<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computational Strategies for Trust-aware Abstract Argumentation Frameworks?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bettina Fazzinga</string-name>
          <email>fazzinga@icar.cnr.it</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Flesca</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filippo Furfaro</string-name>
          <email>furfarog@dimes.unical.it</email>
        </contrib>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In order to make AAFs suitable for modeling disputes in scenarios with di
erent characteristics, several variants have been proposed. In particular, Weighted
AAFs are a variant of AAFs where the arguments and/or the attacks can be
associated with weights. The paper in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] introduces the Trust-aware AAFs
(TAAFs), a form of weighted AAFs where the weights are assigned to arguments
and are representative of the trustworthiness of the agents who propose the
arguments. A natural application of T-AAFs is the e-commerce scenario, where
customers share their reviews about products and get a score based on the
quality of their reviews. As an example, consider the Amazon web site, where every
product gets reviews, and every reviewer is classi ed on the basis of the
usefulness of her/his reviews. Figure 1(a) shows one page of the Amazon web site,
containing the information about one of the reviewers. Each Amazon reviewer
has at least three scores: the position in the general ranking of the reviewers, the
number of helpful votes and the number of reviews. Moreover, it is possible to
devise other statistics about the quality of a reviewer such as the percentage of
her/his reviews that are considered useful by other customers (as shown in the
\Amazon Top reviewers" page shown in Figure 1(b)). Building a T-AAF
starting from the reviews of a certain Amazon product could, then, result in using
the content of the reviews as arguments, the contradictions among the reviews'
content as attacks and any suitable trustworthiness measure derived from the
position in the general ranking or the number of helpful votes (possible weighted
with the number of reviews) as trust degree of the reviewers involved in the
product review.
      </p>
      <p>(a)
(b)</p>
    </sec>
    <sec id="sec-2">
      <title>The following example is inspired by the above scenario.</title>
      <p>Example 1. Ann, Mary, Carl and John are reviewing a notebook. Their reviews
contain the following six arguments:
a=`Since it contains up-to-date components, it is expensive'
b=`Nowadays, it is easy to nd cheap up-to-date components. Therefore, that
aspect does not imply the price.'
c=`Since its brand is not high quality, it does not contain up-to-date components'
d =`Since its battery is lightweight, it is lightweight overall'
e=`It is heavy'
f =`The battery is very heavy'.</p>
      <p>Figure 2 shows the corresponding argumentation graph, properly augmented to
highlight who-claims-what (for instance, a and d are claimed by Mary, and
e is claimed by both Ann and Carl). The numbers in brackets represent the
trustworthiness scores, on a scale of 1 to 10, assigned to the agents on the basis
of their past reviews.</p>
      <p>As a matter of fact, reasoning on reviews is a hot topic attracting the interest
of the research community, owing to the popularity of ecommerce sites. In this
context, reasoning on extensions is useful, since the fact that a set of arguments
is an extension means that it provides a reasonable summary of the main
features and critical aspects of the reviewed object. Analogously, reasoning on the
acceptance of an argument helps understand if it can be reasonably considered
representative of the object. Now, in the T-AAF F of Example 1, argument a
does not belong to any extension. However, a is proposed by Mary, who has a
high trust degree. Thus, the analyst can bene t from knowing that, although a
is not accepted, it becomes accepted in the AAF F (with = 2) obtained from
F by discarding what said only by agents whose trust degree is . This means
that the analyst can choose now to consider a a robust argument, given that F
does not contain what said by agents with \low" trust degrees (we recall that
we are in a scale from 1 to 10). Analogously, even if S = fa; f g is not an
(admissible) extension in F , it can be somehow considered a reasonable summary
of the reviews, since it is an extension over the same F . In general, denoting as
\ -extension" (resp., \ -accepted") a set (resp., an argument) that is an
extension (resp., accepted) over F , the following two problems over a T-AAF F are
of interest to the analyst:
{ min-Tver (F; S): What is the minimum trust degree such that the set S is
a -extension over F under ?
