<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Strong Admissibility, a Tractable Algorithmic Approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Martin</forename><surname>Caminada</surname></persName>
							<email>caminadam@cardiff.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science &amp; Informatics</orgName>
								<orgName type="institution">Cardiff University</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sri</forename><surname>Harikrishnan</surname></persName>
							<email>harikrishnans@cardiff.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Computer Science &amp; Informatics</orgName>
								<orgName type="institution">Cardiff University</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<address>
									<postCode>2022</postCode>
									<settlement>Cardiff</settlement>
									<region>Wales</region>
									<country key="GB">United Kingdom</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Strong Admissibility, a Tractable Algorithmic Approach</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">ECEA203D400C6FA35274039561227BD8</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:05+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>strong admissibility, polynomial algorithms</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the current paper, we present two polynomial algorithms for constructing relatively small strongly admissible labellings, with associated min-max numberings, for a particular argument. These labellings can be used as relatively small explanations for the argument's membership of the grounded extension. Although our algorithms are not guaranteed to yield an absolute minimal strongly admissible labelling for the argument (as doing so would have implied an exponential complexity), our best performing algorithm yields results that are only marginally larger. Moreover, the runtime of this algorithm is an order of magnitude smaller than that of the existing approach for computing an absolute minimal strongly admissible labelling for a particular argument. As such, we believe that our algorithms can be of practical value in situations where the aim is to construct a minimal or near-minimal strongly admissible labelling in a time-efficient way.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In formal argumentation, one would sometimes like to show that a particular argument is (credulously) accepted according to a particular argumentation semantics, without having to construct the entire extension the argument is contained in. For instance, to show that an argument is in a preferred extension, it is not necessary to construct the entire preferred extension. Instead, it is sufficient to construct a set of arguments that is admissible. Similarly, to show that an argument is in the grounded extension, it is not necessary to construct the entire grounded extension. Instead, it is sufficient to construct a set of arguments that is strongly admissible.</p><p>The concept of strong admissibility was introduced by Baroni and Giacomin <ref type="bibr" target="#b0">[1]</ref> as one of the properties to describe and categorise argumentation semantics. It was subsequently studied by Caminada and Dunne <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref> who further developed strong admissibility in both its set and labelling form. As a strongly admissible set (labelling) can be used to explain that a particular argument is in the grounded extension (for instance, by using the discussion game of <ref type="bibr" target="#b3">[4]</ref>) a relevant question is whether one can identify an explanation that is minimal. That is, given an argument 𝐴 that is in the grounded extension, how can one obtain:</p><p>(1) a strongly admissible set that contains 𝐴, of which the number of arguments is minimal among all strongly admissible sets containing 𝐴, and (2) a strongly admissible labelling that labels 𝐴 in, of which the number of in and out labelled arguments (its size, cf. <ref type="bibr" target="#b4">[5]</ref>) is minimal among all strongly admissible labellings that label 𝐴 in.</p><p>It has been found that the verification problem of ( <ref type="formula">1</ref>) is NP-complete <ref type="bibr" target="#b5">[6]</ref> whereas the verification problem of ( <ref type="formula">2</ref>) is co-NP-complete <ref type="bibr" target="#b4">[5]</ref>. Moreover, it has also been observed that even computing a 𝑐-approximation for the minimum size of a strongly admissible set for a given argument is NP-hard for every 𝑐 ≥ 1 <ref type="bibr" target="#b5">[6]</ref>. This is in sharp contrast with the complexity of the general verification problem of strong admissibility (i.e. verifying whether a set/labelling is strongly admissible, without the constraint that it also has to be minimal) which has been found to be polynomial <ref type="bibr" target="#b2">[3]</ref>.