<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computing Stable and Preferred Extensions of Dynamic Bipolar Argumentation Frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gianvincenzo Alfano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Greco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Parisi</string-name>
          <email>fparisig@dimes.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Bipolar argumentation frameworks (BAFs) extend Dung's argumentation frameworks to explicitly represent the notion of support between arguments, in addition to that of attack. BAFs can be profitably used to model disputes between two or more agents, with the aim of deciding the sets of arguments that should be accepted to support a point of view in a discussion. However, since new arguments, attacks, and supports are often introduced to take into account new available knowledge, BAFs as well as the set of accepted arguments (under a given semantics) change over the time. In this paper we tackle the problem of efficiently recomputing sets of accepted arguments of dynamic BAFs (under the preferred and stable semantics). In particular, focusing on a deductive interpretation of support, we introduce an incremental algorithm that, given an initial BAF, an initial extension for it, and an update, computes an extension of the updated BAF. The experiments show that our technique is faster than computing an extension of the updated BAF from scratch.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Argumentation has emerged as one of the central fields in Artificial Intelligence [
        <xref ref-type="bibr" rid="ref12 ref42 ref44 ref6">12,
44, 6, 42</xref>
        ]. In particular, Dung’s abstract argumentation framework [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] is a simple, yet
powerful formalism for modelling disputes between two or more agents. The formal
meaning of an argumentation framework is given in terms of argumentation semantics,
which intuitively tell us the sets of arguments (called extensions) that should be accepted
to support a point of view in a discussion.
      </p>
      <p>
        Bipolar argumentation frameworks (BAFs) are an interesting extension of the Dung’s
frameworks, which allow two kinds of interactions between arguments to be modeled:
the attack relation (as in Dung’s argumentation frameworks) and the support relation.
Several interpretations of the notion of support have been proposed in the literature [
        <xref ref-type="bibr" rid="ref14 ref19 ref20 ref21 ref4 ref45">4,
19–21, 14, 45</xref>
        ] (see [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] for a comprehensive survey). In this paper, we focus on
deductive support [
        <xref ref-type="bibr" rid="ref14 ref45">14, 45</xref>
        ] which is intended to capture the following intuition: if argument
a supports argument b then the acceptance of a implies the acceptance of b, and the
non-acceptance of b implies the non-acceptance of a.
      </p>
      <p>
        Although most research in argumentation focused on static frameworks (i.e.,
frameworks not changing over the time), BAFs are often used to model dynamic systems [
        <xref ref-type="bibr" rid="ref23 ref31 ref41 ref7 ref8">8,
31, 41, 7, 23</xref>
        ]. In fact, usually a BAF represents a temporary situation, and new
arguments, attacks, and supports can be added/retracted to take into account new available
knowledge. For instance, for disputes among users of online social networks [
        <xref ref-type="bibr" rid="ref2 ref40">40, 2</xref>
        ],
arguments, attacks, and supports are continuously added/retracted by users to express
their point of view in response to the last move made by the adversaries (often
disclosing as few arguments/attacks as possible).
      </p>
      <p>
        However, the definition of evaluation algorithms for dynamic BAFs and the
analysis of the computational complexity taking into account such dynamic aspects have
been mostly neglected, whereas in these situations incremental computation techniques
could greatly improve performance. Recently, focusing on Dung’s AFs, in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] we have
proposed a technique for incrementally computing extensions for dynamic AFs. That is,
given an AF, an initial extension for it, and an update, we devised an efficient technique
for computing an extension of the updated AF.
      </p>
      <p>
        In this paper, we show that the technique proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] can be profitably used to
compute extensions of dynamic BAFs. Thus, here we address the following problem:
given a BAF B0, an initial extension E0 for it, and an update u, determine an extension
E of the updated BAF u(B0), which is obtained from B0 by applying update u.
      </p>
      <p>
        We make the following contributions:
1) We identify early-termination conditions for checking whether a given extension
for an initial BAF is still an extension for the updated BAF. When these conditions
hold, we do not need to recompute an extension of the updated BAF.
2) We build on the meta-argumentation approach proposed in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] to define a
reduction of the problem of determining an extension of an updated BAF to that of
determining an extension of a corresponding updated Dung’s argumentation framework.
3) We define an incremental algorithm for computing extensions of dynamic BAFs by
leveraging on the incremental technique proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
4) We performed an experimental analysis showing that our incremental approach
outperforms the computation from scratch, where the fastest solvers from the
International Competition on Computational Models of Argumentation (ICCMA) 1 taking
as input the Dung’s argumentation frameworks resulting from the transformation
of item 2) are used.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Bipolar Argumentation Frameworks</title>
      <p>
        We assume the existence of a set Arg of arguments. An abstract bipolar argumentation
framework (BAF for short) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] is a triple hA; ; i, where (i) A Arg is a (finite) set
whose elements are referred to as arguments, (ii) A A is a binary relation
over A whose elements are called attacks, (iii) A A is a binary relation over A
whose elements are called supports, and (iv) \ = ;. Thus, a Dung’s argumentation
framework (AF) [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] is a BAF of the form hA; ; ;i.
      </p>
      <p>An argument is an abstract entity whose role is entirely determined by its
relationships with other arguments. A BAF can be viewed as a directed graph where each node
corresponds to an argument and each edge in the graph corresponds to either an attacks
1 http://argumentationcompetition.org
Supported attack
Mediated attack
c
c
or a support. Given a BAF B, the bipolar interaction graph for B (denoted as GB) has
two kinds of edges: one for the attack relation (!) and another one for the support
relation ()), as shown in the following example.</p>
      <p>Example 1. Consider the BAF B0 = hA0; 0; 0i where :
– A0 = fa; b; c; d; e; f g;
– 0 = f(a; c); (c; b); (b; d); (d; e); (e; d); (e; e); (e; f )g;
– 0 = f(a; b)g
The bipolar interaction graph GB0 for B0 is shown in Fig.1.</p>
      <p>
        Several interpretations of the notion of support have been proposed in the
literature [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. In this paper, we focus on deductive support [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] which is intended to capture
the following intuition: if argument a supports argument b then the acceptance of a
implies the acceptance of b, and thus the non-acceptance of b implies the non-acceptance
of a. Given this interpretation of support, the coexistence of the support and attack
relations in BAFs entails that new kinds of “implicit” attacks should be considered.
