<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Credulous acceptability in probabilistic abstract argumentation: complexity results</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bettina Fazzinga</string-name>
          <email>fazzinga@icar.cnr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Flesca</string-name>
          <email>flesca@dimes.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filippo Furfaro</string-name>
          <email>furfaro@dimes.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DIMES, University of Calabria</institution>
          ,
          <addr-line>Italy ICAR-CNR</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Probabilistic abstract argumentation combines Dung's abstract argumentation framework with probability theory in order to model uncertainty in argumentation. In this setting, we address the fundamental problem of computing the probability that an argument is (credulously) acceptable according to a given semantics. Speci cally, we focus on the most popular semantics (i.e., admissible, stable, semi-stable, complete, grounded, preferred, ideal, ideal-set ), and show that computing the probability that an argument is credulously accepted is FP #P complete independently from the adopted semantics.</p>
      </abstract>
      <kwd-group>
        <kwd>Acceptability</kwd>
        <kwd>Probabilistic Abstract Argumentation</kwd>
        <kwd>Complexity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Several argumentation frameworks have been proposed, with the aim of suitably
modeling disputes between two or more parties. Typically, argumentation
frameworks model both the possibility of parties to present arguments supporting their
theses, and the possibility that some arguments rebut other arguments.</p>
      <p>
        A powerful yet simple argumentation framework is that proposed in the
seminal paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], called abstract argumentation framework (AAF). An AAF is a
representation of a dispute in terms of an argumentation graph hA; Di, where A
is the set of nodes (each called argument ) and D is the set of edges (each called
defeat or, equivalently, attack ). Basically, an argument is an abstract entity that
may attack and/or be attacked by other arguments, and an attack expresses the
fact that an argument rebuts/weakens another argument.
      </p>
      <p>
        Several semantics for AAFs, such as admissible, stable, preferred, complete,
grounded, semi-stable, ideal-set and ideal, have been proposed [
        <xref ref-type="bibr" rid="ref10 ref11 ref2 ref4">10, 11, 2, 4</xref>
        ] to
identify \reasonable" sets of arguments, called extensions. Basically, each of these
semantics corresponds to some properties that \certify" whether a set of
arguments can be pro tably used to support a point of view in a discussion. For
instance, under the admissible semantics, a set S of arguments is an extension
if S is \con ict-free" (i.e., there is no defeat between arguments in S) and is
\robust" against the other arguments (i.e., every argument outside S attacking
an argument in S is counterattacked by an argument in S). This means that one
using the set of arguments S in a discussion does not contradict her/himself,
and can rebut to the arguments possibly presented by the other parties.
      </p>
      <p>As a matter of fact, in the real world, arguments and defeats are often
uncertain. For instance, consider an argument a (or a defeat ) encoding an
interpretation or a translation of the description of a fact reported in a reference text.
Then, a (or ) may be uncertain in the sense that the original paragraph may
have interpretations other than that encoded by a (or ).</p>
      <p>
        Thus, several proposals have been made to model uncertainty in AAFs,
by considering weights, preferences, or probabilities associated with arguments
and/or defeats. One of the most popular approaches based on probability theory
for modeling the uncertainty is the so called constellations approach [
        <xref ref-type="bibr" rid="ref12 ref19 ref20 ref25 ref27 ref30 ref32 ref7 ref9">12, 32, 7,
9, 25, 27, 30, 19, 20</xref>
        ]: the dispute is represented by means of a Probabilistic
Argumentation Framework (PrAAF), that consists in a set of alternative scenarios,
each represented by an argumentation graph associated with a probability. The
various works in the literature investigating PrAAFs can di er in the assumption
on how the probability distribution function (pdf) over the scenarios is
specied. For instance, in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], the pdf is de ned \extensively", by enumerating all
the possible scenarios and, for each of them, the value of its probability. On the
other hand, in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], the restriction that arguments and defeats are independent
is assumed, and this is exploited to simplify the way probabilities are speci ed:
the pdf is not explicitly speci ed, as it is implied by the marginal probabilities
associated with arguments and defeats.
      </p>
      <p>As regards reasoning over an argumentation framework, in the deterministic
setting, two classical problems supporting the reasoning over AAFs have been
deeply investigated and used in practical applications:
{ Extsem(S): the problem of deciding whether a set of arguments S is an
extension according to the semantics sem;
{ CAsem: the problem of deciding whether the argument a is acceptable, i.e.,
it belongs to at least one extension under the semantics sem.</p>
      <p>Basically, the relevance of these problems is that solving Extsem(S)
supports the decision on whether presenting a set of arguments in a dispute is a
reasonable strategy, while solving CAsem focuses this analysis on single
arguments. In the probabilistic setting, there are multiple scenarios to be taken into
account, and an argument a can be acceptable in some scenarios, but not in
others. Thus, the natural probabilistic counterparts P-Extsem(S) and P-CAsem of
the above-mentioned problems Extsem(S) and CAsem consist in evaluating the
overall probability that S is an extension and a is acceptable, respectively, where
\overall" means summing the probabilities of the scenarios where the property
is veri ed.</p>
      <p>
        The complexity of Extsem(S) and P-Extsem(S) has been deeply
investigated. Speci cally, in the probabilistic setting the complexity of P-Extsem(S)
has been investigated both in the case that the assumption that arguments and
defeats are independent holds [19{22] and in more general cases [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        As regards CAsem, its complexity has been deeply investigated, showing that
it ranges from PTIME to P2p-complete, depending on the adopted semantics [
        <xref ref-type="bibr" rid="ref13 ref14 ref5 ref6">6,
14, 5, 13</xref>
        ]. Detailed complexity results from the literature are reported in the rst
column of Table 1.
