=Paper= {{Paper |id=Vol-3086/paper4 |storemode=property |title=On Weak Constrained Argumentation Frameworks |pdfUrl=https://ceur-ws.org/Vol-3086/paper4.pdf |volume=Vol-3086 |authors=Gianvincenzo Alfano,Sergio Greco,Francesco Parisi,Irina Trubitsyna |dblpUrl=https://dblp.org/rec/conf/aiia/AlfanoGPT21 }} ==On Weak Constrained Argumentation Frameworks== https://ceur-ws.org/Vol-3086/paper4.pdf
On Weak Constrained Argumentation Frameworks
Gianvincenzo Alfano, Sergio Greco, Francesco Parisi and Irina Trubitsyna
Department of Informatics, Modeling, Electronics and System Engineering (DIMES),
University of Calabria, Rende, Italy


                                      Abstract
                                      The success and popularity of Dungโ€™s abstract Argumentation Framework (AF) is also due to its simplicity
                                      and expressiveness. Integrity constraints help to express domain knowledge in a compact and natural way,
                                      thus keeping easy the modeling task even for problems that otherwise would be hard to encode within an
                                      AF. Constraints can be expressed in the so-called Constrained Argumentation Framework (CAF). Although
                                      constraints in CAF allow restricting the set of feasible solutions, they can not be used to find โ€œoptimalโ€
                                      solutions to problems defined through CAFs. In this paper we present Weak constrained AFs (WAFs) that
                                      enhance CAFs with weak constraints, that express some optimal conditions. We discuss the complexity
                                      of WAFs under several well-known argumentation semantics, showing that weak constraints increase the
                                      expressive power of AFs and CAFs.

                                      Keywords
                                      Abstract Argumentation, Weak Constraints, Complexity.




1. Introduction
Despite the expressive power and generality of Dungโ€™s abstract Argumentation Framework
(AF) [1], in some cases it is difficult to accurately model domain knowledge by an AF in a
natural and easy-to-understand way. For this reason, AF has been extended by the introduction
of further constructs, such as preferences [2, 3] and integrity constraints [4, 5], to achieve more
comprehensive, natural, and compact ways of representing useful relationships among arguments.
In particular, enhancing AFs with constraints allows us to naturally and compactly express domain
conditions that need to be taken into account to filter out unfeasible solutions, as illustrated in
what follows.
Example 1. Assume three people ๐‘ฅ, ๐‘ฆ, ๐‘ง wish to attend a theatre event, but only two seats are
available. We could try to model this situation by an AF ฮ› with arguments ๐‘ฅ, ๐‘ฆ, ๐‘ง (resp., ๐‘ฅ        ยฏ , ๐‘ฆยฏ, ๐‘งยฏ),
each stating that ๐‘ฅ, ๐‘ฆ, ๐‘ง attends (resp., does not attend) the event. The direct graph encoding ฮ›
is shown in Figure 1(a), where double arrows are used to represent mutually attacks between
arguments. Specifically, argument ๐‘ฅ (resp., ๐‘ฆ, ๐‘ง) attacks and is attacked by its opposite argument
modeling the fact that only one of them can be accepted. Moreover, argument ๐‘ฅ            ยฏ (resp., ๐‘ฆยฏ, ๐‘งยฏ) is
attacked by the other two arguments ๐‘ฆยฏ and ๐‘งยฏ (resp., ๐‘ฅ  ยฏ and ๐‘งยฏ; ๐‘ฅ
                                                                   ยฏ and ๐‘ฆยฏ) since ๐‘ฅ (resp., ๐‘ฆ, ๐‘ง) can be
accepted only if one of the two arguments ๐‘ฆยฏ and ๐‘งยฏ (resp., ๐‘ฅ  ยฏ and ๐‘งยฏ; ๐‘ฅ
                                                                         ยฏ and ๐‘ฆยฏ) is accepted. Thus, the
set of attacks between every pair in {๐‘ฅยฏ , ๐‘ฆยฏ, ๐‘งยฏ} models the fact that at most one argument among ๐‘ฅ         ยฏ,
5๐‘กโ„Ž Workshop on Advances In Argumentation In Artificial Intelligence (AI3 2021), December 1-3, 2021, Virtual
" g.alfano@dimes.unical.it (G. Alfano); greco@dimes.unical.it (S. Greco); fparisi@dimes.unical.it (F. Parisi);
i.trubitsyna@dimes.unical.it (I. Trubitsyna)
                                    ยฉ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
 CEUR
 Workshop
 Proceedings
               http://ceur-ws.org
               ISSN 1613-0073
                                    CEUR Workshop Proceedings (CEUR-WS.org)
                      x                     y
                                                      x                     y
                            xฬ„         yฬ„
                                                            xฬ„         yฬ„
                                 zฬ„                         zฬ„         wฬ„

                                                      z                     w
                                 z
                                 (a)                             (b)
Figure 1: (a) AF ฮ› of Example 1; (b) AF ฮ›โ€ฒ of Example 4.