      </p>
      <p>Given a BAF hA; ; i, a supported attack for an argument b 2 A by argument
a1 2 A is a sequence a1 a2 : : : an b with n 1. Note that a direct attack a1 b
is a supported attack. Thus a supported attack is a (possibly empty) chain of supports
followed by an attack. Moreover, we say that there is a mediated attack for argument a1
by argument b if there is an attack b an and a sequence of supports a1 a2 : : : an
and with n 1. Thus, for a mediated attack the chain of supports ends in an which
is attacked by b. Supported and mediated attacks are illustrated in Figure 2, where a
chain consisting of only one support is considered. The BAF of Example 1 contains a
supported attack from argument a to d, and a mediated attack from argument c to a.</p>
      <p>
        Another kind of implicit attack which we do not consider in this paper because of
the deductive interpretation of support is the secondary attack [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], which occurs when
in a BAF there is a sequence b a1 a2 : : : an with n 1. Considering supported
and secondary attacks leads to an alternative interpretation of support [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. However,
when considering a deductive interpretation of support, secondary attacks may lead
to counterintuitive results [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], though they are useful in contexts where support is
interpreted differently.
      </p>
      <p>Given a BAF hA; ; i, we say that a set S A set-attacks an argument b 2 A
iff there exists a supported or mediated attack for b by an argument a 2 S. We use S+
to denote the set of arguments set-attacked by S. Moreover, we say that a set S A
2
defends an argument a 2 A iff for each b 2 A such that fbg set-attacks a, it is the case
that S set-attacks b (i.e., b 2 S+).</p>
      <p>Given a BAF hA; ; i, a set S A is conflict-free iff there are no two arguments
a; b 2 S such that fag set-attacks b. Moreover, a conflict-free set S A is said to be
admissible iff it defends all of its arguments.</p>
      <p>Example 2. Continuing our example, for the BAF B0 of Example 1, it is easy to see
that fag defends argument b (as fag set-attacks c which set-attacks b). The set fa; bg is
conflict-free as neither a set-attacks b nor b set-attacks a, while fa; dg is not conflict-free
as a set-attacks d (by means of the supported attack (a; d)). Moreover, S = fc; d; f g
is an admissible set as it is conflict-free and S defends all of its arguments: c defends
itself from a by the mediated attack from c to a; d is defended by c, and f is defended
by d. The set of admissible sets for B0 is ff;g; fag; fcg; fa; bg; fc; dg; fc; d; f gg. 2</p>
      <p>Given a BAF hA; ; i, a preferred extension (pr) for a BAF is an admissible
set which is a maximal (w.r.t ). Furthermore, a conflict-free set S A is a stable
extension (st), if and only if it set-attacks all the arguments in A n S. (Note that this
implies that S is admissible).</p>
      <p>
        Given a BAF B and a semantics S 2 fpr, stg, we use ES (B) to denote the set of
extensions for B according to S. For the BAF B0 of Example 1, we have that the set of
the stable extensions is Est(B0) = ffc; d; f gg, while the set of the preferred extensions
is Epr(B0) = ffa; bg; fc; d; f gg. 2
Labelling. Following the approach of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], where argumentation semantics have been
characterized in terms of labelling, we define a labelling function for BAFs. A labelling
for a BAF B = hA; ; i is a total function L : A ! fIN; OUT; UNg assigning to each
argument a label: L(a) = IN means that argument a is accepted, L(a) = OUT means
that a is rejected, while L(a) = UN means that a is undecided.
      </p>
      <p>Let in(L) = fa j a 2 A ^ L(a) = INg, out(L) = fa j a 2 A ^ L(a) = OUTg,
and un(L) = fa j a 2 A ^ L(a) = UNg. In the following, we also use the triple
hin(L); out(L); un(L)i to represent the labelling L.</p>
      <p>Given a BAF B = hA; ; i, a labelling L for B is said to be admissible (or legal)
b +
if 8a 2 in(L) [ out(L) it holds that (i) L(a) = OUT iff 9 b 2 A such that a 2 f g
and L(b) = IN; and (ii) L(a) = IN iff L(b) = OUT for all b 2 A such that a 2 fbg+.
Moreover, L is a complete labelling iff conditions (i) and (ii) hold for all a 2 A.</p>
      <p>Between extensions and complete labellings there is a bijective mapping defined as
follows: for each extension E there is a unique labelling L = hE; E+; A n (E [ E+)i
and for each labelling L there is a unique extension in(L). We say that L is the labelling
corresponding to E. For instance, considering the BAF B0 of Example 1, the labelling
corresponding to the preferred extension E = fa; bg is L = hfa; bg; fc; dg; fe; f gi.</p>
      <p>In the following, we say that the status of an argument a w.r.t. a labelling L (or its
corresponding extension in(L)) is IN (resp., OUT, UN) iff L(a) = IN (resp., L(a) =
OUT, L(a) = UN). We will avoid to mention explicitly the labelling (or the extension)
whenever it is understood.
2.1</p>
      <sec id="sec-2-1">
        <title>Updates</title>
        <p>An update u for a BAF B0 allows us to change B0 into a BAF B by adding or removing
an argument, an attack, or a support. The addition (resp., deletion) of an argument a will
be denoted as +a (resp. a), whereas the addition (resp., deletion) of an attack from
a to b will be denoted as +(a ! b) (resp., (a ! b)). Moreover, the addition (resp.,
deletion) of a support from a to b will be denoted as +(a ) b) (resp., (a ) b)).</p>
        <p>We will use u(B0) to denote the BAF resulting from the application of an update u
to the initial BAF B0. For instance, for BAF B0 = hA0; 0; 0i, if u = +(f ) b), we
have that u(B0) = +(f ) b)(B0) = hA0; 0; 0 [ f(f; b)gi, while if u = (b ! d),
we have that u(B0) = hA0; 0 n f(b; d)g; 0i.</p>
        <p>Applying an update u to a BAF implies that its semantics (set of extensions or
labellings) may change. Continuing our running example, for the BAF B0 of Example
1 and the update u = +(f ) b), we have that the set of the stable extensions for the
updated BAF B = +(f ) b)(B0) is Est(B) = ffc; dgg, while the set of the preferred
extensions is Epr(B) = ffa; bg; fc; dgg. In fact, the addition of the support between
f and b entails that additional implicit attacks must be considered: a supported attack
between f and d, and a mediated one between c and f .</p>
        <p>In the following, for the sake of the presentation, we consider only feasible updates
which are defined as follows. Adding an argument as well as removing an attack/support
are feasible updates. The deletion of an argument is feasible only if a is isolated, that is
there is no argument b attacking/supporting a or being attacked/supported by a, where
a is not necessarily distinct from b. The addition of an attack (resp., support) between
a and b is feasible only if a and b are arguments of the initial BAF B0 and there is
no already a support (resp. attack) between a and b in B0. Clearly, the general updates
can be simulated by a sequence of feasible updates. For instance, an isolated argument a
can be deleted after deleting all attacks and supports involving a (by performing feasible
updates). Analogously, adding an attack or a support between an argument a in B0 and
a new argument b can be simulated as a sequence of updates of the form +b; +(a ! b)
or +b; +(a ) b).</p>
        <p>It is worth noting that if B is obtained from B0 through the addition (resp. deletion)
of a set S of isolated argument, then, let E0 be an extension for B0, it is the case that
E = E0 [ S (resp. E = E0 n S) is an extension for B that can be trivially computed.
