<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computing the Labellings of Higher-Order Abstract Argumentation Frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sylvie Doutre</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marie-Christine Lagasquie-Schiex</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IRIT, Toulouse 1 University</institution>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>IRIT, Toulouse 3 University</institution>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <fpage>45</fpage>
      <lpage>58</lpage>
      <abstract>
        <p>The topic of this work is related to a computational issue concerning an enriched abstract argumentation framework called RAF (“Recursive Argumentation Framework”). A RAF is composed of a set of arguments and a binary relation modelling the attacks as in Dung's framework. The main difference between Dung's framework and a RAF is the fact that a RAF is able to take into account higher-order interactions (i.e. an attack can target an attack and not only an argument). Since this kind of framework is relatively recent, the efficient computation of the main semantics remains an open question. In this paper, we propose one of the first algorithms dedicated to this issue. We prove the soundness and completeness of this algorithm.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Abstract Argumentation</kwd>
        <kwd>Higher-Order Interactions</kwd>
        <kwd>Algorithms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Motivation</title>
      <p>
        computation (see [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9, 10, 11, 12</xref>
        ]) using the notion of AF labellings (e.g. [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ])1 and the
fact that such semantics are decomposable (see [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]). Indeed, RAF labellings already exist
and classical decision problems for AFs were also adapted to RAFs with an interesting result
(see [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]): even if the expressive power of the frameworks with higher-order attacks is higher,
the complexity of their decision problems remains the same as in an AF. Moreover, it has been
proven in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] that RAF semantics, as AF semantics, are decomposable. Thus, following the line
of the AFDivider algorithm designed for AFs [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], all the mandatory elements are now present
for the definition of some efficient algorithms for computing RAF labellings using a distributed
and parallel method; this is the topic of the present paper.
      </p>
      <p>
        The paper is organised as follows: Recursive Argumentation Frameworks (RAFs) and their
semantics are recalled in Section 2. Section 3 gives some additional definitions mandatory before
the presentation of the algorithm itself in Sections 4 and 5. An example of a clustering method is
provided in Section 6. Section 7 draws conclusions and opens future perspectives. The proofs of
the soundness and completeness of the approach can be found in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background on Recursive Argumentation Frameworks</title>
      <p>
        Higher-order attacks (that is, possibly targeting attacks as well as arguments) have been introduced
in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] then developed in several papers among which one can cite the AFRA (Argumentation
Framework with Recursive Attacks) approach described in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the RAF (Recursive
Argumentation Framework) approach introduced in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. RAF and AFRA differ on the way in which
these attacks are handled despite the fact that there is no difference in the structure of the graph.
This paper is concerned with the RAF approach. This section recalls its main definitions: basics,
labellings and decomposability of the semantics.
      </p>
      <p>Definition 1. A Recursive Argumentation Framework (RAF) RAF = ⟨A, K, s, t⟩ is a quadruple
where A and K are (possibly infinite) disjoint sets respectively representing arguments and attack
names, and where s : K → A and t : K → A ∪ K are functions respectively mapping each attack
name to its source and to its target.
Definition 2. Let RAF = ⟨A, K, s, t⟩ be a recursive argumentation framework. A RAF labelling
is a total function L : A ∪ K → {in, out, und}. We define in(L) (resp. out(L), und(L)) as the
set {x ∈ A ∪ K|L(x) = in (resp. out, und)}.</p>
      <p>L is a complete RAF labelling iff it satisfies:</p>
      <p>
        ∀x ∈ (A ∪ K),
1Whereas an extension assigns to its elements an accepted or a rejected status, a labelling considers a third status,
undecided, which applies to arguments which are neither accepted, nor rejected. This enrichment has proven useful
for the computation of acceptance statuses in AFs (see [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] for a survey).
2Relations between labelling-based semantics and structure-based semantics have been exhibited in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
3These labellings were called “structure labellings” in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] and defined as a pair of sets (the labellings for arguments,
the labellings for attacks). Here the definition and the name are simplified.
⎪
⎪
⎪
⎩
• (L(x) = out) ⇐⇒ (∃α ∈ K s.t. t(α) = x, L(α) = in and L(s(α)) = in)
• (L(x) = in) ⇐⇒ (∀α ∈ K s.t. t(α) = x, L(α) = out or L(s(α)) = out)
Let x ∈ A ∪ K be an element of RAF . x is said to be legally labelled in L iff L is a complete
labelling and x ∈ und(L) iff ((∄α ∈ K s.t. t(α) = x, L(α) = in and L(s(α)) = in) and (∃α ∈
K s.t. t(α) = x, L(α) ̸= out and L(s(α)) ̸= out)). L is said to be a valid RAF labelling if all
its elements are legally labelled. A preferred (resp. grounded) labelling is a complete labelling
that maximises (resp. minimises) the in elements. A stable labelling is a complete labelling for
which there are no und elements.