{ min-Tacc (F; a): What is the minimum trust degree such that the argument
a is -accepted over F under ?</p>
      <p>
        The complexity of min-Tver (F; S) and min-Tacc (F; a) has been
characterized in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]: in particular, it has been proved that computing min-Tver (F; S)
is intractable for the preferred semantics and that min-Tacc (F; a) is intractable
      </p>
      <sec id="sec-2-1">
        <title>John (9) f</title>
      </sec>
      <sec id="sec-2-2">
        <title>Carl (2) c e</title>
        <p>d
a</p>
        <p>Mary (8)
b</p>
        <p>Ann (1)
for the admissible, complete, stable and preferred semantics. In this paper, we
provide methods for computing min-Tver (F; S) and min-Tacc (F; a) for the
semantics for which they resulted to be intractable (see Table 1). Our strategy
is based on the translation of min-Tver (F; S) and min-Tacc (F; a) into
Integer Linear Programming (ILP), so that they can be e ciently computed by
exploiting the many heuristics already implemented in the commercial solvers.
ver acc
and and
Tver Tacc
min-Tver</p>
        <p>min-Tacc
ad,st,co
gr
pr</p>
        <p>P NP-c FP FPNP [log n]-c</p>
        <p>P P FP FP
coNP-c NP-c FPNP [log n]-c FPNP [log n]-c
{ admissible (ad ): S is an admissible extension i S is con ict-free and its
arguments are acceptable w.r.t. S;
{ stable (st ): S is a stable extension i S is con ict-free and S attacks each
argument in A n S;
{ complete (co): S is a complete extension i S is admissible and every argument
acceptable w.r.t. S is in S;
{ grounded (gr ): S is a grounded extension i S is a minimal (w.r.t. ) complete
set of arguments;
{ preferred (pr ): S is a preferred extension i S is a maximal (w.r.t. ) complete
set of arguments.</p>
        <p>Accepted arguments. An argument a is (credulously) accepted under a
semantics i a belongs to some extension of F . In some sense, checking the
acceptability of an argument is a way of deciding whether a represents a robust
point of view in the discussion modeled by F .</p>
        <p>
          Classical problems: ver and acc. Given an AAF F , a semantics , a set of
arguments S and an argument a, the fundamental problems of verifying whether
S is a extension and whether a is (credulously) accepted (under ) will be
denoted as ver (F; S) and acc (F; a), respectively. The complexity of these
problems, widely studied in the literature [
          <xref ref-type="bibr" rid="ref10 ref13 ref15 ref8">15, 10, 13, 8</xref>
          ], is reported in Table 1.
3
        </p>
        <sec id="sec-2-2-1">
          <title>Trust-aware AAFs</title>
          <p>
            We here recall the Trust-aware AAFs (proposed in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]), a form of weighted
AAFs where weights are associated with the arguments and represent the trust
degree of the agents proposing them. We start introducing an agent trust
function assigning a trust degree to each agent, from which an argument trust
function assigning a trust degree to each argument is derived. Next, we formally
recall the de nitions of the Trust-aware Abstract Argumentation Framework
and of the -restrictions, that are T-AAFs derived from the original T-AAF
by retaining only those arguments whose trust degree is greater than a certain
threshold . Finally, we recall how the concepts of extensions and acceptance are
adapted to the -restrictions, that is by reporting the de nitions of -extensions
and -acceptance, and of the problems for which we provide the computational
strategies.
          </p>
          <p>Let F = hA; Di be an AAF and U the set of agents proposing the arguments
in A. Function ! : U ! 2A returns, for each agent u, the set of arguments
proposed by u. We assume that every argument is proposed by at least one
agent, and the same argument can be proposed by several agents. The set of
agents proposing an argument a is denoted as ! 1(a).</p>
          <p>We assume the presence of an agent trust function U assigning to each
agent u 2 U a trust degree U (u), i.e., a positive integer providing a measure of
how trustworthy u is considered. Regarding the trustworthiness of an argument
a, it seems natural to derive the trust degree of a from the trust degrees of
the agents who propose a. In this regard, the trustworthiness of arguments is
modeled with the argument trust function T U;!; U (or, more simply, T ) assigning
to each argument a the positive integer equal to the maximum trust degree of
the agents that propose, i.e., T (a) = maxu2! 1(a) U (u).</p>
          <p>For the sake of simplicity, and without loss of generality, from now on we will
only implicitly consider the set of users U and the functions ! and U , and we
will explicitly consider only the argument trust function T implied by them.</p>
          <p>We now recall the de nition of the Trust-aware Abstract Argumentation
Frameworks.</p>
          <p>De nition 1 (T-AAF). Given an abstract argumentation framework hA; Di
and an argument trust function T over A, the triple F = hA; D; T i is called
Trust-aware Abstract Argumentation Framework (T-AAF).</p>
          <p>We denote as T (F ) the set of distinct trust degrees of F 's arguments augmented
with 0.</p>
          <p>Example 2. (Continuing Example 1 - Fig. 2) From the users' trust degrees, we
have T (e) = max( U (Ann); U (Carl )) = 2, T (a) = T (d) = 8, T (c) = 2, T (b) =
1, T (f ) = 9. Moreover, we have: T (F ) = f0; 1; 2; 8; 9g.</p>
          <p>We now recall the de nition of the concept F of -restrictions, that is the
TAAF consisting of all and only the arguments of the original T-AAF F with trust
greater than and of all and only the attacks in F between these arguments.
