<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computing extensions' probabilities over probabilistic Bipolar Abstract Argumentation Frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bettina Fazzinga</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Flesca</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filippo Furfaro</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Scala</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DIMES - University of Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>ICAR-CNR</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Probabilistic Bipolar Abstract Argumentation Frameworks (prBAFs), combining the possibility of specifying supports between arguments with a probabilistic modeling of the uncertainty, have been recently considered [34, 35] and the complexity of the problem of computing extensions' probabilities has been characterized [22]. In this paper we deal with the problem of computing extensions' probabilities over prBAFs where the probabilistic events that arguments, supports and defeats occur in the real scenario are assumed to be independent probabilistic events (prBAFS of type IND). Specifically an algorithm for efficiently computing extensions' probabilities under the stable and admissible semantics has been devised and its efficiency has been experimentally validated w.r.t. the exhaustive approach, i.e. the approach consisting in the generation of all the possible scenarios.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        An abstract argumentation framework (AAF) represents a dispute as an
argumentation graph hA; Di, where A is the set of nodes (called arguments) and D is the set
of edges (called defeats or attacks). Herein, an argument is an abstract entity that may
attack and/or be attacked by other arguments, where “a attacks b” means that
argument a rebuts/weakens b. Reasoning on the possible strategies for winning the dispute
typically requires looking into the extensions of the AAF. An extension S is a set of
arguments that satisfies some properties certifying its “strength”, so that a party using
the arguments in S has reasonable chances to win the dispute. Different semantics for
AAFs (i.e., sets of properties assessing whether a set of arguments is an extension) have
proven reasonable, such as admissible (ad), stable (st), preferred (pr), complete (co),
grounded (gr), ideal (id) [
        <xref ref-type="bibr" rid="ref14 ref15 ref2">14, 15, 2</xref>
        ], and the complexity of the fundamental problem
EXT of verifying whether a set is an extension has been studied under each of these
semantics [
        <xref ref-type="bibr" rid="ref17 ref19">19, 17</xref>
        ].
      </p>
      <p>
        Since the introduction of AAFs in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], many variants have been proposed, with the
aim of modeling disputes more accurately. Among these, Bipolar Abstract
Argumentation Frameworks (BAFs) allow supports, besides attacks, to be specified between
arguments. Specifically, two alternative formal semantics of support have been introduced:
in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the support is a generic “inverse” of the notion of attack (“abstract semantics”:
“a supports b” means that a strengthens the validity of a), while, in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], it is viewed as a
“deductive” correlation between arguments (“deductive semantics”: if a supports b, the
acceptance of a implies the acceptance of b). The various extensions’ semantics defined
for AAFs have been shown to have a natural counterpart over BAFs, after noticing that
combining attacks with supports (of any semantics) generates “implicit” attacks (see
Example 1).
      </p>
      <p>Example 1. The graph in Figure 1 is a BAF with six arguments a; b; c; d; e; f . The
dashed and the standard arrows denote supports and attacks, respectively. The co-existence
of supports and attacks entails the existence of implicit attacks. For instance, under both
the abstract and deductive semantics, the fact that a strengthens b and b attacks c
implicitly says that a attacks c. This kind of implicit attack is often called “supported attack”.
If the deductive semantics is adopted, there are other forms of implicit attacks. For
instance, since a supports b and e attacks b, there is an implicit attack from e to a.
Otherwise, a would be acceptable while b would be not, thus contradicting the deductive
support from a to b.</p>
      <p>Other variants of AAFs that, owing to their practical impact, have gained interest
from the research community are those addressing the representation of uncertainty.
In this regard, probabilistic AAFs (prAAFs) are a popular paradigm, and in particular
those following the constellation approach. Here, the dispute is modeled as a set of
possible scenarios, each consisting of a standard AAF (called possible AAF)
associated with a probability of representing all and only the arguments and attacks actually
occurring in the dispute. In particular, two main paradigms have been adopted for
specifying the probability distribution function (pdf), called EX and IND. In the general case,
the extensive form EX is used, where the composition of each possible AAF must be
explicitly specified along with its probability. Otherwise, when independence between
arguments/attacks is assumed, the form IND can be used, where the possible
scenarios and their probabilities are represented compactly and implicitly by specifying the
marginal probabilities of the arguments and attacks.</p>
      <p>
        Recently, for both EX and IND, the complexity of the probabilistic counterpart
PEXT of EXT (asking for the probability that a set of arguments is an extension) has
been characterized for IND in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] for prAFFs and in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] for prBAFs. Interestingly,
when considering IND and the stable or the admissible semantics, moving from prAAfs
to prBAFs makes P-EXT intractable (F P #P -complete).
      </p>
      <p>
        In this paper, we consider the probabilistic Bipolar Argumentation Framework (prBAF),
where the bipolarity of BAFs is combined with the probabilistic modeling of the
uncertainty of prAAFs under the paradigm IND, and provide an efficient algorithm for solving
P-EXT in the cases that the stable or the admissible semantics are considered. The
algorithm is shown to be sound and its efficiency has been experimentally validated.