๐‘ฆยฏ and ๐‘งยฏ can be accepted and then, as a consequence, at least two arguments among ๐‘ฅ, ๐‘ฆ and ๐‘ง can
be accepted.                                                                                   โ–ก
   The meaning of an AF is given in terms of argumentation semantics, which intuitively tell us
the sets of arguments (called extensions) that can collectively be accepted. The preferred (and
stable) extensions of AF ฮ› of Example 1 are ๐ธ1 = {๐‘ฅ, ๐‘ฆ, ๐‘งยฏ}, ๐ธ2 = {๐‘ฅ, ๐‘ฆยฏ, ๐‘ง}, ๐ธ3 = {๐‘ฅ    ยฏ , ๐‘ฆ, ๐‘ง},
and ๐ธ4 = {๐‘ฅ, ๐‘ฆ, ๐‘ง}. However, ๐ธ4 is not feasible as only two seats are available and thus only
two people could attend the event. To overcome such a situation, and thus providing a natural and
compact way for expressing such kind of conditions, the use of constraints has been proposed
[4, 6, 5, 7].
Example 2. Continuing from Example 1, the constraint ๐œ… = ๐‘ฅ โˆง ๐‘ฆ โˆง ๐‘ง โ‡’ f can be used. It states
that the propositional formula ๐‘ฅ โˆง ๐‘ฆ โˆง ๐‘ง must be false. That is, feasible solutions must satisfy the
condition that the 3 arguments ๐‘ฅ, ๐‘ฆ, and ๐‘ง are not jointly accepted, i.e., the three people cannot
attend the event together. The effect of using constraint ๐œ… is that ๐ธ4 is discarded from the set of
solutions of our problem.                                                                         โ–ก
   We call an AF augmented with constraints a Constrained AF (CAF). Although constraints in a
CAF allow restricting the set of feasible solutions, they do not help in finding โ€œbestโ€ or preferable
solutions. Considering our running example, the three people may agree on the fact that โ€œ๐‘ฅ and
๐‘ฆ should preferably attend the event whenever there are only two seats availableโ€. To express
this kind of conditions, we introduce weak constraints, that is, constraints that are required to be
satisfied if possible. Syntactically, they have the same form of (strong) constraints except that the
implication symbol โ†’ is used (instead of โ‡’). Intuitively, these constraints can be used to find
โ€œoptimalโ€ solutions to a problem defined by means of an AF or a CAF. A CAF with the addition
of weak constraints is said to be a Weak constrained Argumentation Framework (WAF).
Example 3. Consider a WAF obtained by adding to the CAF of Example 2 the weak constraint
t โ†’ ๐‘ฅ โˆง ๐‘ฆ, stating that it is desirable that ๐‘ฅ and ๐‘ฆ attend the event together. Herein, t denotes the
truth value true. Then, extension ๐ธ1 = {๐‘ฅ, ๐‘ฆ, ๐‘งยฏ} is selected as the โ€œbestโ€ one.                   โ–ก
  The use of strong and weak constraints substantially reduces the effort needed to figure out
how to define an AF that models a given problem. In fact, as said earlier, constraints facilitate to
express knowledge in a more compact and easy to understand way. For instance, the problem
presented in Example 1, has been represented through an AF which expresses the condition that
โ€œat most one argument among ๐‘ฅ     ยฏ , ๐‘ฆยฏ, ๐‘งยฏ can be acceptedโ€ and then, as a consequence, at least two
arguments ๐‘ฅ, ๐‘ฆ, ๐‘ง can be accepted. However, this condition is not easy to be generalized if we
have more than three people. Suppose there is a fourth guy, ๐‘ค, who wish to attend the event, and
there are again only two available seats. After adding the arguments ๐‘ค and ๐‘ค          ยฏ to ฮ› of Figure 1(a),
we cannot use the same reasoning as in Example 1 to model the fact that two of the four people
attend the event. In fact, having the attacks between every pair in {๐‘ฅ                  ยฏ } does not model
                                                                            ยฏ , ๐‘ฆยฏ, ๐‘งยฏ, ๐‘ค
this situation (it models that at least three of the four people attend the event). Remarkably, using
strong and weak constraints allow for using a common reasoning pattern to generalize to this
more complex situation, even starting from an AF having a simpler structure.
Example 4. Consider a WAF consisting of AF ฮ›โ€ฒ of Figure 1(b) and the sets of strong and weak
constraints; ๐’ž = {๐œ…, ๐‘ฅ โˆง ๐‘ฆ โˆง ๐‘ค โ‡’ f, ๐‘ฅ โˆง ๐‘ง โˆง ๐‘ค โ‡’ f, ๐‘ฆ โˆง ๐‘ง โˆง ๐‘ค โ‡’ f}; and ๐’ฒ = {t โ†’ ๐‘ฅ, t โ†’
๐‘ฆ, t โ†’ ๐‘ง, t โ†’ ๐‘ค}. The strong constraints in ๐’ž (that includes ๐œ… of Example 2) filter out from
the (16 preferred) extensions of ฮ›โ€ฒ the solutions where more than two people attend the event,
whereas the weak constraints maximize the set (or number) of people attending the event.   โ–ก

   In this paper, we present WAFs along with two criteria for interpreting weak constraints, under
any argumentation semantics ๐’ฎ: maximal-set (ms๐’ฎ) and maximum-cardinality (mc๐’ฎ) according
to which the best/optimal ๐’ฎ-extensions are those satisfying a maximal set, or a maximum number,
of weak constraints respectively. Then, we discuss the complexity of credulous and skeptical
reasoning for WAFs, showing that the introduction of weak constraints typically increases the
complexity of at least one step in the polynomial hierarchy w.r.t. AF.


2. Preliminaries
We briefly review Dungโ€™s framework and discuss Constrained Argumentation Frameworks.

2.1. Argumentation Frameworks
An abstract Argumentation Framework (AF) is a pair โŸจ๐’œ, โ„›โŸฉ, where ๐’œ is a set of arguments and
โ„› โІ ๐’œ ร— ๐’œ is a set of attacks. If (๐‘Ž, ๐‘) โˆˆ โ„› then we say that ๐‘Ž attacks ๐‘. We can think of an AF
as a directed graph whose nodes represent arguments and edges represent attacks.
   Given an AF ฮ› = โŸจ๐’œ, โ„›โŸฉ and a set ๐‘† โІ ๐’œ of arguments, an argument ๐‘Ž โˆˆ ๐’œ is said to be
i) defeated w.r.t. ๐‘† iff โˆƒ๐‘ โˆˆ ๐‘† such that (๐‘, ๐‘Ž) โˆˆ โ„›, and ii) acceptable w.r.t. ๐‘† iff for every
argument ๐‘ โˆˆ ๐’œ with (๐‘, ๐‘Ž) โˆˆ โ„›, there is ๐‘ โˆˆ ๐‘† such that (๐‘, ๐‘) โˆˆ โ„›. The sets of defeated and
acceptable arguments w.r.t. ๐‘† are defined as follows (where ฮ› is understood):

     โ€ข ๐ท๐‘’๐‘“ (๐‘†) = {๐‘Ž โˆˆ ๐’œ | โˆƒ๐‘ โˆˆ ๐‘† . (๐‘, ๐‘Ž) โˆˆ โ„›};
     โ€ข ๐ด๐‘๐‘(๐‘†) = {๐‘Ž โˆˆ ๐’œ | โˆ€๐‘ โˆˆ ๐’œ . (๐‘, ๐‘Ž) ฬธโˆˆ โ„› โˆจ ๐‘ โˆˆ ๐ท๐‘’๐‘“ (๐‘†)}.

  Given an AF โŸจ๐’œ, โ„›โŸฉ, a set ๐‘† โІ ๐’œ of arguments is said to be: conflict-free iff ๐‘† โˆฉ ๐ท๐‘’๐‘“ (๐‘†) = โˆ…;
โˆ™ admissible iff it is conflict-free and ๐‘† โІ ๐ด๐‘๐‘(๐‘†).
   Different argumentation semantics have been proposed to characterize collectively acceptable
sets of arguments, called extensions [1, 8]. Every extension is an admissible set satisfying
additional conditions. Specifically, the complete, preferred, stable, semi-stable, and grounded
extensions of an AF are defined as follows.
  Given an AF โŸจ๐’œ, โ„›โŸฉ, a set ๐‘† โІ ๐’œ is an extension called:

    โ€ข complete (co) iff it is an admissible set and ๐‘† = ๐ด๐‘๐‘(๐‘†);
    โ€ข preferred (pr) iff it is a maximal (w.r.t. โІ) complete extension;
    โ€ข stable (st) iff it is a total preferred extension, i.e. a preferred extension such that ๐‘† โˆช
      ๐ท๐‘’๐‘“ (๐‘†) = ๐’œ;
    โ€ข semi-stable (sst) iff it is a preferred extension such that ๐‘† โˆช ๐ท๐‘’๐‘“ (๐‘†) is maximal;
    โ€ข grounded (gr) iff it is the smallest (w.r.t. โІ) complete extension.