</p><p>The complexity results related to minimal strong admissibility pose a problem when the aim is to provide the user with a relatively small explanation of why a particular argument is in the grounded extension. For this, one can either apply an algorithmic approach that yields an absolute minimal explanation, but has an exponential runtime, or one can apply an algorithmic approach that has a less than exponential runtime, but does not come with any formal guarantees of how close the outcome is to an absolute minimal explanation. The former approach is taken in <ref type="bibr" target="#b5">[6]</ref>. The latter approach is taken in our current paper. As the complexity results from <ref type="bibr" target="#b5">[6]</ref> prevent us from giving any theory-based guarantees regarding how close the outcome of the algorithm is to an absolute minimal strongly admissible labelling, we will instead assess the performance of the algorithm using a wide range of benchmark examples.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Preliminaries</head><p>In the current section, we briefly restate some of the key concepts of formal argumentation theory, including strong admissibility. For current purposes, we restrict ourselves to finite argumentation frameworks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1.</head><p>An argumentation framework is a pair (Ar , att) where Ar is a finite set of arguments and att is a binary relation on Ar . For any 𝑥, 𝑦 ∈ Ar we say that 𝑥 attacks 𝑦 iff (𝑥, 𝑦) ∈ att.</p><p>If 𝑥 is an argument, we write 𝑥 + for the arguments attacked by 𝑥 and 𝑥 − for the arguments that attack 𝑥. As for notation, we use lower case letters at the end of the alphabet (such as 𝑥, 𝑦 and 𝑧) to denote variables containing arguments, upper case letters at the end of the alphabet (such as 𝑋, 𝑌 and 𝑍) to denote program variables containing arguments, and upper case letters at the start of the alphabet (such as 𝐴, 𝐵 and 𝐶) to denote concrete instances of arguments. For current purposes, we apply the labelling-based version of abstract argumentation theory, following <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Definition 2. Let (Ar , att) be an argumentation framework. An argument labelling is a function ℒ𝑎𝑏 : Ar → {in, out, undec}. An argument labelling is called an admissible labelling iff for each 𝑥 ∈ Ar it holds that:</p><p>• if ℒ𝑎𝑏(𝑥) = in then for each 𝑦 that attacks 𝑥 it holds that ℒ𝑎𝑏(𝑦) = out • if ℒ𝑎𝑏(𝑥) = out then there exists a 𝑦 that attacks 𝑥 such that ℒ𝑎𝑏(𝑦) = in ℒ𝑎𝑏 is called a complete labelling iff it is an admissible labelling and for each 𝑥 ∈ Ar it also holds that:</p><p>• if ℒ𝑎𝑏(𝑥) = undec then there is a 𝑦 that attacks 𝑥 such that ℒ𝑎𝑏(𝑦) = undec, and for each 𝑦 that attacks 𝑥 such that ℒ𝑎𝑏(𝑦) ̸ = undec it holds that ℒ𝑎𝑏(𝑦) = out</p><p>As a labelling is a function, we sometimes write it as a set of pairs. Also, if ℒ𝑎𝑏 is a labelling, we write in(ℒ𝑎𝑏) for {𝑥 ∈ Ar | ℒ𝑎𝑏(𝑥) = in}, out(ℒ𝑎𝑏) for {𝑥 ∈ Ar | ℒ𝑎𝑏(𝑥) = out} and undec(ℒ𝑎𝑏) for {𝑥 ∈ Ar | ℒ𝑎𝑏(𝑥) = undec}. As a labelling is also a partition of the arguments into sets of in-labelled arguments, out-labelled arguments and undec-labelled arguments, we sometimes write it as a triplet (in(ℒ𝑎𝑏), out(ℒ𝑎𝑏), undec(ℒ𝑎𝑏)).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3 ([9]</head><p>). Let ℒ𝑎𝑏 and ℒ𝑎𝑏 ′ be argument labellings of argumentation framework (Ar , att). We say that ℒ𝑎𝑏 ⊑ ℒ𝑎𝑏 ′ iff in(ℒ𝑎𝑏) ⊆ in(ℒ𝑎𝑏 ′ ) and out(ℒ𝑎𝑏) ⊆ out(ℒ𝑎𝑏 ′ ). Definition 4. Let ℒ𝑎𝑏 be a complete labelling of argumentation framework (Ar , att). ℒ𝑎𝑏 is said to be the grounded labelling iff ℒ𝑎𝑏 is the (unique) smallest (w.r.t. ⊑) complete labelling.</p><p>We refer to the size of a labelling ℒ𝑎𝑏 as |in(ℒ𝑎𝑏)∪out(ℒ𝑎𝑏)|. We observe that if ℒ𝑎𝑏 ⊑ ℒ𝑎𝑏 ′ then the size of ℒ𝑎𝑏 is smaller or equal to the size of ℒ𝑎𝑏 ′ , but not necessarily vice versa. In the remainder of the current paper, we use the terms smaller, bigger, minimal and maximal in relation to the size of the respective labellings, unless stated otherwise.</p><p>The next step is to define a strongly admissible labelling. In order to do so, we need the concept of a min-max numbering <ref type="bibr" target="#b2">[3]</ref>.<ref type="foot" target="#foot_0">1</ref> Definition 5. Let ℒ𝑎𝑏 be an admissible labelling of argumentation framework (Ar , att). A min-max numbering is a total function ℳℳ ℒ𝑎𝑏 : in(ℒ𝑎𝑏) ∪ out(ℒ𝑎𝑏) → N ∪ {∞} such that for each 𝑥 ∈ in(ℒ𝑎𝑏) ∪ out(ℒ𝑎𝑏) it holds that:</p><p>• if ℒ𝑎𝑏(𝑥) = in then ℳℳ ℒ𝑎𝑏 (𝑥) = 𝑚𝑎𝑥({ℳℳ ℒ𝑎𝑏 (𝑦) | 𝑦 attacks 𝑥 and ℒ𝑎𝑏(𝑦) = out}) + 1 (with 𝑚𝑎𝑥(∅) defined as 0) • if ℒ𝑎𝑏(𝑥) = out then ℳℳ ℒ𝑎𝑏 (𝑥) = 𝑚𝑖𝑛({ℳℳ ℒ𝑎𝑏 (𝑦) | 𝑦 attacks 𝑥 and ℒ𝑎𝑏(𝑦) = in}) + 1 (with 𝑚𝑖𝑛(∅) defined as ∞) It has been proved that every admissible labelling has a unique min-max numbering <ref type="bibr" target="#b2">[3]</ref>. A strongly admissible labelling can then be defined as follows <ref type="bibr" target="#b2">[3]</ref>. Definition 6. A strongly admissible labelling is an admissible labelling whose min-max numbering yields natural numbers only (no argument is numbered ∞).