<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Efect of Preferences in Abstract Argumentation Under a Claim-Centric View</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Michael Bernreiter</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wolfgang Dvořák</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Rapberger</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Woltran</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Logic and Computation</institution>
          ,
          <addr-line>TU Wien</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <fpage>27</fpage>
      <lpage>38</lpage>
      <abstract>
        <p>In this paper, we study the efect of preferences in abstract argumentation under a claim-centric perspective. Recent work has revealed that semantical and computational properties can change when reasoning is performed on claim-level rather than on the argument-level, while under certain natural restrictions (arguments with the same claims have the same outgoing attacks) these properties are conserved. We now investigate these efects when, in addition, preferences have to be taken into account and consider four prominent reductions to handle preferences between arguments. As we shall see, these reductions give rise to diferent classes of claim-augmented argumentation frameworks, and behave diferently in terms of semantic properties and computational complexity. This strengthens the view that the actual choice for handling preferences has to be taken with care.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        by assigning to each argument a claim. Semantics for
CAFs can be obtained by evaluating the underlying AF
Arguments vary in their plausibility. Research in formal before inspecting the claims of the acceptable arguments
argumentation has taken up this aspect in both quanti- in the final step. CAFs serve as an ideal target formalism
tative and qualitative terms [
        <xref ref-type="bibr" rid="ref1 ref14">1, 2</xref>
        ]. Indeed, preferences for ASPIC+ [
        <xref ref-type="bibr" rid="ref10 ref12 ref7">10</xref>
        ] and other knowledge representation
forare nowadays a standard feature of many structured ar- malisms which utilize abstract argumentation semantics
gumentation formalisms [3, 4]. At the same time, there whilst also considering the claims of the arguments in the
are numerous generalizations of abstract Argumentation evaluation. Thus, CAFs help to streamline the
instantiaFrameworks (AFs) [5] that consider the impact of pref- tion process by avoiding additional mappings to obtain
erences on the abstract level, be it in terms of argument semantical correspondence; e.g., in contrast to
classistrength [
        <xref ref-type="bibr" rid="ref2">6, 7</xref>
        ] or preferences between values [8]. In cal AF-instantiations of logic programs [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ] where
adDung AFs in which conflicts are expressed as a binary ditional mappings are needed, claim-based semantics of
relation between arguments (attack relation), the incor- CAFs capture logic programming semantics without
deporation of preferences typically results in the deletion tours [
        <xref ref-type="bibr" rid="ref18">16</xref>
        ]. In this way, we obtain a direct correspondence
or reversion of attacks between arguments of diferent between the claim-extensions in the CAF and
conclusionstrength—deciding acceptability of arguments via argu- extensions in the original formalism.
mentation semantics is thus reflected in terms of the Although the acceptance of claims is closely related to
modified attack relation [
        <xref ref-type="bibr" rid="ref4">9</xref>
        ]. argument-acceptance, there are subtle diferences as
ob
      </p>
      <p>
        The diference in argument strength and the resulting served in [
        <xref ref-type="bibr" rid="ref10 ref12 ref19 ref7">14, 17, 10</xref>
        ] stemming from the fact that claims
modification of the attack relation naturally influences can appear as conclusion of several diferent arguments.
the acceptability of the arguments’ conclusion (the claim As a consequence, several properties of AF semantics
of the argument). Claim acceptance in argumentation such as I-maximality, i.e., ⊆ -maximality of extensions,
systems, i.e., the evaluation of commonly acceptable state- cannot be taken for granted when considered in terms of
ments while disregarding their particular justifications, the arguments’ claims [
        <xref ref-type="bibr" rid="ref20">18</xref>
        ]. Furthermore, the additional
is an integral part of many structured argumentation for- level of claims causes a rise in the computational
commalisms [
        <xref ref-type="bibr" rid="ref10 ref12 ref7 ref9">10, 11</xref>
        ] and has received increasing attention in plexity of standard decision problems (in particular,
verithe literature [
        <xref ref-type="bibr" rid="ref11">12, 13, 14</xref>
        ]. A simple yet powerful general- fication is one level higher in the polynomial hierarchy as
ization of Dung AFs that allow for claim-based evaluation for standard AFs), see [14, 19]. Luckily, these drawbacks
are Claim-augmented AFs (CAFs) [14]. They extend AFs can be alleviated by taking fundamental properties of the
attack relation into account: the basic observation that
NMR 2022: 20th International Workshop on Non-Monotonic Reason- attacks typically depend on the claim of the attacking
ing, August 07–09, 2022, Haifa, Israel arguments gives rise to the central class of well-formed
* Comrrbeesrpnorneid@indgbaaui.ttuhwori.en.ac.at (M. Bernreiter); CAFs. CAFs from this class require that arguments with
dvorak@dbai.tuwien.ac.at (W. Dvořák); the same claim attack the same arguments, thus
modelarapberg@dbai.tuwien.ac.at (A. Rapberger); ing – on the abstract level – a very natural behavior of
woltran@dbai.tuwien.ac.at (S. Woltran) arguments that is common to all leading structured
arguCPWrEooUrckReshdoinpgs IhStpN:/c1e6u1r3-w-0s.o7r3g ©ACt2tEr0i2bU2utCRioonpWy4r.0igoIhnrttekfornsrahtthiooisnppaalp(PCerCrboByYcite4s.0ea)u.dthionrsg.sUs(eCpeErmUittRed-uWndeSr.Correagti)ve Commons License mentation formalisms and instantiations. Well-formed
CAFs have the main advantage that most of the seman- restrictions suggest beneficial impact on both the
computics behave ‘as expected’. For instance, they retain the
tational complexity and on desired semantical properties
fundamental property of I-maximality, and their compu- such as I-maximality.
tational complexity is located at the same level of the
In this paper, we tackle this issue by considering four
polynomial hierarchy as for Dung AFs.
      </p>
      <p>commonly used methods, so-called reductions, to
inte</p>
      <p>Unfortunately, it turns out that well-formedness can- grate preference orderings into the attack relation: the
not be assumed if one deals with preferences in
argumost common modification is the deletion of attacks in
mentation, as arguments with the same claim are not
case the attacking argument is less preferred than its
necessarily equally plausible. The following example
target. This method is typically utilized to transform
demonstrates this.</p>
      <p>Example 1. Consider two arguments , ′ with claim  ,
and another argument  having claim  . Moreover, both
 and ′ attack , while  attacks . Furthermore assume
that we are given the additional information that  is
preferred over ′ (for example, if assumptions in the support
of  are stronger than assumptions made by ′). A
common method to integrate such information on argument
rankings is to delete attacks from arguments that attack
preferred arguments. In this case, we delete the attack from
′ to .</p>
      <p>Both frameworks are depicted below:  represents the
original situation while  ′ is the CAF resulting from
deleting the unsuccessful attack from ′ on the argument .</p>
      <p>: 
 ′ :








