAT
and answer set programming. pyglaf instead encodes the several semantics
of abstract argumentation framework in the language of circumscription.
Actually, equations (3)–(6) can be seen as linear representations of the propositional
theories introduced by Wallner et al. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
      <p>
        The definition of circumscription given in this paper is slightly different from
the one originally introduced by Mc Carthy [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] and by Lifschitz [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], since
minimization is enforced on a set of literals instead of a set of atoms. Actually,
it is not difficult to transform the reductions presented in this paper to the
original formalism of circumscription: replace each negative literal ¬p in P with
a fresh atom fp, and add to the theory the formula fp ↔ ¬p. However, it
is remarked here that circumscriptino can handle negative objective literals
without introducing any additional atom.
      </p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>Many semantics of abstract argumentation frameworks are naturally encoded
in the language of circumscription. Based on the comparison with some of the
best performant reasoners of ICCMA’15, the linear encodings implemented in
pyglaf appear to be a reasonable solution to the enumeration problems of
abstract argumentation frameworks. Clearly, this is subject to the availability of
an efficient solver for circumscription. Currently, circumscriptino is used, but
pyglaf can easily accommodate different solvers. Some of the acceptance
problems are currently handled naively. This condition can be significantly improved
by extending circumscriptino with native support for query answering, which
we plan to address in the near future.
core analysis. TPLP 17, 1–18 (2017)
average execution time (seconds) on solved instances, and memory consumption (MB).
semi-stable</p>
      <p>stage
pyglaf</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Model enumeration in propositional circumscription via unsatisfiable</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Answer set enumeration via assumption literals</article-title>
          . In: Adorni,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Cagnoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Gori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Maratea</surname>
          </string-name>
          , M. (eds.)
          <source>AI*IA</source>
          <year>2016</year>
          , Genova, Italy,
          <source>November 29 - December 1</source>
          ,
          <year>2016</year>
          , Proceedings. LNCS, vol.
          <volume>10037</volume>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>163</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Anytime answer set optimization via unsatisfiable core shrinking</article-title>
          .
          <source>TPLP</source>
          <volume>16</volume>
          (
          <issue>5-6</issue>
          ),
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Unsatisfiable core shrinking for anytime answer set optimization</article-title>
          . In: Sierra,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (ed.)
          <source>IJCAI</source>
          <year>2017</year>
          , Melbourne, Australia,
          <source>August 19-25</source>
          ,
          <year>2017</year>
          . pp.
          <fpage>4781</fpage>
          -
          <lpage>4785</lpage>
          . ijcai.
          <source>org</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>WASP: A native ASP solver based on constraint learning</article-title>
          . In: Cabalar,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Son</surname>
          </string-name>
          , T.C. (eds.)
          <source>LPNMR</source>
          <year>2013</year>
          , Corunna, Spain,
          <source>September 15-19</source>
          ,
          <year>2013</year>
          . Proceedings. LNCS, vol.
          <volume>8148</volume>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>66</lpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Advances in WASP</article-title>
          . In: Calimeri,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ianni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Truszczynski</surname>
          </string-name>
          , M. (eds.)
          <source>Logic Programming and Nonmonotonic Reasoning - 13th International Conference, LPNMR</source>
          <year>2015</year>
          ,
          <article-title>Lexington</article-title>
          ,
          <string-name>
            <surname>KY</surname>
          </string-name>
          , USA, September
          <volume>27</volume>
          -
          <issue>30</issue>
          ,
          <year>2015</year>
          . Proceedings. LNCS, vol.
          <volume>9345</volume>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>54</lpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A maxsat algorithm using cardinality constraints of bounded size</article-title>
          . In: Yang,
          <string-name>
            <given-names>Q.</given-names>
            ,
            <surname>Wooldridge</surname>
          </string-name>
          , M. (eds.)