</p><p>As an example (taken from <ref type="bibr" target="#b2">[3]</ref>), consider the argumentation framework of Figure <ref type="figure" target="#fig_0">1</ref>. Here, the admissible labelling ℒ𝑎𝑏 1 = ({𝐴, 𝐶, 𝐹, 𝐺}, {𝐵, 𝐸, 𝐻}, {𝐷}) has min-max numbering {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐸 : 4), (𝐹 : 5), (𝐺 : ∞), (𝐻 : ∞)}, which means that it is not strongly admissible. The admissible labelling ℒ𝑎𝑏 2 = ({𝐴, 𝐶, 𝐷, 𝐹 }, {𝐵, 𝐸}, {𝐺, 𝐻}) has min-max numbering {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1), (𝐸 : 2), (𝐹 : 3)}, which means that it is strongly admissible.</p><p>It has been shown that the strongly admissible labellings form a lattice (w.r.t. ⊑) of which the all-undec labelling is the bottom element and the grounded labelling is the top element <ref type="bibr" target="#b2">[3]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The Algorithms</head><p>In the current section, we present an algorithmic approach for computing a relatively small strongly admissible labelling. For this, we provide three different algorithms. The first algorithm (Algorithm 1) basically constructs a strongly admissible labelling bottom-up, starting with the arguments that have no attackers and continuing until the main argument (the argument for which one want to construct the strongly admissible labelling, sometimes also referred to as the argument in question) is labelled in. The second algorithm (Algorithm 2) then takes the output of the first algorithm and tries to prune it. That is, it tries to identify only those in and out labelled arguments that are actually needed for the strongly admissible labelling. The third algorithm (Algorithm 3) then combines Algorithm 1 (which is used as the construction phase) and Algorithm 2 (which is used as the pruning phase). Overall, we assume that it has already been established that the main argument is in the grounded extension and that the aim is merely to find a (relatively small) explanation for this.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Algorithm 1</head><p>The basic idea of Algorithm 1 is to start constructing the grounded labelling bottom-up, until we reach the main argument (that is, until we reach the argument that we are trying to construct a strongly admissible labelling for; this argument should hence be labelled in). As such, the idea is to take an algorithm for computing the grounded labelling and modify it accordingly.</p><p>We have chosen the algorithm of <ref type="bibr" target="#b9">[10]</ref> for this purpose, as it has been shown to run faster than some of its alternatives (such as <ref type="bibr" target="#b10">[11]</ref>). We had to adjust this algorithm in two ways. First, as mentioned above, we want the algorithm to stop once it hits the main argument, instead of continuing to construct the entire grounded labelling. Second, we want it to compute not just the strongly admissible labelling itself, but also its associated min-max numbering.</p><p>Obtaining the min-max numbering is important, as it can be used to show that the obtained admissible labelling is indeed strongly admissible, through the absence of ∞. Additionally, the min-max numbering is also needed for some of the applications of strong admissibility, in particular the Grounded Discussion Game <ref type="bibr" target="#b3">[4]</ref> where the combination of a strongly admissible labelling and its associated min-max numbering serves as a roadmap for obtaining a winning strategy.</p><p>Instead of first computing the strongly admissible labelling and then proceeding to compute the min-max numbering, the idea is to compute both the strongly admissible labelling and the min-max numbering in just a single pass, in order to achieve the best runtime performance.</p><p>To see how the algorithm works, consider again the argumentation framework of Figure <ref type="figure" target="#fig_0">1</ref>. Let 𝐶 be the main argument. At the start of the first iteration of the while loop (line Algorithm 1 Construct a strongly admissible labelling that labels 𝐴 in and its associated min-max numbering.</p><p>Input: An argumentation framework AF = (Ar , att), an argument 𝐴 ∈ Ar that is in the grounded extension of AF . Output: A strongly admissible labelling ℒ𝑎𝑏 where 𝐴 ∈ in(ℒ𝑎𝑏), the associated min-max numbering ℳℳ ℒ𝑎𝑏 . let 𝑋 be the argument at the front of unproc_in 39: // If we get here, A is not in the grounded extension, 40: // so we may want to print an error message 21) it holds that ℒ𝑎𝑏 = ({𝐴, 𝐷}, ∅, {𝐵, 𝐶, 𝐸, 𝐹, 𝐺, 𝐻}), ℳℳ ℒ𝑎𝑏 = {(𝐴 : 1), (𝐷 : 1)} and unproc_in = [𝐴, 𝐷]. At the first iteration of the while loop, the argument in front of unproc_in (𝐴) is selected (line 22). This then means that 𝐵 gets labelled out and 𝐶 gets labelled in. Hence, the algorithm hits the main argument (𝐶) at line 33 and terminates. This yields a labelling ℒ𝑎𝑏 = ({𝐴, 𝐶, 𝐷}, {𝐵}, {𝐸, 𝐹, 𝐺, 𝐻}) and associated min-max numbering ℳℳ ℒ𝑎𝑏 = {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1)}.</p><p>Algorithm 1 (especially lines 22 and 30) implements a FIFO queue for the in labelled arguments it processes. This is an important difference from the algorithm of <ref type="bibr" target="#b9">[10]</ref>, which uses a set for this purpose. Using a set will work fine if the aim is merely to compute a strongly admissible labelling (as is the case for <ref type="bibr" target="#b9">[10]</ref> where the aim is to compute the grounded labelling). However, if the aim is also to compute the associated min-max numbering, having a set as the basic data structure could compromise the algorithm's correctness.