Let F = hA; D; T i be a T-AAF, a trust value, and a semantics. The
restriction of F is the T-AAF F = hA0; D0; T 0i where A0 = faj a 2 A ^ T (a) &gt;
g, D0 = D \(A0 A0), and T 0 is the restriction of T over A0. The T-AAF F will
be also called the \ -restriction of F ". Basically, considering the -restriction of
F means considering as a threshold, and then taking into account only what
said by the agents whose trust degree is greater than , while discarding what
said only by agents whose trust degree is . Observe that F = F when = 0,
since the trust function assigns only positive values.</p>
          <p>We now recall how the classical notions of extension and accepted argument
(reviewed in Section 2) are adapted to the case of T-AAFs. Given a T-AAF F
and a trust degree , a -extension of F " (shorthand for \trusted extension with
trust level ") under the semantics is any set of arguments that is an extension
of F under . Basically, a -extension for F is a set of arguments that meets the
conditions of the semantics in the T-AAF obtained from the original one by
discarding the arguments proposed by agents whose trust degree is . In turn,
an argument a of F is said to be -accepted (shorthand for \trustingly accepted
with trust level ") under if a belongs to at least one -extension under .
The rationale of -acceptance is analogous to -extension: An argument a may
not be accepted in the original T-AAF, but it can still be -accepted for some
, meaning that a turns out to be a \robust" argument when discarding what
said by users not su ciently trustworthy (w.r.t. the threshold ). The reason
is that the removal of arguments (and the consequent removal of the attacks
involving the removed arguments) can change the number of extensions and
their composition.</p>
          <p>Example 3. (Continuing examples 1, 2) Under = ad, fc; f g is a -extension
even with = 0, while fa; f g is a -extension for = 2 but not for lower degrees
in T (F ). Under all the considered semantics, there is no 2 T (F ) such that d
is -accepted, while a is -accepted for = 2, but not for any lower 2 T (F ).</p>
          <p>Now we recall the de nitions of the fundamental problems min-Tver (F; S)
and min-Tacc (F; a).</p>
          <p>De nition 2 (min-Tver (F; S)). min-Tver (F; S): Given a T-AAF F , a
semantics , and a set S of arguments of F , what is the minimum trust degree
in T (F ) (if exists) such that S is a -extension of F under ?
De nition 3 (min-Tacc (F; a)). min-Tacc (F; a): Given a T-AAF F , a
semantics , and an argument a of F , what is the minimum trust degree in T (F )
(if exists) such that a is -accepted under ?</p>
          <p>The choice of minimizing the value of required to make S a -extension
and a -accepted goes in the direction of discarding as few agents as possible
from the dispute. This way, what the the agents said is tried to be preserved
as much as possible, and agents with low trust degrees are discarded at rst,
coherently with the assumption that low values of trust degrees correspond to
less reliable agents. In fact, if the output of min-Tver and min-Tacc is
\low", it means that considering S as an extension and a as accepted is quite
reasonable: indeed, only users with low trust degree must be discarded to make
S extension and a accepted. The case that is \high", instead, represents a
clue of a possible risky situation: considering S as an extension and a as accepted
requires to discard some/many trustworthy agents, thus it could be the case of
questioning the robustness of S and a.</p>
          <p>Example 4. From the discussion in Example 3 regarding the set fc; f g and the
argument a, it follows that min-Tverad (F; fc; f g) = 0 and min-Taccad (F; a) =
2.</p>
          <p>min-Tver and min-Tacc are the natural optimization counterparts of the
following decision problems over a given T-AAF F and under a semantics :
{ Tver (F; S; ): Is S a -extension of F under for some ?
{ Tacc (F; a; ): Is a -accepted for F under for some ?</p>
          <p>
            The complexity of these problems was studied in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] before of the
complexity of min-Tver and min-Tacc, since the complexity characterization of the
optimization counterparts is simpli ed by the knowledge of the complexity of
the decisional counterparts. In the next section, we report the results.