          <source>IJCAI</source>
          <year>2015</year>
          ,
          <string-name>
            <given-names>Buenos</given-names>
            <surname>Aires</surname>
          </string-name>
          , Argentina,
          <source>July 25-31</source>
          ,
          <year>2015</year>
          . pp.
          <fpage>2677</fpage>
          -
          <lpage>2683</lpage>
          . AAAI Press (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Audemard</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simon</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Predicting learnt clauses quality in modern SAT solvers</article-title>
          . In: Boutilier,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (ed.)
          <source>IJCAI</source>
          <year>2009</year>
          , Pasadena, California, USA, July
          <volume>11</volume>
          -
          <issue>17</issue>
          ,
          <year>2009</year>
          . pp.
          <fpage>399</fpage>
          -
          <lpage>404</lpage>
          (
          <year>2009</year>
          ), http://ijcai.org/Proceedings/09/Papers/074.pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Beierle</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brons</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potyka</surname>
          </string-name>
          , N.:
          <article-title>A software system using a SAT solver for reasoning under complete, stable, preferred, and grounded argumentation semantics</article-title>
          . In: H¨olldobler,
          <string-name>
            <surname>S.</surname>
          </string-name>
          , Kro¨tzsch,
          <string-name>
            <given-names>M.</given-names>
            , Pen˜aloza, R.,
            <surname>Rudolph</surname>
          </string-name>
          , S. (eds.)
          <source>KI 2015: Advances in Artificial Intelligence - 38th Annual German Conference on AI</source>
          , Dresden, Germany,
          <source>September 21-25</source>
          ,
          <year>2015</year>
          , Proceedings. LNCS, vol.
          <volume>9324</volume>
          , pp.
          <fpage>241</fpage>
          -
          <lpage>248</lpage>
          . Springer (
          <year>2015</year>
          ), http://dx.doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -24489-1_
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Enumerating extensions on random abstract-afs with argtools, aspartix, conarg2, and dung-o-matic</article-title>
          . In: Bulling, N.,
          <string-name>
            <surname>van der Torre</surname>
            ,
            <given-names>L.W.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villata</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jamroga</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasconcelos</surname>
          </string-name>
          , W.W. (eds.)
          <article-title>Computational Logic in Multi-Agent Systems -</article-title>
          15th International Workshop, CLIMA XV, Prague, Czech Republic,
          <source>August 18-19</source>
          ,
          <year>2014</year>
          . Proceedings. LNCS, vol.
          <volume>8624</volume>
          , pp.
          <fpage>70</fpage>
          -
          <lpage>86</lpage>
          . Springer (
          <year>2014</year>
          ), http://dx.doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -09764-
          <issue>0</issue>
          _
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Conarg: A tool for classical and weighted argumentation</article-title>
          . In: Baroni,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Gordon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.F.</given-names>
            ,
            <surname>Scheffler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Stede</surname>
          </string-name>
          , M. (eds.)
          <source>Computational Models of Argument - Proceedings of COMMA</source>
          <year>2016</year>
          , Potsdam, Germany,
          <fpage>12</fpage>
          -
          <lpage>16</lpage>
          September,
          <year>2016</year>
          .
          <source>Frontiers in Artificial Intelligence and Applications</source>
          , vol.
          <volume>287</volume>
          , pp.
          <fpage>463</fpage>
          -
          <lpage>464</lpage>
          . IOS Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Conarg: Argumentation with constraints</article-title>
          . In: Ossowski,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Toni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Vouros</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the First International Conference on Agreement Technologies, AT</source>
          <year>2012</year>
          , Dubrovnik, Croatia,
          <source>October 15-16</source>
          ,
          <year>2012</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>918</volume>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>198</lpage>
          . CEUR-WS.org (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>On the issue of reinstatement in argumentation</article-title>
          . In: Fisher, M.,
          <string-name>
            <surname>van der Hoek</surname>
          </string-name>
          , W.,
          <string-name>
            <surname>Konev</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lisitsa</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . (eds.)