</p><p>As an example, consider again the argumentation framework of Figure <ref type="figure" target="#fig_0">1</ref>. Let 𝐹 be the main argument. Now suppose that unproc_in is a set instead of a queue. In that case, at the start of the first iteration of the while loop (line 21) it holds that ℒ𝑎𝑏 = ({𝐴, 𝐷}, ∅, {𝐵, 𝐶, 𝐸, 𝐹, 𝐺, 𝐻}), ℳℳ ℒ𝑎𝑏 = {(𝐴 : 1), (𝐷 : 1)} and unproc_in = {𝐴, 𝐷}. At the first iteration of the while loop, an argument 𝑋 from unproc_in is selected (line 22). As a set has no order, it would be possible to select 𝐴 (so 𝑋 = 𝐴). This then means that 𝐵 gets labelled out and 𝐶 gets labelled in. Hence, at the end of the first iteration of the while loop (and therefore at the start of the second iteration of the while loop) it holds that ℒ𝑎𝑏 = ({𝐴, 𝐶, 𝐷}, {𝐵}, {𝐸, 𝐹, 𝐺, 𝐻}), ℳℳ ℒ𝑎𝑏 = {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1)} and unproc_in = {𝐶, 𝐷}. At the second iteration of the while loop, suppose 𝐶 is the selected argument (so 𝑋 = 𝐶). This means that 𝐸 gets labelled out and 𝐹 gets labelled in. Hence, at the moment the algorithm hits the main argument (𝐹 , at line 33) and terminates, it holds that ℒ𝑎𝑏 = ({𝐴, 𝐶, 𝐷, 𝐹 }, {𝐵, 𝐸}, {𝐺, 𝐻}) and ℳℳ ℒ𝑎𝑏 = {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1), (𝐸 : 4), (𝐹 : 5)}. Unfortunately ℳℳ ℒ𝑎𝑏 is incorrect. This is because out labelled argument 𝐸 is numbered 4, whereas its two in labelled attackers 𝐶 and 𝐷 are numbered 3 and 1, respectively, so the correct min-max number of 𝐸 should be 2 instead of 4, which implies that the correct min-max number of 𝐹 should be 3 instead of 5.</p><p>One of the conditions of a min-max numbering is that the min-max number of an out labelled argument should be the minimal value of its in labelled attackers, plus 1. This seems to require that the min-max number of each in labelled attackers is already known, before being able to assign the min-max number of the out labelled argument. At the very least, it would seem that the min-max number of an out labelled argument needs to be recomputed each time the min-max number of one of its in labelled attackers becomes known. Yet, Algorithm 1 does none of this. It determines the min-max number of an out labelled argument as soon as the min-max number of its first in labelled attacker becomes known (line 26) without waiting for the min-max number of any other in labelled attacker to become available. In spite of this, Algorithm 1 still manages to always yield the correct min-max numbering.</p><p>The key to understanding how Algorithm 1 manages to do this is that the in labelled arguments are processed in the order of their min-max numbers. That is, once an in labelled attacker is identified, any subsequently identified in labelled attacker will have a min-max number greater or equal to the first one and will therefore not change the minimal value (in the sense of Definition 5, first bullet point). This avoids having to recalculate the min-max number of an out labelled attacker when more of its in labelled arguments become available, therefore speeding up the algorithm.</p><p>To make sure that arguments are processed in the order of their min-max numbers, we need to apply a FIFO queue instead of the set that was applied by <ref type="bibr" target="#b9">[10]</ref>. This FIFO queue is a key component of Algorithm 1, as the correctness of the algorithm critically depends on it. Overall, the correctness of the algorithm can be stated as follows. <ref type="foot" target="#foot_1">2</ref>Theorem 1. Let AF = (Ar , att) be an argumentation framework and let 𝐴 be an argument in the grounded extension of AF . Let both AF and 𝐴 be given as input to Algorithm 1. Let ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 be the output of the algorithm. It holds that ℒ𝑎𝑏 is a strongly admissible labelling that labels 𝐴 in and has ℳℳ ℒ𝑎𝑏 as its min-max numbering.</p><p>It turns out that the algorithm runs in polynomial (cubic) time.</p><p>Theorem 2. Let AF = (Ar , att) be an argumentation framework and let 𝐴 be an argument in the grounded extension of AF . Let both AF and 𝐴 be given as input to Algorithm 1. Let ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 be the output of the algorithm. It holds that Algorithm 1 computes ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 in O(𝑛<ref type="foot" target="#foot_2">3</ref> ) time</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Algorithm 2</head><p>The basic idea of Algorithm 2 is to prune the part of the strongly admissible labelling that is not needed, by identifying the part that actually is needed. This is done in a top-down way, starting by including the main argument (which is labelled in), then including all its attackers (which are labelled out), for each of which a minimally numbered in labelled attacker is included, etc. The idea is to keep doing this until reaching the (in labelled) arguments that have no attackers. Each argument that has not been included by this process is unnecessary for the strongly admissible labelling and can be made undec, resulting in a labelling that is smaller or equal to the strongly admissible labelling one started with.