=Paper=
{{Paper
|id=Vol-3086/paper4
|storemode=property
|title=On Weak Constrained Argumentation Frameworks
|pdfUrl=https://ceur-ws.org/Vol-3086/paper4.pdf
|volume=Vol-3086
|authors=Gianvincenzo Alfano,Sergio Greco,Francesco Parisi,Irina Trubitsyna
|dblpUrl=https://dblp.org/rec/conf/aiia/AlfanoGPT21
}}
==On Weak Constrained Argumentation Frameworks==
On Weak Constrained Argumentation Frameworks
Gianvincenzo Alfano, Sergio Greco, Francesco Parisi and Irina Trubitsyna
Department of Informatics, Modeling, Electronics and System Engineering (DIMES),
University of Calabria, Rende, Italy
Abstract
The success and popularity of Dungโs abstract Argumentation Framework (AF) is also due to its simplicity
and expressiveness. Integrity constraints help to express domain knowledge in a compact and natural way,
thus keeping easy the modeling task even for problems that otherwise would be hard to encode within an
AF. Constraints can be expressed in the so-called Constrained Argumentation Framework (CAF). Although
constraints in CAF allow restricting the set of feasible solutions, they can not be used to find โoptimalโ
solutions to problems defined through CAFs. In this paper we present Weak constrained AFs (WAFs) that
enhance CAFs with weak constraints, that express some optimal conditions. We discuss the complexity
of WAFs under several well-known argumentation semantics, showing that weak constraints increase the
expressive power of AFs and CAFs.
Keywords
Abstract Argumentation, Weak Constraints, Complexity.
1. Introduction
Despite the expressive power and generality of Dungโs abstract Argumentation Framework
(AF) [1], in some cases it is difficult to accurately model domain knowledge by an AF in a
natural and easy-to-understand way. For this reason, AF has been extended by the introduction
of further constructs, such as preferences [2, 3] and integrity constraints [4, 5], to achieve more
comprehensive, natural, and compact ways of representing useful relationships among arguments.
In particular, enhancing AFs with constraints allows us to naturally and compactly express domain
conditions that need to be taken into account to filter out unfeasible solutions, as illustrated in
what follows.
Example 1. Assume three people ๐ฅ, ๐ฆ, ๐ง wish to attend a theatre event, but only two seats are
available. We could try to model this situation by an AF ฮ with arguments ๐ฅ, ๐ฆ, ๐ง (resp., ๐ฅ ยฏ , ๐ฆยฏ, ๐งยฏ),
each stating that ๐ฅ, ๐ฆ, ๐ง attends (resp., does not attend) the event. The direct graph encoding ฮ
is shown in Figure 1(a), where double arrows are used to represent mutually attacks between
arguments. Specifically, argument ๐ฅ (resp., ๐ฆ, ๐ง) attacks and is attacked by its opposite argument
modeling the fact that only one of them can be accepted. Moreover, argument ๐ฅ ยฏ (resp., ๐ฆยฏ, ๐งยฏ) is
attacked by the other two arguments ๐ฆยฏ and ๐งยฏ (resp., ๐ฅ ยฏ and ๐งยฏ; ๐ฅ
ยฏ and ๐ฆยฏ) since ๐ฅ (resp., ๐ฆ, ๐ง) can be
accepted only if one of the two arguments ๐ฆยฏ and ๐งยฏ (resp., ๐ฅ ยฏ and ๐งยฏ; ๐ฅ
ยฏ and ๐ฆยฏ) is accepted. Thus, the
set of attacks between every pair in {๐ฅยฏ , ๐ฆยฏ, ๐งยฏ} models the fact that at most one argument among ๐ฅ ยฏ,
5๐กโ Workshop on Advances In Argumentation In Artificial Intelligence (AI3 2021), December 1-3, 2021, Virtual
" g.alfano@dimes.unical.it (G. Alfano); greco@dimes.unical.it (S. Greco); fparisi@dimes.unical.it (F. Parisi);
i.trubitsyna@dimes.unical.it (I. Trubitsyna)
ยฉ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
Workshop
Proceedings
http://ceur-ws.org
ISSN 1613-0073
CEUR Workshop Proceedings (CEUR-WS.org)
x y
x y
xฬ yฬ
xฬ yฬ
zฬ zฬ wฬ
z w
z
(a) (b)
Figure 1: (a) AF ฮ of Example 1; (b) AF ฮโฒ of Example 4.
๐ฆยฏ and ๐งยฏ can be accepted and then, as a consequence, at least two arguments among ๐ฅ, ๐ฆ and ๐ง can
be accepted. โก
The meaning of an AF is given in terms of argumentation semantics, which intuitively tell us
the sets of arguments (called extensions) that can collectively be accepted. The preferred (and
stable) extensions of AF ฮ of Example 1 are ๐ธ1 = {๐ฅ, ๐ฆ, ๐งยฏ}, ๐ธ2 = {๐ฅ, ๐ฆยฏ, ๐ง}, ๐ธ3 = {๐ฅ ยฏ , ๐ฆ, ๐ง},
and ๐ธ4 = {๐ฅ, ๐ฆ, ๐ง}. However, ๐ธ4 is not feasible as only two seats are available and thus only
two people could attend the event. To overcome such a situation, and thus providing a natural and
compact way for expressing such kind of conditions, the use of constraints has been proposed
[4, 6, 5, 7].
Example 2. Continuing from Example 1, the constraint ๐
= ๐ฅ โง ๐ฆ โง ๐ง โ f can be used. It states
that the propositional formula ๐ฅ โง ๐ฆ โง ๐ง must be false. That is, feasible solutions must satisfy the
condition that the 3 arguments ๐ฅ, ๐ฆ, and ๐ง are not jointly accepted, i.e., the three people cannot
attend the event together. The effect of using constraint ๐
is that ๐ธ4 is discarded from the set of
solutions of our problem. โก
We call an AF augmented with constraints a Constrained AF (CAF). Although constraints in a
CAF allow restricting the set of feasible solutions, they do not help in finding โbestโ or preferable
solutions. Considering our running example, the three people may agree on the fact that โ๐ฅ and
๐ฆ should preferably attend the event whenever there are only two seats availableโ. To express
this kind of conditions, we introduce weak constraints, that is, constraints that are required to be
satisfied if possible. Syntactically, they have the same form of (strong) constraints except that the
implication symbol โ is used (instead of โ). Intuitively, these constraints can be used to find
โoptimalโ solutions to a problem defined by means of an AF or a CAF. A CAF with the addition
of weak constraints is said to be a Weak constrained Argumentation Framework (WAF).
