<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Is Your Argument Still Skeptically Accepted?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gianvincenzo Alfano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Greco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Parisi</string-name>
          <email>fparisig@dimes.unical.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <kwd-group>
        <kwd>Argumentation Skeptical Acceptance Preferred Semantics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>added/retracted by users to express their point of view in response to the last moves
made by the adversaries.</p>
      <p>
        Recently, the definition of evaluation algorithms taking into account such dynamic
aspects has received an increasing attention, as in these situations incremental
computation techniques could greatly improve performance [
        <xref ref-type="bibr" rid="ref14 ref19 ref3 ref37">37, 14, 3, 19</xref>
        ]. In this regard, a new
track focusing on solvers processing dynamic AFs has been recently proposed for the
upcoming edition of ICCMA competition [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        In this paper, we discuss the recently proposed algorithm SPA [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] which
incrementally solves the following computational task: Given an AF A0, a goal argument
g whose skeptical preferred acceptance w.r.t. A0 is known, and an update u, decide
whether g is skeptical preferred accepted w.r.t. the updated AF u(A0), that is, decide if
g belongs to every preferred extension of u(A0). Thus, we focus on how to efficiently
and incrementally solve the ICCMA computational task DS-pr [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ].
      </p>
      <p>
        Contributions We present SPA [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], an incremental algorithm for computing the
Skeptical Preferred Acceptance of a goal within a dynamic AF, with the following
contributions:
– Given an update and an argument, we identify a set of arguments, called supporting
set, which contains all the arguments whose acceptance status may change after the
update and propagate up to the goal argument.
– Given the supporting set, we define the concept of context-based AF that allows
us to compute the skeptical preferred acceptance of an argument by focusing on
a smaller AF containing the supporting set as well as additional arguments and
attacks representing auxiliary information on the external context.
– SPA enables the computation on context-based AFs by means of (non-incremental)
state-of-the-art AF solvers. Our solution relies on incrementally maintaining the
ideal extension of the given AF. However, to show the relevance of using the ideal
extension, we also consider a simpler version of our algorithm (called SPA-base)
which does not consider the information provided by the ideal extension.
– We report on experiments showing the effectiveness of our approach. We compare
both SPA and SPA-base with the solver that won the ICCMA’17 competition for
the computational task DS-pr. Both SPA and SPA-base significantly beat the
computation from scratch, and SPA performs better than SPA-base on average.
      </p>
      <p>
        There has been an extensive body of work on managing changes in
argumentation [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. Besides the above-cited works, other significant efforts coping with
dynamics aspects of AFs include [
        <xref ref-type="bibr" rid="ref11 ref13 ref18 ref2 ref21 ref23 ref4 ref5 ref8 ref9">13, 21, 23, 11, 18, 2, 4, 9, 8, 5</xref>
        ]. Similarly to SPA, some
approaches focused on local computation in dynamic AFs [
        <xref ref-type="bibr" rid="ref14 ref3 ref32 ref33 ref34 ref37">37, 14, 32, 34, 33, 3</xref>
        ] but with
the aim of recomputing extensions. However, SPA is the first approach addressing the
problem of efficiently and incrementally computing skeptical acceptance for dynamic
AFs.
We assume the existence of a set Arg of arguments. An (abstract) argumentation
framework [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] (AF) is a pair hA; S i, where A Arg is a set of arguments, and S A A is
a binary relation over A whose elements are called attacks.