′

′
tion 2) is {, ′} which translates to { } on the
claim</p>
      <sec id="sec-1-1">
        <title>The CAF  ′, on the other hand, is no longer well-formed</title>
        <p>since ′ does not attack . In  ′, the argument-sets {, ′}
and {, } are both acceptable w.r.t. to stable-semantics. In
terms of claims this translates to { } and {, 
shows that I-maximality is violated on the claim-level.
}, which</p>
        <p>
          Although well-formedness can not be guaranteed in
view of preferences, this does not imply arbitrary
behavior of the resulting CAF: on the one hand, preferences
conform to a certain type of ordering (e.g., asymmetric,
strict, partial, or total orders) over the set of arguments;
on the other hand, it is evident that the deletion,
reversion, and other types of attack manipulation impose
certain restrictions on the structure of the resulting CAF.
Combining both aspects, we obtain that, assuming
wellformedness of the initial framework, it is unlikely that
preference incorporation results in arbitrary behavior.
preference-based argumentation frameworks (PAFs) [20]
into AFs but is also used in many structured
argumentation formalisms such as ASPIC+. This reduction has been
criticized due to several problematic side-efects, e.g., it
can be the case that two conflicting arguments are jointly
acceptable, and has been accordingly adapted in [21]; two
other reductions have been introduced in [
          <xref ref-type="bibr" rid="ref4">9</xref>
          ]. We apply
these four preference reductions to well-formed CAFs
with preferences. In particular, our main contributions
are as follows:
• For each of the four reductions, we characterize
the possible structure of CAFs that are obtained
by applying the reduction to a well-formed CAF
and a preference relation. This results in four
novel CAF classes, each of which constitutes a
proper extension of well-formed CAFs but does
not retain the full expressiveness of general CAFs.
We investigate the relationship between these
classes.
• We study I-maximality of stable, preferred,
semistable, stage, and naive semantics of the novel
CAF classes. Our results highlight a significant
advantage of a particular reduction: we show that,
for admissible-based semantics, this modification
preserves I-maximality. The other reductions fail
to preserve I-maximality; moreover, for naive and
stage semantics, I-maximality cannot be
guaranteed for any of the four reductions.
• Finally, we investigate the complexity of
reasoning for CAFs with preferences with respect to
conflict-free, admissible, complete, and all of the
aforementioned semantics.
        </p>
        <p>We show that for
three of the four reductions, the verification
problem drops by one level in the polynomial
hierarchy for all except complete semantics and is thus
not harder than for well-formed CAFs (which
in turn has the same complexity as the
corresponding AF problems). Complete semantics
remain hard for all but one preference reduction.
Moreover, it turns out that verification for the
reduction which deletes attacks from weaker
arguments remains as hard as for general CAFs.
The key motivation of this paper is to identify and
exOur results constitute a systematic study of the
strucploit structural properties of preferential argumentation
tural and computational efect of preferences on claim
in the scope of claim acceptance. The aforementioned
acceptance. Since we use CAFs as our base formalism,
5]. Complexity of CAFs (Δ ∈ {CAF , wfCAF }).
Ver CAF</p>
        <p>Ver wfCAF</p>
        <sec id="sec-1-1-1">
          <title>Cred Δ</title>
          <p>in P
NP-c
NP-c
in P
NP-c
NP-c
Σ2P-c</p>
        </sec>
        <sec id="sec-1-1-2">
          <title>Skept Δ</title>
          <p>trivial
trivial</p>
          <p>P-c
coNP-c
coNP-c
Π2P-c
Π2P-c</p>
          <p>NP-c
NP-c
NP-c
NP-c
NP-c
Σ2P-c
Σ2P-c
in P
in P
in P
in P
in P
coNP-c
coNP-c
tion of AFs [14].
claim, and thus constitute a straightforward generaliza- all CAFs  ∈  and all ,  ∈  ( ),  ⊆
 implies
our investigations extend to large classes of formalisms
that can be represented as CAFs, just like results on Dung
AFs yield insights for formalisms that can be captured
by AFs.
naive
x
x
stb
x
✓
prf
x
✓
sem
x
✓
stg
x
✓</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>We first define (abstract) argumentation frameworks [
 denotes a countable infinite domain of arguments.
Definition 1.</p>
      <sec id="sec-2-1">
        <title>An argumentation framework (AF) is a tu</title>
        <p>ple  = (, ) where  ⊆</p>
        <p>is a finite set of arguments
and  ⊆  ×  is an attack relation between arguments.
Let  ⊆
some  ∈ ; + = { ∈  | ∃ ∈  : (, ) ∈ }
denotes the set of arguments attacked by . ⊕ =  ∪ +
. We say  attacks  (in  ) if (, ) ∈  for
(in  ) by  if  ∈ + for each  with (, ) ∈ .
is the range of  in  . An argument  ∈  is defended</p>
        <p>Given an AF  = (, ) it can be convenient to write
 ∈  for  ∈  and (, ) ∈  for (, ) ∈ .
Semantics for AFs are defined as functions 
which assign to
each AF  = (, ) a set  ( ) ⊆
consider for  the functions cf , adm, com, naive, stb,
prf , sem, and stg which stand for conflict-free,
admissible, complete, naive, stable, preferred, semi-stable, and
2 of extensions. We
stage, respectively [22].</p>
        <p>Definition 2.
is conflict-free (in</p>
        <p>Let  = (, ) be an AF. A set  ⊆
 ), if there are no ,  ∈ , such that