Example 3. Consider a WAF obtained by adding to the CAF of Example 2 the weak constraint
t โ ๐ฅ โง ๐ฆ, stating that it is desirable that ๐ฅ and ๐ฆ attend the event together. Herein, t denotes the
truth value true. Then, extension ๐ธ1 = {๐ฅ, ๐ฆ, ๐งยฏ} is selected as the โbestโ one. โก
The use of strong and weak constraints substantially reduces the effort needed to figure out
how to define an AF that models a given problem. In fact, as said earlier, constraints facilitate to
express knowledge in a more compact and easy to understand way. For instance, the problem
presented in Example 1, has been represented through an AF which expresses the condition that
โat most one argument among ๐ฅ ยฏ , ๐ฆยฏ, ๐งยฏ can be acceptedโ and then, as a consequence, at least two
arguments ๐ฅ, ๐ฆ, ๐ง can be accepted. However, this condition is not easy to be generalized if we
have more than three people. Suppose there is a fourth guy, ๐ค, who wish to attend the event, and
there are again only two available seats. After adding the arguments ๐ค and ๐ค ยฏ to ฮ of Figure 1(a),
we cannot use the same reasoning as in Example 1 to model the fact that two of the four people
attend the event. In fact, having the attacks between every pair in {๐ฅ ยฏ } does not model
ยฏ , ๐ฆยฏ, ๐งยฏ, ๐ค
this situation (it models that at least three of the four people attend the event). Remarkably, using
strong and weak constraints allow for using a common reasoning pattern to generalize to this
more complex situation, even starting from an AF having a simpler structure.
Example 4. Consider a WAF consisting of AF ฮโฒ of Figure 1(b) and the sets of strong and weak
constraints; ๐ = {๐
, ๐ฅ โง ๐ฆ โง ๐ค โ f, ๐ฅ โง ๐ง โง ๐ค โ f, ๐ฆ โง ๐ง โง ๐ค โ f}; and ๐ฒ = {t โ ๐ฅ, t โ
๐ฆ, t โ ๐ง, t โ ๐ค}. The strong constraints in ๐ (that includes ๐
of Example 2) filter out from
the (16 preferred) extensions of ฮโฒ the solutions where more than two people attend the event,
whereas the weak constraints maximize the set (or number) of people attending the event. โก
In this paper, we present WAFs along with two criteria for interpreting weak constraints, under
any argumentation semantics ๐ฎ: maximal-set (ms๐ฎ) and maximum-cardinality (mc๐ฎ) according
to which the best/optimal ๐ฎ-extensions are those satisfying a maximal set, or a maximum number,
of weak constraints respectively. Then, we discuss the complexity of credulous and skeptical
reasoning for WAFs, showing that the introduction of weak constraints typically increases the
complexity of at least one step in the polynomial hierarchy w.r.t. AF.
2. Preliminaries
We briefly review Dungโs framework and discuss Constrained Argumentation Frameworks.
2.1. Argumentation Frameworks
An abstract Argumentation Framework (AF) is a pair โจ๐, โโฉ, where ๐ is a set of arguments and
โ โ ๐ ร ๐ is a set of attacks. If (๐, ๐) โ โ then we say that ๐ attacks ๐. We can think of an AF
as a directed graph whose nodes represent arguments and edges represent attacks.
Given an AF ฮ = โจ๐, โโฉ and a set ๐ โ ๐ of arguments, an argument ๐ โ ๐ is said to be
i) defeated w.r.t. ๐ iff โ๐ โ ๐ such that (๐, ๐) โ โ, and ii) acceptable w.r.t. ๐ iff for every
argument ๐ โ ๐ with (๐, ๐) โ โ, there is ๐ โ ๐ such that (๐, ๐) โ โ. The sets of defeated and
acceptable arguments w.r.t. ๐ are defined as follows (where ฮ is understood):
โข ๐ท๐๐ (๐) = {๐ โ ๐ | โ๐ โ ๐ . (๐, ๐) โ โ};
โข ๐ด๐๐(๐) = {๐ โ ๐ | โ๐ โ ๐ . (๐, ๐) ฬธโ โ โจ ๐ โ ๐ท๐๐ (๐)}.
Given an AF โจ๐, โโฉ, a set ๐ โ ๐ of arguments is said to be: conflict-free iff ๐ โฉ ๐ท๐๐ (๐) = โ
;
โ admissible iff it is conflict-free and ๐ โ ๐ด๐๐(๐).
Different argumentation semantics have been proposed to characterize collectively acceptable
sets of arguments, called extensions [1, 8]. Every extension is an admissible set satisfying
additional conditions. Specifically, the complete, preferred, stable, semi-stable, and grounded
extensions of an AF are defined as follows.
Given an AF โจ๐, โโฉ, a set ๐ โ ๐ is an extension called:
โข complete (co) iff it is an admissible set and ๐ = ๐ด๐๐(๐);
โข preferred (pr) iff it is a maximal (w.r.t. โ) complete extension;
โข stable (st) iff it is a total preferred extension, i.e. a preferred extension such that ๐ โช
๐ท๐๐ (๐) = ๐;
โข semi-stable (sst) iff it is a preferred extension such that ๐ โช ๐ท๐๐ (๐) is maximal;
โข grounded (gr) iff it is the smallest (w.r.t. โ) complete extension.