          <source>Logics in Artificial Intelligence, 10th European Conference, JELIA</source>
          <year>2006</year>
          ,
          <article-title>Liverpool</article-title>
          , UK,
          <source>September 13-15</source>
          ,
          <year>2006</year>
          , Proceedings. LNCS, vol.
          <volume>4160</volume>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>123</lpage>
          . Springer (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A labelling approach for ideal and stage semantics</article-title>
          .
          <source>Argument &amp; Computation</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carnielli</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>Semi-stable semantics</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>22</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1207</fpage>
          -
          <lpage>1254</lpage>
          (
          <year>2012</year>
          ), http://dx.doi.org/10.1093/logcom/exr033
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gabbay</surname>
            ,
            <given-names>D.M.:</given-names>
          </string-name>
          <article-title>A logical account of formal argumentation</article-title>
          .
          <source>Studia Logica</source>
          <volume>93</volume>
          (
          <issue>2-3</issue>
          ),
          <fpage>109</fpage>
          -
          <lpage>145</lpage>
          (
          <year>2009</year>
          ), http://dx.doi.org/10.1007/ s11225-009-9218-x
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vallati</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Computing preferred extensions in abstract argumentation: A sat-based approach</article-title>
          . In: Black,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Modgil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Oren</surname>
          </string-name>
          , N. (eds.) Theory and Applications of Formal Argumentation - Second International Workshop, TAFA 2013, Beijing, China,
          <source>August 3-5</source>
          ,
          <year>2013</year>
          ,
          <string-name>
            <surname>Revised</surname>
          </string-name>
          <article-title>Selected papers</article-title>
          .
          <source>LNCS</source>
          , vol.
          <volume>8306</volume>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>193</lpage>
          . Springer (
          <year>2013</year>
          ), http: //dx.doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -54373-9_
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vallati</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Argsemsat: Solving argumentation problems using SAT</article-title>
          . In: Parsons,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (eds.)
          <source>Computational Models of Argument - Proceedings of COMMA</source>
          <year>2014</year>
          ,
          <article-title>Atholl Palace Hotel, Scottish Highlands</article-title>
          , UK, September 9-
          <issue>12</issue>
          ,
          <year>2014</year>
          .
          <source>Frontiers in Artificial Intelligence and Applications</source>
          , vol.
          <volume>266</volume>
          , pp.
          <fpage>455</fpage>
          -
          <lpage>456</lpage>
          . IOS Press (
          <year>2014</year>
          ), http://dx.doi.org/10.3233/ 978-1-
          <fpage>61499</fpage>
          -436-7-455
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Charwat</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , Dvor´ak, W.,
          <string-name>
            <surname>Gaggl</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wallner</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Methods for solving reasoning problems in abstract argumentation - A survey</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>220</volume>
          ,
          <fpage>28</fpage>
          -
          <lpage>63</lpage>
          (
          <year>2015</year>
          ), http://dx.doi.org/10.1016/j.artint.
          <year>2014</year>
          .
          <volume>11</volume>
          .008
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Dodaro</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leone</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricca</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirianni</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The birth of a WASP: preliminary report on a new ASP solver</article-title>
          . In: Fioravanti,
          <string-name>
            <surname>F</surname>
          </string-name>
          . (ed.)
          <source>Proceedings of the 26th Italian Conference on Computational Logic</source>
          , Pescara, Italy,
          <source>August 31 - September 2</source>
          ,
          <year>2011</year>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>810</volume>
          , pp.
          <fpage>99</fpage>
          -
          <lpage>113</lpage>
          . CEUR-WS.org (
          <year>2011</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>810</volume>
          /paper-l06.pdf
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          (
          <year>1995</year>
          ), http://dx.doi.org/10.1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>94</issue>
          )
          <fpage>00041</fpage>
          -X
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancarella</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing ideal sceptical argumentation</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <issue>10</issue>
          -
          <fpage>15</fpage>
          ),
          <fpage>642</fpage>
          -
          <lpage>674</lpage>
          (
          <year>2007</year>
          ), http://dx.doi.org/10.1016/j.artint.