(, ) ∈ . cf ( ) denotes the collection of conflict-free
sets of  . For a conflict-free set  ∈ cf ( ), it holds that
defended by  in  is contained in ;
•  ∈ adm( ) if each  ∈  is defended by  in  ;
•  ∈ com( ) if  ∈ adm( ) and each  ∈ 
•  ∈ naive( ) if there is no  ∈ cf ( ) with
 ⊂  ;
in  ;
•  ∈ stb( ) if each  ∈  ∖  is attacked by 
•  ∈ prf ( ) if  ∈ adm( ) and there is no
 ∈ adm( ) with  ⊂  ;
 ∈ adm( ) with ⊕ ⊂
⊕  ;
•  ∈ sem( ) if  ∈ adm( ) and there is no
•  ∈ stg ( ) if there is no  ∈ cf ( ) with
⊕ ⊂</p>
        <p>⊕  .
stg }.</p>
        <p>Example 2. Consider the AF  = ({, ′, }, {(, ),
(′, ), (, )}) from Example 1, ignoring claims  and  .
Then cf ( ) = {∅, {}, {′}, {}, {, ′}}, adm( ) =
and  ( ) = {{, ′}} for 
{∅, {}, {′}, {, ′}}, naive( )
=</p>
        <p>{{}, {, ′}},
∈ {com, stb, prf , sem,
CAFs are AFs in which each argument is assigned a</p>
        <p>Definition 3.</p>
      </sec>
      <sec id="sec-2-2">
        <title>A claim-augmented argumentation frame</title>
        <p>work (CAF) is a triple (, , claim) where (, ) is an
AF and claim :  → Claims is a function that maps
arguments to claims. The claim-function can be extended to
sets of arguments, i.e., claim() = {claim() |  ∈ }.</p>
      </sec>
      <sec id="sec-2-3">
        <title>A well-formed CAF (wfCAF) is a CAF (, , claim) in</title>
        <p>which all arguments with the same claim attack the same
arguments, i.e., for all ,  ∈  with claim() =
claim() we have { | (, ) ∈ } = { | (, ) ∈ }.</p>
        <p>The semantics of CAFs are based on those of AFs.
Definition 4.</p>
        <p>Let 
=
(, , claim) be a CAF.</p>
      </sec>
      <sec id="sec-2-4">
        <title>The claim-based variant of a semantics  is defined as</title>
        <p>( ) = {claim() |  ∈  ((, ))}.
stb( ) = {{ }}.</p>
        <p>Example 3. Consider the CAF  from Example 1.
For{(, ), (′, ), (, )}, claim() = claim(′)
mally,  = (, , claim) with  = {, ′, },  =</p>
        <p>=  ,
and claim() =  .  is well-formed and the
underlying AF of  was investigated in Example 2. From
there we can infer that, e.g., cf( ) = {∅, { }, { }},
adm( ) = {∅, { }}, naive( ) = {{ }, { }}, and</p>
        <p>
          cf( ) [
          <xref ref-type="bibr" rid="ref20">18</xref>
          ].
prf ( ) ⊆
naive( ) ⊆
        </p>
        <p>Well-known basic relations between diferent AF
semantics  also hold for  : stb( ) ⊆</p>
        <p>sem( ) ⊆
adm( ) as well as stb( ) ⊆ stg ( ) ⊆
Note that the semantics</p>
        <p>∈ {naive, stb, prf , sem,
 ⊆
stg } employ argument maximization and result in
incomparable extensions on regular AFs: for all ,  ∈  ( ),</p>
        <p>implies  =  . This property is referred to as
I-maximality, and is defined analogously for CAFs:
Definition 5.   is I-maximal for a class  of CAFs if, for
ℛ4()</p>
        <p>
          Notice that preferences in PCAFs are not required to
be transitive. While transitivity of preferences is often
assumed in argumentation [
          <xref ref-type="bibr" rid="ref4">21, 9</xref>
          ], it cannot always be
guaranteed in practice [6]. However, we will consider
the efect of transitive orderings when applicable.
• Credulous Acceptance (Cred CAF ): Given a CAF If  and  are arguments and  ≻  holds then we
 and claim  , is  contained in some  ∈ say that  is stronger than . But what efect should this
 ( )? ordering have? How should this influence, e.g., the set of
• Skeptical Acceptance (Skept CAF ): Given a CAF  admissible arguments? One possibility is to remove all
and claim  , is  contained in each  ∈  ( )? attacks from weaker to stronger arguments in our PCAF,
• Verification (Ver CAF ): Given a CAF  and a set and to then determine the set of admissible arguments
of claims , is  ∈  ( )? in the resulting CAF. This altering of attacks in a PCAF
based on its preference-ordering is called a reduction.
        </p>
        <p>
          We furthermore consider these reasoning problems re- The literature describes four such reductions for
regustricted to wfCAFs and denote them by Cred wfCAF , lar AFs [
          <xref ref-type="bibr" rid="ref4">9, 24, 21</xref>
          ]. Following [
          <xref ref-type="bibr" rid="ref4">9</xref>
          ] we next recall these
Skept wfCAF , and Ver wfCAF . Table 2 shows the com- reductions.
plexity of these problems [14, 19]. Here we see that the
complexity of the verification problem drops by one level Definition 7. Given a PCAF  = (, , claim, ≻ ),
in the polynomial hierarchy when comparing general a corresponding CAF ℛ( ) = (, ′, claim) is
conCAFs to wfCAFs. This is an important advantage of structed via Reduction , where  ∈ {1, 2, 3, 4}, as follows:
wfCAFs, as a lower complexity in the verification
problem allows for a more eficient enumeration of
claimextensions (cf. [14]).
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Preference-based CAFs</title>
      <p>As discussed in the previous sections, wfCAFs are a
natural subclass of CAFs with advantageous properties in
terms of I-maximality and computational complexity.</p>
      <p>However, when resolving preferences among arguments
the resulting CAFs are typically no longer well-formed Figure 1 visualizes the above reductions. Intuitively,
(cf. Example 1). In order to study preferences under a Reduction 1 removes attacks that contradict the
preferclaim-centric view we introduce preference-based CAFs. ence ordering while Reduction 2 reverts such attacks.
ReThese frameworks enrich the notion of wfCAFs with the duction 3 removes attacks that contradict the preference
concept of argument strength in terms of preferences. ordering, but only if the weaker argument is attacked by
Our main goals are then to understand the efect of re- the stronger argument also. Reduction 4 can be seen as a
solved preferences on the structure of the underlying combination of Reductions 2 and 3. Observe that all four
wfCAF on the one hand, and to determine whether the reductions are polynomial time computable with respect
advantages of wfCAFs are maintained on the other hand. to the input PCAF.</p>
      <p>Given this motivation, it is reasonable to consider the Note that many structured argumentation formalisms
impact of preferences on well-formed CAFs only. make use of preference-reductions as well. For instance,
ABA+ [4] employs attack reversal similar to Reduction 2
•  = 1: ∀,  ∈  : (, ) ∈ ′ ⇔ (, ) ∈ ,</p>
      <p≯≻ 
•  = 2: ∀,  ∈  : (, ) ∈ ′ ⇔ ((, ) ∈ ,</p>
      <p≯≻ ) ∨ ((, ) ∈ , (, ) ∈/ ,  ≻ )
•  = 3: ∀,  ∈  : (, ) ∈ ′ ⇔ ((, ) ∈ ,</p>
      <p≯≻ ) ∨ ((, ) ∈ , (, ) ̸∈ )
•  = 4: ∀,  ∈  : (, ) ∈ ′ ⇔ ((, ) ∈ ,
 ̸≻ ) ∨ ((, ) ∈ , (, ) ∈/ ,  ≻ ) ∨
((, ) ∈ , (, ) ̸∈ )
while some instances of ASPIC [3] delete attacks from
weaker arguments in the spirit of Reduction 1.</p>
      <p>The semantics for PCAFs can now be defined in a
straightforward way: first, one of the four reductions
is applied to the given PCAF; then, CAF-semantics are
applied to the resulting CAF.</p>
      <p>Definition 8.</p>
      <p>Let  be a PCAF and let  ∈ {1, 2, 3, 4}.</p>
      <sec id="sec-3-1">
        <title>The preference-claim-based variant of a semantics  rela</title>
        <p>tive to Reduction  is defined as  ( ) =  (ℛ( )).
Example 4. Let  = (, , claim, ≻ ) be the PCAF
where  =
{, ′, }, 
=
{(, ), (′, ), (, )},
claim() = claim(′) =  , claim() =  , and  ≻</p>
      </sec>
      <sec id="sec-3-2">
        <title>The underlying CAF (, , claim) of  was examined in</title>
        <p>′.</p>
        <p>Example 3.
{ }</p>
        <p>, {, 
ℛ1( ) = (, ′, claim) with ′ = {(, ), (, )},
which is the same CAF as  ′ in Example 1. It can be
veriifed that, e.g., adm1( ) = adm(ℛ1( )) = {{∅, { },
}} and stb1( ) = {{ }
, {, 
}}.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Indeed, the choice of reduction can influence the exten</title>
        <p>{ }}, and stb2( ) = {{ }, { }}.
sions of a PCAF. For example, ℛ2( ) = (, ′′, claim)
with ′′ = {(, ), (, ), (, )}, adm2( ) = {∅, { },</p>
        <p>It is easy to see that basic relations between
semantics carry over from CAFs, as, if we have  ( ) ⊆
 ( ) for two semantics , 
and all CAFs  , then
also  ( ) ⊆
that for all  ∈
prf ( ) ⊆
 ( ) for all PCAFs  . It thus holds
{1, 2, 3, 4}, stb( ) ⊆
sem( ) ⊆
adm( ) as well as stb( ) ⊆ stg ( ) ⊆
naive( ) ⊆ cf ( ).</p>
        <p>Remark 1. In this paper we require the underlying CAF
of a PCAF to be well-formed. The reason for this is that we
are interested in whether the benefits of well-formed CAFs
are preserved when preferences have to be taken into
account. Even from a technical perspective, admitting PCAFs
with a non-well-formed underlying CAF is not very
interesting with respect to the questions addressed in this
paper. Indeed, any CAF could be obtained from such general</p>
      </sec>
      <sec id="sec-3-4">
        <title>PCAFs, regardless of which preference reduction we are us</title>
        <p>ing, by simply specifying the desired CAF and an empty
preference relation. Thus, such general PCAFs have the
same properties regarding I-maximality and complexity as
general CAFs.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Characterization &amp;</title>
    </sec>
    <sec id="sec-5">
      <title>Expressiveness</title>
      <p>Our first step towards understanding the efect of
preferences on wfCAFs is to examine the impact of resolving
preferences on the structure of the underlying CAF. To
this end, we consider four new CAF classes which are
obtained from applying the reductions of Definition 7 to
PCAFs.