It is well-known that the set of complete extensions forms a complete semilattice with respect to
set inclusion. Arguments occurring in an extension are said to be accepted, whereas arguments
attacked by accepted arguments are said to be rejected; remaining arguments are said to be
undecided (w.r.t. the considered extension).

Example 5. Let ฮ› = โŸจ๐’œ, โ„›โŸฉ be an AF where ๐’œ = {๐‘Ž, ๐‘, ๐‘} and โ„› = {(๐‘Ž, ๐‘), (๐‘, ๐‘Ž), (๐‘, ๐‘), (๐‘, ๐‘)}.
AF ฮ› has three complete extensions: ๐ธ1 = โˆ…, ๐ธ2 = {๐‘Ž}, ๐ธ3 = {๐‘}. The set of preferred ex-
tensions is {๐ธ2 , ๐ธ3 }, whereas the set of stable (and semi-stable) extensions is {๐ธ3 }, and the
grounded extension is ๐ธ1 .                                                                    โ–ก

2.2. Constrained Argumentation Frameworks
Constrained Argumentation Framework (CAF) has been introduced in [4] and further investigated
in [5, 9]. The constrained argumentation frameworks in [6] and [7] are particular cases of those
in [5] as the set of constraints is restricted to atomic formulae only.
   Given a set of propositional symbols ๐‘†, โ„’๐‘† denotes the propositional language defined in the
usual inductive way from ๐‘† using the built-in constants f, u, and t denoting the truth values
false, undef (undefined), and true, and the connectives โˆง, โˆจ, ยฌ, โ‡’ and โ‡”.
   A general form of Constrained Argumentation Framework (CAF) has been considered in [4, 5].
A CAF is a triple ฮฉ = โŸจ๐’œ, โ„›, ๐’žโŸฉ where โŸจ๐’œ, โ„›โŸฉ is an AF and ๐’ž is a set of (general) propositional
formulae built from โ„’๐’œ .
   Given an AF โŸจ๐’œ, โ„›โŸฉ and a set ๐‘† โІ ๐’œ, the truth value of an argument ๐‘Ž โˆˆ ๐’œ w.r.t. ๐‘† is denoted
by ๐œ—๐‘† (๐‘Ž), or simply ๐œ—(๐‘Ž) whenever ๐‘† is understood, and ๐œ—(๐‘Ž) is ๐‘–) true if ๐‘Ž โˆˆ ๐‘†; ๐‘–๐‘–) false if
โˆƒ๐‘ โˆˆ ๐‘† such that (๐‘, ๐‘Ž) โˆˆ โ„›; or ๐‘–๐‘–๐‘–) undef otherwise.
   It is important to note that, regarding the operator โ‡’ there is no convergence on its semantics in
CAFs (see Section 5 for a discussion). Thus, in the following we consider a simpler yet sufficiently
general form of constraints than that in [4, 5] (e.g. we do not deal with constraints with multiple
implications) and the classical interpretation of Lukasiewiczโ€™s logic for the implication operator.
   Let โ„’โ€ฒ๐’œ be the propositional language defined from ๐’œ and the connectives โˆง, โˆจ, ยฌ, where ๐’œ is
a set of arguments.

Definition 1. A (strong) constraint is a formula of one of the following forms: (๐‘–) ๐œ™ โ‡’ ๐‘ฃ, or (๐‘–๐‘–)
๐‘ฃ โ‡’ ๐œ™, where ๐œ™ is a propositional formula in โ„’โ€ฒ๐’œ and ๐‘ฃ โˆˆ {f, u, t}.
   Checking whether a constraint is satisfied (under the Lukasiewiczโ€™logic) is equivalent to check
whether the truth value of the head is greater than or equal to the truth value of the body. For
formulae defining constraints we believe that Lucasiewicz interpretation is more appropriate as,
for instance, it allows to distinguish ๐œ™ โ‡’ f from ๐œ™ โ‡’ u, and avoids problems existing in other
interpretations [10].

Example 6. The constraint ๐‘ฅ โˆง ๐‘ฆ โˆง ๐‘ง โ‡’ f states that at least one of the arguments ๐‘ฅ, ๐‘ฆ and ๐‘ง
must be false, whereas ๐‘ฅ โˆง ๐‘ฆ โˆง ๐‘ง โ‡’ u states that ๐‘ฅ, ๐‘ฆ and ๐‘ง cannot be all true.           โ–ก

 Clearly, constraints of the forms f โ‡’ ๐œ™ and ๐œ™ โ‡’ t are useless because always satisfied.
 In the following, we assume that ๐’ž is a set of satisfiable constraints built from โ„’โ€ฒ๐’œ and every
CAF is a triple ฮฉ = โŸจ๐’œ, โ„›, ๐’žโŸฉ.

Definition 2. Given a CAF ฮฉ = โŸจ๐’œ, โ„›, ๐’žโŸฉ (where ๐’ž contains constraints built from โ„’โ€ฒ๐’œ ), a set of
arguments ๐‘† โІ ๐’œ is a complete (resp., grounded, preferred, stable, semi-stable) extension for ฮฉ
if ๐‘† is a complete (resp., grounded, preferred, stable, semi-stable) extension for โŸจ๐’œ, โ„›โŸฉ and ๐’ž is
satisfied by ๐‘† (denoted as ๐‘† |= ๐’ž).


3. Weak Constrained AFs
In this section, we introduce a generalization of CAFs where weak constraints are also considered.
Differently from the strong constraints discussed in the previous section, weak constraints are
propositional formulae that should be satisfied if possible.
   Weak constraints (also called relaxed constraints in some contexts) have been considered in
several research areas, including Mathematical Programming with Equilibrium Constraints [11],
Answer Set Programming [12, 13], and for modelling and solving optimization problems [14, 15].
In particular, concerning the field of Answer Set Programming, weak constraints have been
implemented in DLV [16] and clingo [17]; moreover, learning them from data is also possible [18].
   In our setting, weak constraints are logical formulae of the form ๐œ™ โ†’ ๐‘ฃ (or, equivalently,
๐‘ฃ โ†’ ๐œ™), where ๐œ™ is a propositional formula built using the symbols of a given set ๐’œ and the
connectives โˆง, โˆจ and ยฌ. Herein, โ†’ denotes the logical implication connective. Observe that we
use the symbol โ†’ (instead of โ‡’) to have different syntaxes for weak and strong constraints.

Definition 3. A Weak constrained Argumentation Framework (WAF) is a tuple ฮ“ = โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ,
where โŸจ๐’œ, โ„›, ๐’žโŸฉ is a CAF and ๐’ฒ is a set of weak constraints built from โ„’โ€ฒ๐’œ .