Related Work. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] first introduced BAFs, where supports have the general “abstract”
semantics of positive interactions between arguments. Later, three more specific
interpretations for supports have been proposed: [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] and [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] introduced the deductive,
e
a
b
c
d
      </p>
      <p>
        f
necessary, and evidential semantics for the support relation, respectively. In this paper,
we focus on the abstract and deductive semantics, but our results also hold for necessary
supports (as shown in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], they are dual to deductive ones). [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] reviews the four different
semantics for supports, and discusses the similarities and differences among these
interpretations. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] introduces a more general framework that incorporates attacks, supports
and a preference relation to decide between conflicting arguments. In [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ],
subarguments in AAF have been introduced, that in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] have been shown to be closely related
with the necessary support. Other related works are [
        <xref ref-type="bibr" rid="ref38 ref5">5, 38</xref>
        ] where, although supports
are not mentioned, similar dependencies have been considered. A detailed survey over
BAFs can be found in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Regarding uncertainty in AAFs, the approaches based on probability theory can be
classified in two categories: those adopting the classical constellations approach [
        <xref ref-type="bibr" rid="ref12 ref13 ref16 ref20 ref21 ref24 ref26 ref29 ref36">26,
16, 36, 12, 13, 24, 29, 20, 21</xref>
        ] and those adopting the recent epistemic one [
        <xref ref-type="bibr" rid="ref27 ref28 ref37">37, 28, 27</xref>
        ].
The former category has the two sub-categories EX [
        <xref ref-type="bibr" rid="ref13 ref16 ref36">16, 36, 13</xref>
        ] and IND [
        <xref ref-type="bibr" rid="ref12 ref20 ref21 ref29">12, 29, 20,
21</xref>
        ], described in the paper. The interested reader can find a more detailed comparative
description of the two categories in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Furthermore, many proposals have been made
where uncertainty is represented by exploiting weights or preferences on arguments
and/or defeats [
        <xref ref-type="bibr" rid="ref1 ref11 ref18 ref3 ref31">3, 1, 31, 18, 11</xref>
        ]. Although the approaches based on weights, preferences,
or probabilities to model uncertainty have proved effective in different contexts, there is
no common agreement on what kind of approach should be used in general. In this
regard, [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ] observed that the probability-based approaches may take advantage from
relying on a well-established and well-founded theory, whereas the approaches based
on weights or preferences do not.
      </p>
      <p>
        As regards probabilistic Bipolar Argumentation Framework (prBAF) they have been
recently introduced [
        <xref ref-type="bibr" rid="ref34 ref35">34, 35</xref>
        ] and the computational complexity of the problem of
computing extensions’ probabilities has been characterized [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        We assume that the reader is familiar with the notions of Abstract Argumentation
Framework (AAF), extension, and acceptability of arguments. We now review Bipolar
Abstract Argumentation Frameworks (BAFs) and the concepts of support, attack and
defense, along with the most popular extensions’ semantics over BAFs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
2.1
      </p>
      <sec id="sec-2-1">
        <title>Bipolar abstract argumentation frameworks</title>
        <p>Definition 1. [BAF] A bipolar abstract argumentation framework (BAF) is a tuple F =
hA; Ra; Rsi, where A is a set of arguments, Ra A A is a defeat/attack relation
and Rs A A is a support relation.</p>
        <p>
          In the first proposal of BAF [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], supports are given an abstract semantics, that is the
opposite of the traditional semantics of attack, inherited from classical AAFs. This was
shown to make the combination of supports and attacks imply the so-called supported
attacks3.
3 [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] discussed also indirect implicit attacks. W.l.o.g., as in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], we disregard them, as their
presence would not affect our results.
        </p>
        <p>Definition 2. [Supported attack] Let F = hA; Ra; Rsi be a BAF, and a; b 2 A. There
is a supported attack from a to b iff there is a sequence a1R1 : : : Rn 1an, with n 2,
where a1 = a, an = b, 8i 2 [1::n 2] Ri = Rs, and Rn 1 = Ra.</p>
        <p>Example 2. In the BAF in Figure 1, there is a supported attack from a to c. Also the
three direct attacks (e; b), (b; c) and (f; d) are special cases of supported attack.</p>
        <p>
          Besides the abstract, other semantics have been proposed for supports (see Related
Work). In particular, we consider the well-established deductive semantics, first
proposed in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Here, “a supports b” is interpreted as a strong correlation between a and b,
meaning that if a is acceptable, then b is acceptable too. As observed in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], under this
semantics, a new form of implicit attack, called d-attack, must be considered.
Definition 3. [d-attack] Given a BAF F = hA; Ra; Rsi and a; b 2 A, there is a
dattack from a to b iff
– aRab, or
– there is an argument a0 such that there is a path from a to a0 consisting of only
support edges, and a0 attacks b, or
– there is an argument a0 such that there is a path from b to a0 consisting of only
support edges, and a attacks a0.