      </p>
      <p>Regarding the RAF of Figure 1, Example 1 shows its grounded labelling.</p>
      <p>Example 1. The grounded labelling of the RAF illustrated in Figure 1 is:</p>
      <p>(a, und), (b, und), (c, und), (d, und), (e, in), ( f , in), (g, out), (h, und), (i, und),
Lgr =
(k, und), (l, und), (m, und)(α, in), (β , in), (γ, in), (δ , in), (ε, out), (ζ , in), (η, in),
(θ , in), (ι, in), (κ, in), (λ , und), (ξ , und), (o, und), (π, in), (ρ, in), (ψ, in)
⎫
⎪
⎪
⎪
⎬
⎪
⎪
⎪
⎭</p>
      <p>
        In order to define an algorithm able to answer the enumeration problem 4 in the case of a RAF,
similarly to the one given for an AF (AFDivider [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]), we must be able to split a RAF. Based
on the notion introduced in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], any AF can be split into several sub-frameworks by simply
ignoring some attacks (that are always valid). Nevertheless, it is not the case for RAFs. Attacks,
as arguments, can be labelled in, out or und. As a consequence, we cannot just ignore attacks to
split a RAF. So, if we do not suppress attacks while splitting RAFs, we will have attacks without
targets or without sources. Thus, the result of such a split does not produce a RAF but a partial
RAF.
4The enumeration problem consists in enumerating all the solutions under a given semantics of a framework; see [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
for more details on this problem.
Definition 3. Let RAF = ⟨A, K, s, t⟩ be a RAF. A partial RAF R˜A︁F = ⟨︁ A˜ , K˜ , s˜, t˜, s, t⟩︁ of RAF is a
tuple where A˜ ⊆ A (resp. K˜ ⊆ K) is a set representing arguments (resp. attacks) and:
• s˜ : K˜ → {true, false} s.t. ∀α ∈ K˜ , s˜(α ) = true if s(α ) ∈ A˜ otherwise false
˜
• t˜ : K˜ → {true, false} s.t. ∀α ∈ K˜ , t˜(α ) = true if t(α ) ∈ A ∪ K˜ otherwise false
Then, using the notion of partial RAF, a partition of a RAF can be defined:
Definition 4. Let RAF = ⟨A, K, s, t⟩ be a RAF. Let Ω = {ω1, ..., ωn} be a partition5 of
(A ∪ K). A RAF partition of RAF is a set of partial RAFs {R˜A︁F 1, ..., R˜A︁F n} s.t.: ∀i, R˜A︁F i =
︁⟨ A˜ i, K˜ i, s˜i, t˜i, s, t⟩︁ with A˜i = ωi ∩ A and K˜ i = ωi ∩ K.
      </p>
      <p>Considering a partial RAF implies to consider also its “inputs” (the elements that do not belong
to the partial RAF but that can impact its labellings) and their labellings:
Definition 5. Let RAF = ⟨A, K, s, t⟩ be a RAF and R˜A︁F = ⟨A˜ , K˜ , s˜, t˜, s, t⟩ be a partial RAF of
RAF . The input I of R˜A︁F is a tuple ⟨︁ Sinp, Qinp⟩︁ where: Sinp = {s(α ) ∈ (A \ A˜ )|α ∈ K and t(α ) ∈
(A˜ ∪ K˜ )} and Qinp = {α ∈ (K \ K˜ )|t(α ) ∈ (A˜ ∪ K˜ )}. The tuple ⟨︂R˜A︁F , I, Linp⟩︂ is called a partial
RAF with input, where Linp is a labelling of I.</p>
      <p>Note that several partial RAFs with input can be built from a given partial RAF since several
labellings can exist for its inputs.</p>
      <p>The local function associates any partial RAF with input with a set of labellings:
Definition 6. Let σ be a semantics. A local function Fσra f assigns to any partial RAF with input
⟨︂R˜A︁F , I, Linp⟩︂ a (possibly empty) set of labellings of R˜A︁F under σ , i.e. Fσra f (R˜A︁F , I, Linp) ∈
2{L|L being any labelling over R˜A︁F }.</p>
      <p>The notion of semantics decomposability is thus as follows:
Definition 7. A semantics σ is full decomposable iff there is a local function Fσra f s.t., for
any RAF RAF = ⟨A, K, s, t⟩ and any partition {R˜A︁F 1, ..., R˜A︁F n} of RAF , the set of all possible
labellings under the semantics σ of RAF , denoted by Lσ (RAF ), satisfies: Lσ (RAF ) = {L1 ∪
... ∪ Ln|∀i ∈ {1, ..., n}, Li ∈ Fσra f (R˜A︁F i, Ii, Liinp)} with Liinp = ( ⋃︁ L j) ↓Ii .6
j∈{1,...,n} s.t. j̸=i
A semantics σ is said to be top-down (resp. bottom-up) decomposable iff:</p>
      <p>
        Lσ (RAF ) ⊆ (resp. ⊇ ){L1 ∪ ... ∪ Ln|∀i ∈ {1, ..., n}, Li ∈ Fσra f (R˜A︁F i, Ii, Liinp)}
In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], a specific RAF partition selector has been defined that produces a partition respecting
the strongly connected components (SCC) of a RAF:7
n
5So the following property holds for Ω: ∀(i, j) ∈ {1, ..., n} s.t. i ̸= j, ωi ∩ ω j = ∅ and ⋃︁ ωi = A ∪ K.