   The semantics of a WAF is defined by considering two possible criteria for selecting the
preferable extensions w.r.t. weak constraintsโ€”only weak constraints are considered when
selecting the preferable extensions since strong constraints must be all satisfied. The two criteria
considered for assessing to which extent an extension satisfies a set of weak constraints are:

   (i) maximal set criterion, considering as preferable (or โ€œbestโ€) extensions the ones that satisfy
       a maximal set of weak constraints, and
  (ii) maximum-cardinality criterion, considering as preferable (or โ€œoptimalโ€) extensions the
       ones that satisfy a maximal number of weak constraints.
  Clearly, the selection of preferable extensions make sense only for semantics admitting multiple
extensions, that is, complete, preferred, stable, and semi-stable semantics. Thus, in the following,
whenever we consider a generic semantics ๐’ฎ, we refer to ๐’ฎ โˆˆ {co, pr, st, sst}.
  In the next subsections, we formally define the meaning of a WAF under the maximal-set and
maximum-cardinality semantics and provide two examples.

3.1. Maximal-Set Semantics
A WAF using the maximal-set criterion is defined as follows.

Definition 4 (Maximal-Set Semantics). Given a WAF ฮ“ = โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ, an ๐’ฎ-extension ๐ธ for
โŸจ๐’œ, โ„›, ๐’žโŸฉ is a maximal-set ๐’ฎ-extension (ms๐’ฎ-extension) for ฮ“ if, let ๐’ฒ๐ธ โІ ๐’ฒ be the set of weak
constraints that are satisfied by ๐ธ (that is, ๐ธ |= ๐’ฒ๐ธ ) , there is no ๐’ฎ-extension ๐น for โŸจ๐’œ, โ„›, ๐’žโŸฉ
and ๐’ฒ๐น โІ ๐’ฒ such that ๐น |= ๐’ฒ๐น and ๐’ฒ๐ธ โŠ‚ ๐’ฒ๐น .

  Given a semantics ๐’ฎ, ms๐’ฎ denotes the maximal-set version of ๐’ฎ (e.g. msco denotes the ms
complete semantics).

Example 7. Consider the WAF ฮ“ = โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ with ๐’œ = {๐‘Ž, ๐‘, ๐‘, ๐‘‘}, โ„› = {(๐‘Ž, ๐‘), (๐‘, ๐‘Ž),
(๐‘, ๐‘‘), (๐‘‘, ๐‘)}, ๐’ž = โˆ… and ๐’ฒ = {๐‘ค1 = ๐‘ โ†’ f, ๐‘ค2 = ๐‘Ž โˆจ ยฌ๐‘Ž โ†’ u} stating that ๐‘ should
preferably be false (๐‘ค1 ) and ๐‘Ž should preferably be undefined (๐‘ค2 ). โŸจ๐’œ, โ„›, ๐’žโŸฉ has 9 complete
extensions: ๐ธ0 = {}, ๐ธ1 = {๐‘Ž}, ๐ธ2 = {๐‘}, ๐ธ3 = {๐‘}, ๐ธ4 = {๐‘‘}, ๐ธ5 = {๐‘Ž, ๐‘}, ๐ธ6 = {๐‘Ž, ๐‘‘},
๐ธ7 = {๐‘, ๐‘} and ๐ธ8 = {๐‘, ๐‘‘}.
   In particular, ๐ธ0 is the grounded extension, whereas ๐ธ5 , ๐ธ6 , ๐ธ7 , ๐ธ8 are preferred, stable, and
semi-stable extensions of โŸจ๐’œ, โ„›, ๐’žโŸฉ. These are also extensions of AF โŸจ๐’œ, โ„›โŸฉ, since ๐’ž = โˆ….
   Regarding the satisfaction of weak constraints, we have that ๐ธ0 |= {๐‘ค2 }, ๐ธ4 |= {๐‘ค1 , ๐‘ค2 },
๐ธ6 |= {๐‘ค1 }, and ๐ธ8 |= {๐‘ค1 }, whereas the other complete extensions do not satisfy any constraint.
Therefore, the maximal-set preferred (stable, semi-stable) extensions are ๐ธ6 and ๐ธ8 , whereas
there is only one maximal-set complete extension, which is ๐ธ4 .                                    โ–ก

3.2. Maximum-Cardinality Semantics
Maximum-cardinality semantics for WAFs prescribes as preferable extensions those satisfying
the highest number of weak constraints. This is similar to the semantics of weak constraints in
DLV [16] where, in addition, each constraint has assigned a weight.

Definition 5 (Maximum-Cardinality Semantics). Given a WAF ฮ“ = โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ, an ๐’ฎ-
extension ๐ธ for โŸจ๐’œ, โ„›, ๐’žโŸฉ is a maximum-cardinality ๐’ฎ-extension (mc๐’ฎ-extension) for ฮ“ if, let
๐’ฒ๐ธ โІ ๐’ฒ be the set of weak constraints in ๐’ฒ that are satisfied by ๐ธ, there is no ๐’ฎ-extension ๐น
for โŸจ๐’œ, โ„›, ๐’žโŸฉ and ๐’ฒ๐น โІ ๐’ฒ such that ๐น |= ๐’ฒ๐น and |๐’ฒ๐ธ | < |๐’ฒ๐น |.

Example 8. Consider the WAF ฮ“ = โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ with ๐’œ = {๐‘Ž, ๐‘, ๐‘}, โ„› = {(๐‘Ž, ๐‘), (๐‘, ๐‘Ž),
(๐‘, ๐‘), (๐‘, ๐‘)}, ๐’ž = โˆ… and ๐’ฒ = {๐‘ค1 = t โ†’ ๐‘Ž, ๐‘ค2 = t โ†’ ๐‘, ๐‘ค3 = ๐‘ โ†’ f} stating that it is
desirable that ๐‘Ž is true, ๐‘ is true, and ๐‘ is false.
   โŸจ๐’œ, โ„›, ๐’žโŸฉ has three complete extensions: ๐ธ1 = {}, ๐ธ2 = {๐‘Ž}, and ๐ธ3 = {๐‘}. Herein, ๐ธ2
and ๐ธ3 are the preferred extensions of โŸจ๐’œ, โ„›, ๐’žโŸฉ, whereas the unique stable (and semi-stable)
extension is ๐ธ3 . Regarding the satisfactions of weak constraints we have that ๐ธ1 |= ๐’ฒ0 = โˆ…,
๐ธ2 |= ๐’ฒ1 = {๐‘ค1 }, and ๐ธ3 |= ๐’ฒ3 = {๐‘ค2 , ๐‘ค3 }. Therefore, the only maximum-cardinality
preferred extension of ฮ“ is ๐ธ3 (as |๐’ฒ3 | = 2 > |๐’ฒ1 | = 1 > |๐’ฒ0 | = 0). Note that, according to the
maximal-set semantics, both ๐ธ2 and ๐ธ3 are maximal-set preferred extensions. Regarding the
stable (and semi-stable) semantics, as there is only one extension, ๐ธ3 is both a maximal-set and a
maximum-cardinality extension.                                                                  โ–ก