 


 


 
ℛ4-CAF respectively. Solid arrows are attacks, dashed
arrows indicate where attacks are missing for the CAF to be
well-formed.</p>
      <p>Definition 9.</p>
      <p>ℛ-CAF denotes the set of CAFs that
can be obtained by applying Reduction  to PCAFs, i.e.,
ℛ-CAF = {ℛ( ) |  is a PCAF}.</p>
      <p>It is easy to see that ℛ-CAF, with  ∈ {1, 2, 3, 4},
contains all wfCAFs (we can simply specify the desired
wfCAF and an empty preference relation). However,
not all CAFs are contained in ℛ-CAF. For example,
 = ({, }, {(, ), (, )}, claim) with claim() =
claim() can not be obtained from a PCAF  ′: such  ′
would need to contain either (, ) or (, ). But then,
since the underlying CAF of a PCAF must be well-formed,
 ′ would have to contain a self-attack which can not be
removed by any of the reductions. This is enough to
conclude1 that the four new classes are located in-between
wfCAFs and general CAFs:
it holds that wfCAF ⊂ ℛ -CAF ⊂
CAF.</p>
      <sec id="sec-5-1">
        <title>Proposition 1. Let CAF be the set of all CAFs and</title>
        <p>wfCAF the set of all wfCAFs. For all  ∈ {1, 2, 3, 4}</p>
        <p>Furthermore, the new classes are all distinct from each
other, i.e., we are indeed dealing with four new CAF
classes:
ℛ -CAF and ℛ3-CAF ⊂ ℛ -CAF.</p>
        <p>Proposition 2. For all  ∈</p>
        <p>{1, 2, 4} and all  ∈
{1, 2, 3, 4} such that  ̸=  it holds that ℛ-CAF ̸⊆
Proof sketch. Figure 2 shows CAFs that are in only
one of ℛ1-CAF, ℛ2-CAF, and ℛ4-CAF. Consider
the PCAF  = ({, }, {(, ), (, )}, claim, ≻ ) with
claim() = claim() =  and  ≻</p>
        <p>. Then ℛ1( ),
ℛ2( ), and ℛ4( ) are the CAFs of Figure 2. Since
selfattacks are not removed or introduced by any reduction,
and the underlying CAF must be well-formed,  is the
only PCAF from which ℛ1( ), ℛ2( ), and ℛ4( ) can
be obtained. Note that ℛ3( ) is simply the
underlying CAF of  . ℛ3-CAF ⊂ ℛ -CAF follows by the
fact that if an attack (, ) is removed by Reduction 3
from some PCAF , then (, ) ∈ . In this case, all
reductions behave in the same way (cf. Definition 7 or
1Although many proof sketches are provided in this text, a preprint
of this paper with full proofs in the appendix can be accessed at
https://arxiv.org/abs/2204.13305.</p>
        <p>While the classes ℛ1-CAF, ℛ2-CAF, would have to contain both the attacks (, ), (, ) as
and ℛ4-CAF are incomparable we observe well as the preferences  ≻ ,  ≻ . The argument for
ℛ3-CAF ⊂ ℛ -CAF which reflects that Reduc- ℛ3-CAF is similar.
tion 3 is the most conservative of the four reductions, For ℛ2-CAF, suppose there are , ′,  with
removing attacks only when there is a counter-attack claim() = claim(′), (, ) ∈ wfp( ), (, ) ̸∈ ,
from the stronger argument. and (′, ) ∈ . Assume there is a PCAF  ′ =</p>
        <p>We now know that applying preferences to wfCAFs (, ′, claim, ≻ ) such that ℛ2( ′) =  . Since
Reducresults in four distinct CAF-classes that lie in-between tion 2 can not completely remove conflicts, (, ) ̸∈ ′
wfCAFs and general CAFs. It is still unclear, however, and (, ) ̸∈ ′. If (, ′) ∈ , then (′, ) ∈ ′
how to determine whether some CAF belongs to one and (, ′) ∈ ′ since Reduction 2 can not introduce
of these classes or not. Especially for ℛ2-CAF and symmetric attacks. But then (, ′, claim) is not
wellℛ4-CAF this is not straightforward, since Reductions 2 formed. Now suppose (, ′) ̸∈ , but there is some
and 4 not only remove but also introduce attacks and ′ with claim() = claim(′), (′, ′) ̸∈ , and
therefore allow for many possibilities to obtain a particu- (′, ′) ̸∈ . Then also (′, ′) ̸∈ ′ and (′, ′) ̸∈ ′.
lar CAF as result. We tackle this problem by characteriz- But since (′, ) ∈  we have either (′, ) ∈ ′
ing the new classes via the so-called wf-problematic part or (, ′) ∈ ′, which means that (, ′, claim) is
of a CAF. not well-formed. In all other cases we can construct a
PCAF  ′′ = (, ′′, claim, ≻ ) such that ℛ2( ′′) =  :
Definition 10. A pair of arguments (, ) is wf- first revert all attacks (′, ) in  for which there is
problematic in a CAF  = (, , claim) if ,  ∈ , some  with claim() = claim(′) and (, ) ̸∈ ,
(, ) ̸∈ , and there is ′ ∈  with claim(′) = (, ) ̸∈ ; then, add all remaining pairs (, ) that
claim() and (′, ) ∈ . The set wfp( ) = are still wf-problematic as attacks. Define  ≻  if
{(, ) | (, ) is wf-problematic in  } is called the wf- (, ) ∈ ′′ ∖ . It can be verified that (, ′′, claim)
problematic part of  . is well-formed, ≻ is asymmetric, and ℛ2( ′′) =  . The
argument for ℛ4-CAF is similar.</p>
        <p>Intuitively, the wf-problematic part of a CAF 
consists of those attacks that are missing for  to be
wellformed (cf. Figure 2). Indeed,  is a wfCAF if and only if
wfp( ) = ∅. The four new classes can be characterized
as follows:</p>
        <p>The above characterizations give us some insights into
the efect of the various reductions on wfCAFs. Indeed,
the similarity between the characterizations of ℛ1-CAF
and ℛ3-CAF, resp. ℛ2-CAF and ℛ4-CAF, can
intuProposition 3. Let  = (, , claim) be a CAF. Then itively be explained by the fact that Reductions 1 and 3
only remove attacks, while Reductions 2 and 4 can also
•  ∈ ℛ1-CAF if (, ) ∈ wfp( ) implies introduce attacks. Furthermore, Proposition 3 allows us
(, ) ̸∈ wfp( ); to decide in polynomial time whether a given CAF 
•  ∈ ℛ2-CAF if there are no arguments can be obtained by applying one of the four preference
, ′, , ′ in  with claim() = claim(′) reductions to a PCAF.
and claim() = claim(′) such that (, ) ∈ But what happens if we restrict ourselves to transitive
wfp( ), (, ) ̸∈ , (′, ) ∈ , and either preferences? Analogously to ℛ-CAF, by ℛ-CAFtr
(, ′) ∈  or ((′, ′) ̸∈  and (′, ′) ̸∈ ); we denote the set of CAFs obtained by applying
Re•  ∈ ℛ3-CAF if (, ) ∈ wfp( ) implies duction  to PCAFs with a transitive preference
rela(, ) ∈ ; tion. It is clear that ℛ-CAFtr ⊆ ℛ -CAF for all
•  ∈ ℛ4-CAF if there are no arguments  ∈ {1, 2, 3, 4}. Interestingly, the relationship
be, ′, , ′ in  with claim() = claim(′) tween the classes ℛ-CAFtr is diferent to that between
and claim() = claim(′) such that (, ) ∈ ℛ-CAF (Proposition 2). Specifically, ℛ3-CAFtr is
wfp( ), (, ) ̸∈ , (′, ) ∈ , and either not contained in the other classes. Intuitively, this is
be(, ′) ̸∈  or ((′, ′) ̸∈  and (′, ′) ̸∈ ). cause, in certain PCAFs  , transitivity can force 1 ≻ 
via 1 ≻ 2 ≻ . . . ≻  such that (, 1) ∈  but
Proof sketch. Regarding ℛ1-CAF, observe that Reduc- (1, ) ̸∈  . In this case, only Reduction 3 leaves the
tion 1 can only delete but not introduce attacks. If attacks between 1 and  unchanged.
(, ) ∈ wfp( ) implies (, ) ̸∈ wfp( ) then we can
construct a PCAF  ′ with ′ =  ∪ {(, ) | (, ) ∈ Proposition 4. For all ,  ∈ {1, 2, 3, 4} such that  ̸= 
wfp( )} and  ≻  if (, ) ∈ ′ ∖ . Observe that ≻ it holds that ℛ-CAFtr ̸⊆ ℛ  -CAFtr .
is asymmetric. Conversely, a CAF  with arguments , 
such that (, ) ∈ wfp() and (, ) ∈ wfp() can not
be obtained via Reduction 1 from a PCAF ′, since ′</p>
        <p>We will not characterize all four classes ℛ-CAFtr .</p>
        <p>However, capturing ℛ1-CAFtr will prove useful when
analyzing the computational complexity of PCAFs using
Reduction 1 (see Section 6). Note that wfp( ) can be
seen as a directed graph, with an edge between vertices
 and  whenever (, ) ∈ wfp( ). Thus, we may use
notions such as paths and cycles in the wf-problematic
part of a CAF.</p>
        <p>Proposition 5.  ∈</p>
        <p>ℛ1-CAFtr for a CAF  if and
that there is no path from  to  in wfp( ).
only if (1) wfp( ) is acyclic and (2) (, ) ∈  implies
Proof sketch. Assume there is a cycle (1, . . . , , 1) in
we have (1, 2), . . . , (, 1)
tacks, if there is a PCAF  ′ such that ℛ1( ′) =  ,
1, i.e., ≻
∈  ′.</p>
        <p>This implies
is not
asymmet1 ≻
 ≻</p>
        <p>− 1 ≻ · · · ≻
ric. Similarly, if there is a path (1, . . . , ) in wfp( )</p>
        <p>1 in  ′. But then
we have to define
(1, ) ̸∈ ℛ1( ′).</p>
        <p>≻ · · · ≻</p>
        <p>If wfp( ) is acyclic and there is no path from  to 
in wfp( ) such that (, ) ∈  , then we can construct
a PCAF  ′ such that ℛ1( ′) =  in the same way as
when ≻ is not transitive (cf. proof of Proposition 3).</p>
        <p>From the high-level point of view, our characterization
results yield insights into the expressiveness of
argumentation formalisms that allow for preferences.
Propositions 3 and 5 show which situations can be captured
by formalisms which (i) constructs attacks based on the
claim of the attacking argument (i.e., formalisms with
well-formed attack relation) and (ii) incorporate
asymmetric or transitive preference relations on arguments
using one of the four reductions.
5. I-Maximality
wfp( ). Then, since Reduction 1 can not introduce at- freeness. It is easy to see that this is not the case for