        </p>
        <p>Example below shows that d-attacks include supported attacks, but can be also of
the form of supermediated attacks (described by the last point in Definition 3).
Example 3. Under the deductive semantics for supports, in the BAF of Figure 1, it is
easy to see that the supported attacks reported in Example 2 are d-attacks. Further
dattacks are the supermediated attacks from e to a, and from f to c, that are not supported
attacks.</p>
        <p>In order to analyze what changes when moving from one semantics of supports to
the other (or, equivalently, from one form of implicit attacks to the other), we partition
BAFs into two classes: s-BAFs and d-BAFs, where only supported attacks and d-attacks
are considered, respectively. From now on, we assume the presence of a BAF F =
hA; Ra; Rsi, and, when needed, we will specify whether F is an s- or a d- BAF.</p>
        <p>The concepts of support, attack and defense from sets of arguments are mandatory
to define the extensions over BAFs.</p>
        <p>Definition 4. [Set-support] A set S A set-supports an argument a 2 A iff there is an
argument a0 2 S such that there is a path from a0 to a consisting of only support edges.
Definition 5. [Set-attack] Let F = hA; Ra; Rsi be an s-BAF (resp., d-BAF). A set
S A set-attacks a 2 A iff there is a supported attack (resp., d-attack) from some
b 2 S to a.</p>
        <sec id="sec-2-1-1">
          <title>Definition 6. [Set-defense] A set S A set-defends an argument a 2 A iff, 8b 2 A, if</title>
          <p>fbg set-attacks a then 9c 2 S such that fcg set-attacks b.</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Example 4. Consider the BAF F in Figure 1. Independently from supports’ semantics,</title>
          <p>fa; eg both set-supports and set-attacks b, and also set-attacks c. If F is an s-BAF, then
fa; eg does not set-defend c, since there is a supported attack from a to c, and no attack
from e to a. Observe that fa; eg does not set-defend c if F is a d-BAF either, since,
although e d-attacks a, no argument in fa; eg d-attacks f , that in turn d-attacks c.
2.2</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Semantics</title>
        <p>We first recall the notions of conflict-freeness and safety.</p>
        <p>Definition 7. [Conflict-free and safe sets of arguments] A set of arguments S
A is:
– conflict-free iff 6 9 a; b 2 S such that fag set-attacks b;
– safe iff 6 9 b 2 A such that S set-attacks b and either S set-supports b or b 2 S.</p>
        <sec id="sec-2-2-1">
          <title>Example 5. If the BAF F in Figure 1 is an s-BAF, both fa; eg, and ff; cg are conflict</title>
          <p>free but not safe, while both fa; b; f g and fa; b; dg are conflict-free and safe. If F is a
d-BAF, both fa; eg, and ff; cg are not conflict-free, while both fa; b; f g and fa; b; dg
are still conflict-free and safe.</p>
          <p>
            All the most popular semantics of extensions of “standard” AAFs have been
extended to the case of BAFs [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ]. We start with the stable semantics.
          </p>
          <p>Definition 8. [Stable extension] A set of arguments S
conflict-free and 8a 2 A n S it holds that S set-attacks a.</p>
          <p>A is a stable extension iff S is</p>
          <p>The presence of supports and the fact that, in BAFs, conflict-freeness and safety do
not coincide (while they do in AAFs) is at the basis of the fact that, for some AAF’s
semantics, different variants are considered when moving to BAFs. This is the case of
the admissible semantics.</p>
          <p>Definition 9. [Admissible extension] A set S
A is
– a d-admissible extension iff S is conflict-free and set-defends all of its arguments;
– an s-admissible extension iff S is safe and set-defends all of its arguments;
– a c-admissible extension iff S is conflict-free, closed for Rs and set-defends all of
its arguments.</p>
          <p>In turn, the other semantics subsuming the admissible one are defined as follows. A
set S A is said to be:
– a d-complete (resp. s-complete, c-complete) extension iff S is d-admissible (resp.,
s-admissible, c-admissible) and S contains all the arguments set-defended by S;
– a d-grounded (resp. s-grounded, c-grounded) extension iff S is a minimal (w.r.t. )
d-complete (resp. s-complete, c-complete) extension;
– a d-preferred (resp. s-preferred, c-preferred) extension iff S is a maximal (w.r.t. )
d-complete (resp. s-complete, c-complete) extension;
– a d-ideal (resp. s-ideal, c-ideal) extension iff S is a maximal (w.r.t. ) d-admissible
(resp. s-admissible, c-admissible) extension and S is contained in every d-preferred
(resp. s-preferred, c-preferred) extension.</p>
          <p>We denote the set fd-ad; s-ad; c-ad; st; d-co; s-co; c-co; d-gr; c-gr; c-gr; d-pr; s-pr;
c-pr; d-id; s-id; c-idg consisting of the above semantics as SEM (herein, st means stable,
d-ad d-admissible, s-ad s-admissible, and so on).</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>Example 6. Consider the BAF in Figure 1. Both fa; b; f g and fa; b; dg, although conflict</title>
          <p>free and safe, are not d-ad extensions in both the cases of s-BAF and d-BAF (since b
is not set-defended). Furthermore, for the s-BAF case, we have: both fa; f g and fe; f g
are s-ad, s-gr and s-pr extensions, fa; e; f g is a st, d-ad, d-gr, d-pr, and d-id extension,
ff g is an s-id extension, fe; f g is a c-pr, c-gr and c-id extension.</p>
        </sec>
        <sec id="sec-2-2-3">
          <title>For the d-BAF case we have: fe; f g is the unique stable extension, that is also c</title>
          <p>preferred, c-grounded and c-ideal.</p>
          <p>The fundamental problem of verifying whether a set S of arguments is an extension
over a given BAF under a semantics sem 2 SEM will be denoted as EXTsem(S).