      </p>
      <p>Given an AF hA; S i and arguments a; b 2 A, we say that a attacks b iff (a; b) 2 S ,
and that a set S A attacks b iff there is a 2 S attacking b. We use S+ = fb j 9a 2 S :
(a; b) 2 S g to denote the set of arguments attacked by S. Moreover, we say that S A
defends a iff 8b 2 A such that b attacks a, there is c 2 S such that c attacks b. A set S A
of arguments is said to be: (i) conflict-free if there are no a; b 2 S such that a attacks b;
(ii) admissible if it is conflict-free and it defends all its arguments.</p>
      <p>
        An argumentation semantics specifies the criteria for identifying a set of arguments
that can be considered “reasonable” together, called extension. A preferred extension of
an AF A is a maximal (w.r.t. ) admissible set of A . The ideal extension of A is the
biggest (w.r.t. ) admissible set of A which is contained in every preferred extension of
A . It is well-known that every AF admits exactly one ideal extension which is contained
in the intersection of the preferred extensions, which are at least one [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
      <p>Given an AF A = hA; S i and an argument g 2 A, we say that g is skeptically
accepted w.r.t. A under the preferred semantics iff for each preferred extension E of A
it holds that g 2 E. In the following, we use SAA (g) to denote the skeptical acceptance
(either true or false) of g w.r.t. AF A .</p>
      <p>Example 1. Figure 1(a) shows the graph of the AF AF0 = hA0; 0i where A0 = fa; b; c; : : : ;
lg and 0 includes, among others, attacks (a; b), (b; a), and (c; d). The preferred
extensions of AF0 are Epr = fa; d; f; h; j; lg and E0pr = fb; d; f; h; kg, while the ideal
extension of AF0 is Eid = fd; f; hg. Thus, SAAF0 (d) is true, and so is for SAAF0 (f) and
SAAF0 (h), while for any other argument x, SAAF0 (x) =false.</p>
      <p>Fact 1 Let A be an AF, E the ideal extension of A , and g an argument of A . If g 2 E
then SAA (g) =true. On the other hand, if g 2 E+ then SAA (g) =false.
Updates Performing an update on an AF A0 means modifying it into an AF A by
adding or removing arguments or attacks. We use +(a; b), with a; b 2 A0 and (a; b) 62 S0,
(resp. (a; b), with (a; b) 2 S0) to denote the addition (resp. deletion) of an attack (a; b),
and u(A0) to denote the application of update u = (a; b) to AF A0 (where means
either + or ). Applying an update u to an AF A0 implies that the extensions prescribed
by a given semantics, as well as the arguments that are skeptical accepted, may change.
Example 2. Continuing with our running example, let u = +(h; d). The ideal extension
of u(AF0) is ff; hg, while the preferred extensions are fa; f; h; j; lg and fb; f; h; kg.
Thus, only f and h are skeptically accepted w.r.t. u(AF0).</p>
      <p>As for the addition (resp. deletion) of a set of isolated arguments (i.e., arguments not
adjacent to any other argument in the graph), it is easy to see that if A is obtained from
A0 through the addition (resp. deletion) of a set S of isolated arguments, then every
argument in S is trivially skeptically accepted (resp., not accepted) w.r.t. A . Indeed,
if E0 is an extension for A0, then E = E0 [ S (resp. E = E0 n S) is an extension for
A containing every (resp., none) argument in S. Of course, if arguments in S are not
isolated, for addition we can first add isolated arguments and then add attacks involving
these arguments, while for deletion we can first delete all attacks involving arguments
in S. Thus we do not consider these kinds of updates in the following, and focus on the
addition and deletions of attacks.</p>
      <p>Notation for reachability and other useful concepts Given an AF A = hA; S i and an
argument x, we use ReachA (x) to denote the set of arguments that are reachable from x
in the AF A . Moreover, we use ReachA1(x) to denote the set of arguments from which
x is reachable in A . For instance, for the AF AF0 = hA0; 0i of our running example
(see Figure 1(a)), we have that ReachAF0 (d) = fd; c; g; h; ig, and ReachAF10 (h) = A0 n
fi; j; k; lg. We write ReachA (x) = 0/ and ReachA1(x) = 0/ if x is not in A .</p>
      <p>We use H(A ; u) to denote the larger AF between A and u(A ), that is, H(A ; u)
is (i) the updated AF u(A ) if u is an addition update (it includes the attack added
through u), (ii) the original AF A if u is a deletion (the removed attack is still considered
in H(A ; u)). For instance, if u = +(h; d) then H(AF0; u) = hA0; 0 [ f(h; d)gi, while
H(AF0; u) = AF0 for any deletion update u.</p>
      <p>
        We use P (S; A ) to denote the restriction of AF A = hA; S i to a subset S A of
its arguments [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], that is P (S; A ) = hS; S \ (S S)i. For instance, if S = fc; dg then
P (S; AF0) = hfc; dg; f(c; d); (d; c)gi.
      </p>
      <p>Finally, given A1 = hA1; S1i and A2 = hA2; S2i, we denote as A1 t A2 = hA1 [
A2; S1 [ S2i the union of the two AFs.