It is well-known that the set of complete extensions forms a complete semilattice with respect to
set inclusion. Arguments occurring in an extension are said to be accepted, whereas arguments
attacked by accepted arguments are said to be rejected; remaining arguments are said to be
undecided (w.r.t. the considered extension).
Example 5. Let ฮ = โจ๐, โโฉ be an AF where ๐ = {๐, ๐, ๐} and โ = {(๐, ๐), (๐, ๐), (๐, ๐), (๐, ๐)}.
AF ฮ has three complete extensions: ๐ธ1 = โ
, ๐ธ2 = {๐}, ๐ธ3 = {๐}. The set of preferred ex-
tensions is {๐ธ2 , ๐ธ3 }, whereas the set of stable (and semi-stable) extensions is {๐ธ3 }, and the
grounded extension is ๐ธ1 . โก
2.2. Constrained Argumentation Frameworks
Constrained Argumentation Framework (CAF) has been introduced in [4] and further investigated
in [5, 9]. The constrained argumentation frameworks in [6] and [7] are particular cases of those
in [5] as the set of constraints is restricted to atomic formulae only.
Given a set of propositional symbols ๐, โ๐ denotes the propositional language defined in the
usual inductive way from ๐ using the built-in constants f, u, and t denoting the truth values
false, undef (undefined), and true, and the connectives โง, โจ, ยฌ, โ and โ.
A general form of Constrained Argumentation Framework (CAF) has been considered in [4, 5].
A CAF is a triple ฮฉ = โจ๐, โ, ๐โฉ where โจ๐, โโฉ is an AF and ๐ is a set of (general) propositional
formulae built from โ๐ .
Given an AF โจ๐, โโฉ and a set ๐ โ ๐, the truth value of an argument ๐ โ ๐ w.r.t. ๐ is denoted
by ๐๐ (๐), or simply ๐(๐) whenever ๐ is understood, and ๐(๐) is ๐) true if ๐ โ ๐; ๐๐) false if
โ๐ โ ๐ such that (๐, ๐) โ โ; or ๐๐๐) undef otherwise.
It is important to note that, regarding the operator โ there is no convergence on its semantics in
CAFs (see Section 5 for a discussion). Thus, in the following we consider a simpler yet sufficiently
general form of constraints than that in [4, 5] (e.g. we do not deal with constraints with multiple
implications) and the classical interpretation of Lukasiewiczโs logic for the implication operator.
Let โโฒ๐ be the propositional language defined from ๐ and the connectives โง, โจ, ยฌ, where ๐ is
a set of arguments.
Definition 1. A (strong) constraint is a formula of one of the following forms: (๐) ๐ โ ๐ฃ, or (๐๐)
๐ฃ โ ๐, where ๐ is a propositional formula in โโฒ๐ and ๐ฃ โ {f, u, t}.
Checking whether a constraint is satisfied (under the Lukasiewiczโlogic) is equivalent to check
whether the truth value of the head is greater than or equal to the truth value of the body. For
formulae defining constraints we believe that Lucasiewicz interpretation is more appropriate as,
for instance, it allows to distinguish ๐ โ f from ๐ โ u, and avoids problems existing in other
interpretations [10].
Example 6. The constraint ๐ฅ โง ๐ฆ โง ๐ง โ f states that at least one of the arguments ๐ฅ, ๐ฆ and ๐ง
must be false, whereas ๐ฅ โง ๐ฆ โง ๐ง โ u states that ๐ฅ, ๐ฆ and ๐ง cannot be all true. โก
Clearly, constraints of the forms f โ ๐ and ๐ โ t are useless because always satisfied.
In the following, we assume that ๐ is a set of satisfiable constraints built from โโฒ๐ and every
CAF is a triple ฮฉ = โจ๐, โ, ๐โฉ.
Definition 2. Given a CAF ฮฉ = โจ๐, โ, ๐โฉ (where ๐ contains constraints built from โโฒ๐ ), a set of
arguments ๐ โ ๐ is a complete (resp., grounded, preferred, stable, semi-stable) extension for ฮฉ
if ๐ is a complete (resp., grounded, preferred, stable, semi-stable) extension for โจ๐, โโฉ and ๐ is
satisfied by ๐ (denoted as ๐ |= ๐).
3. Weak Constrained AFs
In this section, we introduce a generalization of CAFs where weak constraints are also considered.
Differently from the strong constraints discussed in the previous section, weak constraints are
propositional formulae that should be satisfied if possible.
Weak constraints (also called relaxed constraints in some contexts) have been considered in
several research areas, including Mathematical Programming with Equilibrium Constraints [11],
Answer Set Programming [12, 13], and for modelling and solving optimization problems [14, 15].
In particular, concerning the field of Answer Set Programming, weak constraints have been
implemented in DLV [16] and clingo [17]; moreover, learning them from data is also possible [18].
In our setting, weak constraints are logical formulae of the form ๐ โ ๐ฃ (or, equivalently,
๐ฃ โ ๐), where ๐ is a propositional formula built using the symbols of a given set ๐ and the
connectives โง, โจ and ยฌ. Herein, โ denotes the logical implication connective. Observe that we
use the symbol โ (instead of โ) to have different syntaxes for weak and strong constraints.
Definition 3. A Weak constrained Argumentation Framework (WAF) is a tuple ฮ = โจ๐, โ, ๐, ๐ฒโฉ,
where โจ๐, โ, ๐โฉ is a CAF and ๐ฒ is a set of weak constraints built from โโฒ๐ .
The semantics of a WAF is defined by considering two possible criteria for selecting the
preferable extensions w.r.t. weak constraintsโonly weak constraints are considered when
selecting the preferable extensions since strong constraints must be all satisfied. The two criteria
considered for assessing to which extent an extension satisfies a set of weak constraints are:
(i) maximal set criterion, considering as preferable (or โbestโ) extensions the ones that satisfy
a maximal set of weak constraints, and
(ii) maximum-cardinality criterion, considering as preferable (or โoptimalโ) extensions the
ones that satisfy a maximal number of weak constraints.