4
          </p>
        </sec>
        <sec id="sec-2-2-2">
          <title>Complexity Characterization</title>
          <p>We rst recall the characterization of the complexity of the decisional variants
Tver (F; S; ) and Tacc (F; a; ).</p>
          <p>
            Theorem 1. [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] Tver (F; S;
coN P -complete for = pr.
          </p>
          <p>) is in F P for</p>
          <p>The ptime results for 2 fad; co; st; grg straightforwardly follows from the
fact that Tver (F; S; ) can be decided by iteratively invoking an algorithm
solving ver (F ; S) (that is in P ), for each 2 T (F ) smaller than or equal to
. Furthermore, the fact that Tverpr (F; S; ) is coNP -complete can be proved
by observing that a polynomial size witness for the answer \false" consists of
x supersets S1; : : : ; Sx of S witnessing that S is not maximally admissible in
F 1 ; : : : ; F x , respectively, and the coNP -hardness straightforwardly follows from
the fact that verpr is coNP -hard.</p>
          <p>
            Similar arguments were exploited in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] for proving the following theorem
regarding Tacc (F; a; ).
          </p>
          <p>
            Theorem 2. [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] Tacc (F; a;
and is in F P for = gr.
          </p>
          <p>
            ) is NP -complete for every
2 fad; co; st; prg
As regards min-Tver (F; S) and min-Tacc (F; a), from Theorems 1 and 2 it
can be proved that min-Tver (F; S) is in FP for 2 fad; co; st; grg and
minTacc (F; a) is in FP for = gr. Speci cally, both for min-Tver (F; S) and
min-Tacc (F; a) we can reason as done for Tver (F; S; ) and Tacc (F; a; ),
that is by trying the trust degrees in T (F ) in ascending order. Moreover,
reasoning analogously ot the case of Tver (F; S; ) and Tacc (F; a; ), in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]
it was shown that min-Tver (F; S) is in FP NP [log n] for = pr and that
minTacc (F; a) is in FP NP [log n] for = fad; co; st; prg. Finally in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] it was shown
that the FP NP [log n] upper bounds are tight. We report below the Theorems
proved in that paper.
          </p>
          <p>
            Theorem 3. [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] min-Tver (F; S) is in FP for
FP NP [log n]-complete for = pr.
Theorem 4. [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] min-Tacc (F; a) is in FP for
for 2 fad; co; st; prg.
= gr and FP NP [log n]-complete
5
          </p>
        </sec>
        <sec id="sec-2-2-3">
          <title>From Theory to Practice: Evaluating min-Tver (F; S) and min-Tacc (F; a)</title>
          <p>The characterization of the computational complexity of min-Tver (F; S) and
min-Tacc (F; a) is relevant not only from a theoretical standpoint, but also in
a practical perspective, since it suggests suitable computational strategies for
these problems. We consider the two problems separately.</p>
          <p>
            Solving min-Tver (F; S). The proof of Theorem 3 in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] contains the details
of polynomial- time algorithms solving min-Tver (F; S) under 2 fad; co; st; grg.
          </p>
          <p>Hence, we focus on = pr. Theorem 3 states that min-Tverpr (F; S) is in
FP NP , and this suggests to try a solution based on Integer Linear Programming
(ILP), that is well-suited for research problems inside this complexity class.
Generally speaking, resorting to ILP solvers (such as CPLEX) is a reasonable
choice (if allowed by the expressiveness of ILP), as this exploits a number of
heuristics implemented in the commercial solvers that in many cases enhance
the e ciency of evaluating even hard instances.</p>
          <p>The core of our approach is a system of linear inequalities IminTver(F; S) over
binary variables that is parametric on the T-AAF F = hA; D; T i and the set S,
and that tests whether S is a preferred extension in F z0 , for di erent values of
z0 . In particular, z0 ranges over the ordered sequence 10 ; : : : ; m0 of trust degrees
extracted from T (F ) where:
1. 10 is the result of min-Tverad (F; S), i.e., the minimum trust degree such
that S is admissible for F 10 ;
2. m0 = mina2S T (a);
3. 20 ; : : : ; m0 1 are the trust degrees in T (F ) between 1 and m.
The reason for this restriction of the search space is that S cannot be a preferred
extension in any F with &lt; 10 (since S would not be admissible) or m0
(since some of its arguments would not be present in F ).</p>
          <p>Given this, for each argument ai of F , we represent the membership of ai to
S with the boolean constant si. Moreover, for each z 2 [1::m] we use suitable
variables and inequalities for testing whether S is a preferred extension in F z .