Basically, solving an instance of EXTsem(S) means checking whether a set of arguments
is a reasonable strategy in the dispute, where the meaning of “reasonable” is encoded
in the semantics.</p>
          <p>Given a BAF F = hA; Ra; Rsi, a set S A, and a semantics sem 2 SEM , we
define the boolean function ext( ; sem; S) returning true iff S is an extension under
sem.
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Probabilistic BAFs (prBAFs)</title>
      <p>We now consider the extension of BAFs where uncertainty is addressed and modeled
probabilistically as in “traditional” probabilistic Abstract Argumentation Frameworks
- prAAFs (in particular, we refer to prAAFs employing the constellation approach
recalled in the introduction and adopting the IND approach for specifying pdfs).</p>
      <sec id="sec-3-1">
        <title>A probabilistic BAF (prBAF) F of type IND is a tuple hA; Ra; Rs; PA; PRi where</title>
        <p>A = fa1; : : : ; amg, Ra = f 1; : : : ; ng and Rs = f 1; : : : ; kg are the sets of
arguments, attacks and supports, respectively, and PA = fP (a1); : : : ; P (am)g, PR =
fP ( 1); : : : ; P ( n); P ( 1); : : : ; P ( k)g are their marginal probabilities.</p>
      </sec>
      <sec id="sec-3-2">
        <title>A prBAF F is used to represent a set of possible BAFs, that is the alternative</title>
        <p>cases of dispute that may occur, and their probabilities. More in detail P S = f =
hA0; R0a; R0si j A0 A^ R0a (A0 A0) \ Ra ^ R0s (A0 A0) \ Rsg is the set
of possible BAFs represented by F and the pdf P over the possible scenarios that is
implied by the independence assumption and the marginal probabilities PA; PR is as
follows. For each possible BAF 0 = hA0; R0a; R0si, the probability P ( 0) is:
P ( 0) =Qa2A0 P (a)</p>
        <p>Qa2AnA0 1 P (a)
Q 2R0a P ( )
Q 2R0s P ( )</p>
        <p>Q
Q
2(Rs\(A0 A0))nR0a</p>
        <p>1 P ( )
2(Rs\(A0 A0))nR0s 1 P ( ) :</p>
      </sec>
      <sec id="sec-3-3">
        <title>The size of a prBAF of type IND is O(jAj + jRaj + Rsj + jPAj + jPRj).</title>
        <p>(1)</p>
      </sec>
      <sec id="sec-3-4">
        <title>Example 7. Consider a prBAF F 0 of form IND, where A; Ra and Rs are those of Figure</title>
        <p>1, and PA and PR are the following: P (a) = P (b) = P (c) = P (d) = P (f ) = 1,
P (e) = 0:5, P (e; b) = 0:5 and the probabilities of the other supports and attacks
are equal to 1. We have three possible scenarios: 1 = hA; Ra; Rsi, 2 = hA; Ra n
f(e; b)g; Rsi, 3 = hA n feg; Ra n f(e; b)g; Rsi, whose probabilities are: P ( 1) =
0:25, P ( 2) = 0:25, P ( 3) = 0:5.</p>
        <p>In what follows, given a prBAF F = hA; Ra; Rs; PA; PRi, we denote as F : =</p>
      </sec>
      <sec id="sec-3-5">
        <title>1; : : : ; m the possible BAFs that are assigned non-zero probability by P, and as F :P = P ( 1); : : : ; P ( m) their probabilities.</title>
        <p>The probabilistic versions of the two sub-classes s-BAF and d-BAF will be called
s-prBAF and d-prBAF, respectively.</p>
        <p>When switching to the probabilistic setting, the decision problem EXTsem(S) makes
no sense, since a number of different scenarios are possible, and a set of arguments can
be an extension in a some scenarios, but not in others. Thus, the most natural
“translation” of the problem of examining the “reasonability” of a set of arguments S becomes
the functional problem P-EXTsem(S) of evaluating the probability that S is an
extension, according to the following definition.</p>
        <p>Definition 10 (P-EXTsem(S) and P sem(S)). Given a prBAF F , a set S of arguments,
and a semantics sem 2 SEM , P-EXTsem(S) is the problem of computing the
probability P sem(S) that S is an extension under sem, i.e.</p>
        <p>F</p>
        <p>P sem(S) =</p>
        <p>F</p>
        <p>X</p>
        <p>F :P ( )
2 F: ^ ext( ; sem; S)
(2)
Example 8. Continuing examples 6 and 7, we now compute the probability that S =
fa; eg is d-admissible in both the s-and d- prBAF cases.</p>
        <p>Case s-prBAF: S is d-admissible in both
P d-ad(S) = P ( 1) + P ( 2) = 0:5.</p>
        <p>Case d-prBAF: S is d-admissible only in 2, as in
missing, thus we have P d-ad(S) = P ( 2) = 0:25.