′




′ 
′</p>
        <p>′′</p>
        <p>Proposition 8 and 9). Dashed arrows are edges in wfp( ).</p>
        <p>In other words, Reductions 2, 3, and 4 preserve
conflictReduction 1. In fact, Reduction 1 has been deemed
problematic for exactly this reason when applied to regular
AFs [21], although it is still discussed and considered
in the literature alongside the other reductions [6]. We
ifrst consider Reduction</p>
        <p>3, and show that it preserves
I-maximality for some, but not all, semantics.</p>
        <p>Proposition 7. prf 3, stb3, and sem3 are I-maximal for</p>
      </sec>
      <sec id="sec-5-2">
        <title>PCAFs.</title>
        <p>Proof. By stb3( ) ⊆ sem3( ) ⊆</p>
        <p>prf 3( ) it sufices to
,  ∈ prf 3( ). Then there are ′,  ′ ⊆
consider prf 3. Towards a contradiction, assume there is a
PCAF  = (, , claim, ≻ ) such that  ⊂  for some</p>
        <p>such that
′ ∈ prf (ℛ3( )), claim(′) = ,  ′ ∈ prf (ℛ3( )),
and claim( ′) =  . ′ ̸⊆</p>
        <p>′ since ′ ∈ prf (ℛ3( )).</p>
        <p>There are two possibilities for why  ̸∈  ′.</p>
        <p>Thus, there is  ∈ ′ such that  ̸∈  ′. But claim() ∈
 , i.e., there is ′ ∈  ′ with claim(′) = claim().</p>
        <p>Case 1:  ′ ∪ {} ̸∈ cf (ℛ3( )), i.e., there exists
 ∈  ′ such that  ̸∈ ′ and either (, ) ∈  or
(, ) ∈  . In fact, (, ) ̸∈  : otherwise, by the
well-formedness of (, , claim), we have (′, ) ∈ 
and, by Lemma 6,  ′ ̸∈ cf (ℛ3( )). Thus, (, ) ∈  .
must defend  in ℛ3( ), i.e., there exists  ∈ ′ such
that (, ) ∈ ℛ3( ). Then (, ) ∈  . Since  ⊂
there exists ′ ∈  ′ such that claim(′) = claim().</p>
        <p>≻
But then  ′ ̸∈ cf (ℛ3( )). Contradiction.</p>
        <p>Case 2:  is not defended by  ′, i.e., there exists  ∈ 
that is not attacked by  ′ and such that (, ) ∈ ℛ3( ).</p>
        <p>By the same argument as above, there is ′ ∈  ′ with
(′, ) ∈  . It cannot be that (′, ) ∈ ℛ3( ), i.e.,
′. By the definition of Reduction</p>
        <p>3, (, ′) ∈ 
and thus (, ′) ∈ ℛ3( ). But then  ′ ̸∈ adm(ℛ3( )).</p>
        <p>3, (, ) ∈ ℛ3( ). ′</p>
        <p>Of course, positive results regarding the I-maximality
of PCAFs with arbitrary preferences, such as in the above
proposition, still hold for PCAFs with transitive
preference orderings. Conversely, for negative results, it
sufsitive orderings to obtain results for the more general
One of the advantages of wfCAFs over general
By the definition of Reduction
CAFs is that they preserve I-maximality under most
maximization-based semantics (cf. Table 1), which leads
to more intuitive behavior of these semantics when
congate whether these advantages are preserved when
prefsidering extensions on the claim-level. We now investi- (′, ) ∈  by the well-formedness of (, , claim).
erences are introduced.
if, for all  in  and all ,  ∈  ( ),  ⊆  implies</p>
        <p>From known properties of wfCAFs (cf. Table 1) it
folIt remains to investigate the I-maximality of prf , stb,
sem, and stg  for PCAFs. For convenience, given a
lows directly that naive is not I-maximal for PCAFs. Contradiction.</p>
        <p>CAF  = (, , claim) and  ⊆
write  ∈  ( ) for  ∈  ((, )).</p>
        <p>, we sometimes
cf ((, , claim)) for  ∈ {2, 3, 4}.
and  ⊆
. 
∈ cf (ℛ( )) if and only if  ∈
case.</p>
        <p>Lemma 6. Let 
=
(, , claim, ≻ ) be a PCAF fices to show that I-maximality is not preserved on
tran</p>
        <p>Proof sketch. Let  be the CAF shown on the left
in Figure 3. Observe that  ∈ ℛ3-CAFtr since
ℛ3( ′) =  for the PCAF  ′ with the same
arguments as  , attacks {(, ), (, ), (, ), (′, ), (, ′)}
and  ≻ ′. Moreover, it can be verified that stg 3( ′) =
{{ }, {,  }, { }}.</p>
        <p>In contrast to Reduction 3, under Reductions 1, 2, and 4
we lose I-maximality for all semantics.</p>
        <p>Proposition 9.  , with  ∈ {prf , stb, sem, stg } and
 ∈ {1, 2, 4}, is not I-maximal for PCAFs, even when
considering only transitive preferences.</p>
        <p>Proof sketch. We only need to show this for stb since
stb( ) ⊆ sem( ) ⊆ prf ( ) and stb( ) ⊆
stg ( ).</p>
        <p>For  ∈ {1, 4}, consider  ′ from Example 1.  ′ ∈
ℛ1-CAFtr by Proposition 5, and  ′ ∈ ℛ4-CAFtr
since ℛ4( ) =  for  = ({, ′, }, {(, )},
claim, ≻ ) with  ≻ . It can be verified that stb( ′) =
{{ }, {,  }}.</p>
        <p>For  = 2, let  be the CAF shown on the right in
Figure 3.  ∈ ℛ2-CAFtr since ℛ2(′) =  for the
PCAF ′ with attacks {(, ), (, ′), (′, ), (′, ′)}
and preferences  ≻  and ′ ≻ ′. stb() =
{{ }, {,  }}.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Computational Complexity</title>
      <p>In this section, we investigate the impact of preferences
on the computational complexity of claim-based
reasoning. To this end, we adapt the decision problems
introduced in Section 2 to PCAFs as follows: given
a preference Reduction  ∈ {1, 2, 3, 4}, we define
Cred ,PCAF , Skept , PCAF analogously to</p>
      <p>PCAF , and Ver ,
Cred CAF , Skept CAF , and Ver CAF , except that we take