Thus, in the following we do not discuss further updates of the form +a or a. We will
focus on updates of the forms (c ! d) and (e ) f ), where means either + or .</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3 Incremental Computation</title>
      <p>Given a BAF B0, a preferred/stable extension E0 for B0, and an update u, our approach
to recompute a preferred/stable extension E of an updated BAF u(B0) consists of the
following three main steps.
1) We identify conditions ensuring that a given extension E0 for the initial BAF B0
(under the preferred or stable semantic) is still an extension for the updated BAF
u(B0). In such case, the update u does not invalidate the initial extension E0, and
it will be immediately returned by our algorithm.</p>
      <p>In the next sections we describe in detail the three steps above.
3.1</p>
      <sec id="sec-3-1">
        <title>Early-Termination Conditions</title>
        <p>Given a BAF B0, an initial extension E0 whose corresponding labelling is L0, and an
update u, for each pair of initial statuses L0(a) and L0(b) of the arguments involved in
the update, Tables 1 – 4 tell us if E0 is still an extension after performing the update
under the preferred or stable semantics.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Proposition 1 (Extension preservation for addition/deletion of an attack/support).</title>
        <p>Let B0 be a BAF, S 2 fpr; stg a semantics, E0 2 ES (B0) an extension of B0 under
semantics S, L0 the labelling corresponding to E0, and u an update. If S is in the cell
hL0(a); L0(b)i of Table 1 and u = +(a ! b) [resp., Table 2 and u = +(a ) b);
Table 3 and u = (a ! b); Table 4 and u = (a ) b)) ], then E0 2 ES (u(B0)).</p>
        <p>If some of the conditions of Proposition 1 holds, then the given initial extension of
the initial BAF is still an extension of the updated one, and thus the above-mentioned
steps 2) and 3) can be skipped — the algorithm just returns the initial extension which
is also an extension for the updated BAF. For instance, considering the BAF B0 of
Example 1, the update u = (b ! d), and preferred extension E0 = fc; d; f g, since
L0(b) = OUT and L0(d) = IN, Table 3 says that E0 = fc; d; f g is still an extension
of the BAF u(B0). Similarly, considering u = +(c ) f ), and again the preferred
extension E0 = fc; d; f g, since L0(c) = L0(f ) = IN, Table 2 tell us that E0 is still an
extension of the updated BAF.</p>
        <p>
          Conditions similar to those of Proposition 1 were identified in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] for updates of
Dung’s AFs, where support is not considered. However, those conditions could be used
only at step 3) when applying the technique of [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] to the meta-argumentation
framework M0, that is, after performing the transformation of step 2). Therefore, to avoid to
uselessly perform step 2), we provided Proposition 1, which can be used to check for
cases for which the initial extension is preserved directly on the input BAF.
3.2
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>The Meta-Argumentation Framework</title>
        <p>Given the initial BAF B0 and an updated u for it, we define the corresponding
metaargumentation framework as follows.
update
+(a ! b)</p>
        <p>IN
L0(a) UN</p>
        <p>OUT pr,st</p>
        <p>L0(b)</p>
        <p>UN
update
(a ! b)</p>
        <p>IN NA
L0(a) UN NA</p>
        <p>OUT pr,st</p>
        <p>L0(b)
UN
NA
pr
pr, st</p>
        <p>pr
pr,st</p>
        <p>OUT
pr
pr,st
update
+(a ) b)</p>
        <p>IN pr,st
L0(a) UN</p>
        <p>OUT pr,st</p>
        <p>L0(b)
UN
pr</p>
        <p>pr,st
update
(a ) b)</p>
        <p>IN pr,st
L0(a) UN pr</p>
        <p>OUT pr,st</p>
        <p>L0(b)
UN
NA
pr</p>
        <p>OUT
NA
NA</p>
        <p>Definition 1 (Meta AF). Let B = hA; ; i be a BAF, and u an update for B of
the form u = (c ! d) or u = (e ) f ). Then, the meta-AF for B w.r.t. u is
M = hAm; mi where:
ii)
i) Am = f a j a 2 Ag [ fXa;b; Ya;b j (a; b) 2 g [
fXc;d; Yc;d j u = +(c ! d)g [
fZa;b j (a; b) 2 g [
fZe;f j u = +(e ) f )g
m = f(a; Xa;b); (Xa;b; Ya;b); (Ya;b; b) j (a; b) 2
f(c; Xc;d); (Xc;d; Yc;d) j u = +(c ! d)g [
f(b; Za;b); (Za;b; a) j (a; b) 2 g [
f(f; Ze;f ) j u = +(e ) f )g
g [</p>
        <p>As an example, the (interaction graph of the) meta AF M0 for the for the BAF B0
of Example 1 w.r.t the update u = +(f ) b) is shown in Figure 3.</p>
        <p>
          Our definition of meta-argumentation framework builds on that proposed in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and
consider additional (meta)arguments (e.g., Zf;b in Figure 3) and attacks (e.g., (b; Zf;b)
in Figure 3) that will allow us to simulate (positive) updates to be performed on BAF
B0 by means of updates performed on the corresponding the meta-AF M0. (We do not
need to add additional arguments/attack to simulate negative updates, as it is sufficient
to remove attacks already present in the original construction of [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]). The meta AF of
Definition 1 collapses to the construction of [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] if we have no updates.