4. Complexity of Credulous and Skeptical Acceptance
In this section we discuss the complexity of the credulous and skeptical acceptance problems. We
assume the reader is familiar with the main complexity classes [19], which are briefly recalled in
what follows.
   Classes ฮฃ๐‘ƒ๐‘˜ , ฮ ๐‘ƒ๐‘˜ and ฮ”๐‘ƒ๐‘˜ , with ๐‘˜ โ‰ฅ 0 are defined as follows: ฮฃ๐‘ƒ0 = ฮ ๐‘ƒ0 = ฮ”๐‘ƒ0 = ๐‘ƒ ;
                                          ๐‘ƒ               ๐‘ƒ
ฮฃ๐‘ƒ1 = ๐‘๐‘ƒ and ฮ ๐‘ƒ1 = ๐‘๐‘œ๐‘๐‘ƒ ; ฮ”๐‘ƒ๐‘˜ = ๐‘ƒ ฮฃ๐‘˜โˆ’1 , ฮฃ๐‘ƒ๐‘˜ = ๐‘๐‘ƒ ฮฃ๐‘˜โˆ’1 , and ฮ ๐‘ƒ๐‘˜ = ๐‘๐‘œฮฃ๐‘ƒ๐‘˜ , โˆ€๐‘˜ > 0. Thus, ๐‘ƒ ๐ถ
(resp., ๐‘๐‘ƒ ๐ถ ) denotes the class of problems that can be solved in polynomial time using an oracle
in the class ๐ถ by a deterministic (resp., non-deterministic) Turing machine. The class ฮ”๐‘ƒ๐‘˜ [๐‘™๐‘œ๐‘” ๐‘›]
denotes the subclass of ฮ”๐‘ƒ๐‘˜ containing the problems that can be solved in polynomial time by
a deterministic Turing machine by performing a number of calls bounded by ๐‘‚(๐‘™๐‘œ๐‘” ๐‘›) to an
oracle in the class ฮฃ๐‘ƒ๐‘˜โˆ’1 . It is known that: ฮฃ๐‘ƒ๐‘˜ โŠ‚ ฮ”๐‘ƒ๐‘˜+1 [๐‘™๐‘œ๐‘” ๐‘›] โŠ‚ ฮ”๐‘ƒ๐‘˜+1 โŠ‚ ฮฃ๐‘ƒ๐‘˜+1 โІ ๐‘ƒ ๐‘†๐‘ƒ๐ด๐ถ๐ธ
and ฮ ๐‘ƒ๐‘˜ โŠ‚ ฮ”๐‘ƒ๐‘˜+1 [๐‘™๐‘œ๐‘” ๐‘›] โŠ‚ ฮ”๐‘ƒ๐‘˜+1 โŠ‚ ฮ ๐‘ƒ๐‘˜+1 โІ ๐‘ƒ ๐‘†๐‘ƒ๐ด๐ถ๐ธ.
   We now recall the definition of credulous and skeptical acceptance problems. Given an AF-
based framework ฮ› (e.g., AF, CAF, WAF), an argument ๐‘Ž, and an argumentation semantics
๐’ฎ โˆˆ {co, pr, st, sst, gr},

    โ€ข the credulous acceptance problem, denoted as ๐ถ๐ด๐’ฎ , is the problem of deciding whether
      argument ๐‘Ž is credulously accepted, that is, deciding whether ๐‘Ž belongs to at least an
      ๐’ฎ-extension of ฮ›.
    โ€ข the skeptical acceptance problem, denoted as ๐‘†๐ด๐’ฎ , is the problem of deciding whether
      argument ๐‘Ž is skeptically accepted, that is, deciding whether ๐‘Ž belongs to every ๐’ฎ-extension
      of ฮ›.

For AFs, the complexity of the credulous and skeptical acceptance problems has been investigated
in [1] for the grounded semantics (as grounded semantics admits exactly one extension that can
be computed in polynomial time, these problems become identical and polynomial), in [20] for
the stable semantics, in [20, 21] for the preferred semantics, and in [22, 23] for the semi-stable
semantics. The results for AFs are summarized in the second and third column of Table 1.
   As for the complexity of CAFs, it is important to note that, given a CAF ฮฉ = โŸจ๐’œ, โ„›, ๐’žโŸฉ, if
we consider the corresponding AF ฮ› = โŸจ๐’œ, โ„›โŸฉ, then the set of complete extensions of ฮ› that
satisfy ๐’ž does not always form a complete meet-semilattice. This means that the constraints break
the lattice by marking as unfeasible some extensions. As a result, the complexity of credulous
and skeptical acceptance problems in CAF is slightly different from that of AF as ๐‘†๐ดco becomes
NP-complete and ๐ถ๐ดpr is shown to be in ฮฃ๐‘2 (and still NP-hard) [9].
   Concerning WAFs, given an ๐’ฎ-extension, checking satisfaction of a maximal-set of weak
constraints means ensuring that no any other ๐’ฎ-extension is better according to that criterion.
Table 1
Complexity of credulous (๐ถ๐ด๐’ฎ ) and skeptical (๐‘†๐ด๐’ฎ ) acceptance problems under complete (co),
stable (st), preferred (pr), and semi-stable (sst) semantics.



                       AF                                           WAF
  ๐’ฎ         ๐ถ๐ด๐’ฎ               ๐‘†๐ด๐’ฎ                ๐ถ๐ดms๐’ฎ            ๐‘†๐ดms๐’ฎ           ๐ถ๐ดmc๐’ฎ /๐‘†๐ดmc๐’ฎ
                                              ๐‘ƒ
  co    NP-complete             P            ฮฃ2 -complete     ฮ ๐‘ƒ
                                                               2 -complete
                                                                                ๐‘ƒ
                                                                               ฮ”2 [log ๐‘›]-complete
  st    NP-complete      coNP-complete       ฮฃ๐‘ƒ
                                              2 -complete     ฮ ๐‘ƒ
                                                               2 -complete     ฮ”๐‘ƒ
                                                                                2 [log ๐‘›]-complete
  pr    NP-complete       ฮ ๐‘ƒ
                           2 -complete      ฮฃ๐‘ƒ            ๐‘ƒ
                                             2 -hard, in ฮฃ3   ฮ ๐‘ƒ
                                                               3 -complete     ฮ”๐‘ƒ
                                                                                3 [log ๐‘›]-complete
 sst    ฮฃ๐‘ƒ
         2 -complete      ฮ ๐‘ƒ
                           2 -complete
                                              ๐‘ƒ
                                             ฮฃ3 -complete     ฮ ๐‘ƒ
                                                               3 -complete     ฮ”๐‘ƒ
                                                                                3 [log ๐‘›]-complete