The fact that an argument ai is maintained or discarded in F z (corresponding to
the fact that its trust degree T (ai) is higher or lower than z) is represented with
a boolean variable xiz (xiz = 1 means that ai is NOT discarded in F z ). Then, in
order to test whether S is a preferred extension in F z , we search for a superset
Sz0 of S that is admissible and such that jSz0j &gt; jSj. We encode the membership of
an argument ai to Sz0 using a binary variable s0iz, where s0iz = 1 i ai 2 S0 .
Morez
over, for every z 2 [1::m], we use a boolean variable yz to express the result of the
comparison jSz0j jSj. Then, for every z, we enforce jSz0j jSj to be as large as
possible by means of the objective function. This leads to the following ILP instance
IminTver(F; S): &lt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;8&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; ((((((m543210a))))))xsssxMMP00iiiizzz +z(x2s1i[ss0i1szz0ij:0iz:zm](y2zz yzz) z T (ai) + 1 9=&gt;&gt;=&gt;&gt;&gt;&gt;&gt;9;&gt; z88ii2;2j[j1[1(::a:m:in;]a],j )2D;
&gt;&gt;:&gt;&gt;&gt; ((67)) xxiizz ++ ss0jjz ; z 2 [1::m]</p>
          <p>T (ai)
xiz)
1
Plj(al;ai)2D sl + 1</p>
          <p>Plj(al;ai)2D s0l + 1
where M = maxai2A T (ai).</p>
          <p>The semantics of the inequalities is the following:
(0) yz = 1 i jSz0j &gt; jSj, for each z 2 [1::m];
(1) every Sz0 is a superset of S;
(2) every Sz0 (and thus S) contains only non-discarded arguments;
(3; 4) an argument ai is discarded in F z i T (ai) z;
(5) every Sz0 (and thus S) is con ict free;
(6) S is admissible;
(7) every Sz0 is admissible.</p>
          <p>The result R of IminTver(F; S) can be easily translated into what asked by
min-Tverpr (F; S): the position of the leftmost bit 0 in R (if any) is the index
of the minimum trust degree in T (F ) such that S is a preferred extension
over F . Obviously, if all the bits of R are 1, it means that there is no way of
making S a preferred extension by removing all the arguments less trustworthy
than some threshold.</p>
          <p>
            Solving min-Tacc (F; a). The case = gr can be solved by the
polynomialtime algorithm described in the proof of Theorem 4 in [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ].
          </p>
          <p>As for the other semantics, analogously to what said for min-Tver (F; S),
the FP NP [log n]-completeness backs an ILP-based approach. Our formulation of
min-Tacc (F; a) as an ILP instance IminTacc(F; a) is based on searching an
extension S that contains a. We represent the membership of an argument ai
to S with a boolean variable si (where the variable sj corresponding to a is
constrained to be 1), and the fact that ai is maintained or discarded (owing to the
threshold ) with a boolean variable xi (xi = 1 means \ai is NOT discarded").
The objective function consists in minimizing . Observe that we can resort to
the same ILP instance to solve min-Tacc (F; a) under any 2 fad; co; prg,
since an argument belongs to a complete or a preferred extension if and only if
it belongs to an admissible extension. This leads to the following formulation for
IminTacc(F; a) under any 2 fad; co; prg:
8 min
&gt;&gt;&gt;&gt; (0) 0 T (a) 1
&gt;
&gt;&gt;&gt; (1) sj = 1 (where j is the index of a in A)
&gt;&lt;&gt; (2) xi si 8i 2 [1::n]
&gt;&gt;&gt;&gt;&gt;&gt;:&gt;&gt;&gt;&gt; ((((3456)))) sxMMii ++(xss1ijj xT1Pi()alji()al;ai)2TD(asil)++11 8888iiii;;22jjjj[[((11aa::ii::nn;;aa]]jj )) 22 DD
where inequalities (1) (6) have the following meaning:
(0) the threshold ranges from 0 to T (a) 1 (a threshold
a);
(1) a belongs to S;
(2) an argument can belong to S only if it is not discarded;
(3; 4) an argument ai is discarded i T (ai) ;
(5) S is con ict-free;
(6) S is admissible.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Under = st, (6) must be replaced with:</title>
    </sec>
    <sec id="sec-4">
      <title>T (a) would discard</title>
      <p>xi
si</p>
      <p>X
lj(al;ai)2D
sl 8i 2 [1::n];
stating that every argument in F outside S must be attacked by some argument
in S.