1
1
2
2


3
3


1
1
2
2


4
4


3
3


4
4
a PCAF instead of a CAF as input and appeal to the
  semantics instead of the   semantics.
Membership results for PCAFs can be inferred from results
for general CAFs (recall that the preference reductions
from PCAFs to the respective CAF class can be done
in polynomial time), and hardness results from results
for wfCAFs. Thus, the complexity of credulous and
skeptical acceptance follows immediately from known
results for CAFs and wfCAFs: given  ∈ {1, 2, 3, 4}
and  ∈ {cf , adm, com, naive, stb, prf , sem, stg }, the
problems Cred ,PCAF and Skept ,</p>
      <p>PCAF have the same
complexity as Cred wfCAF and Skept wfCAF respectively (cf.</p>
      <p>Table 2).</p>
      <p>The computational complexity of the verification
problem, on the other hand, is one level higher for general
CAFs when compared to wfCAFs (cf. Table 2), i.e., the
bounds that existing results yield for PCAFs are not tight.</p>
      <p>PCAF
In the following, we examine the complexity of Ver ,
for each of the considered reductions and semantics. Let
us first consider Reduction 1.</p>
      <p>PCAF is NP-complete for  ∈ {cf ,
Proposition 10. Ver , 1
naive}, even for transitive preferences.</p>
      <p>Proof sketch. NP-membership follows from known
results for general CAFs. NP-hardness: let  be an
arbitrary instance of 3-Sat given as a set {1, . . . , } of
clauses over variables . We construct a PCAF  =
(, , claim, ≻ ) and a set of claims  = {1, . . . , } ∪
 as follows:
•  =  ∪  ∪  where
 = { |  ∈ , 1 ≤  ≤ },
 = { | ¬ ∈ , 1 ≤  ≤ }, and
 = { ,  |  ∈ };
•  = {( , ), ( , ) |  ∈  } ∪</p>
      <p>{( , ), ( , ) |  ∈  };
• claim() = claim() =  for ,  ∈  ∪  ,</p>
      <p>claim( ) = claim( ) =  for  ∈ ;
•  ≻  for all  ∈  and  ≻  for all</p>
      <p>∈  .</p>
      <p>Note that the “trick” in above construction to guess
an interpretation does not work for admissible-based
semantics, since the occurrences of  resp.  in  would
remain undefended. Indeed, we need a more involved
construction next.</p>
      <p>PCAF is NP-complete for 
Proposition 11. Ver , 1
{stb, adm, com}, even for transitive preferences.</p>
      <p>∈
Proof sketch. We show NP-hardness. Let  be a
3-Satinstance given as a set {1, . . . , } of clauses over
variables . For convenience, we directly construct a
CAF  = (, , claim) with  ∈ ℛ1-CAFtr instead
of providing a PCAF  ′ such that ℛ1( ′) =  . This
is legitimate, as, by our characterization of ℛ1-CAFtr
(see Proposition 5), we can obtain  ′ by simply adding
all edges in wfp( ) to  and defining ≻ accordingly.
, , ˆ, .</p>
      <p>As it turns out, with Reductions 2, 3, and 4 we retain
For verification consider the set  = {1, . . . , } ∪ the benefits of wfCAFs over general CAFs for almost
{claim() |  ∈ }. Figure 5 illustrates the above all investigated semantics with respect to computational
construction. It can be verified that (1)  ∈ ℛ1-CAFtr ; complexity. In short, verification for wfCAFs is easier
(2)  is satisfiable if  ∈ stb( ). Likewise for adm than on general CAFs because, given a wfCAF  and a
and com. Intuitively, for each ,  , the helper argu- set of claims , a set of arguments  can be constructed
ments , and the corresponding cycle ensures that only in polynomial time such that  is the unique maximal
adone of ,  can be chosen. Note that  and  must not missible set in  with claim claim() =  [14]. Making
attack each other directly because of well-formedness in use of the fact that Reductions 2, 3, and 4 do not alter
conthe original CAF. lficts between arguments, we can construct such a
maximal set of arguments also for PCAFs: given a PCAF</p>
      <p>In fact, when applying Reduction 1, we lose the advan- and set  of claims, we define the set 0() containing
tages of wfCAFs for all investigated semantics, since also all arguments of  with a claim in ; the set 1 () is
obfor the remaining semantics verification remains harder tained from 0() by removing all arguments attacked
than in the case of wfCAFs. by 0() in the underlying CAF of  ; finally, the set
Proposition 12. Ver ,PC1AF is Σ2P-complete for  ∈ no*t(de)feisnodbetdaibnyedb1y(re)pienatℛedl(yre)muonvtiilnag fixaleldarpgouimnteinsts
{prf , sem, stg }, even for transitive preferences. reached. Recall that +
(,) = { | (, ) ∈ ,  ∈ }
denotes the arguments attacked by  in (, ).
set of claims , and  ∈ {2, 3, 4}, we define</p>
      <p>Given a PCAF  = (, , claim, ≻ ), a
0() ={ ∈  | claim() ∈ };
1 () =0() ∖ 0()(+,);
() ={ ∈ − 1() |  is defended by − 1()</p>
      <p>in ℛ( )} for  ≥ 2;
* () = for  ≥ 2 such that () = − 1().</p>
      <p>The above definition is based on [ 14, Definition 5], but
with the crucial diferences that undefended arguments
moved until a fixed point is reached.
are (a) computed w.r.t. ℛ( ) and (b) are iteratively
re</p>
      <p>For conflict-free based semantics we observe that the
conflicts are not afected by the reductions and thus
one can use existing results for well-formed CAFs [14,
Lemma 1] to obtain that 1 () is the unique candidate
for the maximal conflict-free set of arguments that
realizes the claim set .</p>
      <sec id="sec-6-1">
        <title>Lemma 14. Let  be a PCAF,  be a set of claims</title>
        <p>such that claim() = .
and  ∈
{2, 3, 4}.</p>
        <p>We have that  ∈ cf ( ) if
claim(1 ()) = . Moreover, if  ∈ cf ( ) then
1 () is the unique maximal conflict-free set  in ℛ( )</p>
        <p>Regarding admissible semantics we are looking for
a conflict-free set that defends all its arguments. Thus
we start from the conflict-free set 1 (). Notice that
arguments that are not in 1 () cannot be contained
in any admissible set  with claim() = . We can
then obtain the maximal admissible set realizing  in
ℛ( ) by iteratively removing arguments that are not
defended by the current set of arguments. Once we reach
a fixed-point we have an admissible set, but need to check
whether we still cover all the claims of .
such that claim() = .</p>
      </sec>
      <sec id="sec-6-2">
        <title>Lemma 15. Let  be a PCAF,  be a set of claims</title>
        <p>and  ∈
{2, 3, 4}.</p>
        <p>We have that  ∈ adm( ) if
claim(* ()) = . Moreover, if  ∈ adm( ) then
* () is the unique maximal admissible set  in ℛ( )</p>
        <p>By computing the maximal conflict-free (resp.
admissible) extensions 1 () (resp. * ()) for a set of claims
, the verification problem becomes easier for most
semantics.</p>
        <p>Proposition</p>
        <p>16.</p>
        <p>∈
∈
transitive preferences.</p>
        <p>{adm, stb}.</p>
        <p>PCAF
Ver , ∈{2,3,4}
is in</p>
        <p>P</p>
        <p>for
It is</p>
        <p>coNP-complete for
{prf , sem, stg }, even when considering only
Proof sketch. Let  = (, , claim, ≻ ) be a PCAF, let
 be a set of claims, and let  ∈ {2, 3, 4}. We can
compute ℛ( ), 1 (), and * () in polynomial time.