3</p>
    </sec>
    <sec id="sec-2">
      <title>Supporting Set</title>
      <p>In this section, we introduce the concept of supporting set which intuitively consists
of the set of arguments that needs to be taken into account in order to determine the
skeptical acceptance of an argument of interest after performing an update. We provide
a parametric definition of supporting set that will enable the characterization of different
portions of a given AF, called context-based AFs, that will be used for two different
purposes: (i) recompute the skeptical acceptance of a goal w.r.t. the updated AF, and (ii)
recompute the ideal extension of the updated AF.</p>
      <p>Before defining the supporting set, we introduce the auxiliary notion of steadiness
of an argument. Given an AF A = hA; S i, the ideal extension E of A , and an update
u = (a; b), we first define E(u) as the subset of E consisting of the arguments which
are not reachable from b in A , i.e., E(u) = fz j z 2 E; z 62 ReachA (b)g. Intuitively, the
acceptance status of the arguments in E(u) is not affected by u as they are not
reachable from it. Then, the set of steady arguments for u = (a; b) w.r.t. A is defined as
StdA (u) = (E(u))+ n fbg, i.e., the arguments attacked by E(u) in A and that will be still
attacked by E(u) in u(A ). Argument b is not included in StdA (u) as it may be no longer
attacked by a 2 E(u) after performing u = (a; b); however, it will be considered for
positive updates in Definition 1. For the AF AF0 of our example, where Eid = fd; f; hg,
if u = +(h; d) then Eid (u) = ffg and StdAF0 (u) = fe; gg Ei+d = fc; e; g; ig.
Definition 1 (Supporting set). Let A = hA; S i be an AF, u =
ideal extension of A , and g an argument in A. Let
(a; b) an update, E the
– Sup0(u; A ; E; g) =
&gt;:fbg otherwise:
80/ if u = +(a; b) ^ b 2 (E(u))+;
&gt;
&lt;</p>
      <p>0/ if b 62 ReachH(1A ;u)(g);
y 2 ReachH(1A ;u)(g) ^ y 62 StdA (u)g.</p>
      <p>– Supi+1(u; A ; E; g)= Supi(u; A ; E; g) [ fy j 9(x; y) 2 S s:t: x 2 Supi(u; A ; E; g) ^
Let n be the natural number such that Supn(u; A ; E; g) = Supn+1(u; A ; E; g). The
supporting set Sup(u; A ; E; g) is:</p>
      <p>Sup(u; A ; E; g) = Supn(u; A ; E; g) \ ReachG1(g)
(1)
where G=P (Supn(u; A ; E; g); H(A ; u)) is the restriction of H(A ; u) to Supn(u; A ; E; g).</p>
      <p>Finally, when g is not specified, the supporting set, denoted as Sup(u; A ; E; ?), is
defined as Sup(u; A ; E; g) except that all the checks concerning Reach 1 are omitted.</p>
      <p>Intuitively, Sup(u; A ; E; g) consists of the arguments whose status may change after
performing an update u and such that their change can imply a change of the status of g.
More in detail, Sup(u; A ; E; g) for u = (a; b) and g consists of the arguments that (i)
can be reached from b without using any steady argument y; and (ii) allow to reach g in
H(A ; u) by using only the arguments in Supn(u; A ; E; g). In fact, Equation (1) entails
that an argument of Supn(u; A ; E; g) will be in Sup(u; A ; E; g) only if it can reach g in
the restriction of H(A ; u) to Supn(u; A ; E; g)—the other arguments in Supn(u; A ; E; g)
are not needed to determine the acceptance status of g, and thus they are pruned by
Equation (1).</p>
      <p>When no argument g is specified, the set Sup(u; A ; E; ?) is built by ignoring
condition (ii) above. It is easy to see that, for any argument g, Sup(u; A ; E; g) Sup(u; A ; E;
?) ReachA (b), where b is the argument in the update u = (a; b). Moreover, Sup(u; A ;
E; g) may be empty even if g 2 ReachA (b). Finally, if Sup(u; A ; E; g) 6= 0/ then the
arguments of at least one path from b to g belong to Sup(u; A ; E; g).</p>
      <p>Example 3. For the goal c, we have that Sup0(u; AF0; Eid ; c) = fdg, Sup1(u; AF0; Eid ; c) =
fc; dg, and Sup2(u; AF0; Eid ; c) = fc; dg (the latter does not contain g since g 2 StdAF0 (u)).</p>
      <p>Thus, Sup(u; AF0; Eid ; c) = fc; dg as both c and d allow to reach c in the restriction of
the updated AF to fc; dg. Analogously, we have that Sup(u; AF0; Eid ; ?) = fc; dg.</p>
      <p>Consider now the goal h. Again Sup0(u; AF0; Eid ; h) = fdg, and Sup1(u; AF0; Eid ; h) =
Sup2(u; AF0; Eid ; h) = fc; dg. However, Sup(u; AF0; Eid ; h) = 0/ as fc; dg\ReachG1(h) =
0/ , where G = P (fc; dg; u(AF0)). Finally, for the goal a, Sup(u; AF0; Eid ; a) = 0/ .