</p><p>To see how the algorithm works, consider again the argumentation framework of Figure <ref type="figure" target="#fig_0">1</ref>. Let 𝐶 be the main argument. Suppose the input labelling ℒ𝑎𝑏 𝐼 is ({𝐴, 𝐶, 𝐷}, {𝐵}, {𝐸, 𝐹, 𝐺, 𝐻}) and its associated input labelling numbering ℳℳ ℒ𝑎𝑏𝑂 is {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1)}. 3  At the start of the first iteration of the while loop, it holds that ℒ𝑎𝑏 𝑂 = ({𝐶}, ∅, {𝐴, 𝐵, 𝐷, 𝐸, 𝐹, 𝐺, 𝐻}), ℳℳ ℒ𝑎𝑏𝑂 = {(𝐶 : 1)} and unproc_in = [𝐶]. The first iteration of the while loop then removes 𝐶 from unproc_in (line 14), labels its attacker 𝐵 out (line 16), numbers 𝐵 with 2 (line 17), adds 𝐴 to unproc_in (line 20), labels 𝐴 in (line 21) and numbers 𝐴 with 1 (line 22). The second iteration of the while loop then removes 𝐴 from unproc_in (line 14). However, as 𝐴 does not have any attackers, the for loop (lines 15-24) is skipped. As unproc_in is now empty, the while loop is finished and the algorithm terminates, with ℒ𝑎𝑏 𝑂 = ({𝐴, 𝐶}, {𝐵}, {𝐷, 𝐸, 𝐹, 𝐺, 𝐻}) and ℳℳ ℒ𝑎𝑏𝑂 = {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3)} being its results.</p><p>We now proceed to state some of the formal properties of the algorithm, the first property being correctness.</p><p>Algorithm 2 Prune a strongly admissible labelling that labels 𝐴 in and its associated min-max numbering.</p><p>Input: An argumentation framework AF = (Ar , att), an argument 𝐴 ∈ Ar that is in the grounded extension of AF , A strongly admissible labelling ℒ𝑎𝑏 𝐼 where 𝐴 ∈ in(ℒ𝑎𝑏 𝐼 ), the associated min-max numbering ℳℳ ℒ𝑎𝑏𝐼 .</p><p>Output: A strongly admissible labelling ℒ𝑎𝑏 𝑂 ⊑ ℒ𝑎𝑏 𝐼 where 𝐴 ∈ in(ℒ𝑎𝑏 𝑂 ), the associated min-max numbering ℳℳ ℒ𝑎𝑏𝑂 .  end for 25: end while Theorem 3. Let AF = (Ar , att) be an argumentation framework, 𝐴 be an argument in the grounded extension of AF , ℒ𝑎𝑏 𝐼 be a strongly admissible labelling where 𝐴 is labelled in and ℳℳ ℒ𝑎𝑏𝐼 be the associated min-max numbering. Let AF , 𝐴, ℒ𝑎𝑏 𝐼 and ℳℳ ℒ𝑎𝑏𝐼 be given as input to Algorithm 2. Let ℒ𝑎𝑏 𝑂 and ℳℳ ℒ𝑎𝑏𝑂 be the output of Algorithm 2. It holds that ℒ𝑎𝑏 𝑂 is a strongly admissible labelling that labels 𝐴 in and has ℳℳ ℒ𝑎𝑏𝑂 as its min-max numbering. Theorem 4. Let AF = (Ar , att) be an argumentation framework, 𝐴 be an argument in the grounded extension of AF , ℒ𝑎𝑏 𝐼 be a strongly admissible labelling where 𝐴 is labelled in and ℳℳ ℒ𝑎𝑏𝐼 be the associated min-max numbering. Let AF , 𝐴, ℒ𝑎𝑏 𝐼 and ℳℳ ℒ𝑎𝑏𝐼 be given as input to Algorithm 2. Let ℒ𝑎𝑏 𝑂 and ℳℳ ℒ𝑎𝑏𝑂 be the output of Algorithm 2. It holds that ℒ𝑎𝑏 𝑂 ⊑ ℒ𝑎𝑏 𝐼 It turns out that the algorithm runs in polynomial (cubic) time.</p><p>Theorem 5. Let AF = (Ar , att) be an argumentation framework, 𝐴 be an argument in the grounded extension of AF , ℒ𝑎𝑏 𝐼 be a strongly admissible labelling where 𝐴 is labelled in and ℳℳ ℒ𝑎𝑏𝐼 be the correct min-max numbering of ℒ𝑎𝑏 𝐼 . Let AF , 𝐴, ℒ𝑎𝑏 𝐼 and ℳℳ ℒ𝑎𝑏𝐼 be given as input to Algorithm 2. Let ℒ𝑎𝑏 𝑂 and ℳℳ ℒ𝑎𝑏𝑂 be the output of Algorithm 2. It holds that Algorithm 2 computes ℒ𝑎𝑏 𝑂 and ℳℳ ℒ𝑎𝑏𝑂 in O(𝑛) 3 time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Algorithm 3</head><p>The idea of Algorithm 3 is to combine Algorithm 1 and Algorithm 2, by running them in sequence. That is, the output of Algorithm 1 is used as input for Algorithm 2.</p><p>Algorithm 3 Construct a relatively small strongly admissible labelling that labels 𝐴 in and its associated min-max numbering.</p><p>Input: An argumentation framework AF = (Ar , att), an argument 𝐴 ∈ Ar that is in the grounded extension of AF .</p><p>Output: A strongly admissible labelling ℒ𝑎𝑏 where 𝐴 ∈ in(ℒ𝑎𝑏), the associated min-max numbering ℳℳ ℒ𝑎𝑏 . As an example, consider again the argumentation framework of Figure <ref type="figure" target="#fig_0">1</ref>. Let 𝐶 be the main argument. Running Algorithm 1 yields a labelling ({𝐴, 𝐶, 𝐷}, {𝐵}, {𝐸, 𝐹, 𝐺, 𝐻}) with associated numbering {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3), (𝐷 : 1)} (as explained in Section 3.1). Feeding this labelling and numbering into Algorithm 2 then yields an output labelling ({𝐴, 𝐶}, {𝐵}, {𝐷, 𝐸, 𝐹, 𝐺, 𝐻}) with associated output numbering {(𝐴 : 1), (𝐵 : 2), (𝐶 : 3)} (as explained in Section 3.2).</p><p>Given the properties of Algorithm 1 and Algorithm 2, we can prove that Algorithm 3 correctly computes a strongly admissible labelling and its associated min-max numbering, yields an output that is smaller or equal to the output of Algorithm 1, and runs in polynomial (cubic) time.</p><p>Theorem 6. Let AF = (Ar , att) be an argumentation framework and let 𝐴 be an argument in the grounded extension of AF . Let both AF and 𝐴 be given as input to Algorithm 3. Let ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 be the output of the algorithm. It holds that ℒ𝑎𝑏 is a strongly admissible labelling that labels 𝐴 in and has ℳℳ ℒ𝑎𝑏 as its min-max numbering.