        </p>
        <p>Thus, updates for a given BAFs can be modeled by means of updates for the
corresponding meta-AF, as detailed in what follows.</p>
        <p>Definition 2 (Updates for the Meta AF). Let B = hA; ; i be a BAF, and u an
update for B of the form u = (c ! d) or u = (e ) f ). The corresponding update
Ya;c
Xa;c
a</p>
        <p>Xc;b</p>
        <p>Yc;b
Za;b
d
b</p>
        <p>Xd;e
Yb;d Ye;d
Xb;d</p>
        <p>Zf;b</p>
        <p>Yd;e
Xe;d
e
f
Xe;f
Ye;f
Ye;e
um for the meta-AF M for B w.r.t. u is as follows:
um =
8+(Ze;f ; e) if u = +(e ) f )
&gt;
&gt;
&gt;&lt; (Ze;f ; e)) if u =</p>
        <p>(e ) f ))
&gt;+(Yc;d; d) if u = +(c ! d)
&gt;
&gt;: (Yc;d; d)) if u = (c ! d))</p>
        <p>Continuing our running example, the update for the meta AF M0 corresponding to
the BAF B0 of Example 1 and the update u = +(f ) b) is um = +(Zf;b; f ).</p>
        <p>
          The last ingredient we need before being ready to apply the incremental technique
of [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] is the initial extension E0m for the AF M0. It is obtained from that of initial BAF
B0 by essentially propagating the labels of the arguments in B0 as follows.
Definition 3 (Initial Extension/Labelling for the Meta AF). Given the BAF B0 =
hA; ; i and its initial labelling L0, the corresponding initial labelling L0m for the
meta-AF M0 = hAm; mi is as follows:
        </p>
        <p>For instance, with reference to Figure 3, and the preferred extension E0 = fc; d; f g
for the BAF B0 of Example 1, we have that the labelling corresponding to E0 is
L0 = hfc; d; f g; fa; b; eg; ;i, and thus L0m(Zf;b) = IN since L0m(b) = L0(b) = OUT.
Moreover, L0m(Ye;f ) = L0(e) = OUT.</p>
        <p>The following proposition characterizes the relationship between extensions of
updated BAFs and extension of updated for meta AFs.</p>
        <p>Proposition 2. Let B0 = hA; ; i be a BAF, S 2 fpr; stg a semantics, and E0 2
ES (B0) an extension of B0 under S.</p>
        <p>Let M0 be meta AF for B0 w.r.t. u, E0m the initial S-extension for M0 corresponding
to E0, and um the update for M0 corresponding to u.</p>
        <p>Then, there is E 2 ES (u(B0)) iff there is Em 2 ES (um(M0)) such that E = Em \ A.
Algorithm 1 Incr-BAF(B0; u; E0; S, SolverS )</p>
        <p>return ?;</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.3 Incremental Algorithm</title>
        <p>Given a BAF B0, a semantics S 2 fpr, stg, an extension E0 2 ES (B0), and an update
u of the form u = (a ) b) or u = (a ! b), we define an incremental algorithm
(Algorithm 1) for computing an extension E of the updated BAF u(B0), if it exists
(note that for the stable semantics, the set of extensions Est(u(B0)) of the updated AF
may be empty; in this case, the algorithm returns ?).</p>
        <p>
          Algorithm 1 works as follows. It first checks if the initial extension E0 is still an
extension of the updated BAF at Line 1, where checkP rop(B0; u; E0; S) is a function
returning true iff some of the conditions of Proposition 1 holds. If this is the case, it
immediately returns the initial extension. Otherwise, it computes the (meta) AF M0
(Line 3), the update um for M0 (Line 4), and the initial S-extension E0m for M0
(Line 5). Next it invokes the incremental algorithm Incr-Alg proposed in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] with input
parameters M0; um; S; E0m, and SolverS , where SolverS is any external solver that
can compute an S-extension for the input AF.
        </p>
        <p>
          Roughly speaking, the technique in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] uses state-of-the-art algorithms to compute
an extension on a subset of the input AF. More in detail, it consists of three steps:
(i) First a sub-AF, called reduced AF, is identified on the basis of the the set of
arguments influenced by an update [
          <xref ref-type="bibr" rid="ref37 ref38 ref39">37–39</xref>
          ] and additional information provided by the
initial extension. In our running example, given the meta AF M0 of Figure 3 the
update um = +(Zf;b; f ), and the extension E0m corresponding to the preferred extension
E0 = fc; d; f g, the influenced set consists of argument f only. The reduced AF is built
by adding to the subgraph induced by the influenced set, additional arguments and
attacks containing needed information on the “external context”, i.e. information about
the status of arguments which are attacking some argument in the influenced set.
Continuing our example, the reduced AF consists of the two arguments Zf;b and f and the
attack (Zf;b; f ) between them.
(ii) Second, a non-incremental algorithm (e.g., Cegartix [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] for S = pr,
ASPARTIXD [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] for S = st) is used to compute an extension of the reduced AF — this is done
by calling function SolverS in Algorithm 1. In our example the external solver returns
the preferred extension Er = fZf;bg for the reduced AF.
(iii) Finally, the final extension Em of the whole (meta) AF is obtained by merging a
portion of its initial extension with that computed for the reduced AF (i.e., Er = fZf;bg
in our example) by the external solver SolverS . The result of the merging operation in
our example will be Em = fc; d; Yc;b; Za;b; Zf;b; Xa;c; Yc;b; Yd;e; Xe;d; Xe;e; Xe;f g.
        </p>
        <p>
          After calling the incremental algorithm Incr-Alg of [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] over the (meta-) AF M0,
the extension of the updated BAF (if any) is obtained by projecting out the extension
Em returned by Incr-Alg over the set of arguments A0 of the initial BAF (Line 8). In
our example, we obtain the extension E = fc; dg = Em \ A0 for the updated BAF.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Experimental Results</title>
      <p>
        We implemented a C++ prototype and, for each semantics S 2 fpr, stg, we compared
the performance of Algorithm 1 with that of the best ICCMA’15 solver for the
computational task S-SE, that is the task of determining some S-extension. In particular, given
a BAF B0, a semantics S 2 fpr, stg, an extension E0 2 ES (B0), and an update u of
the form u = (a ) b) or u = (a ! b), we compare the following two strategies
for computing an extension E 2 ES (u(B0)) of the updated BAF:
– Incremental computation, that is, Algorithm 1 with input B0; u; E0; S, and SolverS ;
– Computation from scratch, where an extension E of the updated BAF u(B0) is
computed by running SolverS over the (meta-)AF for um(M0).
where SolverS is Cegartix [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] for S = pr and ASPARTIX-D [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] for S = st (these
solvers are the winners of the ICCMA’15 competition for the computational task S-SE).