1 and
2 (as e is missing in</p>
        <p>3), thus
1 e d-attacks a and in
3 e is
4</p>
        <p>An algorithm for computing P sem(S)</p>
        <p>F
We now provide our main contribution, that is the definition of an algorithm for
efficiently computing the probability that a set of arguments is an extension according to a
semantics sem 2 fst; d-ad; s-ad; c-adg.</p>
        <p>
          The algorithm is based on the following results, provided in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], that hold for
traditional prAAF of type IND. A PrAAf of type IND correspond to a prBAF of type
IND where the support relation is empty.
        </p>
        <p>
          Fact 1 [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] Given a prAAF F = hA; Ra; ;; PA; PRi and a set S A of arguments,
the probability that S is an admissible extension in F is equal to P1(S) P2(S) P3(S),
where4:
4 Note that an empty product evaluates to 1.
– P1(S) = Q a2S PA(a),
– P2(S) = Q (a; b) 2 Ra 1 PR((a; bi)) , and
^ a 2 S
^ b 2 S
– P3(S) = Q d2AnS P31(S; d)+ P32(S; d)+ P33(S; d) , where:
        </p>
        <p>P31(S; d) = 1 PA(d),
P32(S; d) = PA(d)</p>
        <p>Q (d; b) 2 Ra 1 PR((d; b)) ,</p>
        <p>^b 2 S
P33(S; d) = PA(d)</p>
        <p>1
1</p>
        <p>Q (a; d) 2 Ra
^a 2 S</p>
        <p>
          Q (d; b) 2 Ra 1 PR((d; b))
^b 2 S
1 PR((a; d))
Fact 2 [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] Given a prAAF F = hA; Ra; ;; PA; PRi and a set S A of arguments,
the probability that S is a stable extension in F is equal to P1(S) P2(S) P3(S), where
P1(S) and P2(S) are defined as in Fact 1 and
        </p>
        <p>Y
d2AnS
P3(S) =</p>
        <p>P31(S; d) + P32(S; d)</p>
        <p>Before defining the algorithm we introduce some preliminary notations used in its
definition. Formally, given a prBAF F = hA; Ra; Rs; PA; PRi, we consider the sets:
– F :Ae = faj 9ha; bi 2 Rs _ 9hb; ai 2 Rsg (called set of supp-arguments, as they
are those involved in supports), and
– F :Re = fha; bi 2 (Ra [ Rs) j (a 2 Ae _ b 2 Aeg (called set of supp- attacks and
supports, as they are attacks/supports incident to supp-arguments).</p>
        <p>The algorithm evaluation strategy is based on the notions of contraction and
completion. A contraction for a prBAF F = hA; Ra; Rs; PA; PRi is a prBAF F =
hA ; Ra; Rs; PA; PRi where:
– A A and A n A F :Ae;
– Ra Ra \ (A A ) and Ra n Ra F :Re;
– Rs Rs \ (A A );
– PA(a) = 1 if a 2 F :Ae and PA(a) = PA(a) otherwise;
– PR(ha; bi) = 1 if a 2 F :Ae _ b 2 F :Ae, and PR(ha; bi) = PR(ha; bi) otherwise.</p>
      </sec>
      <sec id="sec-3-6">
        <title>Basically, F ’s supports are a subset of F ’s, and arguments (resp., attacks) are a subset</title>
        <p>of F ’s containing at least the non supp-arguments (resp., the non supp-attacks). Then,
the probabilities are copied from those specified in F , except for those over supp-
arguments and attacks, that are overwritten with 1.
(3)</p>
      </sec>
      <sec id="sec-3-7">
        <title>E (F ) will denote the set of possible contractions of F . For F the probability of F given F as: 2 E (F ), we define</title>
        <p>P (F jF ) = Y PF (a)
a2Ae</p>
        <p>Y
2Re\(A</p>
        <p>A )</p>
        <p>PF ( );</p>
      </sec>
      <sec id="sec-3-8">
        <title>As regards completions, their definition uses the function cert(F ), returning the</title>
      </sec>
      <sec id="sec-3-9">
        <title>BAF consisting of all and only the arguments in F :Ae plus the arguments in F involved in the attacks/supports in F :Re and the attacks/supports of F that appear in F :Re. More formally, given a prBAF F = hA; Ra; Rs; PA; PRi, cert(F ) is the BAF hA0; R0a; R0si such that:</title>
        <p>– A = F :Ae [ fa j a 2 A ^ 9b 2 As:t:ha; bi 2 F :Re _ hb; ai 2 F :Reg,
– R0a = Ra \ F :Re,
– R0s = Rs \ F :Re.</p>
        <p>Thus, the completion of F is the prBAF compl(F ) = hA0; R0a; R0s; PA0; PR0i where:
– A0 = A and R0s = Rs;
– R0a = Ra[R0, where R0 consists of the s- or the d- attacks of cert(F ), depending on
whether F is an s- or a d- prBAF;
– 8a 2 A, PA0(a) = PA(a);
– 8 2 R0a, if 2 R0 then PR0( ) = 1, else PR0( ) = PR( ).