6</p>
      <sec id="sec-4-1">
        <title>Related Work</title>
        <p>
          There are a lot of works extending AAFs: most of them have the aim of
handling uncertainty [
          <xref ref-type="bibr" rid="ref16 ref17 ref19 ref20 ref21 ref22 ref23 ref27">19, 27, 22, 17, 21, 20, 23, 16</xref>
          ], or the aim of representing the
\strength" of arguments and/or attacks via preferences [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], degrees of beliefs [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ]
and importance of the values the arguments pertain to [
          <xref ref-type="bibr" rid="ref4 ref6">6, 4</xref>
          ].
        </p>
        <p>
          The reasonability of associating weights with arguments or attacks has been
widely discussed in the literature, and, as observed in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], depending on the
scenarios and the semantics of the weights, there are cases where assigning weights
to arguments is more reasonable than to attacks, and vice versa. An example of
weighted AAF where weights represent trust degrees and are associated with the
arguments is [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], where a fuzzy reasoning mechanism is embedded in SMACk,
a system for analyzing arguments taken from disputes available in online
commercial websites. The latter work, along with [
          <xref ref-type="bibr" rid="ref24 ref26 ref29 ref5 ref7">5, 24, 26, 7, 29</xref>
          ], belongs to the
family of approaches where the reasoning yields acceptability degrees for the
arguments, obtained by suitably revising the \initial" arguments' strengths. A
second family of approaches [
          <xref ref-type="bibr" rid="ref2 ref25 ref27 ref28 ref6">2, 6, 28, 27, 31, 25</xref>
          ], instead, eventually produces a
binary result for each argument, stating whether it is acceptable or not. In this
regard, the framework in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] can be viewed in between these two families: on the
one hand, the mechanisms invoked to decide if S is an extension and a accepted
produce a binary result; on the other hand, the results of min-Tver (F; S),
min-Tacc (F; a) and their variants could be also viewed as \strengths" of S
and a. However, these strengths are not revisions of the initial weights. For
instance, consider an argument a with the highest trust degree in T (A). If the
answer of min-Tacc (F; a) is 0, it means that even discarding no argument, a is
accepted, that is a positive characteristics, and not a downgrading of T (a). Thus,
several properties listed in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] regarding the output strength of arguments (such
as Weakening and Maximality ) make no sense on the semantics of T-AAFs, as
they are better tailored at reasoning paradigms belonging to the rst family.
        </p>
        <p>
          It is worth noting that the results in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] still hold if the weights are associated
to attacks: the di erence in semantics does not correspond to a di erence in
computational complexity and solution strategies. Thus, in particular, the work
in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] completes the framework in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] (where the problem min-budget, dual
to min-Taccgr(F; a), was addressed). In fact, the results on min-Tver (F; S)
and min-Tacc (F; a) can be used over the framework of [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] to use a di erent
threshold-based mechanism tailored at the case where the weights denote levels
instead of additive measures.
        </p>
        <p>
          In this regard, the interest of the research community to extending the
framework in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] in the direction of T-AAFs is witnessed by [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], where the use of
aggregate operators other than sum (including min and max ) for reasoning on
attacks to be discarded was formalized. However, no result on the
computational complexity and no computational method has been proposed in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] for
these extensions.
7
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Conclusions</title>
        <p>
          We have provided some computational strategies for the intractable cases of
the problems min-Tver and min-Tacc proposed in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Those problems are
extensions of the veri cation and acceptance problems for reasoning over AAFs
where the trustworthiness of the agents is encoded as a weight function over the
arguments.
        </p>
        <p>We have provided a translation of the cases of min-Tver and min-Tacc
that have been shown to be inside the class FP NP into ILP instances so that a
well-established ILP solver can be invoked. Generally speaking, resorting to ILP
solvers (such as CPLEX) is a reasonable choice (if allowed by the expressiveness
of ILP, that is bounded by FP NP ), as this exploits a number of heuristics
implemented in the commercial solvers that in many cases enhance the e ciency
of evaluating even hard instances. Future work will be devoted to implement
ILP-based strategies and compare them with the usage of SAT-solvers, that are
commonly used as tools for verifying/generating the extensions and deciding the
acceptance of arguments in \classical" abstract argumentation.