Clearly, the selection of preferable extensions make sense only for semantics admitting multiple
extensions, that is, complete, preferred, stable, and semi-stable semantics. Thus, in the following,
whenever we consider a generic semantics ๐ฎ, we refer to ๐ฎ โ {co, pr, st, sst}.
In the next subsections, we formally define the meaning of a WAF under the maximal-set and
maximum-cardinality semantics and provide two examples.
3.1. Maximal-Set Semantics
A WAF using the maximal-set criterion is defined as follows.
Definition 4 (Maximal-Set Semantics). Given a WAF ฮ = โจ๐, โ, ๐, ๐ฒโฉ, an ๐ฎ-extension ๐ธ for
โจ๐, โ, ๐โฉ is a maximal-set ๐ฎ-extension (ms๐ฎ-extension) for ฮ if, let ๐ฒ๐ธ โ ๐ฒ be the set of weak
constraints that are satisfied by ๐ธ (that is, ๐ธ |= ๐ฒ๐ธ ) , there is no ๐ฎ-extension ๐น for โจ๐, โ, ๐โฉ
and ๐ฒ๐น โ ๐ฒ such that ๐น |= ๐ฒ๐น and ๐ฒ๐ธ โ ๐ฒ๐น .
Given a semantics ๐ฎ, ms๐ฎ denotes the maximal-set version of ๐ฎ (e.g. msco denotes the ms
complete semantics).
Example 7. Consider the WAF ฮ = โจ๐, โ, ๐, ๐ฒโฉ with ๐ = {๐, ๐, ๐, ๐}, โ = {(๐, ๐), (๐, ๐),
(๐, ๐), (๐, ๐)}, ๐ = โ
and ๐ฒ = {๐ค1 = ๐ โ f, ๐ค2 = ๐ โจ ยฌ๐ โ u} stating that ๐ should
preferably be false (๐ค1 ) and ๐ should preferably be undefined (๐ค2 ). โจ๐, โ, ๐โฉ has 9 complete
extensions: ๐ธ0 = {}, ๐ธ1 = {๐}, ๐ธ2 = {๐}, ๐ธ3 = {๐}, ๐ธ4 = {๐}, ๐ธ5 = {๐, ๐}, ๐ธ6 = {๐, ๐},
๐ธ7 = {๐, ๐} and ๐ธ8 = {๐, ๐}.
In particular, ๐ธ0 is the grounded extension, whereas ๐ธ5 , ๐ธ6 , ๐ธ7 , ๐ธ8 are preferred, stable, and
semi-stable extensions of โจ๐, โ, ๐โฉ. These are also extensions of AF โจ๐, โโฉ, since ๐ = โ
.
Regarding the satisfaction of weak constraints, we have that ๐ธ0 |= {๐ค2 }, ๐ธ4 |= {๐ค1 , ๐ค2 },
๐ธ6 |= {๐ค1 }, and ๐ธ8 |= {๐ค1 }, whereas the other complete extensions do not satisfy any constraint.
Therefore, the maximal-set preferred (stable, semi-stable) extensions are ๐ธ6 and ๐ธ8 , whereas
there is only one maximal-set complete extension, which is ๐ธ4 . โก
3.2. Maximum-Cardinality Semantics
Maximum-cardinality semantics for WAFs prescribes as preferable extensions those satisfying
the highest number of weak constraints. This is similar to the semantics of weak constraints in
DLV [16] where, in addition, each constraint has assigned a weight.
Definition 5 (Maximum-Cardinality Semantics). Given a WAF ฮ = โจ๐, โ, ๐, ๐ฒโฉ, an ๐ฎ-
extension ๐ธ for โจ๐, โ, ๐โฉ is a maximum-cardinality ๐ฎ-extension (mc๐ฎ-extension) for ฮ if, let
๐ฒ๐ธ โ ๐ฒ be the set of weak constraints in ๐ฒ that are satisfied by ๐ธ, there is no ๐ฎ-extension ๐น
for โจ๐, โ, ๐โฉ and ๐ฒ๐น โ ๐ฒ such that ๐น |= ๐ฒ๐น and |๐ฒ๐ธ | < |๐ฒ๐น |.
Example 8. Consider the WAF ฮ = โจ๐, โ, ๐, ๐ฒโฉ with ๐ = {๐, ๐, ๐}, โ = {(๐, ๐), (๐, ๐),
(๐, ๐), (๐, ๐)}, ๐ = โ
and ๐ฒ = {๐ค1 = t โ ๐, ๐ค2 = t โ ๐, ๐ค3 = ๐ โ f} stating that it is
desirable that ๐ is true, ๐ is true, and ๐ is false.
โจ๐, โ, ๐โฉ has three complete extensions: ๐ธ1 = {}, ๐ธ2 = {๐}, and ๐ธ3 = {๐}. Herein, ๐ธ2
and ๐ธ3 are the preferred extensions of โจ๐, โ, ๐โฉ, whereas the unique stable (and semi-stable)
extension is ๐ธ3 . Regarding the satisfactions of weak constraints we have that ๐ธ1 |= ๐ฒ0 = โ
,
๐ธ2 |= ๐ฒ1 = {๐ค1 }, and ๐ธ3 |= ๐ฒ3 = {๐ค2 , ๐ค3 }. Therefore, the only maximum-cardinality
preferred extension of ฮ is ๐ธ3 (as |๐ฒ3 | = 2 > |๐ฒ1 | = 1 > |๐ฒ0 | = 0). Note that, according to the
maximal-set semantics, both ๐ธ2 and ๐ธ3 are maximal-set preferred extensions. Regarding the
stable (and semi-stable) semantics, as there is only one extension, ๐ธ3 is both a maximal-set and a
maximum-cardinality extension. โก
4. Complexity of Credulous and Skeptical Acceptance
In this section we discuss the complexity of the credulous and skeptical acceptance problems. We
assume the reader is familiar with the main complexity classes [19], which are briefly recalled in
what follows.