</p><p>Proof. This follows from Theorem 1 and Theorem 3. Theorem 7. Let AF = (Ar , att) be an argumentation framework, 𝐴 be an argument in the grounded extension of AF . Let AF and 𝐴 be given as input to Algorithm 1 and Algorithm 3. Let ℒ𝑎𝑏 𝐼 and ℳℳ ℒ𝑎𝑏𝐼 be the output of Algorithm 1 and let ℒ𝑎𝑏 3 and ℳℳ ℒ𝑎𝑏3 be the output of Algorithm 3. It holds that ℒ𝑎𝑏 3 ⊑ ℒ𝑎𝑏 𝐼 Proof. This follows from Theorem 4, together with Theorem 1 and the way Algorithm 3 is defined (by successively applying Algorithm 1 and Algorithm 2) Theorem 8. Let AF = (Ar , att) be an argumentation framework and let 𝐴 be an argument in the grounded extension of AF . Let both AF and 𝐴 be given as input to Algorithm 3. Let ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 be the output of the algorithm. It holds that Algorithm 3 computes ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 in 𝑂(𝑛 3 ) time.</p><p>Proof. This follows from Theorem 2 and Theorem 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Empirical Results</head><p>Now that the formal properties of our algorithms have been stated, the next step is to empirically evaluate their performance. For this, we looked at the benchmark examples that have applied in ICCMA'17 and ICCMA'19, <ref type="foot" target="#foot_3">4</ref> of which we used the 277 example argumentation frameworks whose grounded extension is not empty. We implemented our algorithms in C++ and ran the performance tests on a MacBook Pro 2020 with 8GB of memory and an Intel Core i5 processor.</p><p>Compared to the grounded labelling, we found that Algorithm 1 yields an output that is smaller than the grounded labelling in 63% of the examples, with the average output size being 76% of the size of the grounded labelling. Algorithm 3 yields an output that is smaller than the grounded labelling in 88% of the examples, with the average output size being just 25% of the size of the grounded labelling. These findings are relevant as the only previously available polynomial algorithms for strong admissibility are those for computing the grounded extension/labelling (e.g. <ref type="bibr" target="#b9">[10]</ref>).</p><p>Next, we compared the output of our best performing algorithm (Algorithm 3) for finding a small strongly admissible labelling with the size of an absolute minimal strongly admissible labelling for the argument in question, for which we used the ASPARTIX encodings of <ref type="bibr" target="#b5">[6]</ref>. We found that in 91% of the examples, the output of Algorithm 3 is of the same size as an absolute minimal strongly admissible labelling for the argument in question, with the average output being just 3% bigger than the size of an absolute smallest strongly admissible labelling for the argument in question.</p><p>As for runtime, we first compared the runtime of our Algorithm 3 with the runtime of Algorithm 3 of <ref type="bibr" target="#b9">[10]</ref> for computing the grounded labelling. <ref type="foot" target="#foot_4">5</ref> We found that the differences in runtime are minimal, with the former algorithm taking just 0.02 seconds (3%) longer than the latter algorithm. <ref type="foot" target="#foot_5">6</ref> Next, we compared the runtime of our Algorithm 3 with the runtime of the ASPARTIX encodings of <ref type="bibr" target="#b5">[6]</ref> for computing an absolute minimal strongly admissible labelling. <ref type="foot" target="#foot_6">7</ref>We found that the latter approach has a runtime that is 12.5 seconds (907%) longer than the former approach. That is, our Algorithm 3 is able to provide an answer in less than a tenth of the time it would have taken to compute an absolute minimal answer. A more detailed analysis of our results, including a pointer to the source code of our software, can be found in <ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion</head><p>In the current paper, we provided two polynomial algorithms (Algorithm 1 and Algorithm 3) for constructing a relatively small strongly admissible labelling and its associated min-max numbering, for a particular argument. The correctness and complexity of the algorithms has been stated in a formal way, with proofs available in <ref type="bibr" target="#b11">[12]</ref>.</p><p>The fact that the 𝑐-approximation problem for minimal strong admissibility is NP-complete for every 𝑐 ≥ 1 means that polynomial algorithms (such as ours) cannot give any formal guarantees of how close their output is to having the size of an absolute minimal strongly admissible labelling for the argument in question. As such, we had to rely on an empirical evaluation of this (using the benchmark examples of ICCMA'17 and ICCMA'19). Overall, our results indicate that the output of Algorithm 3 is only marginally larger (3%) than an absolute minimal strongly admissible labelling for the argument in question, while taking less than a tenth of the runtime that would be needed to compute such a minimal strongly admissible labelling.