Theorem 1. Let A0 = hA0; S0i be an AF, E0 the ideal extension of A0, u = (a; b) an
update, A = u(A0) the updated AF, and x an argument in A0. Therefore, if Sup(u; A0;
E0; x) = 0/ then SAA (x) = SAA0 (x).</p>
      <p>Example 4. Since Sup(u; AF0; Eid ; h) = 0/ we can conclude that SAu(AF0)(h) = SAAF0 (h) =
true. Similarly, since Sup(u; AF0; Eid ; a) = 0/ then SAu(AF0) (a) = SAAF0 (a) =false.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Context-Based Argumentation Frameworks</title>
      <p>The supporting set has been used so far to determine whether the status of the goal does
not need to be recomputed. In this section, starting from the supporting set, we define a
restriction of the AF which will be used to compute the status of the goal after an update.
Specifically, given the set Sup(u; A ; E; g) (resp. Sup(u; A ; E; ?)), we define the
contextbased AF CBAF(u; A ; E; g) (resp. CBAF(u; A ; E; ?)). While CBAF(u; A ; E; ?) will
be used to incrementally compute the ideal extension of the updated AF (with the aim
of checking if one of the conditions of Fact 1 holds), CBAF(u; A ; E; g) will be used to
compute the skeptical acceptance SAu(A )(g) w.r.t. the updated AF.</p>
      <p>
        Given an AF A = hA; S i, its ideal extension E, and a set S A, we use Nodes(A ; S;
E) to denote the set of the nodes x 2 A such that there are a node y 2 S and a path from
x to y in A such that all nodes in the path except y do not belong to E [ E+ (i.e., they
are undecided [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]). Analogously, Edges(A ; S; E) is the set of edges (x; z) 2 S such
that there are y 2 S and a path from x to y in A containing (x; z) such that all nodes
in the path except y do not belong to E [ E+. Essentially, if S is the supporting set, to
determine the status of nodes in S we must also consider all nodes and attacks occurring
in paths (of any length) ending in S whose nodes outside S are undecided.
Definition 2 (Context-Based AF). Let A = hA; S i be an AF, u = (a; b), E the ideal
extension of A , and x either an argument in A or the symbol ?. Let S = Sup(u; A ; E; x).
The context-based AF of A w.r.t. u and x is CBAF(u; A ; E; x) = P (Sup(u; A ; E; x);
u(A )) t T1 t T2 where:
– T1 is the union of the AFs hfc; dg; f(c; d)gi s.t. (c; d) is an attack of u(A ) and
c 62 Sup(u; A ; E; x), c 2 E, and d 2 Sup(u; A ; E; x);
– T2 = hNodes(u(A ); S; E); Edges(u(A ); S; E)i.