This is an additional source of complexity that makes, in most cases, credulous and skeptical
reasoning in WAFs one level higher in the polynomial-time hierarchy than AFs.
Theorem 1. For any WAF โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ, the problem
    โ€ข ๐ถ๐ดms๐’ฎ is: (๐‘–) ฮฃ๐‘ƒ2 -complete for any semantics ๐’ฎ โˆˆ {co, st}, (๐‘–๐‘–) ฮฃ๐‘ƒ2 -hard and in ฮฃ๐‘ƒ3 for
      ๐’ฎ = pr, and (๐‘–๐‘–๐‘–) ฮฃ๐‘ƒ3 -complete for ๐’ฎ = sst.
    โ€ข ๐‘†๐ดms๐’ฎ is: (๐‘–) ฮ ๐‘ƒ2 -complete for ๐’ฎ โˆˆ {co, st}, and (๐‘–๐‘–) ฮ ๐‘ƒ3 -complete for ๐’ฎ โˆˆ {pr, sst}.
   It turns out that, under standard complexity assumptions, computing credulous and skeptical
acceptance in WAFs under maximum-cardinality semantics is easier than using maximal-set
semantics. Roughly speaking, this follows from the fact that a binary search strategy can be used
for deciding whether the cardinality of a set of constraints satisfied by an ๐’ฎ-extension containing
a given argument is maximum.
Theorem 2. For any WAF โŸจ๐’œ, โ„›, ๐’ž, ๐’ฒโŸฉ with |๐’ฒ| = ๐‘›, the problems ๐ถ๐ดmc๐’ฎ and ๐‘†๐ดmc๐’ฎ are:
    - ฮ”๐‘ƒ2 [log ๐‘›]-complete for any semantics ๐’ฎ โˆˆ {co, st},
    - ฮ”๐‘ƒ3 [log ๐‘›]-complete for ๐’ฎ โˆˆ {pr, sst}.
   The results for WAFs are summarized in the last three columns of Table 1.
   Restricted forms of WAFs, that is, Linearly ordered WAFs where constraints are linearly
ordered, for which maximal-set and maximum-cardinality semantics coincide, are investigated
in [9]: ๐ถ๐ด๐’ฎ and ๐‘†๐ด๐’ฎ are ฮ”๐‘ƒ2 -complete for the complete and stable semantics and ฮ”๐‘ƒ3 -complete
for the preferred and semistable semantics. It is also shown that, for the case of WAFs where
constraints are expressed by negative constraints (i.e., denials constraints whose body is a
conjunction of literals), the complexity of credulous acceptance for the preferred semantics
decreases to ฮฃ๐‘ƒ2 -complete.


5. Related Work
The use of constraints in AFs has been firstly proposed in [4] and then further investigated in
[6, 5, 7]. As mentioned in Section 2.2, there is no convergence on the semantics of operator โ‡’
for constraints in CAFs. The semantics proposed in [4] relies on classical 2-valued logic for
the evaluation of constraints by making use of the concept of completion of extensions, which
converts undefined truth values to negated truth values. More formally, for any set of arguments
๐‘† โІ ๐’œ, the completion of ๐‘† is ๐‘† ^ = ๐‘† โˆช {ยฌ๐‘Ž | ๐‘Ž โˆˆ ๐’œ โˆ– ๐‘†}. Then, ๐‘† satisfies a set of constraints
                  ^
๐’ž if and only if ๐‘† is a (2-valued) model of ๐’ž. A drawback of this semantics is that in checking
whether an extension ๐ธ satisfies a set of constraints it does not distinguish between false and
undefined arguments, e.g., a constraint of the form ๐‘Ž โˆง ยฌ๐‘Ž โ‡’ f is always satisfied, even when
๐œ—๐ธ (๐‘Ž) = undef (e.g. assuming an extension ๐ธ = โˆ… stating that ๐‘Ž is undefined, ๐ธ       ^ = {ยฌ๐‘Ž} and
then the 2-valued semantics is applied w.r.t. ๐ธ^ ).
   The semantics proposed in [5] assumes the standard 3-valued Kleeneโ€™s semantics for the
connectives โˆง, โˆจ and ยฌ, whereas for โ‡’ it assumes the Slupeckiโ€™s interpretation which is defined
as follows: ๐œ—(๐œ™ โ‡’ ๐œ“) is true if ๐œ—(๐œ™) โˆˆ {false, undef}, otherwise it is ๐œ—(๐œ“). Thus, while a
constraint of the form t โ‡’ ๐‘Ž โˆจ ยฌ๐‘Ž is useless according to [4] (since it is always satisfied), in
the Arieliโ€™s 3-valued semantics this constraint indicates that argument ๐‘Ž cannot have a neutral,
undefined, status. The use of 3-valued semantics allows us to distinguish between different
conditions on arguments. For instance, the constraint t โ‡’ ยฌ๐‘Ž means that ๐‘Ž should be rejected,
while the constraint ๐‘Ž โ‡’ f is a somewhat weaker demand: ๐‘Ž should not be accepted, and so
its status may be undecided. A drawback of Arieliโ€™s semantics, due to the assumption of the
Slupeckiโ€™s logic for interpreting the implication operator, is that it does not distinguish two
constraints of the form ๐œ™ โ‡’ f and ๐œ™ โ‡’ u, though it distinguishes two constraints of the
form t โ‡’ ๐œ™ and u โ‡’ ๐œ™. In order to avoid the above-mentioned problems, we considered the
interpretation of Lukasiewiczโ€™s logic for the implication operator.
   Besides being related to the proposals for CAFs in [4, 5], our work is also related to the
approach in [24] that provides a method for generating non-empty conflict-free extensions
for CAFs. Constraints have been also used in the context of dynamic AFs to refer to the
enforcement of some change [25]. In this context, extension enforcement aims at modifying
an AF to ensure that a given set of arguments becomes (part of) an extension for the chosen
semantics [26, 27, 28, 29, 30]. This is different from our approach where integrity constrains are
used to discard unfeasible solutions (extensions), without enforcing that a new set of arguments
becomes an extension.
   Weak constraints allow for selecting โ€œbestโ€ or โ€œoptimalโ€ extensions satisfying some conditions
on arguments, if possible. This can be viewed as expressing a kind of preference over the set
of extensions. Dungโ€™s framework has been extended in several ways for allowing preferences
over arguments [31, 32, 33, 34]. In particular, preferences relying to so-called critical attacks, i.e.,
attacks from a less preferred argument to a more preferred one, can be handled by removing or
invalidating such attacks or by โ€œinvertingโ€ them [35]. Such kind of preferences can be encoded
into AFs, possible through reductions relying on additional (meta)-arguments and attacks [36].
Thus these preferences do not increase expressiveness of AFs from a computational standpoint.
   Preferences can be also expressed in value-based AFs [37, 38], where each argument is associ-
ated with a numeric value, and a set of possible orders (preferences) among the values is defined.
In [39] weights are associated with attacks, and new semantics extending the classical ones on
the basis of a given numerical threshold are proposed. [40] extends [39] by considering other ag-
gregation functions over weights apart from sum. Except for weighted solutions under grounded
semantics (that prescribes more than one weighted solution), the complexity of credulous and
skeptical reasoning in the above-considered AF-based frameworks is lower than that of WAFs,
which suggests that WAFs are more expressive and can be used to model those frameworks (we
plan to formally investigate these connections in future work).