</p><p>As a strongly admissible labelling and its associated min-max numbering can serve as an explanation of membership of the grounded extension, our algorithms can be useful for obtaining, in a time-efficient way, an explanation that is not overly long. Such an explanation can then for instance be used as the basis for the argument-based discussion game of <ref type="bibr" target="#b3">[4]</ref>, where the combination of the strongly admissible labelling and its associated min-max numbering serves as a roadmap for selecting the moves to be played by the computer when reacting to the user's possible counterarguments <ref type="bibr" target="#b3">[4]</ref>.</p><p>In the current paper, we focussed on strong admissibility, but a similar development of algorithms and associated empirical analysis could be done as future research in the context of admissible labellings and ideal labellings, in order to obtain relatively small explanations for (credulous) preferred semantics and ideal semantics, which could be used in the respective discussion games for these semantics <ref type="bibr" target="#b12">[13]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: An example of an argumentation framework.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>23:remove 𝑋 from unproc_in 24: for each 𝑌 ∈ 𝑋 + with ℒ𝑎𝑏(𝑌 ) ̸ = out do 25: ℒ𝑎𝑏(𝑌 ) ← out 26: ℳℳ ℒ𝑎𝑏 (𝑌 ) ← ℳℳ ℒ𝑎𝑏 (𝑋) + 1 27: for each 𝑍 ∈ 𝑌 + with ℒ𝑎𝑏(𝑍) = undec do 28: undec_pre(𝑍) ← undec_pre(𝑍) − 1 29: if undec_pre(𝑍) = 0 then 30: add 𝑍 to the rear of unproc_in 31: ℒ𝑎𝑏(𝑍) ← in 32: ℳℳ ℒ𝑎𝑏 (𝑍) ← ℳℳ ℒ𝑎𝑏 (𝑌 ) + 1 33: if 𝑍 = 𝐴 then return ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 34:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>the rear of unproc_in 21: ℒ𝑎𝑏 𝑂 (𝑍) ← in 22:ℳℳ ℒ𝑎𝑏𝑂 (𝑍) ← ℳℳ ℒ𝑎𝑏𝐼 (𝑍)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Ar → {in, out, undec} 3: ℳℳ ℒ𝑎𝑏 : in(ℒ𝑎𝑏) ∪ out(ℒ𝑎𝑏) → N ∪ {∞} 4: undec_pre : Ar → N 5: unproc_in : [𝑋 1 , ...𝑋 𝑛 ] (𝑋 𝑖 ∈ Ar for each 1 ≤ 𝑖 ≤ 𝑛, with 𝑛 ≥ 0) Next, we initialize and process the arguments that have no attackers 8: unproc_in ← [] // unproc_in becomes the empty list of arguments</figDesc><table><row><cell>6:</cell><cell></cell></row><row><cell>7: // 10:</cell><cell>ℒ𝑎𝑏(𝑋) ← undec</cell></row><row><cell>11:</cell><cell>undec_pre(𝑋) ← |𝑋 − |</cell></row><row><cell>12:</cell><cell>if undec_pre(𝑋) = 0 then</cell></row><row><cell>13:</cell><cell>add 𝑋 to the rear of unproc_in</cell></row><row><cell>14:</cell><cell>ℒ𝑎𝑏(𝑋) ← in</cell></row><row><cell>15:</cell><cell></cell></row><row><cell></cell><cell>end if</cell></row><row><cell cols="2">18: end for</cell></row><row><cell>19:</cell><cell></cell></row><row><cell cols="2">20: // We proceed to process the arguments that do have attackers</cell></row><row><cell cols="2">21: while unproc_in is not empty do</cell></row><row><cell>22:</cell><cell></cell></row></table><note>1: // We start with the type definitions 2: ℒ𝑎𝑏 : 9: for each 𝑋 ∈ Ar do ℳℳ ℒ𝑎𝑏 (𝑋) ← 1 16: if 𝑋 = 𝐴 then return ℒ𝑎𝑏 and ℳℳ ℒ𝑎𝑏 17:</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1: // We start with the type definitions 2: ℒ𝑎𝑏 𝑂 : Ar → {in, out, undec} 3: ℳℳ ℒ𝑎𝑏𝑂 : in(ℒ𝑎𝑏) ∪ out(ℒ𝑎𝑏) → N ∪ {∞} 4: unproc_in : [𝑋 1 , ...𝑋 𝑛 ] (𝑋 𝑖 ∈ Ar for each 1 ≤ 𝑖 ≤ 𝑛) // list of arguments 5: // Initialize ℒ𝑎𝑏 𝑂 and include the main argument 6: ℒ𝑎𝑏 𝑂 ← (∅, ∅, Ar ) // ℒ𝑎𝑏 𝑂 becomes the all-undec labelling 7: unproc_in ← [𝐴] ℒ𝑎𝑏 𝐼 ) attacker of 𝑌 that is also labelled in by 𝐿𝑎𝑏 𝑂 then Let 𝑍 be a minimal (w.r.t ℳℳ ℒ𝑎𝑏𝐼 ) in labelled (w.r.t 𝐿𝑎𝑏 𝐼 ) attacker of 𝑌</figDesc><table><row><cell>19:</cell></row></table><note>8: ℒ𝑎𝑏 𝑂 (𝐴) ← in 9: ℳℳ ℒ𝑎𝑏𝑂 (𝐴) ← ℳℳ ℒ𝑎𝑏𝐼 (𝐴) 10: 11: // Next, process the other arguments in a top-down way 12: while unproc_in is not empty do 13: let 𝑋 be the argument at the front of unproc_in 14: remove 𝑋 from unproc_in 15: for each attacker 𝑌 of 𝑋 do 16: ℒ𝑎𝑏 𝑂 (𝑌 ) ← out 17: ℳℳ ℒ𝑎𝑏𝑂 (𝑌 ) ← ℳℳ ℒ𝑎𝑏𝐼 (𝑌 ) 18:if there is no minimal (w.r.t ℳℳ ℒ𝑎𝑏𝐼 ) in labelled (w.r.t</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">Please notice that for the purpose of Definition 5, ∞ is defined such that ∀𝑥 ∈ N : ∞+𝑥 = ∞ and 𝑚𝑎𝑥({𝑥, ∞}) = ∞. Also, the condition that "ℒ𝑎𝑏(𝑦) = out" in the first point of Definition 5 is technically superfluous, but has been added for clarity.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">The formal proof of this result, as well as of some of the other results, had to be omitted due to a lack of space, but can be found in a separate technical report<ref type="bibr" target="#b11">[12]</ref>.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">The reader may have noticed that this was the output of Algorithm 1 for the example that was given in Section 3.1.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">See http://argumentationcompetition.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">We modified the latter algorithm to return the grounded labelling instead of the grounded extension. We also made minor corrections by removing some duplicate code.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">Please be aware, however, that Algorithm 3 of<ref type="bibr" target="#b9">[10]</ref> does not yield the min-max numbering, whereas Algorithm 3 does.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">Please notice that the latter is currently the only implementation for minimal strong admissibility.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On principle-based evaluation of extension-based argumentation semantics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="675" to="700" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Strong admissibility revisited</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Models of Argument; Proceedings of COMMA 2014</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Oren</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Reed</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Cerutti</surname></persName>