      </p>
      <p>However, to the best of our knowledge no work has been done for
characterizing the complexity of P-CAsem.</p>
      <p>
        In this paper we focus on the constellations approach with independence
proposed in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] and analyze the complexity of P-CAsem showing that it is
F P #P -complete independently from the adopted semantics (see the second
column of Table 1). Proving that the problem is intractable backs the usage of
alternative strategies for solving P-CAsem, such as resorting to Monte-carlo
based probability estimation approaches.
In this section, we brie y recall some basic notions about computational
complexity, and concisely overview Dung's abstract argumentation framework, and
its probabilistic extension introduced in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
The computational complexity of the problem addressed in this paper is
related to the complexity classes of counting problems. A counting problem f is a
function from strings over a nite alphabet into integers. #P is the complexity
class of the functions f such that f counts the number of accepting paths of a
nondeterministic polynomial-time Turing machine [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. Although the problem
addressed in the paper is closely related to #P , strictly speaking, it cannot
belong to it, since the outputs of our problem are not integers. In fact, we deal
with the class F P #P , that is, the class of functions computable by a
polynomialtime Turing machine with a #P oracle. In this regard, note that a function is
      </p>
      <p>
        F P #P -hard i it is #P -hard, and thus to prove that a problem is F P #P -hard
it su ces to reduce a #P -hard problem to it.
2.2
An abstract argumentation framework [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] (AAF ) is a pair hA; Di, where A
is a nite set, whose elements are referred to as arguments, and D A
A is a binary relation over A, whose elements are referred to as defeats (or
attacks). An argument is an abstract entity whose role is entirely determined by
its relationships with other arguments. Given an AAF A, we also refer to the set
of its arguments and the set of its defeats as Arg(A) and Def (A), respectively.
      </p>
      <p>Given arguments a; b 2 A, we say that a defeats b i there is (a; b) 2 D.
Similarly, a set S A defeats an argument b 2 A i there is a 2 S such that a
defeats b.</p>
      <p>A set S A of arguments is said to be con ict-free if there are no a; b 2 S
such that a defeats b. An argument a is said to be acceptable w.r.t. S A i
8b 2 A such that b defeats a, there is c 2 S such that c defeats b. Given a set
S A of arguments, we de ne S+ as the set of arguments that are defeated by
S, that is, S+ = fa 2 A s.t. S defeats ag.</p>
      <p>
        Several semantics for AAFs have been proposed to identify \reasonable"
sets of arguments, called extensions. We consider the following well-known
semantics [
        <xref ref-type="bibr" rid="ref10 ref11 ref4">10, 11, 4</xref>
        ]: admissible (ad), stable (st), complete (co), grounded (gr),
semi-stable (sst), preferred (pr), ideal-set (ids), and ideal (ide).
A set S A is said to be:
{ an admissible extension i S is con ict-free and all its arguments are
acceptable w.r.t. S;
{ a stable extension i S is con ict-free and S defeats each argument in A n S;
{ a complete extension i S is admissible and S contains all the arguments
that are acceptable w.r.t. S;
{ a grounded extension i S is a minimal (w.r.t. ) complete set of arguments;
{ a semi-stable extension i S is a complete extension where S [S+ is maximal
(w.r.t. );
{ a preferred extension i S is a maximal (w.r.t. ) admissible set of
arguments;
{ an ideal-set extension i S is admissible and S is contained in every preferred
set of arguments;
{ an ideal extension i S is a maximal (w.r.t. ) ideal-set extension;
Example 1. Consider the AAF hA, D i, where the set A of arguments is fa; b; cg
and the set D of defeats is f 1 = (b; a); 2 = (b; c); 3 = (c; b)g, where 2 and
3 encode the fact that arguments b and c attack each other. A graphical
rapresentation of the AAF hA, D i is reported in Figure 1, where arguments are
represented as nodes and defeats are represented as edges between nodes. As
S = fa; cg is con ict-free and every argument in S is acceptable w.r.t. S, it
is the case that S is admissible. It is easy to see that the sets fbg, fcg, and ;
are admissible extensions as well. Since S is con ict-free and defeats b (the only
argument in AnS) it is also a stable extension. As S is maximally admissible,
it a preferred extension, while fcg is not, since a is acceptable w.r.t fcg. It is
easy to check that S is complete, while it neither is grounded (since it is not