6. Conclusions and Future Work
We have introduced a general argumentation framework where weak constraints can be easily
expressed. These constraints impact on the complexity of credulous and skeptical reasoning: it
turns out that they generally increase the expressivity of AFs and CAFs. WAFs allow us to model
optimization problems such as for instance Min Coloring and Maximum Satisfiability, where
some kind of preferences (e.g. use the minimum number of colors) are expressed on solutions.
This is not possible for AFs whose expressivity is lower than that of WAFs (AFs can capture
simpler problems such as k-coloring and SAT).
   We envisage implementations of the proposed WAF semantics by exploiting ASP-based sys-
tems and analogies with logic programs with weak constraints [12, 13] (the relationship between
the semantics of some frameworks extending AF and that of logic programs has been recently
investigated in [41]). For WAFs, DLV system [16] could be used for computing maximum-
cardinality stable semantics.
   Although we considered ground constraints, the framework can be easily extended for general
formulae with variables, whose ground version is a propositional set. For instance, the strong and
weak constraints in Example 4 could be written by using only one strong constraint ๐‘‹ โˆง ๐‘Œ โˆง
๐‘ โˆง (๐‘‹ ฬธ= ๐‘Œ ) โˆง (๐‘‹ ฬธ= ๐‘) โˆง (๐‘Œ ฬธ= ๐‘) โ‡’ f and only one weak constraint t โ†’ ๐‘‹, where ๐‘‹,
๐‘Œ and ๐‘ are variables whose domain is the set of arguments. Future work will be also devoted
to considering more general forms of constraints, not only using variables ranging on the sets
of arguments, but also constraints allowing to express conditions on aggregates (e.g., at least ๐‘›
arguments from a given set ๐‘† should be accepted/rejected).
   Finally, given the inherent nature of argumentation and the typical high computational complex-
ity of most of the reasoning tasks [42, 43, 44, 45], there have been several recent efforts toward
the investigation of incremental techniques that use AF solutions (e.g. extensions, skeptical ac-
ceptance) at time ๐‘ก to recompute updated solutions at time ๐‘ก + 1 after that an update (e.g. adding/
removing an attack) is performed [46, 47, 48, 49, 50, 51, 25]. These approaches have been
extended to argumentation frameworks more general than AFs [52, 53, 54, 55]. Following this
line of research, we plan to investigate incremental techniques for recomputing WAF semantics
after performing updates consisting of changes to the AF component or to the sets of strong and
weak constraints.