– 8 2 R0s, PR0( ) = PR( ).</p>
        <p>We now define Algorithm 1 that computes the probability that a set of arguments S
is an extension for F according to the semantics sem 2 fst; d-ad; s-ad; c-adg for both
s- and d-prBAFs by iterating over E (F ).</p>
      </sec>
      <sec id="sec-3-10">
        <title>Algorithm 1 first computes the sets F :Ae and F :Re of supp-arguments and supp</title>
        <p>attacks and supports of F (Lines 2-3) and it initializes P r to 0. Then it iterates over the
possible contractions of F by iterating over the subsets of F :Ae (Line 4) and then for
each subset A0e of F :Ae iterating over the subsets of Re \ (A0e A0e) (Line 5).</p>
      </sec>
      <sec id="sec-3-11">
        <title>The contraction F o f F corresponding to the sets A0e and R0e is generated by call</title>
        <p>ing function contract (Line 6) and its probability P (F jF ) is computed using
Equation 3 (Line 7). Then the completion F 0 of F is computed as by calling function
complete (Line 8).</p>
        <p>Then the variable P r0 is computed according to the following definition (Lines
919):
– P r0 = 0:0 if sem = s-ad and S is not safe in cert(F 0),
– P r0 = 0:0 if sem = s-ad and S is not closed for supports over cert(F 0),
– P r0 = 1:0, otherwise.</p>
        <p>Next, the probability P r that S is an admissible/stable extension in the prAAF
obtained removing supports by F 0 (F ) is computed according to the formulas reported in
Facts 1 and 2 (Lines 20- 26). Specifically function computePrAAF is responsible for
computing the probability P r that S is an admissible/stable extension in F and P r is
added to the probability P r. Finally P r is returned.
Lemma 1. Let F be a prBAF and S a set of its arguments. For sem 2 fd-ad; s-ad; c-ad; stg,
it holds that PFsem(S) = PF 2E(F) P (F jF ) PFsem(S).</p>
        <p>The following lemma state that the method for computing P sem(S) for each F 2
E (F ) used in Algorithm 1 is correct. Indeed, it states that P semF(S) can be computed
F
by taking the prAAF F obtained by removing the supports from the completion of</p>
      </sec>
      <sec id="sec-3-12">
        <title>F , and then using over F any state-of-the-art algorithm for computing the extensions’</title>
        <p>probabilities over “traditional” prAAFs (e.g. using the formulas reported in Facts 1
and 2).</p>
        <p>Lemma 2. Let F be a prBAF, F a contraction for F , F the prAAF obtained from
compl(F ) by removing the supports, and S a set of arguments of F . Then:
Proof (Sketch). The statement can be proved by exploiting the fact that, since supp-
arguments and attacks in contractions are certain, safeness and closure for Rs hold over</p>
      </sec>
      <sec id="sec-3-13">
        <title>F iff they hold over cert(compl(F )). The detailed proof is omitted for space rea</title>
        <p>sons. 2
Theorem 1. For sem 2 fd-ad; s-ad; c-ad; stg, Algorithm 1 computes P sem(S) for both
s- and d- prBAFs in time O(2jF:Aej+F:Eej F (jF j)), F is a polynomiFal function.
Proof. The fact that Algorithm 1 computes P sem(S) followos form the fact that it
computes PF 2E(F) P (F jF ) PFsem(S). SpeFcifically, Lemma 1 ensures that PFsem(S)
can be computed as PF 2E(F) P (F jF ) PFsem(S), where for each F 2 E (F ).