minimally complete, as the emptyset is complete) nor ideal or ideal-set (since it
is not contained in fbg which is a preferred extension). 2
      </p>
      <p>Fig. 1: The AAF hA, Di</p>
      <p>Given an AAF A, a set S Arg(A) of arguments, an argument a 2 Arg(A)
and a semantics sem 2fad, st, gr, co, sst, pr, ids, ideg, we de ne the function
acc(A; sem; a) that returns true if 9S Arg(A) such that a 2 S and S is an
extension according to sem, false otherwise.</p>
      <p>Example 2. Consider the AAF hA, D i introduced in Example 1. The argument
a is credulously accepted under the admissible, stable, complete, semi-stable and
preferred semantics. a is not credulousy accepted under the grounded, ideal-set
and ideal semantics. 2
2.3</p>
      <sec id="sec-1-1">
        <title>Probabilistic Abstract Argumentation</title>
        <p>
          We now review the probabilistic abstract argumentation framework proposed
in [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
        <p>De nition 1 (PrAAF). A probabilistic argumentation framework (PrAAF) is
a tuple hA; PA; D; PDi where hA; Di is an AAF, and PA and PD are, respectively,
functions assigning a non-zero1 probability value to each argument in A and
defeat in D, that is, PA : A ! (0; 1] \ Q and PD : D ! (0; 1] \ Q.</p>
        <p>Basically, the value assigned by PA to an argument a represents the
probability that a actually occurs, whereas the value assigned by PD to a defeat (a; b)
represents the conditional probability that a defeats b given that both a and b
occur.</p>
        <p>The meaning of a PrAAF is given in terms of possible worlds, each of them
representing a scenario that may occur in the reality. Given a PrAAF F , a
possible world is modeled by an AAF which is derived from F by considering
only a subset of its arguments and defeats. More formally, given a PrAAF F =
hA; PA; D; PDi, a possible world w of F is an AAF hA0; D0i such that A0 A
and D0 D \ (A0 A0). The set of the possible worlds of F will be denoted as
pw(F ).
1 Assigning probability equal to 0 to arguments/defeats is useless.</p>
        <p>Example 3. As a running example, consider the PrAAF F = hA; PA; D; PDi
reported in Figure 2, where A and D are those of Example 1, and PA(a) =
:9; PA(b) = :7; PA(c) = :2; PD( 1) = :9 and PD( 2) = PD( 3) = 1. The set
pw(F ) contains the following possible worlds:</p>
        <p>w1 = h;; ;i w2 = hfag; ;i w3 = hfbg; ;i w4 = hfcg; ;i
w5 = hfa; bg; ;i w6 = hfa; cg; ;i w7 = hfb; cg; ;i w8 = hA; ;i
w9 = hfa; bg; f 1gi w10 = hfb; cg; f 3gi w11 = hfb; cg; f 2gi w12 = hfb; cg; f 2; 3gi
w13 = hA; f 1gi w14 = hA; f 1; 3gi w15 = hA; f 1; 2gi w16 = hA; Di
w17 = hA; f 2gi w18 = hA; f 3gi w19 = hA; f 2; 3gi
a
.9
.9
b
.7
1.0
1.0
c
.2
Fig. 2: The PrAAF hA; PA; D; PDi</p>
        <p>An interpretation for a PrAAF F = hA; PA; D; PDi is a probability
distribution function I over the set pw(F ) of the possible worlds. Assuming that
arguments represent pairwise independent events, and that each defeat represents
an event conditioned by the occurrence of its argument events but independent
from any other event, the interpretation for the PrAAF F = hA; PA; D; PDi is as
follows. For each possible world w 2 pw(F ), w is assigned by I the probability:
I(w) = Qa2Arg(w) PA(a)</p>
        <p>Q</p>
        <p>a2AnArg(w)(1
Q 2Def(w) PD( )</p>
        <p>Q
2D(w)nDef(w)(1</p>
        <p>PA(a))</p>
        <p>PD( ))
where D(w) is the set of defeats that may appear in the possible world w, that
is D(w) = D \ (Arg(w) Arg(w)). Hence, the probability of a possible world w
is given by the product of four contributions: (i ) the product of the probabilities
of the arguments belonging to w; (ii ) the product of the one's complements of
the probabilities of the arguments that do not appear in w; (iii ) the product of
the conditional probabilities of the defeats in w (recall that a defeat = (a; b)
may appear in w only if both a and b are in w); (iv ) the product of the one's
complements of the conditional probabilities of the defeats that, though they
may appear in w, they do not.</p>
        <p>Example 4. Continuing our running example, the interpretation I for F is as
follows. First of all, observe that, for each possible world w 2 pw(F ), if both
arguments b and c belong to Arg(w) and 2 62 Def (w) or 3 62 Def (w), then
I(w) = 0. The probabilities of the other possible worlds are the following:</p>
        <p>I(w1) = :024 I(w2) = :216 I(w3) = :056 I(w4) = :006
I(w5) = :0504 I(w6) = :054 I(w9) = :4536 I(w12) = :014
I(w16) = :1134 I(w19) = :0126
2
2</p>
        <p>The probability that an argument a is acceptable according to a given
semantics sem is de ned as the sum of the probabilities of the possible worlds w
for which a is acceptable according to sem, i.e., acc(w; sem; a) = true.