Classes ฮฃ๐๐ , ฮ ๐๐ and ฮ๐๐ , with ๐ โฅ 0 are defined as follows: ฮฃ๐0 = ฮ ๐0 = ฮ๐0 = ๐ ;
๐ ๐
ฮฃ๐1 = ๐๐ and ฮ ๐1 = ๐๐๐๐ ; ฮ๐๐ = ๐ ฮฃ๐โ1 , ฮฃ๐๐ = ๐๐ ฮฃ๐โ1 , and ฮ ๐๐ = ๐๐ฮฃ๐๐ , โ๐ > 0. Thus, ๐ ๐ถ
(resp., ๐๐ ๐ถ ) denotes the class of problems that can be solved in polynomial time using an oracle
in the class ๐ถ by a deterministic (resp., non-deterministic) Turing machine. The class ฮ๐๐ [๐๐๐ ๐]
denotes the subclass of ฮ๐๐ containing the problems that can be solved in polynomial time by
a deterministic Turing machine by performing a number of calls bounded by ๐(๐๐๐ ๐) to an
oracle in the class ฮฃ๐๐โ1 . It is known that: ฮฃ๐๐ โ ฮ๐๐+1 [๐๐๐ ๐] โ ฮ๐๐+1 โ ฮฃ๐๐+1 โ ๐ ๐๐๐ด๐ถ๐ธ
and ฮ ๐๐ โ ฮ๐๐+1 [๐๐๐ ๐] โ ฮ๐๐+1 โ ฮ ๐๐+1 โ ๐ ๐๐๐ด๐ถ๐ธ.
We now recall the definition of credulous and skeptical acceptance problems. Given an AF-
based framework ฮ (e.g., AF, CAF, WAF), an argument ๐, and an argumentation semantics
๐ฎ โ {co, pr, st, sst, gr},
โข the credulous acceptance problem, denoted as ๐ถ๐ด๐ฎ , is the problem of deciding whether
argument ๐ is credulously accepted, that is, deciding whether ๐ belongs to at least an
๐ฎ-extension of ฮ.
โข the skeptical acceptance problem, denoted as ๐๐ด๐ฎ , is the problem of deciding whether
argument ๐ is skeptically accepted, that is, deciding whether ๐ belongs to every ๐ฎ-extension
of ฮ.
For AFs, the complexity of the credulous and skeptical acceptance problems has been investigated
in [1] for the grounded semantics (as grounded semantics admits exactly one extension that can
be computed in polynomial time, these problems become identical and polynomial), in [20] for
the stable semantics, in [20, 21] for the preferred semantics, and in [22, 23] for the semi-stable
semantics. The results for AFs are summarized in the second and third column of Table 1.
As for the complexity of CAFs, it is important to note that, given a CAF ฮฉ = โจ๐, โ, ๐โฉ, if
we consider the corresponding AF ฮ = โจ๐, โโฉ, then the set of complete extensions of ฮ that
satisfy ๐ does not always form a complete meet-semilattice. This means that the constraints break
the lattice by marking as unfeasible some extensions. As a result, the complexity of credulous
and skeptical acceptance problems in CAF is slightly different from that of AF as ๐๐ดco becomes
NP-complete and ๐ถ๐ดpr is shown to be in ฮฃ๐2 (and still NP-hard) [9].
Concerning WAFs, given an ๐ฎ-extension, checking satisfaction of a maximal-set of weak
constraints means ensuring that no any other ๐ฎ-extension is better according to that criterion.
Table 1
Complexity of credulous (๐ถ๐ด๐ฎ ) and skeptical (๐๐ด๐ฎ ) acceptance problems under complete (co),
stable (st), preferred (pr), and semi-stable (sst) semantics.
AF WAF
๐ฎ ๐ถ๐ด๐ฎ ๐๐ด๐ฎ ๐ถ๐ดms๐ฎ ๐๐ดms๐ฎ ๐ถ๐ดmc๐ฎ /๐๐ดmc๐ฎ
๐
co NP-complete P ฮฃ2 -complete ฮ ๐
2 -complete
๐
ฮ2 [log ๐]-complete
st NP-complete coNP-complete ฮฃ๐
2 -complete ฮ ๐
2 -complete ฮ๐
2 [log ๐]-complete
pr NP-complete ฮ ๐
2 -complete ฮฃ๐ ๐
2 -hard, in ฮฃ3 ฮ ๐
3 -complete ฮ๐
3 [log ๐]-complete
sst ฮฃ๐
2 -complete ฮ ๐
2 -complete
๐
ฮฃ3 -complete ฮ ๐
3 -complete ฮ๐
3 [log ๐]-complete
This is an additional source of complexity that makes, in most cases, credulous and skeptical
reasoning in WAFs one level higher in the polynomial-time hierarchy than AFs.
Theorem 1. For any WAF โจ๐, โ, ๐, ๐ฒโฉ, the problem
โข ๐ถ๐ดms๐ฎ is: (๐) ฮฃ๐2 -complete for any semantics ๐ฎ โ {co, st}, (๐๐) ฮฃ๐2 -hard and in ฮฃ๐3 for
๐ฎ = pr, and (๐๐๐) ฮฃ๐3 -complete for ๐ฎ = sst.
โข ๐๐ดms๐ฎ is: (๐) ฮ ๐2 -complete for ๐ฎ โ {co, st}, and (๐๐) ฮ ๐3 -complete for ๐ฎ โ {pr, sst}.
It turns out that, under standard complexity assumptions, computing credulous and skeptical
acceptance in WAFs under maximum-cardinality semantics is easier than using maximal-set
semantics. Roughly speaking, this follows from the fact that a binary search strategy can be used
for deciding whether the cardinality of a set of constraints satisfied by an ๐ฎ-extension containing
a given argument is maximum.
Theorem 2. For any WAF โจ๐, โ, ๐, ๐ฒโฉ with |๐ฒ| = ๐, the problems ๐ถ๐ดmc๐ฎ and ๐๐ดmc๐ฎ are:
- ฮ๐2 [log ๐]-complete for any semantics ๐ฎ โ {co, st},
- ฮ๐3 [log ๐]-complete for ๐ฎ โ {pr, sst}.