Dataset. We generated a set of BAFs by starting from AFs used as benchmarks at
ICCMA’15, available at http://argumentationcompetition.org/2015/results.html. Given
a percentage p 2 f10%; 20%g of support, for each AF Ad = hAd; di in the ICCMA
dataset, we generate two BAFs B0 = hAd; p; pi as follows. We selected p j dj
attacks in d in a random way, and converted them into supports. That is, let r d
be the set of the chosen p j dj attacks in d. For each (a; b) 2 Attr, we added a
support randomly chosen in f(a; b); (b; a)g to p. Finally, we set p = d n r.
Methodology. For each semantics S 2 fpr, stg, for each BAF B0 = hA0; 0; 0i in
the dataset, we considered every S-extension E0 of B0 as an initial extension. Then, we
randomly selected an update u of the form +(a ! b) (with a; b 2 A0 and (a; b) 62 0),
or +(a ) b) (with a; b 2 A0 and (a; b) 62 0), or (a ! b) (with (a; b) 2 0), or
(a ) b) (with (a; b) 2 0). Next, we computed an S-extension E for the updated
BAF u(B0) by calling Algorithm 1. Finally, the average run time of our
incremental algorithm to compute an S-extension was compared with the average run time of
Cegartix for S = pr and ASPARTIX-D for S = st to compute an S-extension for
um(M0) from scratch.
      </p>
      <p>Results. Figure 4 reports the average run times (log scale) of the incremental
computation (Incr-BAF) and the computation from scratch. Each data point reported in the
figure is the average time over 30 runs. The figure shows how the running time vary
w.r.t. the semantics (preferred or stable), the percentage (10% or 20%) of edges of the
type support in the initial BAF, and the number of arguments in the meta AF M0 for
the given BAF and update. It is worth noting that the number of arguments and attacks
in the meta AF M0 is much greater then the number of arguments and attacks/supports
in the initial BAF B0 = hA0; 0; 0i, whose size (in terms of nodes and edges in the
interaction graph) is that of the original AF Ad = hAd; di in the ICCMA dataset used
to build B0. Specifically, from Definition 1, it is easy to see that the number of
arguments of M0 turns out to be jA0j + j 0j + 2 j 0j, while the number of attacks is
2 j 0j + 3 j 0j.</p>
      <p>S = pr, p=10%</p>
      <p>S = st, p=10%
104
103
102
104
103
29274</p>
      <p>166636
N. of Arguments</p>
      <p>S = pr, p=20%
27867</p>
      <p>180155
N. of Arguments</p>
      <p>Cegartix
Incr-BAF</p>
      <p>331028
Cegartix
Incr-BAF
313810
104
103
104
103
29274
27867</p>
      <p>166636
N. of Arguments
S = st, p=20%</p>
      <p>ASPARTIX-D
Incr-BAF</p>
      <p>331028
180155
N. of Arguments</p>
      <p>ASPARTIX-D
Incr-BAF
313810</p>
      <p>From the results reported in Figure 4, we can draw the following conclusions:
– Our algorithm outperforms the competitors that compute the extensions from scratch.</p>
      <p>In particular, the time saved by the incremental computation increases
exponentially with respect to the size of the input BAF.
– The improvements obtained for the two semantics (preferred and stable) are similar.</p>
      <p>That is, our incremental approach is quite insensitive w.r.t. the semantics adopted.
– The improvements obtained increase when increasing the percentage of support
from 10% to 20%. In fact, for a given fixed number n = j 0j + j 0j of the edges
in the interaction graph for BAF B0, it is the case that increasing the percentage of
edges in 0 (and thus decreasing j 0j) yields to smaller meta AFs.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Related Work</title>
      <p>
        A comprehensive introduction to (static) abstract argumentation frameworks (AFs) can
be found in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], while [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] provides a survey of bipolar argumentation frameworks
(BAFs). Although the idea underlying AFs is simple and intuitive, most of the semantics
proposed so far suffer from a high computational complexity [
        <xref ref-type="bibr" rid="ref26 ref27 ref29 ref30 ref32 ref33 ref34 ref35">27, 26, 29, 30, 32–35</xref>
        ].
Complexity bounds and evaluation algorithms for AFs have been deeply studied in the
literature, but most of this research focused on static frameworks, whereas, in practice,
AFs (as well as BAFs) are not static systems [
        <xref ref-type="bibr" rid="ref23 ref31 ref41 ref7 ref8">8, 31, 41, 7, 23</xref>
        ].
      </p>
      <p>
        There have been significant efforts coping with dynamics aspects of Dung’s abstract
argumentation frameworks. as discussed in what follows. [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] have investigated the
principles according to which a grounded extension of a Dung’s abstract
argumentation frameworks does not change when the set of arguments/attacks are changed. [
        <xref ref-type="bibr" rid="ref17 ref18">17,
18</xref>
        ] have addressed the problem of revising the set of extensions of an argumentation
framework, and studied how the extensions can evolve when a new argument is
considered. They focus on adding one argument interacting with one initial argument (i.e. an
argument which is not attacked by any other argument). [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] have studied the evolution
of the set of extensions after performing a change operation (addition/removal of
arguments/interaction). Dynamic argumentation has been applied to decision-making of an
autonomous agent by [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], where it is studied how the acceptability of arguments evolves
when a new argument is added to the decision system. The division-based method,
proposed by [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ] and then refined by [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], divides the updated framework into two parts:
affected and unaffected, where only the status of affected arguments is recomputed
after updates. Recently, [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ] introduced a matrix representation of argumentation
frameworks and proposed a matrix reduction that, when applied to dynamic argumentation
frameworks, resembles the division-based method in [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ].
      </p>
      <p>
        Other relevant works on dynamic aspects of Dung’s argumentation frameworks
include the following. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] have proposed an approach exploiting the concept of splitting
of logic programs to deal with dynamic argumentation. The technique considers weak
expansions of the initial AF, where added arguments never attack previous ones. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
have investigated whether and how it is possible to modify a given AF so that a desired
set of arguments becomes an extension, whereas [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ] have studied equivalence between
two AFs when further information (another AF) is added to both AFs. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] have focused
on expansions where new arguments and attacks may be added but the attacks among
the old arguments remain unchanged, while [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] have characterized update and
deletion equivalence, where adding/deleting arguments/attacks is allowed (deletions were
not considered by [
        <xref ref-type="bibr" rid="ref43 ref9">43, 9</xref>
        ]).