		</editor>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="197" to="208" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Strong admissibility revised: theory and applications</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argument &amp; Computation</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="277" to="300" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A discussion game for grounded semantics</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theory and Applications of Formal Argumentation (proceedings TAFA 2015)</title>
				<editor>
			<persName><forename type="first">E</forename><surname>Black</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Oren</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="59" to="73" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Minimal strong admissibility: a complexity analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of COMMA 2020</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Taticchi</surname></persName>
		</editor>
		<meeting>COMMA 2020</meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="135" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Computing strongly admissible sets</title>
		<author>
			<persName><forename type="first">W</forename><surname>Dvořák</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wallner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of COMMA 2020</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Prakken</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Taticchi</surname></persName>
		</editor>
		<meeting>COMMA 2020</meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="179" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">On the issue of reinstatement in argumentation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Logics in Artificial Intelligence; 10th European Conference, JELIA 2006</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Fischer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Van Der Hoek</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Konev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Lisitsa</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">4160</biblScope>
			<biblScope unit="page" from="111" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A logical account of formal argumentation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gabbay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studia Logica</title>
		<imprint>
			<biblScope unit="volume">93</biblScope>
			<biblScope unit="page" from="109" to="145" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>Special issue: new ideas in argumentation theory</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On judgment aggregation in abstract argumentation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pigozzi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Autonomous Agents and Multi-Agent Systems</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="64" to="102" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Computing grounded extensions of abstract argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Nofal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Atkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Computer Journal</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="54" to="63" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Proof theories and algorithms for abstract argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Argumentation in Artificial Intelligence</title>
				<editor>
			<persName><forename type="first">I</forename><surname>Rahwan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Simari</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="105" to="129" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Strong Admissibility, a Tractable Algorithmic Approach (proofs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Harikrishnan</surname></persName>
		</author>
		<ptr target="Https://arxiv.org/abs/2204.03551" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
		<respStmt>
			<orgName>Cardiff University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Argumentation semantics as formal discussion</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Formal Argumentation</title>
				<imprint>
			<publisher>College Publications</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="487" to="518" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