      </p>
      <p>Example 5. For AF0, where Eid = fd; f; hg, and u = +(h; d), we have seen in Example 3
that Sup(u; AF0; Eid ; c) = fc; dg. Thus CBAF(u; AF0; Eid ; c) = hfc; dg; f(c; d); (d; c)git
T1 t T2 where: T1 = hfh; dg; f(h; d)gi since h 2 Eid does not belong to Sup(u; AF0; Eid ; c)
while d 2 Sup(u; AF0; Eid ; c); and T2 = hfa; b; cg; f(a; b); (b; a); (a; c); (b; c)gi since
there are paths starting from the undecided arguments a and b (fa; bg 6 (Eid [ Ei+d ))
and ending in c 2 Sup(u; AF0; Eid ; c). Thus, CBAF(u; AF0; Eid ; c) is the AF shown in
Figure 1(b). Also, CBAF(u; AF0; Eid ; ?) = CBAF(u; AF0; Eid ; c).</p>
    </sec>
    <sec id="sec-4">
      <title>Algorithm 1 SPA(A0; g; SAA0 (g); u; E0)</title>
      <p>Theorem 2. Let A0 = hA0; S0i be an AF, E0 the ideal extension of A0, u = (a; b) an
update, A = u(A0) the updated AF, and x an argument in A0. Thus, if Sup(u; A0; E0; x) 6=
0/ then x is skeptically accepted w.r.t. A iff it is skeptically accepted w.r.t. the
contextbased AF CBAF(u; A0; E0; x).</p>
      <p>Example 6. Continuing from Example 5, we can conclude that argument c is not
skeptically accepted w.r.t. the updated AF u(AF0) because it is not skeptically accepted w.r.t.
the context-based AF CBAF(u; AF0; Eid ; c) of Figure 1(b) whose preferred extensions
are fa; hg and fb; hg (only h is sceptically accepted w.r.t. the context-based AF).
Theorem 3. Let A0 = hA0; S0i be an AF, E0 the ideal extension of A0, u = (a; b) an
update, and A = u(A0) the updated AF. Then, the ideal extension E of A is such that
E = (E0 n Sup(u; A0; E0; ?)) [ E0, where E0 is the ideal extension of the context-based
AF CBAF(u; A0; E0; ?).</p>
      <p>Example 7. Continuing from Example 5, the ideal extension ff; hg of u(AF0) is equal
to (fd; f; hg n fc; dg) [ fhg where fhg is the ideal extension of CBAF(u; AF0; Eid ; ?).</p>
    </sec>
    <sec id="sec-5">
      <title>5 Incremental Computation</title>
      <p>The results of Theorems 1 and 2, along with those of Theorem 3 and Fact 1, allow us
to define SPA (see Algorithm 1) to decide the skeptical acceptance of a goal g w.r.t. an
AF A0 updated by u = (a; b). Algorithm SPA works as follows. First, the supporting
set S? = Sup(u; A0; E0; ?) is computed at Line 1, and using Theorem 3 the ideal
extension E of the updated AF is computed by invoking an external solver ID-Solver(Aid ),
01 5
01 7
01 6
01 5 ● ● ●● ●●
0101 43 ● ● ● ●● ●
010101 120 ●● ●● ●● ●●●●● ● ● ●●
01 − 1</p>
      <p>ASP
● A−basePS
●
●●● ● ●●●● ● ● ● ●●
● ● ●●●● ● ●
● ●
●</p>
      <p>●
● ● ●● ● ●●● ● ●●●● ●●● ●●
● ● ● ● ● ● ● ● ● ● ●
01 2 10 3
.N of ksAtac
computing the ideal extension of the context-based AF CBAF(u; A0; E0; ?) (Line 3).
Then, using Fact 1, if g belongs to E, then g is skeptically accepted and the algorithm
returns true along with the ideal extension of the updated AF (Line 5). Similarly, if
g belongs to the set of arguments attacked by an argument in E, then g is not
skeptically accepted and the algorithm returns false along with E (Line 7). Otherwise, the
set Sg = Sup(u; A0; E0; g) is built (it can be efficiently done by starting from S?), and
it is checked if it is empty. If this is the case, using Theorem 1, we can conclude that
the acceptance status of g does not change after the update (Line 10). Otherwise, the
context-based AF is built at Line 11 and, using Theorem 2, the skeptical acceptance of
g is recomputed by invoking an external solver SA-Solver(Asa; g) which tells us if g is
skeptically accepted w.r.t. the context-based AF CBAF(u; A0; E0; g) (Line 12).
SPA-base: A version of SPA not using the ideal extension SPA-base is obtained
from SPA by skipping lines 1–7 of Algorithm 1 and assuming E0 = 0/ at lines 8 and 11
to compute Sg and Asa respectively. Also, no ideal extension is returned (i.e., E = ?).