′
′
′
′
1
1




 
2
2




′
′
′

′



have been introduced by Reduction 4.
) ∧ (¬ ∨ ¬)). Symmetric attacks drawn in gray and thick</p>
        <p>For adm, by Lemma 15, it sufices to test whether
claim(* ()) = . For stb, we first check whether
 ∈ adm( ). If not,  ̸∈ stb( ). If yes, then, by
Lemma 15, claim(* ()) = . We can check in
polynomial time if * () ∈ stb(ℛ( )). If yes, we are done.
If no, then there is an argument  that is not in  () but
is also not attacked by * () in ℛ( ). Moreover, there
can be no other  ∈ stb(ℛ( )) with claim() = 
*
since for any such  we would have  ⊆
would imply that  does not attack  and that  ̸∈ .
*
 (), which
The arguments for</p>
        <p>∈ {prf , sem, stg } are similar,
but some checks require coNP-time.</p>
        <p>For complete semantics, only Reduction 3 retains the
benefits of wfCAFs. Here, the fact that Reductions 2
and 4 can introduce new attacks leads to an increase in
complexity.</p>
      </sec>
      <sec id="sec-6-3">
        <title>NP-complete, even for transitive preferences.</title>
        <p>Proposition 17. Ver cPoCmA,F3 is in P. Ver cPoCmA,F∈{2,4} is
Proof sketch. P-membership for Ver cPoCmA,F3 is similar to
the proof of Proposition 16.</p>
        <p>We demonstrate
NPhardness of Ver cPoCmA,F4 . Let  be an arbitrary instance
of 3-Sat given as a set  of clauses over variables 
and let  = { |  ∈ }. We construct a PCAF  =
(, , claim, ≻ ) as well as a set of claims  =  ∪ { }:
•  = { } ∪  ∪  ∪  ∪
•  = {(,  ) |  ∈ } ∪ {(, ) |  ∈ } ∪
{ |  ∈ } ∪ {′ |  ∈  ∪ };
{(, ) |  ∈ ,  ∈ } ∪
{(, ) | ¬ ∈ ,  ∈ } ∪
{(′, ) |  ∈  ∪ } ∪
{(′, ), (′, ) |  ∈ };
claim() =  otherwise;
• claim() = claim() =  for  ∈ ,
•  ≻ ,  ≻ ′ for all  ∈  ∪  and all  ∈ .
Figure 6 illustrates the above construction. It can be
verified that  is satisfiable if
 ∈ com(ℛ4( )).</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>Many approaches to structured argumentation (i) assume
that arguments with the same claims attack the same
arguments and (ii) take preferences into account.
Investigations on claim-augmented argumentation frameworks
(CAFs) so far only consider (i), showing that the
resulting subclass of well-formed CAFs (wfCAFs) has several
desired properties. The research question of this paper
is to analyze whether these properties carry over when
preferences are taken into account, since the
incorporation of preferences can violate the syntactical restriction
of wfCAFs.</p>
      <p>To this end, we introduced preference-based
claimaugmented argumentation frameworks (PCAFs) and
investigated the impact of the four preference reductions
commonly used in abstract argumentation when applied
to PCAFs. We examined and characterized CAF-classes
that result from applying these reductions to PCAFs,
yielding insights into the expressiveness of
argumentation formalisms that can be instantiated as CAF and
allow for preference incorporation. Furthermore, we
investigated the fundamental properties of I-maximality
and computational complexity for PCAFs. Preserving
Imaximality is desirable since it implies intuitive behavior
of maximization-based semantics, while the complexity
of the verification problem is crucial for the enumeration
of claim-extensions. Insights in terms of both semantical
and computational properties provide necessary
foundations towards a practical realization of this particular
argumentation paradigm (we refer to, e.g., [26, 27], for a
similar research endeavor in terms of incomplete AFs).</p>
      <p>Our results show that (1) Reduction 3, the most
conservative of the four reductions, exhibits the same properties
as wfCAFs regarding computational complexity while
also preserving I-maximality for most of the semantics;
(2) Reductions 2 and 4 retain the advantages of wfCAFs
regarding complexity for all but complete semantics, but
do not preserve I-maximality for any investigated
semantics; (3) under Reduction 1, neither complexity properties
nor I-maximality are preserved. The above results hold
even if we restrict ourselves to transitive preferences.
on regular AFs as well, fulfilling many principles for
preference-based semantics laid out by Kaci et al. (2018).</p>
      <p>
        A possible direction for future work is to lift the
preference ordering over arguments to sets of arguments and
for regular AFs in combination with Reduction 2 [21].
Another direction is to extend our studies to alternative
semantics for CAFs [
        <xref ref-type="bibr" rid="ref20">18, 19</xref>
        ], where subset-maximization
is handled on the claim-level instead of on the
argument
      </p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>We thank the anonymous reviewers for their valuable
feedback. This work was funded by the Austrian Science
Fund (FWF) under grants Y698 and W1255-N23 and by
the Vienna Science and Technology Fund (WWTF) under
grant ICT19-065.</p>
      <p>in: Proc. TAFA’11,
volume 7132 of LNCS, Springer, 2011, pp. 1–16.</p>
      <p>URL: https://doi.org/10.1007/978-3-642-29184-5_1.</p>
      <p>doi:10.1007/978-3-642-29184-5\_1.
[2] K. Atkinson, P. Baroni, M. Giacomin, A. Hunter,</p>
      <p>H. Prakken, C. Reed, G. R. Simari, M. Thimm, S.
Villata, Towards artificial argumentation, AI
Magazine 38 (2017) 25–36. doi:10.1609/aimag.v38i3.
and rather exhibits the full complexity as general CAFs. select extensions in this way. This has been investigated</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Norman</surname>
          </string-name>
          ,
          <article-title>Probabilistic argumentation frameworks</article-title>
          , [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. W. N. van der</given-names>
            <surname>Torre</surname>
          </string-name>
          , S. Vesic, S. Villata, [19]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Greßler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Preference in abstract argumentation, in: Hand- The complexity landscape of claim-augmented arbook of Formal Argumentation</article-title>
          , Volume
          <volume>2</volume>
          , College gumentation frameworks,
          <source>in: Proc. AAAI'21</source>
          ,
          <string-name>
            <given-names>AAAI</given-names>
            <surname>Publications</surname>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>211</fpage>
          -
          <lpage>248</lpage>
          . Press,
          <year>2021</year>
          , pp.
          <fpage>6296</fpage>
          -
          <lpage>6303</lpage>
          . URL: https://ojs.aaai.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <article-title>Reasoning about preferences in argu- org/index</article-title>
          .php/AAAI/article/view/16782.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>mentation frameworks</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>173</volume>
          [20]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          , On the accept(
          <year>2009</year>
          )
          <fpage>901</fpage>
          -
          <lpage>934</lpage>
          .
          <article-title>ability of arguments in preference-based [8</article-title>
          ]
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J. M.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          ,
          <article-title>Value-based argumentation</article-title>
          ,
          <source>in: Proc. UAI'98</source>
          ,
          <string-name>
            <surname>Morargumentation</surname>
          </string-name>
          ,
          <source>IfCoLog Journal of Logic and gan Kaufmann</source>
          ,
          <year>1998</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . URL: https
          <article-title>: its Applications 8 (</article-title>
          <year>2021</year>
          )
          <fpage>1543</fpage>
          -
          <lpage>1588</lpage>
          . URL: https: //dslpitt.org/uai/displayArticleDetails.jsp?mmnu= //collegepublications.co.uk/ifcolog/?00048.
          <article-title>1&amp;smnu=2&amp;article_id=226&amp;proceeding</article-title>
          _id=
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. W. N. van der</given-names>
            <surname>Torre</surname>
          </string-name>
          , S. Vil- [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          , S. Vesic,
          <article-title>Rich preference-based arlata, Preference in abstract argumentation, gumentation frameworks</article-title>
          ,
          <source>Int. J. Approx. Reason.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>in: Proc. COMMA'18</source>
          , volume
          <volume>305</volume>
          <source>of FAIA</source>
          ,
          <volume>55</volume>
          (
          <year>2014</year>