      </p>
      <p>
        Bipolarity in argumentation is discussed in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], where a survey of the use of
bipolarity is given, as as well as a formal definition of BAF that extends the Dung’s concept of
argumentation framework by including supports is provided. The notion of support has
been found useful in many application domains, including decision making [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
However, as discussed in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], different interpretations of the concept of support have been
proposed. The acceptability of arguments in the presence of the support relation was
first investigated in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Then, to handle bipolarity in argumentation, [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ] proposed
an approach based on using the concept of coalition of arguments, where arguments are
grouped together, and defeats occur between coalitions. However, when considering a
deductive interpretation of support [
        <xref ref-type="bibr" rid="ref14 ref45">14, 45</xref>
        ], as we did in this paper, coalitions may lead
to counterintuitive results [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], though they are useful in contexts where support is
interpreted differently. Changes in bipolar argumentation frameworks have been studied
in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], where it is shown how the addition of one argument together with one support
involving it (and without any attack) impacts the extensions of the updated BAF.
      </p>
      <p>To the best of our knowledge, this is the first paper addressing the problem of
efficiently and incrementally computing extensions of dynamic BAFs.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion and Future Work</title>
      <p>
        We introduced a technique for the incremental computation of extensions of dynamic
BAFs. Following the meta-argumentation approach [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], according to which BAFs are
translated into semantically equivalent AFs, we introduced a translation where updates
and initial extensions of BAFs are taken into account. Then, we exploited the
incremental algorithm recently proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and computed extensions of the meta AFs, from
which the updated extensions of BAFs are obtained. Our experiments showed that the
incremental technique outperforms the computation from scratch.
      </p>
      <p>
        Although in this paper we focused on updates consisting of adding/removing one
attack/support, our technique can be extended to deal with sets of updates performed
simultaneously. Indeed, the construction described in [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] for reducing the application
of a set of updates to the application of a single attack update can be easily extended to
deal with multiple updates for BAFs.
      </p>
      <p>
        Moreover, our technique can be extended to consider second-order attacks [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for
BAFs, that is, (i) attacks from an argument or an attack to another attack and (ii) attacks
from an argument to a support. This allows the representation of a kind of defeasible
support, according to which the support itself can be attacked. In fact, analogously to
what done in Section 3.2, we can build on the definition of meta-AF introduced in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
for encoding second-order attacks, and then we can extend it to deal with updates for
such kind of BAFs. The incremental algorithm of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] could be used again by taking as
input the meta AF resulting from such transformation.
      </p>
      <p>
        Finally, we also plan to extend our technique to deal with other interpretations of
support, particularly the approach in [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ] where meta AFs are also adopted to cope
with bipolarity in argumentation.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Gianvincenzo</given-names>
            <surname>Alfano</surname>
          </string-name>
          , Sergio Greco, and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>Efficient computation of extensions for dynamic abstract argumentation frameworks: An incremental approach</article-title>
          .
          <source>In IJCAI</source>
          , pages
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Teresa</given-names>
            <surname>Alsinet</surname>
          </string-name>
          , Josep Argelich, Ramn Bjar, Csar Fernndez, Carles Mateu, and
          <string-name>
            <given-names>Jordi</given-names>
            <surname>Planes</surname>
          </string-name>
          .
          <article-title>An argumentative approach for discovering relevant opinions in twitter with probabilistic valued relationships. Pattern Recognition Letters</article-title>
          , In press,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Leila</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <article-title>Jean-Franc¸ois Bonnefon, and</article-title>
          <string-name>
            <given-names>Henri</given-names>
            <surname>Prade</surname>
          </string-name>
          .
          <article-title>An argumentation-based approach to multiple criteria decision</article-title>
          .
          <source>In ECSQARU</source>
          , pages
          <fpage>269</fpage>
          -
          <lpage>280</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Leila</given-names>
            <surname>Amgoud</surname>
          </string-name>
          , Claudette Cayrol, and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>On the bipolarity in argumentation frameworks</article-title>
          .
          <source>In NMR</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Leila</given-names>
            <surname>Amgoud</surname>
          </string-name>
          and
          <string-name>
            <given-names>Srdjan</given-names>
            <surname>Vesic</surname>
          </string-name>
          .
          <article-title>Revising option status in argument-based decision systems</article-title>
          .
          <source>J. Log. Comput.</source>
          ,
          <volume>22</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1019</fpage>
          -
          <lpage>1058</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Pietro</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Martin</given-names>
            <surname>Caminada</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Massimiliano</given-names>
            <surname>Giacomin</surname>
          </string-name>
          .
          <article-title>An introduction to argumentation semantics</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          ,
          <volume>26</volume>
          (
          <issue>4</issue>
          ):
          <fpage>365</fpage>
          -
          <lpage>410</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Pietro</given-names>
            <surname>Baroni</surname>
          </string-name>
          , Massimiliano Giacomin, and
          <string-name>
            <given-names>Beishui</given-names>
            <surname>Liao</surname>
          </string-name>
          .
          <article-title>On topology-related properties of abstract argumentation semantics. A correction and extension to dynamics of argumentation systems: A division-based method</article-title>
          .
          <source>AI</source>
          ,
          <volume>212</volume>
          :
          <fpage>104</fpage>
          -
          <lpage>115</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Ringo</given-names>
            <surname>Baumann</surname>
          </string-name>
          .
          <article-title>Splitting an argumentation framework</article-title>
          .
          <source>In LPNMR</source>
          , pages
          <fpage>40</fpage>
          -
          <lpage>53</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Ringo</given-names>
            <surname>Baumann</surname>
          </string-name>
          .
          <article-title>Normal and strong expansion equivalence for argumentation frameworks</article-title>
          .
          <source>AI</source>
          ,
          <volume>193</volume>
          :
          <fpage>18</fpage>
          -
          <lpage>44</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>Ringo</given-names>
            <surname>Baumann</surname>
          </string-name>
          .
          <article-title>Context-free and context-sensitive kernels: Update and deletion equivalence in abstract argumentation</article-title>
          .
          <source>In ECAI</source>
          , pages
          <fpage>63</fpage>
          -
          <lpage>68</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Ringo</given-names>
            <surname>Baumann</surname>
          </string-name>
          and
          <string-name>
            <given-names>Gerhard</given-names>
            <surname>Brewka</surname>
          </string-name>
          .