Notice that, similarly to SPA-base, SPA does not use the information provided by the
initial ideal extension when E0 = 0/ , though SPA always incrementally computes the
ideal extension of the updated AF.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Experimental Results</title>
      <p>
        We have implemented a C++ prototype and compared our incremental technique with
ArgSemSAT [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], the solver that won the last ICCMA competition for the task DS-pr
of determining the skeptical preferred acceptance.
      </p>
      <p>
        As for the datasets, we used benchmarks from the DS-pr track of ICCMA’17, that
is, the dataset A2 consisting of 50 AFs with a number of arguments jAj 2 [61; 20K] and
a number of attacks jS j 2 [97; 358K], and the dataset A3 consisting of 100 AFs with
jAj 2 [39; 100K] and jS j 2 [72; 1:26M]. For each AF A0 in the dataset, we randomly
selected an update u and an argument g. Then, we computed SAu(A0)(g) by using 1)
SPA, that is Algorithm 1 where ID-Solver is pyglaf [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and SA-Solver is ArgSemSAT;
2) SPA-base where only ArgSemSAT is used; and 3) ArgSemSAT (from scratch).
      </p>
      <p>For AF A0, update u, and argument g, let tA and tB be the amount of time required
by SPA and SPA-base, respectively, to compute SAu(A0)(g). Let tS be the time required
by ArgSemSAT to compute SAu(A0)(g) from scratch. Then, the improvements of SPA
and SPA-base over ArgSemSAT are defined as ttS and ttS , respectively. Thus, an
imA B
provement equal to x means that the incremental computation is x times faster than the
computation from scratch.</p>
      <p>
        Figure 2 reports the improvement (log scale) of SPA and SPA-base over
ArgSemSAT on datasets A2 (left-hand side) and A3 (right-hand side) for single updates
versus the size of the AFs, i.e., the number of attacks (solid lines are obtained by linear
regression). Both SPA and SPA-base significantly outperform the computation from
scratch, though the improvement decreases as the number of attacks increases—this
behavior is in line with that of algorithms for computing argumentation semantics in the
static setting [
        <xref ref-type="bibr" rid="ref1 ref38 ref39 ref7">38, 39, 7, 1</xref>
        ] and it is further analyzed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] where additional experiments
considering sets of updates performed simultaneously are presented.
      </p>
      <p>Considering the averages of the improvements, SPA and SPA-base turn out to be
5 and 4 orders of magnitude faster than ArgSemSAT, respectively. However, as this can
be skewed by extremely large values of improvements (e.g. 106), we also considered
the medians of improvements for SPA (32 on A2, 134 on A3) and SPA-base (27 on
A2, 40 on A3) (see dashed line in Figure 2), which confirm the significance of the gain
in efficiency. In brief, both SPA and SPA-base generally outperform the computation
from scratch, and SPA is generally faster than SPA-base except for a few AFs whose
initial ideal extension is empty—future work will focus on devising heuristics to take
advantages of both algorithms.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>An efficient algorithm for computing the set of semi-stable extensions</article-title>
          .
          <source>In: FQAS</source>
          . pp.
          <fpage>139</fpage>
          -
          <lpage>151</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing stable and preferred extensions of dynamic bipolar argumentation frameworks</article-title>
          .
          <source>In: AI3</source>
          , co
          <article-title>-located with AI*IA</article-title>
          . pp.
          <fpage>28</fpage>
          -
          <lpage>42</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Efficient computation of extensions for dynamic abstract argumentation frameworks: An incremental approach</article-title>
          .
          <source>In: IJCAI</source>
          . pp.
          <fpage>49</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing extensions of dynamic abstract argumentation frameworks with second-order attacks</article-title>
          .
          <source>In: IDEAS</source>
          . pp.
          <fpage>183</fpage>
          -
          <lpage>192</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A meta-argumentation approach for the efficient computation of stable and preferred extensions in dynamic bipolar argumentation frameworks</article-title>
          .
          <source>Intelligenza Artificiale</source>
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <fpage>193</fpage>
          -
          <lpage>211</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An efficient algorithm for skeptical preferred acceptance in dynamic argumentation frameworks</article-title>
          .