De nition 2 (P rCAsem(a)). Given a PrAAF F = hA; PA; D; PDi, an
argu</p>
        <p>F
ment a 2 A, and a semantics sem, the probability P rCAsem(a) that a is
acceptF
able under sem is</p>
        <p>P rCAsem(a) =</p>
        <p>F</p>
        <p>X
w2pwAcc(F;a)</p>
        <p>I(w);
where pwAcc(F ; a) = fw 2 pw(F ) jacc(w; sem; a) =trueg.</p>
        <p>The following example shows usages of this de nition.</p>
        <p>Example 5. In our running example, the probabilities that the arguments a and
b are acceptable w.r.t. the admissible semantics are as follows:</p>
        <p>P rCAaFd(a) = I(w2) +I(w5) +I(w6) +I(w16) +I(w19) = :4464</p>
        <p>P rCAaFd(b) = I(w3)+ I(w5)+ I(w9)+ I(w12)+ I(w16)+ I(w19) = :8134
Obviously, computing P rCAsem(a) by directly applying De nition 2 would</p>
        <p>F
require exponential time, since it relies on summing the probabilities of an
exponential number of possible worlds. However, this does not rule out the possibility
that e cient strategies for computing P rCAsFem(a) exist. Unfortunately, this is
not true in the general case. Indeed, in the next section we show that the problem
of computing P rCAsem(S) is F P #P -complete.</p>
        <p>F
De nition 3 (P-CAsem). Given a PrAAF F = hA; PA; D; PDi, an argument
a 2 A, and a semantics sem, P-CAsem is the problem of computing the
probability P rCAsem(a).</p>
        <p>F
3</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Complexity of credulous acceptability in probabilistic abstract argumentation</title>
      <p>In this section we characterize the complexity of P-CAsem, by rst showing that
it is in F P #P and then showing that it is F P #P -hard.
3.1</p>
      <sec id="sec-2-1">
        <title>Upper bound</title>
        <p>Theorem 1. For sem 2 fad, st, co, gr, sst, pr, ids, ide g, it holds that
P-CAsem is in F P #P .</p>
        <p>Proof. First, observe that P rCAsem(a) with sem 2 fad, st, co, gr, sst, pr,</p>
        <p>F
ids, ide g, can be expressed as a rational number whose denominator d is the
product of the denominators of the probabilities of arguments in A and defeats
in D.</p>
        <p>We rst prove the statement for sem = gr. First observe that CAsem is
ipnolPynToImMiEal ftoi mreseamlgo=ritghrm. WAewsihthowactcheasts PtorCaA#gFrP(ao)raccalne. bAelgcoormitphumtedA byrsat
computes d in polynomial time w.r.t. the size of F , then calls a #P oracle
to determine the numerator of PrCAgFr(a). The oracle counts the number of
accepting paths of a nondeterministic polynomial-time Turing machine M such
that:
(i) M nondeterministically guesses a subset of arguments in A and defeats in
D so that each leaf of the resulting computation tree is a possible world
w 2 pw(F );
(ii) At each leaf, let w be the guessed world, and I(w) its probability, the
computation tree is then split again d I(w) times to re ect the probability of
the guessed world (for each w 2 pw(F ), I(w) is a rational number whose
denominator is d, and I(w) can be computed in polynomial time w.r.t. the
size of F );
(iii) Finally, M checks in polynomial time if a is an acceptable argument in the
world w w.r.t. the grouded semantics.</p>
        <p>Thus, the number of accepting paths of M is d PrCAgFr(a) that is the numerator
n of PrCAgFr(a). As a nal step, algorithm A returns both n and d.</p>
        <p>To prove the statement for sem 2fad, st, co, sst, pr, ids, ideg it su ces
to reason analogously to the membership proof for the grounded semantics, by
considering that CAsem for those semantics is either in NP, or in 2p, or in P2p.</p>
        <p>Speci cally, for sem 2fad, st, co, sst, pr, ids, ideg, PrCAsem(a) can be
F
computed by an algorithm A0 which behaves as follows. A0 rst computes (in
polynomial time) the denominator d of PrCAsFem(a). Then A0 invokes a #N P ,
or a # 2p or a # P2p oracle that counts the number of accepting paths of a
non-deterministic Turing machine M 0 de ned in the same way of M with the
di erence that the step (iii ) of the computation of M is replaced by the
invocation of either an N P , a 2p or a P2p oracle that checks whether a is an acceptable
argument w.r.t. sem in the world w obtained as nal leaf of the computation
tree.</p>
        <p>Therefore, since F P #P = F P #NP = F P # 2p = F P # P2p , then P-CAsem is in
F P #P . 2
3.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Lower bound</title>
        <p>To prove that P-CAsem is F P #P -hard we show a reduction from the #P -hard
problem #P 2CN F , that is the problem of counting the number of satisfying
assignments of a CN F formula where each clause consists of exactly 2 positive
literals, to P-CAsem.
{ A = fa; c1; : : : ; ck; x1; : : : ; xng;
{ D = f(ci; a) j i 2 [1::k]g S(Ch=Xi_Xj)2 f(xi; ch); (xj ; ch)g;
{ PA(a) = 1:0, 8i 2 [1::k]PA(ci) = 1:0, and 8j 2 [1::n]PA(xj ) = 12 ;
{ PD( ) = 1:0 for each 2 D.</p>
        <p>Moreover, let be a truth assignment for the propositional variables x1; : : : ; xn.