31. Thimm, M.: A probabilistic semantics for abstract argumentation. In: Proc.
European Conf. on Arti cial Intelligence (ECAI), Montpellier, France. pp. 750{755
(2012)</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben-Naim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Doder</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Acceptability semantics for weighted argumentation frameworks</article-title>
          .
          <source>In: Proc. Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , Melbourne, Australia, Aug.
          <fpage>19</fpage>
          -
          <lpage>25</lpage>
          ,
          <year>2017</year>
          . pp.
          <volume>56</volume>
          {
          <issue>62</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cayrol</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A reasoning model based on the production of acceptable arguments</article-title>
          .
          <source>Ann. Math. Artif. Intell</source>
          .
          <volume>34</volume>
          (
          <issue>1-3</issue>
          ),
          <volume>197</volume>
          {
          <fpage>215</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Amgoud</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vesic</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A new approach for preference-based argumentation frameworks</article-title>
          .
          <source>Ann. Math. Artif. Intell</source>
          .
          <volume>63</volume>
          (
          <issue>2</issue>
          ),
          <volume>149</volume>
          {
          <fpage>183</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Atkinson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Value based reasoning and the actions of others</article-title>
          .
          <source>In: Proc. European Conf. on Arti cial Intelligence (ECAI)</source>
          ,
          <article-title>The Hague, The Netherlands</article-title>
          . pp.
          <volume>680</volume>
          {
          <issue>688</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aurisicchio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bertanza</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Automatic evaluation of design alternatives with quantitative argumentation</article-title>
          .
          <source>Argument &amp; Computation</source>
          <volume>6</volume>
          (
          <issue>1</issue>
          ),
          <volume>24</volume>
          {
          <fpage>49</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.M.:</given-names>
          </string-name>
          <article-title>Persuasion in practical argument using value-based argumentation frameworks</article-title>
          .
          <source>J. Log. Comput</source>
          .
          <volume>13</volume>
          (
          <issue>3</issue>
          ),
          <volume>429</volume>
          {
          <fpage>448</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. da Costa Pereira,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Tettamanzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <article-title>Changing one's mind: Erase or rewind?</article-title>
          <source>In: Proc. Int. Joint Conf. on Arti cial Intelligence (IJCAI)</source>
          , Barcelona, Catalonia, Spain,
          <source>July 16-22</source>
          . pp.
          <volume>164</volume>
          {
          <issue>171</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Coste-Marquis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Devred</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marquis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Symmetric argumentation frameworks</article-title>
          .
          <source>In: Proc. of Symbolic</source>
          and
          <article-title>Quantitative Approaches to Reasoning with Uncertainty (ECSQARU), Barcelona</article-title>
          , Spain. pp.
          <volume>317</volume>
          {
          <issue>328</issue>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Coste-Marquis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konieczny</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marquis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ouali</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>Weighted attacks in argumentation frameworks</article-title>
          .
          <source>In: Proc. Int. Conf. on Knowledge Representation and Reasoning (KR)</source>
          , Rome, Italy. pp.
          <volume>593</volume>
          {
          <issue>597</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dimopoulos</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Graph theoretical structures in logic programs and default theories</article-title>
          .
          <source>Theor. Comput. Sci</source>
          .
          <volume>170</volume>
          (
          <issue>1-2</issue>
          ),
          <volume>209</volume>
          {
          <fpage>244</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Dragoni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , da Costa Pereira,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Tettamanzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.G.B.</given-names>
            ,
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>Combining argumentation and aspect-based opinion mining: The smack system</article-title>
          .
          <source>AI Commun</source>
          .
          <volume>31</volume>
          (
          <issue>1</issue>
          ),
          <volume>75</volume>
          {
          <fpage>95</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dung</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          :
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <volume>321</volume>
          {
          <fpage>358</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bench-Capon</surname>
            ,
            <given-names>T.J.M.:</given-names>
          </string-name>
          <article-title>Coherence in nite argument systems</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>141</volume>
          (
          <issue>1</issue>
          /2),
          <volume>187</volume>
          {
          <fpage>203</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McBurney</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsons</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Weighted argument systems: Basic de nitions, algorithms, and complexity results</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <issue>2</issue>
          ) (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dunne</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Complexity of abstract argumentation</article-title>
          .
          <source>In: Argumentation in Arti cial Intelligence</source>
          , pp.
          <volume>85</volume>
          {
          <issue>104</issue>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Probabilistic bipolar abstract argumentation frameworks: complexity results</article-title>
          .