          <source>In: IJCAI</source>
          . p. To appear
          <article-title>(</article-title>
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On scaling the enumeration of the preferred extensions of abstract argumentation frameworks</article-title>
          .
          <source>In: SAC</source>
          . pp.
          <fpage>1147</fpage>
          -
          <lpage>1153</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.:</given-names>
          </string-name>
          <article-title>An incremental approach to structured argumentation over dynamic knowledge bases</article-title>
          .
          <source>In: KR 2018</source>
          . pp.
          <fpage>78</fpage>
          -
          <lpage>87</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Alfano</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.</given-names>
          </string-name>
          :
          <article-title>Incremental computation of warranted arguments in dynamic defeasible argumentation: The rule addition case</article-title>
          .
          <source>In: SAC</source>
          . pp.
          <fpage>911</fpage>
          -
          <lpage>917</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Alviano</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The pyglaf argumentation reasoner</article-title>
          .
          <source>In: ICLP</source>
          . pp.
          <volume>2</volume>
          :
          <fpage>1</fpage>
          -
          <issue>2</issue>
          :
          <issue>3</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Revising option status in argument-based decision systems</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>22</volume>
          (
          <issue>5</issue>
          ),
          <fpage>1019</fpage>
          -
          <lpage>1058</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An introduction to argumentation semantics</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          <volume>26</volume>
          (
          <issue>4</issue>
          ),
          <fpage>365</fpage>
          -
          <lpage>410</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guida</surname>
          </string-name>
          , G.:
          <article-title>SCC-recursiveness: a general schema for argumentation semantics</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>168</volume>
          (
          <issue>1-2</issue>
          ),
          <fpage>162</fpage>
          -
          <lpage>210</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>On topology-related properties of abstract argumentation semantics. A correction and extension to dynamics of argumentation systems: A divisionbased method</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>212</volume>
          ,
          <fpage>104</fpage>
          -
          <lpage>115</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Baumann</surname>
          </string-name>
          , R.:
          <article-title>Splitting an argumentation framework</article-title>
          .
          <source>In: LPNMR</source>
          . pp.
          <fpage>40</fpage>
          -
          <lpage>53</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Baumann</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brewka</surname>
          </string-name>
          , G.:
          <article-title>Expanding argumentation frameworks: Enforcing and monotonicity results</article-title>
          .
          <source>In: COMMA</source>
          . pp.
          <fpage>75</fpage>
          -
          <lpage>86</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          : Argumentation in AI. Artif. Intell.
          <volume>171</volume>
          (
          <issue>10</issue>
          -
          <fpage>15</fpage>
          ),
          <fpage>619</fpage>
          -
          <lpage>641</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Bisquert</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Saint-Cyr</surname>
            ,
            <given-names>F.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagasquie-Schiex</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Characterizing change in abstract argumentation systems</article-title>
          .
          <source>In: Trends in Belief Revision and Argumentation Dynamics</source>
          , vol.
          <volume>48</volume>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>102</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faloci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taticchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Studying dynamics in argumentation with Rob</article-title>
          .
          <source>In: COMMA</source>
          . pp.
          <fpage>451</fpage>
          -
          <lpage>452</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotthoff</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taticchi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Containerisation and dynamic frameworks in ICCMA'19</article-title>
          . In: SAFA Workshop co-located
          <source>with COMMA</source>
          . pp.
          <fpage>4</fpage>
          -
          <lpage>9</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Boella</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaci</surname>
            , S., van der Torre,
            <given-names>L.W.N.:</given-names>
          </string-name>
          <article-title>Dynamics in argumentation with single extensions: Abstraction principles and the grounded extension</article-title>
          .
          <source>In: ECSQARU</source>
          . pp.
          <fpage>107</fpage>
          -
          <lpage>118</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Caminada</surname>
            ,
            <given-names>M.W.A.</given-names>
          </string-name>
          , Dvora´k, W.,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Preferred semantics as socratic discussion</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>26</volume>
          (
          <issue>4</issue>
          ),
          <fpage>1257</fpage>
          -
          <lpage>1292</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Saint-Cyr</surname>
            ,
            <given-names>F.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagasquie-Schiex</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Revision of an argumentation system</article-title>
          .
          <source>In: KR</source>
          . pp.