We de ne as w( ; F ( )) the possible world w = hAw; Dwi 2 pw(F ( )) de ned
as follows:
{ Aw = A n fxi j i 2 [1::n] ^ (xi) =falseg;
{ Dw = D n f(xi; cj ) j i 2 [1::n] ^ j 2 [1::k] ^ (xi) = falseg ;</p>
        <p>It is easy to see that given a possible world w 2 pw(F ( )) the probability of
w is I(w) = 21n .</p>
        <p>Example 6. Consider the P 2CN F formula = (X1 _ X3) ^ (X2 _ X3). The
PrAAf F ( ) is reported in Figure 3(a), where probabilities di erent from 1:0 are
reported next to each node and edge. Moreover, consider the truth assignment
for X1; X2 and X3 such that (X1) =true, (X2) =true and (X3) =false.
The possible world w( ; F ( )) is reported in Figure 3(b). 2
a
c1
c2
a
c1
c2
1 1 1
x1 2 x2 2 x3 2
(a)
x1
(b)
x2</p>
        <p>Lemma 1. Let = C1 ^ C2 ^ : : : Ck be a P 2CN F , where X = fX1; : : : ; Xng is
the set of its propositional variables.</p>
        <p>For each truth assignment for the propositional variables X1; : : : ; Xn it
holds that CAawd( ;F( ))(a) is true i ( ) is true.</p>
        <p>Proof. We rst prove that for each truth assignment for X1; : : : ; Xn the fact
ad
that CAw( ;F( ))(a) is true implies that ( ) is true.</p>
        <p>Reasoning by contradiction assume that there exists a truth assignment for
X1; : : : ; Xn such that w = w( ; F ( )) and CAawd(a) is true while ( ) is false.</p>
        <p>Since CAawd(a) is true there exists an admissible extension S for w such
that a 2 S. It is easy to see that S \ fc1; : : : ; ckg = ;, as otherwise S would
not be an admissible extension (S would not be con ict-free). Moreover, it is
easy to see that there exists a subset fxi1 ; : : : ; xih g of fx1; : : : ; xng such that
fxi1 ; : : : ; xih g S and for each j 2 [1::k] there is l 2 [1::h] such that:
1. xil 2 Aw, and
2. (xil ; cj) 2 Dw,
as otherwise S would not be an admissible extension as there would be a cj
attacking a which is not attacked by any argument in S.</p>
        <p>Since ( ) is false it must be the case that there is a j 2 [i::k] such that
Cj = Xl _ Xh and (Xl) = (Xh) =false. This implies that xl 62 Aw, xh 62
Aw, (xl; cj) 62 Dw and (xh; cj) 62 Dw, thus contradicting the fact that S is
an admissible extension. Hence, it holds that for each truth assignment for
ad
x1; : : : ; xn the fact that CAw( ;F( ))(a) is true implies that ( ) is true.</p>
        <p>We now prove that for each truth assignment for x1; : : : ; xn the fact that
ad
( ) is true implies that CAw( ;F( ))(a) is true. Reasoning by contradiction
assume that there exists a truth assignment for x1; : : : ; xn such that w =
w( ; F ( )) and CAawd(a) is false while ( ) is true.</p>
        <p>Let S be the set of arguments fag [ fxi j i 2 [1::n] ^ (Xi) = trueg. We
show that S is an admissible extension reasoning by contradiction. Since S is
not an admissible extension it must be the case that there is a j 2 [1::k] such
that Cj = Xh _ Xl and both xh 2= S and xl 2= S. Hence, by construction of S it
holds that (Xh) = (Xh) = false which, in turn, implies that ( ) = false,
thus contradicting that is a truth assignment for x1; : : : ; xn such that ( )
is true. This implies that for each truth assignment for x1; : : : ; xn the fact that
( ) is true implies that CAawd( ;F( ))(a) is true.</p>
        <p>Lemma 2. Let = C1 ^ C2 ^ : : : Ck be a P 2CN F , where X = fX1; : : : ; Xng is
the set of its propositional variables.</p>
        <p>For a possible world w 2 pw(F ( )) CAawd( ;F( ))(a) is true i CAswe(m;F( ))(a),
where sem 2fst, co, gr, sst, pr, ids, ideg, is true.</p>
        <p>Proof. The if part is straightforward since stable, complete, grounded,
semistable, preferred, ideal-set and ideal extensions are admissible extensions. As
regards the proof of the only if part, reasoning by contradiction we assume that
there is an admissible extension S such that a 2 S and there is no extension S0
according to sem, where sem 2fst, co, gr, sst, pr, ids, ide g, such that a 2 S0.</p>
        <p>Consider the set of arguments S^ = S [ (Arg(w) \ fx1; : : : ; xng), and note
that Arg(w) n S^ = fc1; : : : ; ckg. It is straightforward to see that, since S is an
admissible extension then S^ is an admissible extension. Moreover, it is easy to see
that (i) S^ is a stable extension since it defeats each argument in Arg(w) n S^, (ii)
S^ is a complete extension since it contains all the argument that are acceptable
w.r.t. S^, (iii) S^ is a preferred extension since S^ is an admissible extension and
any argument in Arg(w)nS^ attacks an argument in S^, so that for each argument
2 Arg(w) n S^ it holds that S^ [ is not con ict-free. Moreover, observe that S^
is the unique preferred extension for w.</p>
        <p>Furthermore, since S^ is a complete extension and since removing any
argument from S^ make it loose the property that it contains all the arguments that
are acceptable w.r.t. it, it holds that S^ is a grounded extension.</p>
        <p>Moreover, since S^ [ S^+ = Arg(w) then there is no complete extension S such
that S [ S+ S^ [ S^+. Therefore, since S^ is a complete extension it follows that
S^ is a semi-stable extension.</p>
        <p>Finally, it is straightforward to see that S^ is an ideal-set and ideal extension
for w as it is the unique preferred extension for w.</p>
        <p>Hence, for possible world w 2 pw(F ( )) CAawd( ;F( ))(a) is true only if
CAswe(m;F( ))(a) is true, where sem 2 fst, co, gr, sst, pr, ids, ideg, which
completes the proof.</p>
        <p>Theorem 2. For sem 2fad, st, co, gr, sst, pr, ids, ideg, it holds that
PCAsem is F P #P -hard.</p>