          <year>2007</year>
          .
          <volume>05</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Faber</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vallati</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Solving set optimization problems by cardinality optimization with an application to argumentation</article-title>
          . In: Kaminka,
          <string-name>
            <given-names>G.A.</given-names>
            ,
            <surname>Fox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Bouquet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            , Hu¨llermeier, E.,
            <surname>Dignum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Dignum</surname>
          </string-name>
          , F.,
          <string-name>
            <surname>van Harmelen</surname>
            ,
            <given-names>F</given-names>
          </string-name>
          . (eds.)
          <source>ECAI 2016 - 22nd European Conference on Artificial Intelligence</source>
          ,
          <volume>29</volume>
          <fpage>August</fpage>
          -2
          <source>September</source>
          <year>2016</year>
          ,
          <string-name>
            <given-names>The</given-names>
            <surname>Hague</surname>
          </string-name>
          ,
          <source>The Netherlands - Including Prestigious Applications of Artificial Intelligence (PAIS</source>
          <year>2016</year>
          ).
          <source>Frontiers in Artificial Intelligence and Applications</source>
          , vol.
          <volume>285</volume>
          , pp.
          <fpage>966</fpage>
          -
          <lpage>973</lpage>
          . IOS Press (
          <year>2016</year>
          ), http://dx.doi.org/10.3233/978-1-
          <fpage>61499</fpage>
          -672-9-966
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gaggl</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manthey</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ronca</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wallner</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Improved answerset programming encodings for abstract argumentation</article-title>
          .
          <source>TPLP</source>
          <volume>15</volume>
          (
          <issue>4-5</issue>
          ),
          <fpage>434</fpage>
          -
          <lpage>448</lpage>
          (
          <year>2015</year>
          ), http://dx.doi.org/10.1017/S1471068415000149
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Lifschitz</surname>
          </string-name>
          , V.:
          <article-title>On the satisfiability of circumscription</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>28</volume>
          (
          <issue>1</issue>
          ),
          <fpage>17</fpage>
          -
          <lpage>27</lpage>
          (
          <year>1986</year>
          ), http://dx.doi.org/10.1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>86</issue>
          )
          <fpage>90028</fpage>
          -
          <lpage>7</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>McCarthy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Circumscription - A form of non-monotonic reasoning</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>13</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>27</fpage>
          -
          <lpage>39</lpage>
          (
          <year>1980</year>
          ), http://dx.doi.org/10.1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>80</issue>
          )
          <fpage>90011</fpage>
          -
          <lpage>9</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Verheij</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Two approaches to dialectical argumentation: Admissible sets and argumentation stages</article-title>
          .
          <source>In: In Proceedings of the biannual International Conference on Formal and Applied Practical Reasoning (FAPR) workshop</source>
          . pp.
          <fpage>357</fpage>
          -
          <lpage>368</lpage>
          .
          <string-name>
            <surname>Universiteit</surname>
          </string-name>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Wallner</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weissenbacher</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Advanced SAT techniques for abstract argumentation</article-title>
          . In: Leite,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Son</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.C.</given-names>
            ,
            <surname>Torroni</surname>
          </string-name>
          , P.,
          <string-name>
            <surname>van der Torre</surname>
          </string-name>
          , L.,
          <string-name>
            <surname>Woltran</surname>
          </string-name>
          , S. (eds.)
          <article-title>Computational Logic in Multi-Agent Systems -</article-title>
          14th International Workshop, CLIMA XIV, Corunna, Spain,
          <source>September 16-18</source>
          ,
          <year>2013</year>
          . Proceedings. LNCS, vol.
          <volume>8143</volume>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>154</lpage>
          . Springer (
          <year>2013</year>
          ), http://dx.doi.org/10. 1007/978-3-
          <fpage>642</fpage>
          -40624-
          <issue>9</issue>
          _
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>