References
 [1] P. M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic
     reasoning, logic programming and n-person games, Artif. Intell. 77 (1995) 321โ€“358.
 [2] L. Amgoud, C. Cayrol, On the acceptability of arguments in preference-based argumentation,
     in: Proc. of Conference on Uncertainty in Artificial Intelligence (UAI), 1998, pp. 1โ€“7.
 [3] S. Modgil, H. Prakken, A general account of argumentation with preferences, Artif. Intell.
     195 (2013) 361โ€“397.
 [4] S. Coste-Marquis, C. Devred, P. Marquis, Constrained argumentation frameworks, in: Proc.
     of International Conference on Principles of Knowledge Representation and Reasoning
     (KR), 2006, pp. 112โ€“122.
 [5] O. Arieli, Conflict-free and conflict-tolerant semantics for constrained argumentation
     frameworks, J. Appl. Log. 13 (2015) 582โ€“604.
 [6] O. Arieli, Towards constraints handling by conflict tolerance in abstract argumentation
     frameworks, in: Proc. of International Florida Artificial Intelligence Research Society
     Conference (FLAIRS), 2013.
 [7] O. Arieli, On the acceptance of loops in argumentation frameworks, J. Log. Comput. 26
     (2016) 1203โ€“1234.
 [8] M. Caminada, Semi-stable semantics, in: Proc. of Computational Models of Argument
     (COMMA), 2006, pp. 121โ€“130.
 [9] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Argumentation frameworks with strong and
     weak constraints: Semantics and complexity, in: Proc. of AAAI Conference on Artificial
     Intelligence (AAAI), 2021, pp. 6175โ€“6184.
[10] A. Avron, Natural 3-valued logicsโ€“characterization and proof theory, The Journal of
     Symbolic Logic 56 (1991) 276โ€“294.
[11] A. Ramos, Two new weak constraint qualifications for mathematical programs with
     equilibrium constraints and applications, J. Optim. Theory Appl. 183 (2019) 566โ€“591.
[12] F. Buccafurri, N. Leone, P. Rullo, Enhancing disjunctive datalog by constraints, IEEE Trans.
     Knowl. Data Eng. 12 (2000) 845โ€“860.
[13] S. Greco, Non-determinism and weak constraints in datalog, New Gener. Comput. 16
     (1998) 373โ€“396.
[14] W. Faber, M. Vallati, F. Cerutti, M. Giacomin, Solving set optimization problems by
     cardinality optimization with an application to argumentation, in: Proc. of European
     Conference on Artificial Intelligence (ECAI), 2016, pp. 966โ€“973.
[15] M. Li, R. Lv, The binary algorithm for finding the best weak-constraints in contradictory
     weak-constrained optimization problems, in: Proc. of International Conference on Natural
     Computation (ICNC), 2014, pp. 475โ€“479.
[16] M. Alviano, F. Calimeri, C. Dodaro, D. Fuscร , N. Leone, S. Perri, F. Ricca, P. Veltri,
     J. Zangari, The ASP system DLV2, in: Proc. of International Conference on Logic
     Programming and Nonmonotonic Reasoning (LPNMR), 2017, pp. 215โ€“221.
[17] M. Gebser, R. Kaminski, B. Kaufmann, T. Schaub, Multi-shot ASP solving with clingo,
     Theory Pract. Log. Program. 19 (2019) 27โ€“82.
[18] M. Law, A. Russo, K. Broda, Learning weak constraints in answer set programming, Theory
     Pract. Log. Program. 15 (2015) 511โ€“525.
[19] C. H. Papadimitriou, Computational complexity., Addison-Wesley, 1994.
[20] Y. Dimopoulos, A. Torres, Graph theoretical structures in logic programs and default
     theories, Theor. Comput. Sci. 170 (1996) 209โ€“244.
[21] P. E. Dunne, T. J. M. Bench-Capon, Coherence in finite argument systems, Artif. Intell. 141
     (2002) 187โ€“203.
[22] P. E. Dunne, M. Caminada, Computational complexity of semi-stable semantics in abstract
     argumentation frameworks, in: Proc. of European Conference on Logics in Artificial
     Intelligence (JELIA), volume 5293, 2008, pp. 153โ€“165.
[23] W. Dvorรกk, S. Woltran, Complexity of semi-stable and stage semantics in argumentation
     frameworks, Inf. Process. Lett. 110 (2010) 425โ€“430.
[24] R. Booth, S. Kaci, T. Rienstra, L. W. N. van der Torre, A logical theory about dynamics
     in abstract argumentation, in: Proc. of International Conference Scalable Uncertainty
     Management (SUM), 2013, pp. 148โ€“161.
[25] S. Doutre, J. Mailly, Constraints and changes: A survey of abstract argumentation dynamics,
     Argument & Computation 9 (2018) 223โ€“248.
[26] R. Baumann, G. Brewka, Expanding argumentation frameworks: Enforcing and mono-
     tonicity results, in: Proc. of Computational Models of Argument (COMMA), 2010, pp.
     75โ€“86.
[27] R. Baumann, What does it take to enforce an argument? minimal change in abstract
     argumentation, in: Proc. of the European Conference on Artificial Intelligence (ECAI),
     2012, pp. 127โ€“132.
[28] S. Coste-Marquis, S. Konieczny, J. Mailly, P. Marquis, Extension enforcement in abstract
     argumentation as an optimization problem, in: Proc. of International Joint Conference on
     Artificial Intelligence (IJCAI), 2015, pp. 2876โ€“2882.
[29] J. P. Wallner, A. Niskanen, M. Jรคrvisalo, Complexity results and algorithms for extension
     enforcement in abstract argumentation, J. Artif. Intell. Res. 60 (2017) 1โ€“40.
[30] A. Niskanen, J. P. Wallner, M. Jรคrvisalo, Extension enforcement under grounded seman-
     tics in abstract argumentation, in: International Conference on Principles of Knowledge
     Representation and Reasoning (KR), 2018, pp. 178โ€“183.
[31] L. Amgoud, C. Cayrol, A reasoning model based on the production of acceptable arguments,
     Ann. Math. Artif. Intell. 34 (2002) 197โ€“215.
[32] S. Kaci, L. W. N. van der Torre, Preference-based argumentation: Arguments supporting
     multiple values, Int. J. Approx. Reason. 48 (2008) 730โ€“751.
[33] S. Modgil, Reasoning about preferences in argumentation frameworks, Artif. Intell. 173
     (2009) 901โ€“934.
[34] L. Amgoud, S. Vesic, A new approach for preference-based argumentation frameworks,
     Ann. Math. Artif. Intell. 63 (2011) 149โ€“183.
[35] L. Amgoud, S. Vesic, Rich preference-based argumentation frameworks, Int. J. Approx.
     Reason. 55 (2014) 585โ€“606.
[36] S. Kaci, L. W. N. van der Torre, S. Villata, Preference in abstract argumentation, in: Proc.
     of Computational Models of Argument (COMMA), 2018, pp. 405โ€“412.
[37] T. J. M. Bench-Capon, Persuasion in practical argument using value-based argumentation
     frameworks, J. Log. Comput. 13 (2003) 429โ€“448.
[38] P. E. Dunne, T. J. M. Bench-Capon, Complexity in value-based argument systems, in: Proc.
     of European Conference on Logics in Artificial Intelligence (JELIA), 2004, pp. 360โ€“371.
[39] P. E. Dunne, A. Hunter, P. McBurney, S. Parsons, M. J. Wooldridge, Weighted argument
     systems: Basic definitions, algorithms, and complexity results, Artif. Intell. 175 (2011)
     457โ€“486.
[40] S. Coste-Marquis, S. Konieczny, P. Marquis, M. A. Ouali, Weighted attacks in argumen-
     tation frameworks, in: Proc. of International Conference on Principles of Knowledge
     Representation and Reasoning (KR), 2012.
[41] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, On the semantics of abstract argumentation
     frameworks: A logic programming approach, Theory Pract. Log. Program. 20 (2020)
     703โ€“718.
[42] G. Alfano, M. Calautti, S. Greco, F. Parisi, I. Trubitsyna, Explainable acceptance in proba-
     bilistic abstract argumentation: Complexity and approximation, in: Proc. of International
     Conference on Principles of Knowledge Representation and Reasoning (KR), 2020, pp.
     33โ€“43.
[43] G. Alfano, S. Greco, F. Parisi, On scaling the enumeration of the preferred extensions of
     abstract argumentation frameworks, in: Proc. of ACM Symposium on Applied Computing
     (SAC), 2019, pp. 1147โ€“1153.
[44] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation for
     structured argumentation over dynamic delp knowledge bases, Artif. Intell. 300 (2021)
     103553.
[45] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Incomplete argumentation frameworks:
     Properties and complexity, in: Proc. of AAAI Conference on Artificial Intelligence (AAAI),
     2022, p. (to appear).
[46] S. Greco, F. Parisi, Efficient computation of deterministic extensions for dynamic abstract
     argumentation frameworks, in: Proc. of European Conference on Artificial Intelligence
     (ECAI), 2016, pp. 1668โ€“1669.
[47] S. Greco, F. Parisi, Incremental computation of deterministic extensions for dynamic
     argumentation frameworks, in: Proc. of European Conference on Logics in Artificial
     Intelligence (JELIA), 2016, pp. 288โ€“304.
[48] G. Alfano, S. Greco, F. Parisi, Efficient computation of extensions for dynamic abstract
     argumentation frameworks: An incremental approach, in: Proc. of International Joint
     Conference on Artificial Intelligence (IJCAI), 2017, pp. 49โ€“55.
[49] G. Alfano, S. Greco, F. Parisi, An efficient algorithm for skeptical preferred acceptance
     in dynamic argumentation frameworks, in: Proc. of International Joint Conference on
     Artificial Intelligence (IJCAI), 2019, pp. 18โ€“24.
[50] G. Alfano, S. Greco, Incremental skeptical preferred acceptance in dynamic argumentation
     frameworks, IEEE Intell. Syst. 36 (2021) 6โ€“12.
[51] G. Alfano, S. Greco, F. Parisi, Incremental computation in dynamic argumentation frame-
     works, IEEE Intelligent Systems (2021). doi:10.1109/MIS.2021.3077292.
[52] G. Alfano, S. Greco, F. Parisi, Computing skeptical preferred acceptance in dynamic
     argumentation frameworks with recursive attack and support relations, in: Proc. of Compu-
     tational Models of Argument (COMMA), 2020, pp. 67โ€“78.
[53] G. Alfano, A. Cohen, S. Gottifredi, S. Greco, F. Parisi, G. R. Simari, Dynamics in abstract
     argumentation frameworks with recursive attack and support relations, in: Proc. of European
     Conference on Artificial Intelligence (ECAI), 2020, pp. 577โ€“584.
[54] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, An incremental approach
     to structured argumentation over dynamic knowledge bases, in: Proc. of International
     Conference on Principles of Knowledge Representation and Reasoning (KR), 2018, pp.
     78โ€“87.
[55] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation of
warranted arguments in dynamic defeasible argumentation: the rule addition case, in: Proc.
of ACM Symposium on Applied Computing (SAC), 2018, pp. 911โ€“917.