          <source>In: Proc. Int. Joint Conference on Arti cial Intelligence</source>
          ,
          <source>IJCAI 2018, July 13-19</source>
          ,
          <year>2018</year>
          , Stockholm, Sweden. pp.
          <year>1803</year>
          {
          <year>1809</year>
          . ijcai.
          <source>org</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Complexity of fundamental problems in probabilistic abstract argumentation: Beyond independence</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>268</volume>
          ,
          <issue>1</issue>
          {
          <fpage>29</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Embedding the trust degrees of agents in abstract argumentation</article-title>
          .
          <source>In: Proc. European Conf. on Arti cial Intelligence (ECAI) 2020. Frontiers in Arti cial Intelligence and Applications</source>
          , vol.
          <volume>325</volume>
          , pp.
          <volume>737</volume>
          {
          <fpage>744</fpage>
          . IOS Press (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Revisiting the notion of extension over incomplete abstract argumentation frameworks</article-title>
          .
          <source>In: Proc. Int. Joint Conference on Arti cial Intelligence</source>
          ,
          <string-name>
            <surname>IJCAI</surname>
          </string-name>
          <year>2020</year>
          . pp.
          <volume>1712</volume>
          {
          <fpage>1718</fpage>
          . ijcai.
          <source>org</source>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
          </string-name>
          , F.:
          <article-title>E ciently estimating the probability of extensions in abstract argumentation</article-title>
          .
          <source>In: Proc. Int Conf. on Scalable Uncertainty Management (SUM)</source>
          . pp.
          <volume>106</volume>
          {
          <issue>119</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation</article-title>
          .
          <source>In: Proc. Int. Joint Conference on Arti cial Intelligence (IJCAI)</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>On the complexity of probabilistic abstract argumentation frameworks</article-title>
          .
          <source>ACM Trans. Comput. Log. (TOCL) 16(3)</source>
          ,
          <volume>22</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Fazzinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flesca</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parisi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietramala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>PARTY: A mobile system for e ciently assessing the probability of extensions in a debate</article-title>
          .
          <source>In: Proc. Int. Conf. on Database and Expert Systems Applications (DEXA)</source>
          . pp.
          <volume>220</volume>
          {
          <issue>235</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gabbay</surname>
            ,
            <given-names>D.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodrigues</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Equilibrium states in numerical argumentation networks</article-title>
          .
          <source>Logica Universalis</source>
          <volume>9</volume>
          (
          <issue>4</issue>
          ),
          <volume>411</volume>
          {
          <fpage>473</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Probabilistic quali cation of attack in abstract argumentation</article-title>
          .
          <source>Int. J. Approx. Reasoning</source>
          <volume>55</volume>
          (
          <issue>2</issue>
          ),
          <volume>607</volume>
          {
          <fpage>638</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Leite</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martins</surname>
          </string-name>
          , J.:
          <article-title>Social abstract argumentation</article-title>
          .
          <source>In: Proc. Int. Joint Conf. on Arti cial Intelligence</source>
          , Barcelona, Catalonia, Spain,
          <source>July 16-22</source>
          ,
          <year>2011</year>
          . pp.
          <volume>2287</volume>
          {
          <issue>2292</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oren</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norman</surname>
          </string-name>
          , T.J.:
          <article-title>Probabilistic argumentation frameworks</article-title>
          .
          <source>In: Proc. Int. Workshop on Theory and Applications of Formal Argumentation (TAFA)</source>
          , Barcelona, Spain. pp.
          <volume>1</volume>
          {
          <issue>16</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Modgil</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Reasoning about preferences in argumentation frameworks</article-title>
          .
          <source>Artif. Intell</source>
          .
          <volume>173</volume>
          (
          <issue>9-10</issue>
          ),
          <volume>901</volume>
          {
          <fpage>934</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Rago</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aurisicchio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Discontinuity-free decision support with quantitative argumentation debates</article-title>
          .
          <source>In: Proc. Int. Conf. on Principles of Knowledge Representation and Reasoning (KR)</source>
          , Cape Town, South Africa,
          <source>April 25-29</source>
          . pp.
          <volume>63</volume>
          {
          <issue>73</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>J sang</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>Pini</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Are my arguments trustworthy? abstract argumentation with subjective logic</article-title>
          .
          <source>In: Proc. Int. Conf. on Information Fusion (FUSION)</source>
          , Cambridge, UK,
          <source>July 10-13</source>
          . pp.
          <year>1982</year>
          {
          <year>1989</year>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>