          <article-title>Expanding argumentation frameworks: Enforcing and monotonicity results</article-title>
          .
          <source>In COMMA</source>
          , pages
          <fpage>75</fpage>
          -
          <lpage>86</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Trevor J. M. Bench-Capon</surname>
            and
            <given-names>Paul E. Dunne.</given-names>
          </string-name>
          <article-title>Argumentation in artificial intelligence</article-title>
          .
          <source>AI</source>
          ,
          <volume>171</volume>
          (
          <issue>1015</issue>
          ):
          <fpage>619</fpage>
          -
          <lpage>641</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Pierre</surname>
            <given-names>Bisquert</given-names>
          </string-name>
          , Claudette Cayrol, Florence Dupin de Saint-Cyr, and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Characterizing change in abstract argumentation systems</article-title>
          .
          <source>In Trends in Belief Revision and Argumentation Dynamics</source>
          , volume
          <volume>48</volume>
          , pages
          <fpage>75</fpage>
          -
          <lpage>102</lpage>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Guido</surname>
            <given-names>Boella</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dov M. Gabbay</surname>
            ,
            <given-names>Leendert W. N. van der Torre,</given-names>
          </string-name>
          and
          <string-name>
            <given-names>Serena</given-names>
            <surname>Villata</surname>
          </string-name>
          .
          <article-title>Support in abstract argumentation</article-title>
          .
          <source>In COMMA</source>
          , pages
          <fpage>111</fpage>
          -
          <lpage>122</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Guido</surname>
            <given-names>Boella</given-names>
          </string-name>
          , Souhila Kaci, and
          <string-name>
            <surname>Leendert</surname>
            <given-names>W. N. van der Torre.</given-names>
          </string-name>
          <article-title>Dynamics in argumentation with single extensions: Abstraction principles and the grounded extension</article-title>
          .
          <source>In ECSQARU</source>
          , pages
          <fpage>107</fpage>
          -
          <lpage>118</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Guido</surname>
            <given-names>Boella</given-names>
          </string-name>
          , Souhila Kaci, and
          <string-name>
            <surname>Leendert</surname>
            <given-names>W. N. van der Torre.</given-names>
          </string-name>
          <article-title>Dynamics in argumentation with single extensions: Attack refinement and the grounded extension</article-title>
          .
          <source>In ArgMAS Workshop</source>
          , pages
          <fpage>150</fpage>
          -
          <lpage>159</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Claudette</surname>
            <given-names>Cayrol</given-names>
          </string-name>
          , Florence Dupin de Saint-Cyr, and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Revision of an argumentation system</article-title>
          .
          <source>In KR</source>
          , pages
          <fpage>124</fpage>
          -
          <lpage>134</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Claudette</surname>
            <given-names>Cayrol</given-names>
          </string-name>
          , Florence Dupin de Saint-Cyr, and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Change in abstract argumentation frameworks: Adding an argument</article-title>
          .
          <source>JAIR</source>
          ,
          <volume>38</volume>
          :
          <fpage>49</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Claudette</given-names>
            <surname>Cayrol</surname>
          </string-name>
          and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>On the acceptability of arguments in bipolar argumentation frameworks</article-title>
          .
          <source>In ECSQARU</source>
          , pages
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>Claudette</given-names>
            <surname>Cayrol</surname>
          </string-name>
          and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Bipolar abstract argumentation systems</article-title>
          .
          <source>In Argumentation in Artificial Intelligence</source>
          , pages
          <fpage>65</fpage>
          -
          <lpage>84</lpage>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>Claudette</given-names>
            <surname>Cayrol</surname>
          </string-name>
          and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Coalitions of arguments: A tool for handling bipolar argumentation frameworks</article-title>
          .
          <source>Int. J. Intell. Syst.</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ):
          <fpage>83</fpage>
          -
          <lpage>109</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>Claudette</given-names>
            <surname>Cayrol</surname>
          </string-name>
          and
          <string-name>
            <surname>Marie-Christine</surname>
          </string-name>
          Lagasquie-Schiex.
          <article-title>Change in abstract bipolar argumentation systems</article-title>
          .
          <source>In SUM</source>
          , pages
          <fpage>314</fpage>
          -
          <lpage>329</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gu</surname>
          </string-name>
          <article-title>¨nther Charwat, Wolfgang Dvora´k, Sarah Alice Gaggl, Johannes Peter Wallner, and Stefan Woltran</article-title>
          .
          <article-title>Methods for solving reasoning problems in abstract argumentation - A survey</article-title>
          .
          <source>AI</source>
          ,
          <volume>220</volume>
          :
          <fpage>28</fpage>
          -
          <lpage>63</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Andrea</surname>
            <given-names>Cohen</given-names>
          </string-name>
          , Sebastian Gottifredi, Alejandro Javier Garc´INa, and
          <article-title>Guillermo Ricardo Simari. A survey of different approaches to support in argumentation systems</article-title>
          .
          <source>Knowledge Eng. Review</source>
          ,
          <volume>29</volume>
          (
          <issue>5</issue>
          ):
          <fpage>513</fpage>
          -
          <lpage>550</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25. Phan Minh Dung.
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>AI</source>
          ,
          <volume>77</volume>
          (
          <issue>2</issue>
          ):
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Paul E. Dunne.</surname>
          </string-name>
          <article-title>The computational complexity of ideal semantics</article-title>
          .
          <source>AI</source>
          ,
          <volume>173</volume>
          (
          <issue>18</issue>
          ):
          <fpage>1559</fpage>
          -
          <lpage>1591</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27. Paul E. Dunne and
          <string-name>
            <given-names>Michael</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          .
          <article-title>Complexity of abstract argumentation</article-title>
          .
          <source>In Argumentation in Artificial Intelligence</source>
          , pages
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          .
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Wolfgang</surname>
          </string-name>
          <article-title>Dvora´k, Matti Ja¨rvisalo, Johannes Peter Wallner, and Stefan Woltran. Complexitysensitive decision procedures for abstract argumentation</article-title>
          .
          <source>AI</source>
          ,
          <volume>206</volume>
          :
          <fpage>53</fpage>
          -
          <lpage>78</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29. Wolfgang Dvora´k, Reinhard Pichler, and
          <string-name>
            <given-names>Stefan</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Towards fixed-parameter tractable algorithms for argumentation</article-title>
          .