        <p>Proof. Given an instance of #P 2CN F , we construct an instance of
PCAsem by de ning a PrAAF F = F ( ) as in De nition 4, and we return
2n (P rCAsFem(a)).</p>
        <p>Since for each possible world w 2 pw(F ( )) we have that I(w) = 21n , from
Lemmas 1 and 2 it follows that 2n (P rCAsem(a)) is the number of satisfying
F
assignments of .</p>
        <p>Hence, as the above described reduction from the #P -hard problem
#P 2CN F to P-CAsem is a Cook reduction, this su ces to prove that P-CAsem
is F P #P -hard, since a problem is F P #P -hard i it is #P -hard.
4</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>RELATED WORK</title>
      <p>
        The main state-of-the-art approaches for handling uncertainty in AAFs by
relying on probability theory can be classi ed in two categories, based on the way
they interpret the probabilities of the arguments: those adopting the classical
constellations approach [
        <xref ref-type="bibr" rid="ref12 ref19 ref20 ref25 ref27 ref30 ref32 ref7 ref9">27, 12, 32, 7, 9, 25, 30, 19, 20</xref>
        ] and those adopting the
recent epistemic one [
        <xref ref-type="bibr" rid="ref28 ref29 ref33">33, 29, 28</xref>
        ]. As regards the epistemic approach, probabilities
and extensions have a di erent semantics, compared with the constellations
approach. Speci cally, the probability of an argument represents the degree of belief
in the argument (the higher the probability, the more the argument is believed),
and a key concept is the \rational" probability distribution, that requires that
if the belief in an argument is high, then the belief in the arguments attacked
by it is low. In this approach, epistemic extensions are considered rather than
Dung's extensions, where an epistemic extension is the set of arguments that
are believed to be true to some degree. The interested reader can
detailed comparative description of the two categories in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
nd a more
      </p>
      <p>
        We now focus our attention on the approaches classi ed as constellations,
as the complexity characterization provided in our work refers to this class
of PrAAFs. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] addressed the modeling of jury-based dispute resolutions, and
proposed a prAAF where uncertainty is taken into account by specifying
probability distribution functions (pdfs) over possible AAFs and showing how an
instance of the proposed prAAF can be obtained by specifying a probabilistic
assumption-based argumentation framework (introduced by themselves). In the
same spirit, [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] de ned a prAAF as a pdf over the set of possible AAFs, and
introduced a probabilistic version of a fragment of the ASPIC framework [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
that can be used to instantiate the proposed prAAF. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] addresses the problem
of computing all the subgraphs of an AAF in which an argument a belongs to
the grounded extension, and [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] extends it by focusing on computing the
probability that an argument a belongs to the grounded extension of a probabilistic
abstract argumentation framework. In particular, [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] assumes to receive a joint
probability distribution over the arguments as input. In fact, providing a joint
probability distribution usually means specifying the probability values for all
the possible correlations, i.e., P (a), P (a ^ b), P (a ^ b ^ c)::: and so on. This is
analogous to providing the probabilities for all the possible AAFs (since defeats
are considered as certain).
      </p>
      <p>
        Di erently from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] proposed a prAAF where probabilities
are directly associated with arguments and defeats, instead of being associated
with possible AAFs, and independence among pairs of arguments/defeats is
assumed. After claiming that computing the probability P sem(S) that a set S of
arguments is an extension according to sem requires exponential time for
every semantics, [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] proposed a Monte-Carlo simulation approach to approximate
P sem(S). [
        <xref ref-type="bibr" rid="ref19 ref20 ref7">7, 19, 20</xref>
        ] build upon [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]: [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] characterizes di erent semantics from the
approach of [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] in terms of probabilistic logic, as a rst step in the direction
of creating a uniform logical formalization for all the proposed AAFs of the
literature, in order to understand and compare the di erent approaches. [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ],
instead, showed that computing P sem(S) is actually tractable for the admissible
and stable semantics, but it is F P #P -complete for other semantics, including
complete, grounded, preferred and ideal-set. Furthermore, [
        <xref ref-type="bibr" rid="ref18 ref21">18, 21</xref>
        ] proposed a
Monte-Carlo approach to e ciently estimate P sem(S) based on the
polynomiality results of [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], as well as in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], P sem(S) is de ned as the
sum of the probabilities of the possible AAFs where S is an extension according
to semantics sem.