          )
          <fpage>585</fpage>
          -
          <lpage>606</lpage>
          . URL: https://doi.org/10.1016/j.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          IOS Press,
          <year>2018</year>
          , pp.
          <fpage>405</fpage>
          -
          <lpage>412</lpage>
          . URL: https://doi. ijar.
          <year>2013</year>
          .
          <volume>10</volume>
          .010. doi:
          <volume>10</volume>
          .1016/j.ijar.
          <year>2013</year>
          .
          <volume>10</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>org/10</source>
          .3233/978-1-
          <fpage>61499</fpage>
          -906-5-405. doi:
          <volume>10</volume>
          .3233/ 010.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          978-1-
          <fpage>61499</fpage>
          -906-5-405. [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          , Abstract [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <article-title>Abstract rule-based argu- argumentation frameworks and their semantics</article-title>
          , in: mentation, in: Handbook of Formal Argumentation, Handbook of Formal Argumentation, College PubCollege Publications,
          <year>2018</year>
          , pp.
          <fpage>287</fpage>
          -
          <lpage>364</lpage>
          . lications,
          <year>2018</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <surname>P. M. Dung</surname>
            ,
            <given-names>R. A.</given-names>
          </string-name>
          <string-name>
            <surname>Kowalski</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Toni</surname>
            , Assumption- [23]
            <given-names>L. van der</given-names>
          </string-name>
          <string-name>
            <surname>Torre</surname>
          </string-name>
          , S. Vesic,
          <article-title>The principle-based apbased argumentation, in: Argumentation in Ar- proach to abstract argumentation semantics</article-title>
          ,
          <source>Iftificial Intelligence</source>
          , Springer,
          <year>2009</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>218</lpage>
          .
          <source>CoLog Journal of Logic and its Applications</source>
          <volume>4</volume>
          (
          <year>2017</year>
          ) URL: https://doi.org/10.1007/978-0-
          <fpage>387</fpage>
          -98197-0_
          <fpage>10</fpage>
          .
          <fpage>2735</fpage>
          -
          <lpage>2778</lpage>
          . URL: http://www.collegepublications.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>doi:10</source>
          .1007/978-0-
          <fpage>387</fpage>
          -98197-0\_10. co.uk/downloads/ifcolog00017.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Horty</surname>
          </string-name>
          , Skepticism and floating conclusions, [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <article-title>A reasoning model based Artif</article-title>
          .
          <source>Intell</source>
          .
          <volume>135</volume>
          (
          <year>2002</year>
          )
          <fpage>55</fpage>
          -
          <lpage>72</lpage>
          . URL: https://doi. on
          <article-title>the production of acceptable arguments</article-title>
          , Ann.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>org/10</source>
          .1016/S0004-
          <volume>3702</volume>
          (
          <issue>01</issue>
          )
          <fpage>00160</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1016/ Math. Artif. Intell.
          <volume>34</volume>
          (
          <year>2002</year>
          )
          <fpage>197</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <fpage>S0004</fpage>
          -
          <volume>3702</volume>
          (
          <issue>01</issue>
          )
          <fpage>00160</fpage>
          -
          <lpage>6</lpage>
          . [25]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          , Computational problems [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Riveret</surname>
          </string-name>
          ,
          <article-title>Enhancing statement evalua- in formal argumentation and their complexity, Iftion in argumentation via multi-labelling systems</article-title>
          , J.
          <source>CoLog Journal of Logic and its Applications</source>
          <volume>4</volume>
          (
          <issue>2017</issue>
          )
          <article-title>Artif</article-title>
          .
          <source>Intell. Res</source>
          .
          <volume>66</volume>
          (
          <year>2019</year>
          )
          <fpage>793</fpage>
          -
          <lpage>860</lpage>
          . doi:
          <volume>10</volume>
          .1613/
          <fpage>2557</fpage>
          -
          <lpage>2622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>jair.1</source>
          .
          <fpage>11428</fpage>
          . [26]
          <string-name>
            <given-names>D.</given-names>
            <surname>Baumeister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Neugebauer</surname>
          </string-name>
          , [14]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Complexity of abstract A</article-title>
          .
          <string-name>
            <surname>Niskanen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          ,
          <article-title>Acceptance in incomplete argumentation under a claim-centric view</article-title>
          , Artif. argumentation frameworks,
          <source>Artif. Intell</source>
          .
          <volume>295</volume>
          (
          <issue>2021</issue>
          ) Intell.
          <volume>285</volume>
          (
          <year>2020</year>
          )
          <article-title>103290</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.artint. 103470. URL: https://doi.org/10.1016/j.artint.
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <year>2020</year>
          .
          <volume>103290</volume>
          . 103470. doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2021</year>
          .
          <volume>103470</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sá</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Alcântara</surname>
          </string-name>
          , W. Dvořák, On [27]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fazzinga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Flesca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Furfaro</surname>
          </string-name>
          ,
          <article-title>Revisiting the the equivalence between logic programming se- notion of extension over incomplete abstract argumantics and argumentation semantics, Int</article-title>
          . J. Ap- mentation frameworks.,
          <source>in: Proc. IJCAI'20</source>
          ,
          <year>2020</year>
          , prox.
          <source>Reasoning</source>
          <volume>58</volume>
          (
          <year>2015</year>
          )
          <fpage>87</fpage>
          -
          <lpage>111</lpage>
          . doi:
          <volume>10</volume>
          .1016/j. pp.
          <fpage>1712</fpage>
          -
          <lpage>1718</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>ijar.</surname>
          </string-name>
          <year>2014</year>
          .
          <volume>12</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <article-title>Defining argumentation semantics under a claim-centric view</article-title>
          ,
          <source>in: Proc. STAIRS'20</source>
          , volume
          <volume>2655</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEURWS.org,
          <year>2020</year>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2655</volume>
          / paper2.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Vreeswijk</surname>
          </string-name>
          ,
          <article-title>Logics for defeasible argumentation</article-title>
          ,
          <source>in: Handbook of Philosophical Logic</source>
          , volume
          <volume>4</volume>
          , Springer,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Argumentation semantics under a claim-centric view: Properties, expressiveness and relation to SETAFs</article-title>
          , in
          <source>: Proc. KR'20, IJCAI.org</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>341</fpage>
          -
          <lpage>350</lpage>
          . doi:10.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>24963/kr.2020/35.</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>