i=1
6↓ is the classical generic operator of restriction that allows the selection of a sub-part of a given “object” wrt to a
given set of “elements”. Here for instance, it produces the sub-part of the labellings concerning only the elements
belonging to Ii.
7See in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] the details about the method for defining the SCC of a RAF.
Definition 8. Let RAF be a RAF. Let Sra f -USCC be the RAF partition selector s.t.:
Sra f -USCC(RAF ) = {Ω| Ω is a partition of RAF and ∀S ∈ SCCSra f (RAF ), ∃ωi ∈ Ω s.t. S ⊆ ωi}.
Let S ⊆ A ∪ K s.t. S ∈ Sra f -USCC(RAF ), S is called an “U SCCra f ”.
      </p>
      <p>
        Then, in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], the following proposition has been proven:
Proposition 1. Let RAF = ⟨A, K, s, t⟩ be any RAF. The semantics properties in Table 1 hold.
      </p>
      <sec id="sec-2-1">
        <title>Full decomposability</title>
      </sec>
      <sec id="sec-2-2">
        <title>Top-down decomposability</title>
      </sec>
      <sec id="sec-2-3">
        <title>Bottom-up decomposability</title>
        <p>Full decomposability w.r.t. Sra f -USCC
(so Top-down and Bottom-up decomposability)</p>
        <p>RAF semantics
complete
grounded
preferred</p>
        <p>stable
×
×
×
×
“ ” (resp. “× ”) means that the semantics on the column has (resp. does not have) the property on the
row.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Some Preliminary Definitions</title>
      <p>Before explaining our algorithm, some additional definitions are needed. First, Definition 9 gives
an adaptation of the notion of walk and path to the case of partial RAF, then Definition 10 defines
the notion of connected elements in a partial RAF.</p>
      <p>Definition 9. Let R˜A︁F = ⟨︁ A˜, K˜ , s˜, t˜, s, t⟩︁ be a partial RAF and e1, en ∈ ( A˜ ∪ K˜ ) be elements of
R˜A︁F . A non-directed partial-RAF-walk is a sequence (e1, ..., en) with n ∈ N∗ and ∀i, ei ∈ (A ∪ K)
s.t.:
• If n &gt; 1, ∀i ∈ {1, ..., n − 1}, ei ∈ A =⇒
s(ei+1) or (t˜(ei+1) = true and ei = t(ei+1)))
ei+1 ∈ K and (s˜(ei+1) = true and ei =
• If n &gt; 1, ∀i ∈ {1, ..., n − 1}, ei ∈ K =⇒ (ei+1 ∈ A and ((s˜(ei) = true and s(ei) =
ei+1) or (t˜(ei) = true and t(ei) = ei+1))) or (ei+1 ∈ K and ((t˜(ei+1) = true and ei =
t(ei+1)) or (t˜(ei) = true and t(ei) = ei+1)))</p>
      <p>A non-directed partial-RAF-path is a non-directed partial-RAF-walk in which all the elements
are distinct.</p>
      <p>Considering the RAF given in Figure 1, ( f , ε , δ , d) is an example of a non-directed
partialRAF-path.