The results for WAFs are summarized in the last three columns of Table 1.
Restricted forms of WAFs, that is, Linearly ordered WAFs where constraints are linearly
ordered, for which maximal-set and maximum-cardinality semantics coincide, are investigated
in [9]: ๐ถ๐ด๐ฎ and ๐๐ด๐ฎ are ฮ๐2 -complete for the complete and stable semantics and ฮ๐3 -complete
for the preferred and semistable semantics. It is also shown that, for the case of WAFs where
constraints are expressed by negative constraints (i.e., denials constraints whose body is a
conjunction of literals), the complexity of credulous acceptance for the preferred semantics
decreases to ฮฃ๐2 -complete.
5. Related Work
The use of constraints in AFs has been firstly proposed in [4] and then further investigated in
[6, 5, 7]. As mentioned in Section 2.2, there is no convergence on the semantics of operator โ
for constraints in CAFs. The semantics proposed in [4] relies on classical 2-valued logic for
the evaluation of constraints by making use of the concept of completion of extensions, which
converts undefined truth values to negated truth values. More formally, for any set of arguments
๐ โ ๐, the completion of ๐ is ๐ ^ = ๐ โช {ยฌ๐ | ๐ โ ๐ โ ๐}. Then, ๐ satisfies a set of constraints
^
๐ if and only if ๐ is a (2-valued) model of ๐. A drawback of this semantics is that in checking
whether an extension ๐ธ satisfies a set of constraints it does not distinguish between false and
undefined arguments, e.g., a constraint of the form ๐ โง ยฌ๐ โ f is always satisfied, even when
๐๐ธ (๐) = undef (e.g. assuming an extension ๐ธ = โ
stating that ๐ is undefined, ๐ธ ^ = {ยฌ๐} and
then the 2-valued semantics is applied w.r.t. ๐ธ^ ).
The semantics proposed in [5] assumes the standard 3-valued Kleeneโs semantics for the
connectives โง, โจ and ยฌ, whereas for โ it assumes the Slupeckiโs interpretation which is defined
as follows: ๐(๐ โ ๐) is true if ๐(๐) โ {false, undef}, otherwise it is ๐(๐). Thus, while a
constraint of the form t โ ๐ โจ ยฌ๐ is useless according to [4] (since it is always satisfied), in
the Arieliโs 3-valued semantics this constraint indicates that argument ๐ cannot have a neutral,
undefined, status. The use of 3-valued semantics allows us to distinguish between different
conditions on arguments. For instance, the constraint t โ ยฌ๐ means that ๐ should be rejected,
while the constraint ๐ โ f is a somewhat weaker demand: ๐ should not be accepted, and so
its status may be undecided. A drawback of Arieliโs semantics, due to the assumption of the
Slupeckiโs logic for interpreting the implication operator, is that it does not distinguish two
constraints of the form ๐ โ f and ๐ โ u, though it distinguishes two constraints of the
form t โ ๐ and u โ ๐. In order to avoid the above-mentioned problems, we considered the
interpretation of Lukasiewiczโs logic for the implication operator.
Besides being related to the proposals for CAFs in [4, 5], our work is also related to the
approach in [24] that provides a method for generating non-empty conflict-free extensions
for CAFs. Constraints have been also used in the context of dynamic AFs to refer to the
enforcement of some change [25]. In this context, extension enforcement aims at modifying
an AF to ensure that a given set of arguments becomes (part of) an extension for the chosen
semantics [26, 27, 28, 29, 30]. This is different from our approach where integrity constrains are
used to discard unfeasible solutions (extensions), without enforcing that a new set of arguments
becomes an extension.
Weak constraints allow for selecting โbestโ or โoptimalโ extensions satisfying some conditions
on arguments, if possible. This can be viewed as expressing a kind of preference over the set
of extensions. Dungโs framework has been extended in several ways for allowing preferences
over arguments [31, 32, 33, 34]. In particular, preferences relying to so-called critical attacks, i.e.,
attacks from a less preferred argument to a more preferred one, can be handled by removing or
invalidating such attacks or by โinvertingโ them [35]. Such kind of preferences can be encoded
into AFs, possible through reductions relying on additional (meta)-arguments and attacks [36].
Thus these preferences do not increase expressiveness of AFs from a computational standpoint.
Preferences can be also expressed in value-based AFs [37, 38], where each argument is associ-
ated with a numeric value, and a set of possible orders (preferences) among the values is defined.
In [39] weights are associated with attacks, and new semantics extending the classical ones on
the basis of a given numerical threshold are proposed. [40] extends [39] by considering other ag-
gregation functions over weights apart from sum. Except for weighted solutions under grounded
semantics (that prescribes more than one weighted solution), the complexity of credulous and
skeptical reasoning in the above-considered AF-based frameworks is lower than that of WAFs,
which suggests that WAFs are more expressive and can be used to model those frameworks (we
plan to formally investigate these connections in future work).
6. Conclusions and Future Work
We have introduced a general argumentation framework where weak constraints can be easily
expressed. These constraints impact on the complexity of credulous and skeptical reasoning: it
turns out that they generally increase the expressivity of AFs and CAFs. WAFs allow us to model
optimization problems such as for instance Min Coloring and Maximum Satisfiability, where
some kind of preferences (e.g. use the minimum number of colors) are expressed on solutions.
This is not possible for AFs whose expressivity is lower than that of WAFs (AFs can capture
simpler problems such as k-coloring and SAT).
We envisage implementations of the proposed WAF semantics by exploiting ASP-based sys-
tems and analogies with logic programs with weak constraints [12, 13] (the relationship between
the semantics of some frameworks extending AF and that of logic programs has been recently
investigated in [41]). For WAFs, DLV system [16] could be used for computing maximum-
cardinality stable semantics.