      </p>
      <p>
        In the above-cited works, probability theory is recognized as a
fundamental tool to model uncertainty. However, a deeper understanding of the role of
probability theory in abstract argumentation was developed only later in [
        <xref ref-type="bibr" rid="ref25 ref26">25,
26</xref>
        ], where the justi cation and the premise perspectives of probabilities of
arguments are introduced. According to the former perspective the probability of
an argument indicates the probability that it is justi ed in appearing in the
argumentation system. In contrast, the premise perspective views the
probability of an argument as the probability that the argument is true based on the
degrees to which the premises supporting the argument are believed to be true.
Starting from these perspectives, in [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], a formal framework showing the
connection among argumentation theory, classical logic, and probability theory was
investigated. Furthermore, quali cation of attacks is addressed in [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], where an
investigation of the meaning of the uncertainty concerning defeats in
probabilistic abstract argumentation is provided.
      </p>
      <p>
        The computational complexity of computing extensions has been thoroughly
investigated for classical AAFs [
        <xref ref-type="bibr" rid="ref13 ref15 ref16 ref17 ref24 ref3">15, 16, 13, 17, 24, 3</xref>
        ] with respect to several
semantics (a comprehensive overview of argumentation semantics can be found
in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]). In particular, [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] presents a number of results on the complexity of
some decision questions for semi-stable semantics, while [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] focuses on ideal
semantics; complexity results for preferred semantics can be found in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Complexity results about skeptical and credulous acceptance under
admissible, complete, grounded, stable and preferred semantics have been provided
in [
        <xref ref-type="bibr" rid="ref14 ref5 ref6">6, 14, 5</xref>
        ], while [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] characterizes the complexity of skeptical and credulous
acceptance under ideal and ideal-set.
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and future works</title>
      <p>
        Focusing on the constellations approach with independence proposed in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ],
in this paper we characterized the complexity of P-CAsem showing that it is
F P #P -complete independently from the adopted semantics. Future work will
be devoted to the characterization of the complexity of the problem of
computing the probability that an argument is skeptically acceptable w.r.t. a given
semantics sem. Moreover, another interesting direction for future work is that of
nding tractable cases for P-CAsem by identifying structural properties of the
argumentation graph that will ensure that P-CAsem is solvable in polynomial
time.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An introduction to argumentation semantics</article-title>
          .
          <source>Knowledge Eng. Review</source>
          <volume>26</volume>
          (
          <issue>4</issue>
          ),
          <volume>365</volume>
          {
          <fpage>410</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semantics of abstract argument systems</article-title>
          .
          <source>In: Argumentation in Arti cial Intelligence</source>
          , pp.
          <volume>25</volume>
          {
          <issue>44</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Booth</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Podlaszewski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahwan</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Complexity properties of critical sets of arguments</article-title>
          .
          <source>In: Proc. of Computational Models of Argument (COMMA)</source>
          . pp.
          <volume>173</volume>
          {
          <issue>184</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semi-stable semantics</article-title>
          .
          <source>In: Proc. Int. Conf. Computational Models of Argument (COMMA)</source>
          . pp.
          <volume>121</volume>
          {
          <issue>130</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Coste-Marquis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Devred</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marquis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Symmetric argumentation frameworks</article-title>
          .
          <source>In: Proc. of Symbolic</source>
          and
          <article-title>Quantitative Approaches to Reasoning with Uncertainty (ECSQARU)</article-title>
          . pp.
          <volume>317</volume>
          {
          <issue>328</issue>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dimopoulos</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Graph theoretical structures in logic programs and default theories</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>170</volume>
          (
          <issue>1-2</issue>
          ),
          <volume>209</volume>
          {
          <fpage>244</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Doder</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation frameworks - A logical approach</article-title>
          .
          <source>In: Proc. Int. Conf. on Scalable Uncertainty Management (SUM)</source>
          . pp.
          <volume>134</volume>
          {
          <issue>147</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Computing the grounded semantics in all the subgraphs of an argumentation framework: An empirical evaluation</article-title>
          .
          <source>In: Proc. Int. Workshop Computational Logic in Multi-Agent Systems (CLIMA)</source>
          . pp.
          <volume>119</volume>
          {
          <issue>137</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Toward a computational analysis of probabilistic argumentation frameworks</article-title>
          .