2M. oreover, for each F 2 E (F ) Algorithm 1 computes PFsem(S) as specified by Lemma
Finally, it is straightforward to see that computing P sem(S) as done by Algorithm 1
F
(i.e., following Lemma 2 and applying the formulas reported in Facts 1 and 2) is
feasible in time O(F (jF j)), where F is a polynomial function. Hence, since jE (F )j
2jF:Aej+F:Eej, it follows that Algorithm 1 runs in time O(2jF:Aej+F:Eej F (jF j)),
which completes the proof. 2
4.2</p>
        <sec id="sec-3-13-1">
          <title>Experimental validation</title>
          <p>In this section we report a preliminary experimental assessment of the efficiency of
Algorithm 1. To this end we compared running times of Algorithm 1 (denoted as
CONTRACT in what follows) with a naive algorithm that computes P sem(S) by directly
F
applying Equation 2 of Definition 10 (denoted as NAIVE in what follows).</p>
          <p>We perform experiments over 100 prBAFs with a number of arguments ranging
over f6; 8; 10; 12; 14g. Specifically we randomly generate 20 prBAFs for every
number of arguments in f6; 8; 10; 12; 14g. Figure 2 reports the average running times of
CONTRACT and NAIVE vs the number of arguments in the prBAFs.</p>
          <p>From the experiments it follows that CONTRACT outperforms NAIVE for all the
considered number of arguments. However, it is worth noting that even using CONTRACT
computing P sem(S) requires a large amount of time (the algorithm was halted after 30</p>
          <p>F
minutes) on prBAFs with more than 14 arguments.</p>
          <p>1×106
100000
10000
1000
100
10</p>
          <p>CONTRACT</p>
          <p>NAIVE
6
8
10
12</p>
          <p>14</p>
          <p>Num. of Arguments
In this paper we devised an algorithm for computing extensions’ probabilities over
prBAFs of type IND when the stable, d-admissible, s-admissible or c-admissible
semantics are considered. The correctness of the algorithm has been formally proved and
its efficiency experimentally validated w.r.t. the naive computation based on the
enumeration of possible BAFs. The gain in efficiency of the proposed algorithm is due to
the fact that it enumerates contractions rather than possible BAFs and in most cases the
number of possible contractions is much smaller than the number of possible BAFs.
However, from the experiments it turns out that the algorithm is not able to deal with
large prBAFs in reasonable time. Hence, for large prBAFs resorting to estimating
extensions’ probabilities is reasonable. An interesting research direction for future work
is that of applying the approach based on enumerating contractions to improve the
efficiency of estimation algorithms.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A new approach for preference-based argumentation frameworks</article-title>
          .
          <source>A. Math. Artif. Intell</source>
          .
          <volume>63</volume>
          (
          <issue>2</issue>
          ),
          <fpage>149</fpage>
          -
          <lpage>183</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semantics of abstract argument systems</article-title>
          . In: Argum. in Artif. Intell., pp.
          <fpage>25</fpage>
          -
          <lpage>44</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.M.:</given-names>
          </string-name>
          <article-title>Persuasion in practical argument using value-based argumentation frameworks</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>13</volume>
          (
          <issue>3</issue>
          ),
          <fpage>429</fpage>
          -
          <lpage>448</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Boella</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gabbay</surname>
          </string-name>
          , D.M.,
          <string-name>
            <surname>van der Torre</surname>
            ,
            <given-names>L.W.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villata</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Support in abstract argumentation</article-title>
          .
          <source>In: Proc. of COMMA 2010</source>
          . pp.
          <fpage>111</fpage>
          -
          <lpage>122</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Brewka</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Abstract dialectical frameworks</article-title>
          .
          <source>In: Proc. of KR</source>
          (
          <year>2010</year>
          ), http://aaai.org/ocs/index.php/KR/KR2010/paper/view/1294
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagasquie-Schiex</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments in bipolar argumentation frameworks</article-title>
          .
          <source>In: Proc. of ECSQARU</source>
          . pp.
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagasquie-Schiex</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          :
          <article-title>Bipolar abstract argumentation systems</article-title>
          . In: Argum. in Artif. Intell., pp.
          <fpage>65</fpage>
          -
          <lpage>84</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagasquie-Schiex</surname>
            ,
            <given-names>M.C.</given-names>
          </string-name>
          :
          <article-title>Bipolarity in argumentation graphs: Towards a better understanding</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>54</volume>
          (
          <issue>7</issue>
          ),
          <fpage>876</fpage>
          -
          <lpage>899</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Garc´ıa,
          <string-name>
            <given-names>A.J.</given-names>
            ,
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.R.</surname>
          </string-name>
          :
          <article-title>Backing and undercutting in abstract argumentation frameworks</article-title>
          .
          <source>In: Proc. of FoIKS</source>
          . pp.
          <fpage>107</fpage>
          -
          <lpage>123</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gottifredi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Garc´ıa,
          <string-name>
            <given-names>A.J.</given-names>
            ,
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.R.:</surname>
          </string-name>
          <article-title>A survey of different approaches to support in argumentation systems</article-title>
          .
          <source>Know. Eng. Review</source>
          <volume>29</volume>
          (
          <issue>5</issue>
          ),
          <fpage>513</fpage>
          -
          <lpage>550</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Coste-Marquis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Koniec-zny, S.,
          <string-name>
            <surname>Marquis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ouali</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Weighted attacks in argumentation frameworks</article-title>
          .
          <source>In: Proc. of KR</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Doder</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation frameworks - A logical approach</article-title>
          .
          <source>In: Proc. of SUM</source>
          . pp.
          <fpage>134</fpage>
          -
          <lpage>147</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Dondio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Toward a computational analysis of probabilistic argumentation frameworks</article-title>
          .