Although we considered ground constraints, the framework can be easily extended for general
formulae with variables, whose ground version is a propositional set. For instance, the strong and
weak constraints in Example 4 could be written by using only one strong constraint ๐ โง ๐ โง
๐ โง (๐ ฬธ= ๐ ) โง (๐ ฬธ= ๐) โง (๐ ฬธ= ๐) โ f and only one weak constraint t โ ๐, where ๐,
๐ and ๐ are variables whose domain is the set of arguments. Future work will be also devoted
to considering more general forms of constraints, not only using variables ranging on the sets
of arguments, but also constraints allowing to express conditions on aggregates (e.g., at least ๐
arguments from a given set ๐ should be accepted/rejected).
Finally, given the inherent nature of argumentation and the typical high computational complex-
ity of most of the reasoning tasks [42, 43, 44, 45], there have been several recent efforts toward
the investigation of incremental techniques that use AF solutions (e.g. extensions, skeptical ac-
ceptance) at time ๐ก to recompute updated solutions at time ๐ก + 1 after that an update (e.g. adding/
removing an attack) is performed [46, 47, 48, 49, 50, 51, 25]. These approaches have been
extended to argumentation frameworks more general than AFs [52, 53, 54, 55]. Following this
line of research, we plan to investigate incremental techniques for recomputing WAF semantics
after performing updates consisting of changes to the AF component or to the sets of strong and
weak constraints.
References
[1] P. M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic
reasoning, logic programming and n-person games, Artif. Intell. 77 (1995) 321โ358.
[2] L. Amgoud, C. Cayrol, On the acceptability of arguments in preference-based argumentation,
in: Proc. of Conference on Uncertainty in Artificial Intelligence (UAI), 1998, pp. 1โ7.
[3] S. Modgil, H. Prakken, A general account of argumentation with preferences, Artif. Intell.
195 (2013) 361โ397.
[4] S. Coste-Marquis, C. Devred, P. Marquis, Constrained argumentation frameworks, in: Proc.
of International Conference on Principles of Knowledge Representation and Reasoning
(KR), 2006, pp. 112โ122.
[5] O. Arieli, Conflict-free and conflict-tolerant semantics for constrained argumentation
frameworks, J. Appl. Log. 13 (2015) 582โ604.
[6] O. Arieli, Towards constraints handling by conflict tolerance in abstract argumentation
frameworks, in: Proc. of International Florida Artificial Intelligence Research Society
Conference (FLAIRS), 2013.
[7] O. Arieli, On the acceptance of loops in argumentation frameworks, J. Log. Comput. 26
(2016) 1203โ1234.
[8] M. Caminada, Semi-stable semantics, in: Proc. of Computational Models of Argument
(COMMA), 2006, pp. 121โ130.
[9] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Argumentation frameworks with strong and
weak constraints: Semantics and complexity, in: Proc. of AAAI Conference on Artificial
Intelligence (AAAI), 2021, pp. 6175โ6184.
[10] A. Avron, Natural 3-valued logicsโcharacterization and proof theory, The Journal of
Symbolic Logic 56 (1991) 276โ294.
[11] A. Ramos, Two new weak constraint qualifications for mathematical programs with
equilibrium constraints and applications, J. Optim. Theory Appl. 183 (2019) 566โ591.
[12] F. Buccafurri, N. Leone, P. Rullo, Enhancing disjunctive datalog by constraints, IEEE Trans.
Knowl. Data Eng. 12 (2000) 845โ860.
[13] S. Greco, Non-determinism and weak constraints in datalog, New Gener. Comput. 16
(1998) 373โ396.
[14] W. Faber, M. Vallati, F. Cerutti, M. Giacomin, Solving set optimization problems by
cardinality optimization with an application to argumentation, in: Proc. of European
Conference on Artificial Intelligence (ECAI), 2016, pp. 966โ973.
[15] M. Li, R. Lv, The binary algorithm for finding the best weak-constraints in contradictory
weak-constrained optimization problems, in: Proc. of International Conference on Natural
Computation (ICNC), 2014, pp. 475โ479.
[16] M. Alviano, F. Calimeri, C. Dodaro, D. Fuscร , N. Leone, S. Perri, F. Ricca, P. Veltri,
J. Zangari, The ASP system DLV2, in: Proc. of International Conference on Logic
Programming and Nonmonotonic Reasoning (LPNMR), 2017, pp. 215โ221.
[17] M. Gebser, R. Kaminski, B. Kaufmann, T. Schaub, Multi-shot ASP solving with clingo,
Theory Pract. Log. Program. 19 (2019) 27โ82.
[18] M. Law, A. Russo, K. Broda, Learning weak constraints in answer set programming, Theory
Pract. Log. Program. 15 (2015) 511โ525.
[19] C. H. Papadimitriou, Computational complexity., Addison-Wesley, 1994.
[20] Y. Dimopoulos, A. Torres, Graph theoretical structures in logic programs and default
theories, Theor. Comput. Sci. 170 (1996) 209โ244.
[21] P. E. Dunne, T. J. M. Bench-Capon, Coherence in finite argument systems, Artif. Intell. 141
(2002) 187โ203.
[22] P. E. Dunne, M. Caminada, Computational complexity of semi-stable semantics in abstract
argumentation frameworks, in: Proc. of European Conference on Logics in Artificial
Intelligence (JELIA), volume 5293, 2008, pp. 153โ165.
[23] W. Dvorรกk, S. Woltran, Complexity of semi-stable and stage semantics in argumentation
frameworks, Inf. Process. Lett. 110 (2010) 425โ430.
[24] R. Booth, S. Kaci, T. Rienstra, L. W. N. van der Torre, A logical theory about dynamics
in abstract argumentation, in: Proc. of International Conference Scalable Uncertainty
Management (SUM), 2013, pp. 148โ161.
[25] S. Doutre, J. Mailly, Constraints and changes: A survey of abstract argumentation dynamics,
Argument & Computation 9 (2018) 223โ248.
[26] R. Baumann, G. Brewka, Expanding argumentation frameworks: Enforcing and mono-
tonicity results, in: Proc. of Computational Models of Argument (COMMA), 2010, pp.
75โ86.