          <source>Cybernetics and Systems</source>
          <volume>45</volume>
          (
          <issue>3</issue>
          ),
          <volume>254</volume>
          {
          <fpage>278</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <volume>321</volume>
          {
          <fpage>358</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancarella</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing ideal sceptical argumentation</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <issue>10</issue>
          -
          <fpage>15</fpage>
          ),
          <volume>642</volume>
          {
          <fpage>674</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thang</surname>
            ,
            <given-names>P.M.:</given-names>
          </string-name>
          <article-title>Towards (probabilistic) argumentation for jury-based dispute resolution</article-title>
          .
          <source>In: Proc. Int. Conf. Computational Models of Argument (COMMA)</source>
          . pp.
          <volume>171</volume>
          {
          <issue>182</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>The computational complexity of ideal semantics</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>173</volume>
          (
          <issue>18</issue>
          ) (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.M.:</given-names>
          </string-name>
          <article-title>Coherence in nite argument systems</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>141</volume>
          (
          <issue>1</issue>
          /2),
          <volume>187</volume>
          {
          <fpage>203</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Computational complexity of semi-stable semantics in abstract argumentation frameworks</article-title>
          .
          <source>In: Proc.European Conf. on Logics in Arti cial Intelligence (JELIA)</source>
          . pp.
          <volume>153</volume>
          {
          <issue>165</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Complexity of abstract argumentation</article-title>
          .
          <source>In: Argumentation in Arti cial Intelligence</source>
          , pp.
          <volume>85</volume>
          {
          <issue>104</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dvorak</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Complexity of semi-stable and stage semantics in argumentation frameworks</article-title>
          .
          <source>Inf. Process. Lett</source>
          .
          <volume>110</volume>
          (
          <issue>11</issue>
          ),
          <volume>425</volume>
          {
          <fpage>430</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
          </string-name>
          , F.:
          <article-title>E ciently estimating the probability of extensions in abstract argumentation</article-title>
          .
          <source>In: Proc. Int Conf. on Scalable Uncertainty Management (SUM)</source>
          . pp.
          <volume>106</volume>
          {
          <issue>119</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation</article-title>
          .
          <source>In: Proc. Int. Joint Conference on Arti cial Intelligence (IJCAI)</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation frameworks</article-title>
          .
          <source>ACM Trans. Comput. Log. (TOCL) 16(3)</source>
          ,
          <volume>22</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On e ciently estimating the probability of extensions in abstract argumentation frameworks</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>69</volume>
          ,
          <issue>106</issue>
          {
          <fpage>132</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietramala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>PARTY: A mobile system for e ciently assessing the probability of extensions in a debate</article-title>
          .
          <source>In: Proc. Int. Conf. on Database and Expert Systems Applications (DEXA)</source>
          . pp.
          <volume>220</volume>
          {
          <issue>235</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietramala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Computing or estimating extension's probabilities over structured probabilistic argumentation frameworks. Special Issue on Probabilistic and other Quantitative Approaches to Computational Argumentation of the</article-title>
          <source>IfCoLog Journal of Logics and their Applications</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <volume>177</volume>
          {
          <fpage>200</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gaggl</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The cf2 argumentation semantics revisited</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>23</volume>
          (
          <issue>5</issue>
          ),
          <volume>925</volume>
          {
          <fpage>949</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Some foundations for probabilistic abstract argumentation</article-title>
          .
          <source>In: Proc. Int. Conf. Computational Models of Argument (COMMA)</source>
          . pp.
          <volume>117</volume>
          {
          <issue>128</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A probabilistic approach to modelling uncertain logical arguments</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>54</volume>
          (
          <issue>1</issue>
          ),
          <volume>47</volume>
          {
          <fpage>81</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Probabilistic quali cation of attack in abstract argumentation</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>55</volume>
          (
          <issue>2</issue>
          ),
          <volume>607</volume>
          {
          <fpage>638</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation with epistemic extensions</article-title>
          .
          <source>In: Proc. Int. Workshop on Defeasible and Ampliative Reasoning (DARe@ECAI)</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation with incomplete information</article-title>
          .
          <source>In: Proc. European Conf. on Arti cial Intelligence (ECAI)</source>
          . pp.
          <volume>1033</volume>
          {
          <issue>1034</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
          </string-name>
          , T.J.:
          <article-title>Probabilistic argumentation frameworks</article-title>
          .
          <source>In: Proc. Int. Workshop on Theorie and Applications of Formal Argumentation (TAFA)</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An abstract framework for argumentation with structured arguments</article-title>
          .
          <source>Argument &amp; Computation</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>93</volume>
          {
          <fpage>124</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Rienstra</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Towards a probabilistic dung-style argumentation system</article-title>
          .
          <source>In: AT</source>
          . pp.
          <volume>138</volume>
          {
          <issue>152</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A probabilistic semantics for abstract argumentation</article-title>
          .
          <source>In: Proc. European Conf. on Arti cial Intelligence (ECAI)</source>
          . pp.
          <volume>750</volume>
          {
          <issue>755</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Valiant</surname>
            ,
            <given-names>L.G.</given-names>
          </string-name>
          :
          <article-title>The complexity of computing the permanent</article-title>
          .
          <source>Theor. Comput. Sci. (TCS) 8</source>
          ,
          <issue>189</issue>
          {
          <fpage>201</fpage>
          (
          <year>1979</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>