          <fpage>124</fpage>
          -
          <lpage>134</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Cerutti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacomin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vallati</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>ArgSemSAT: Solving argumentation problems using SAT</article-title>
          . In: COMMA. pp.
          <fpage>455</fpage>
          -
          <lpage>456</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Charwat</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Dvora´</article-title>
          k, W.,
          <string-name>
            <surname>Gaggl</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wallner</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Methods for solving reasoning problems in abstract argumentation - A survey</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>220</volume>
          ,
          <fpage>28</fpage>
          -
          <lpage>63</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Doutre</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mailly</surname>
          </string-name>
          , J.:
          <article-title>Constraints and changes: A survey of abstract argumentation dynamics</article-title>
          .
          <source>Argument &amp; Computation</source>
          <volume>9</volume>
          (
          <issue>3</issue>
          ),
          <fpage>223</fpage>
          -
          <lpage>248</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancarella</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Computing ideal sceptical argumentation</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <issue>10</issue>
          -
          <fpage>15</fpage>
          ),
          <fpage>642</fpage>
          -
          <lpage>674</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          :
          <article-title>The computational complexity of ideal semantics</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>173</volume>
          (
          <issue>18</issue>
          ),
          <fpage>1559</fpage>
          -
          <lpage>1591</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Complexity of abstract argumentation</article-title>
          .
          <source>In: Argumentation in AI</source>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Falappa</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garcia</surname>
            ,
            <given-names>A.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kern-Isberner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.</given-names>
          </string-name>
          :
          <article-title>On the evolving relation between belief revision and argumentation</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          <volume>26</volume>
          (
          <issue>1</issue>
          ),
          <fpage>35</fpage>
          -
          <lpage>43</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Efficient computation of deterministic extensions for dynamic abstract argumentation frameworks</article-title>
          .
          <source>In: ECAI</source>
          . pp.
          <fpage>1668</fpage>
          -
          <lpage>1669</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Incremental computation of deterministic extensions for dynamic argumentation frameworks</article-title>
          .
          <source>In: JELIA</source>
          . pp.
          <fpage>288</fpage>
          -
          <lpage>304</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Greco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Incremental computation of grounded semantics for dynamic abstract argumentation frameworks</article-title>
          .
          <source>In: COREDEMA ECAI Workshop, Revised Selected Papers</source>
          . pp.
          <fpage>66</fpage>
          -
          <lpage>81</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35. Ko¨kciyan, N.,
          <string-name>
            <surname>Yaglikci</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yolum</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An argumentation approach for resolving privacy disputes in online social networks</article-title>
          .
          <source>ACM Trans. Internet Techn</source>
          .
          <volume>17</volume>
          (
          <issue>3</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36. Kro¨ll,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Pichler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Woltran</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <article-title>On the complexity of enumerating the extensions of abstract argumentation frameworks</article-title>
          .
          <source>In: IJCAI</source>
          . pp.
          <fpage>1145</fpage>
          -
          <lpage>1152</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>B.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koons</surname>
          </string-name>
          , R.C.:
          <article-title>Dynamics of argumentation systems: A division-based method</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1790</fpage>
          -
          <lpage>1814</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Toward incremental computation of argumentation semantics: A decompositionbased approach</article-title>
          . Ann. Math. Artif. Intell.
          <volume>67</volume>
          (
          <issue>3-4</issue>
          ),
          <fpage>319</fpage>
          -
          <lpage>358</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
          </string-name>
          , H.:
          <article-title>Partial semantics of argumentation: basic properties and empirical results</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>23</volume>
          (
          <issue>3</issue>
          ),
          <fpage>541</fpage>
          -
          <lpage>562</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Oikarinen</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Woltran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Characterizing strong equivalence for argumentation frameworks</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <issue>14</issue>
          -
          <fpage>15</fpage>
          ),
          <fpage>1985</fpage>
          -
          <lpage>2009</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Rahwan</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simari</surname>
            ,
            <given-names>G.R.</given-names>
          </string-name>
          :
          <source>Argumentation in AI</source>
          . Springer Publishing Company, Incorporated, 1st edn. (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Thimm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villata</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The first international competition on computational models of argumentation: Results and analysis</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>252</volume>
          ,
          <fpage>267</fpage>
          -
          <lpage>294</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>