[27] R. Baumann, What does it take to enforce an argument? minimal change in abstract
argumentation, in: Proc. of the European Conference on Artificial Intelligence (ECAI),
2012, pp. 127โ132.
[28] S. Coste-Marquis, S. Konieczny, J. Mailly, P. Marquis, Extension enforcement in abstract
argumentation as an optimization problem, in: Proc. of International Joint Conference on
Artificial Intelligence (IJCAI), 2015, pp. 2876โ2882.
[29] J. P. Wallner, A. Niskanen, M. Jรคrvisalo, Complexity results and algorithms for extension
enforcement in abstract argumentation, J. Artif. Intell. Res. 60 (2017) 1โ40.
[30] A. Niskanen, J. P. Wallner, M. Jรคrvisalo, Extension enforcement under grounded seman-
tics in abstract argumentation, in: International Conference on Principles of Knowledge
Representation and Reasoning (KR), 2018, pp. 178โ183.
[31] L. Amgoud, C. Cayrol, A reasoning model based on the production of acceptable arguments,
Ann. Math. Artif. Intell. 34 (2002) 197โ215.
[32] S. Kaci, L. W. N. van der Torre, Preference-based argumentation: Arguments supporting
multiple values, Int. J. Approx. Reason. 48 (2008) 730โ751.
[33] S. Modgil, Reasoning about preferences in argumentation frameworks, Artif. Intell. 173
(2009) 901โ934.
[34] L. Amgoud, S. Vesic, A new approach for preference-based argumentation frameworks,
Ann. Math. Artif. Intell. 63 (2011) 149โ183.
[35] L. Amgoud, S. Vesic, Rich preference-based argumentation frameworks, Int. J. Approx.
Reason. 55 (2014) 585โ606.
[36] S. Kaci, L. W. N. van der Torre, S. Villata, Preference in abstract argumentation, in: Proc.
of Computational Models of Argument (COMMA), 2018, pp. 405โ412.
[37] T. J. M. Bench-Capon, Persuasion in practical argument using value-based argumentation
frameworks, J. Log. Comput. 13 (2003) 429โ448.
[38] P. E. Dunne, T. J. M. Bench-Capon, Complexity in value-based argument systems, in: Proc.
of European Conference on Logics in Artificial Intelligence (JELIA), 2004, pp. 360โ371.
[39] P. E. Dunne, A. Hunter, P. McBurney, S. Parsons, M. J. Wooldridge, Weighted argument
systems: Basic definitions, algorithms, and complexity results, Artif. Intell. 175 (2011)
457โ486.
[40] S. Coste-Marquis, S. Konieczny, P. Marquis, M. A. Ouali, Weighted attacks in argumen-
tation frameworks, in: Proc. of International Conference on Principles of Knowledge
Representation and Reasoning (KR), 2012.
[41] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, On the semantics of abstract argumentation
frameworks: A logic programming approach, Theory Pract. Log. Program. 20 (2020)
703โ718.
[42] G. Alfano, M. Calautti, S. Greco, F. Parisi, I. Trubitsyna, Explainable acceptance in proba-
bilistic abstract argumentation: Complexity and approximation, in: Proc. of International
Conference on Principles of Knowledge Representation and Reasoning (KR), 2020, pp.
33โ43.
[43] G. Alfano, S. Greco, F. Parisi, On scaling the enumeration of the preferred extensions of
abstract argumentation frameworks, in: Proc. of ACM Symposium on Applied Computing
(SAC), 2019, pp. 1147โ1153.
[44] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation for
structured argumentation over dynamic delp knowledge bases, Artif. Intell. 300 (2021)
103553.
[45] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Incomplete argumentation frameworks:
Properties and complexity, in: Proc. of AAAI Conference on Artificial Intelligence (AAAI),
2022, p. (to appear).
[46] S. Greco, F. Parisi, Efficient computation of deterministic extensions for dynamic abstract
argumentation frameworks, in: Proc. of European Conference on Artificial Intelligence
(ECAI), 2016, pp. 1668โ1669.
[47] S. Greco, F. Parisi, Incremental computation of deterministic extensions for dynamic
argumentation frameworks, in: Proc. of European Conference on Logics in Artificial
Intelligence (JELIA), 2016, pp. 288โ304.
[48] G. Alfano, S. Greco, F. Parisi, Efficient computation of extensions for dynamic abstract
argumentation frameworks: An incremental approach, in: Proc. of International Joint
Conference on Artificial Intelligence (IJCAI), 2017, pp. 49โ55.
[49] G. Alfano, S. Greco, F. Parisi, An efficient algorithm for skeptical preferred acceptance
in dynamic argumentation frameworks, in: Proc. of International Joint Conference on
Artificial Intelligence (IJCAI), 2019, pp. 18โ24.
[50] G. Alfano, S. Greco, Incremental skeptical preferred acceptance in dynamic argumentation
frameworks, IEEE Intell. Syst. 36 (2021) 6โ12.
[51] G. Alfano, S. Greco, F. Parisi, Incremental computation in dynamic argumentation frame-
works, IEEE Intelligent Systems (2021). doi:10.1109/MIS.2021.3077292.
[52] G. Alfano, S. Greco, F. Parisi, Computing skeptical preferred acceptance in dynamic
argumentation frameworks with recursive attack and support relations, in: Proc. of Compu-
tational Models of Argument (COMMA), 2020, pp. 67โ78.
[53] G. Alfano, A. Cohen, S. Gottifredi, S. Greco, F. Parisi, G. R. Simari, Dynamics in abstract
argumentation frameworks with recursive attack and support relations, in: Proc. of European
Conference on Artificial Intelligence (ECAI), 2020, pp. 577โ584.
[54] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, An incremental approach
to structured argumentation over dynamic knowledge bases, in: Proc. of International
Conference on Principles of Knowledge Representation and Reasoning (KR), 2018, pp.
78โ87.
[55] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation of
warranted arguments in dynamic defeasible argumentation: the rule addition case, in: Proc.
of ACM Symposium on Applied Computing (SAC), 2018, pp. 911โ917.