          <source>In KR</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Wolfgang</surname>
          </string-name>
          <article-title>Dvora´k and Stefan Woltran. Complexity of semi-stable and stage semantics in argumentation frameworks</article-title>
          .
          <source>Information Processing Letters</source>
          ,
          <volume>110</volume>
          (
          <issue>11</issue>
          ):
          <fpage>425</fpage>
          -
          <lpage>430</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Marcelo</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Falappa</surname>
          </string-name>
          , Alejandro Javier Garcia,
          <article-title>Gabriele Kern-Isberner, and Guillermo Ricardo Simari. On the evolving relation between belief revision and argumentation</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          ,
          <volume>26</volume>
          (
          <issue>1</issue>
          ):
          <fpage>35</fpage>
          -
          <lpage>43</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Bettina</surname>
            <given-names>Fazzinga</given-names>
          </string-name>
          , Sergio Flesca, and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>Efficiently estimating the probability of extensions in abstract argumentation</article-title>
          .
          <source>In SUM</source>
          , pages
          <fpage>106</fpage>
          -
          <lpage>119</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Bettina</surname>
            <given-names>Fazzinga</given-names>
          </string-name>
          , Sergio Flesca, and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>On the complexity of probabilistic abstract argumentation frameworks</article-title>
          .
          <source>ACM Trans. Comput. Log.</source>
          ,
          <volume>16</volume>
          (
          <issue>3</issue>
          ):
          <fpage>22</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Bettina</surname>
            <given-names>Fazzinga</given-names>
          </string-name>
          , Sergio Flesca, and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>On efficiently estimating the probability of extensions in abstract argumentation frameworks</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          ,
          <volume>69</volume>
          :
          <fpage>106</fpage>
          -
          <lpage>132</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Bettina</surname>
            <given-names>Fazzinga</given-names>
          </string-name>
          , Sergio Flesca, Francesco Parisi, and
          <string-name>
            <given-names>Adriana</given-names>
            <surname>Pietramala</surname>
          </string-name>
          .
          <article-title>PARTY: A mobile system for efficiently assessing the probability of extensions in a debate</article-title>
          .
          <source>In DEXA</source>
          , pages
          <fpage>220</fpage>
          -
          <lpage>235</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Sarah</surname>
          </string-name>
          <article-title>Alice Gaggl and Norbert Manthey</article-title>
          .
          <article-title>ASPARTIX-D ready for the competition</article-title>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <given-names>Sergio</given-names>
            <surname>Greco</surname>
          </string-name>
          and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>Efficient computation of deterministic extensions for dynamic abstract argumentation frameworks</article-title>
          .
          <source>In ECAI</source>
          , pages
          <fpage>1668</fpage>
          -
          <lpage>1669</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <given-names>Sergio</given-names>
            <surname>Greco</surname>
          </string-name>
          and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>Incremental computation of deterministic extensions for dynamic argumentation frameworks</article-title>
          .
          <source>In JELIA</source>
          , pages
          <fpage>288</fpage>
          -
          <lpage>304</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <given-names>Sergio</given-names>
            <surname>Greco</surname>
          </string-name>
          and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Parisi</surname>
          </string-name>
          .
          <article-title>Incremental computation of grounded semantics for dynamic abstract argumentation frameworks</article-title>
          .
          <source>In COREDEMA</source>
          , pages
          <fpage>66</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40. Nadin Ko¨kciyan, Nefise Yaglikci, and
          <string-name>
            <given-names>Pinar</given-names>
            <surname>Yolum</surname>
          </string-name>
          .
          <article-title>Argumentation for resolving privacy disputes in online social networks: (extended abstract)</article-title>
          .
          <source>In AAMAS</source>
          , pages
          <fpage>1361</fpage>
          -
          <lpage>1362</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Bei Shui</surname>
            <given-names>Liao</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Li</given-names>
            <surname>Jin</surname>
          </string-name>
          , and
          <string-name>
            <surname>Robert</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Koons</surname>
          </string-name>
          .
          <article-title>Dynamics of argumentation systems: A divisionbased method</article-title>
          .
          <source>AI</source>
          ,
          <volume>175</volume>
          (
          <issue>11</issue>
          ):
          <fpage>1790</fpage>
          -
          <lpage>1814</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <given-names>Sanjay</given-names>
            <surname>Modgil</surname>
          </string-name>
          and
          <string-name>
            <given-names>Henry</given-names>
            <surname>Prakken</surname>
          </string-name>
          .
          <article-title>Revisiting preferences and argumentation</article-title>
          .
          <source>In IJCAI</source>
          , pages
          <fpage>1021</fpage>
          -
          <lpage>1026</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <given-names>Emilia</given-names>
            <surname>Oikarinen</surname>
          </string-name>
          and
          <string-name>
            <given-names>Stefan</given-names>
            <surname>Woltran</surname>
          </string-name>
          .
          <article-title>Characterizing strong equivalence for argumentation frameworks</article-title>
          .
          <source>AI</source>
          ,
          <volume>175</volume>
          (
          <fpage>14</fpage>
          -15):
          <fpage>1985</fpage>
          -
          <lpage>2009</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <given-names>Iyad</given-names>
            <surname>Rahwan</surname>
          </string-name>
          and
          <string-name>
            <surname>Guillermo R. Simari</surname>
          </string-name>
          .
          <source>Argumentation in Artificial Intelligence</source>
          . Springer Publishing Company,
          <source>Incorporated, 1st edition</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Serena</surname>
            <given-names>Villata</given-names>
          </string-name>
          , Guido Boella,
          <string-name>
            <surname>Dov M. Gabbay</surname>
          </string-name>
          , and
          <string-name>
            <surname>Leendert</surname>
            <given-names>W. N. van der Torre.</given-names>
          </string-name>
          <article-title>Modelling defeasible and prioritized support in bipolar argumentation</article-title>
          . Ann. Math. Artif. Intell.,
          <volume>66</volume>
          (
          <issue>1- 4</issue>
          ):
          <fpage>163</fpage>
          -
          <lpage>197</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <given-names>Yuming</given-names>
            <surname>Xu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Claudette</given-names>
            <surname>Cayrol</surname>
          </string-name>
          .
          <article-title>The matrix approach for abstract argumentation frameworks</article-title>
          .
          <source>In Proc. of International Workshop on Theory and Applications of Formal Argumentation (TAFA)</source>
          , pages
          <fpage>243</fpage>
          -
          <lpage>259</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>