          <source>Cybernetics and Systems</source>
          <volume>45</volume>
          (
          <issue>3</issue>
          ),
          <fpage>254</fpage>
          -
          <lpage>278</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancarella</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing ideal sceptical argumentation</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <issue>10</issue>
          -
          <fpage>15</fpage>
          ),
          <fpage>642</fpage>
          -
          <lpage>674</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thang</surname>
            ,
            <given-names>P.M.:</given-names>
          </string-name>
          <article-title>Towards (probabilistic) argumentation for jury-based dispute resolution</article-title>
          .
          <source>In: Proc. of COMMA</source>
          . pp.
          <fpage>171</fpage>
          -
          <lpage>182</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>The computational complexity of ideal semantics</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>173</volume>
          (
          <issue>18</issue>
          ) (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McBurney</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsons</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Weighted argument systems: Basic definitions, algorithms, and complexity results</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <issue>2</issue>
          ) (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Complexity of abstract argumentation</article-title>
          . In: Argum. in Artif. Intell., pp.
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation</article-title>
          .
          <source>In: Proc. of IJCAI</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation frameworks</article-title>
          .
          <source>ACM Trans. Comput. Log</source>
          .
          <volume>16</volume>
          (
          <issue>3</issue>
          ),
          <volume>22</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Probabilistic bipolar abstract argumentation frameworks: complexity results</article-title>
          .
          <source>In: Proceedings of IJCAI 2018</source>
          . pp.
          <fpage>1803</fpage>
          -
          <lpage>1809</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Complexity of fundamental problems in probabilistic abstract argumentation: Beyond independence</article-title>
          .
          <source>Artificial Intelligence</source>
          <volume>268</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          (
          <year>2019</year>
          ). https://doi.org/https://doi.org/10.1016/j.artint.
          <year>2018</year>
          .
          <volume>11</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Some foundations for probabilistic abstract argumentation</article-title>
          .
          <source>In: Proc. of COMMA</source>
          . pp.
          <fpage>117</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A probabilistic approach to modelling uncertain logical arguments</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>54</volume>
          (
          <issue>1</issue>
          ),
          <fpage>47</fpage>
          -
          <lpage>81</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Probabilistic qualification of attack in abstract argumentation</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>55</volume>
          (
          <issue>2</issue>
          ),
          <fpage>607</fpage>
          -
          <lpage>638</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation with epistemic extensions</article-title>
          .
          <source>In: Proc. of DARe@ECAI</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Probabilistic argumentation with incomplete information</article-title>
          .
          <source>In: Proc. of ECAI</source>
          . pp.
          <fpage>1033</fpage>
          -
          <lpage>1034</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
          </string-name>
          , T.J.:
          <article-title>Probabilistic argumentation frameworks</article-title>
          .
          <source>In: Proc.of TAFA</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30. Mart´ınez,
          <string-name>
            <surname>D.C.</surname>
          </string-name>
          , Garc´ıa,
          <string-name>
            <given-names>A.J.</given-names>
            ,
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.R.</surname>
          </string-name>
          :
          <article-title>On acceptability in abstract argumentation frameworks with an extended defeat relation</article-title>
          .
          <source>In: Proc. of COMMA</source>
          . pp.
          <fpage>273</fpage>
          -
          <lpage>278</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Modgil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Reasoning about preferences in argumentation frameworks</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>173</volume>
          (
          <issue>9- 10</issue>
          ),
          <fpage>901</fpage>
          -
          <lpage>934</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Nouioua</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Risch</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Bipolar argumentation frameworks with specialized supports</article-title>
          .
          <source>In: Proc. of ICTAI</source>
          . pp.
          <fpage>215</fpage>
          -
          <lpage>218</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
          </string-name>
          , T.J.:
          <article-title>Semantics for evidence-based argumentation</article-title>
          .
          <source>In: Proc. of COMMA</source>
          . pp.
          <fpage>276</fpage>
          -
          <lpage>284</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Polberg</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Empirical evaluation of abstract argumentation: Supporting the need for bipolar and probabilistic approaches</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>93</volume>
          ,
          <fpage>487</fpage>
          -
          <lpage>543</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Proietti</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Polarization and bipolar probabilistic argumentation frameworks</article-title>
          .
          <source>In: Proc. of Work. AI3</source>
          . pp.
          <fpage>22</fpage>
          -
          <lpage>27</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Rienstra</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Towards a probabilistic dung-style argumentation system</article-title>
          .
          <source>In: Proc. of AT</source>
          . pp.
          <fpage>138</fpage>
          -
          <lpage>152</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A probabilistic semantics for abstract argumentation</article-title>
          .
          <source>In: Proc. of ECAI</source>
          . pp.
          <fpage>750</fpage>
          -
          <lpage>755</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Verheij</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>The toulmin argument model in artificial intelligence</article-title>
          . In: Argum. in Artif. Intell., pp.
          <fpage>219</fpage>
          -
          <lpage>238</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>