Definition 10. Let R˜A︁F = ⟨︁ A˜, K˜ , s˜, t˜, s, t⟩︁ be a partial RAF. R˜A︁F is a connected partial RAF if,
˜ ˜
for all distinct elements xi ∈ A ∪ K˜ and x j ∈ A ∪ K˜ , there exists a non-directed partial-RAF-path
p in R˜A︁F s.t. xi is the first element of p and x j is the last element of p. Otherwise the partial
RAF is disconnected.</p>
      <p>Considering the partial RAF obtained from the RAF given in Figure 1 by the removal of ξ ,
this partial RAF is disconnected since, for instance, none non-directed partial-RAF-path exists
between f and k.</p>
      <p>The very classical operator of restriction, denoted by ↓, can also be applied to partial RAF
giving the partial RAF that is the restriction of a given partial RAF to a given set of elements
(arguments and/or attacks). Then, using this operator, we can define the notion of “Partial RAF
Connected Component”:
Definition 11. Let R˜A︁F = ⟨︁ A˜, K˜ , s˜, t˜, s, t⟩︁ be a partial RAF. Let S ⊆ A˜ ∪ K˜ be a set of elements.
The partial RAF R˜A︁F ↓S is a connected component of R˜A︁F iff: R˜A︁F ↓S is connected and there
exists no set S′ ⊆ A˜ ∪ K˜ s.t. S ⊂ S′ and R˜A︁F ↓S′ is connected.</p>
    </sec>
    <sec id="sec-4">
      <title>4. A Generic Algorithm for computing RAF semantics:</title>
    </sec>
    <sec id="sec-5">
      <title>Presentation by Example</title>
      <p>
        The RAFDivider algorithm we propose in this paper is an adaptation of the AFDivider algorithm
proposed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Similarly to AFDivider, it addresses the enumeration problem for the complete,
stable and preferred semantics (finding all the possible solutions of a given semantics for a given
RAF). It follows the same four major steps (see Figure 2):
1. A preprocessing on RAF removes “trivial” parts of it.
2. Clusters in RAF are identified.
3. The labellings under semantics σ in each cluster are computed in parallel.
4. The results of each cluster are reunified to get the labellings of RAF .
      </p>
      <sec id="sec-5-1">
        <title>Cluster Component Hard Initial</title>
        <p>labellings labellings RAF RAF
labellings labellings
Initial RAF
η g θe ζf ε δa α βb
ρ mh κι λi ξ d γ c
ψ o kl π</p>
        <p>Partial
Hard RAF
a α b
δd γ βc
?
ρ mh κι ψ λi ξ o kl π</p>
      </sec>
      <sec id="sec-5-2">
        <title>Components pClustersp</title>
        <p>a α b
δd γ βc
ρ mh κι ψλi ξ o kl π</p>
        <sec id="sec-5-2-1">
          <title>Step 1</title>
        </sec>
        <sec id="sec-5-2-2">
          <title>Step 2</title>
        </sec>
        <sec id="sec-5-2-3">
          <title>Step 3</title>
        </sec>
        <sec id="sec-5-2-4">
          <title>Step 4</title>
          <p>Before giving the formal definition of the algorithm, we describe its desired behaviour on a
running example.</p>
          <p>a α b
δd γ βc
ρ mh κι ψλi
ξ o kl π
4.1. Preprocessing: Removing the Trivial Part
The first step is to identify the trivial part to remove. Similarly to an AF, it is built using the in
and out elements produced by the grounded semantics. In the case of an AF, these elements are
all removed. However, for a RAF, this complete removal is not possible. Consider for instance
the grounded labelling given in Example 1. If we remove all elements that are not labelled und as
it was done in the case of an AF, the resultant partial RAF would not capture the initial relations
between the elements (for instance, the relation between the arguments a and b is expressed
by the attack α labelled in, so the removal of α is not possible). This leads to the following
definition of the RAF trivial part:
Definition 12. Let RAF = ⟨A, K, s, t⟩ be a RAF and let Lgr be the grounded labelling of
RAF . The “trivial part” of RAF is the structure of RAF , denoted by Utriv = ⟨Striv, Qtriv⟩, with
Striv = {a ∈ A|a ∈/ und(Lgr)} and Qtriv = {α ∈ K|α ∈ out(Lgr) or (α ∈ in(Lgr) and s(α ) ∈/
und(Lgr))}
Example 2. Following Example 1, the trivial part of RAF is: Utriv = ⟨{e, f , g} , {ε , ζ , η , θ }⟩.</p>
          <p>Then the partial hard RAF and partial hard RAF with input are defined as follows:
Definition 13. Let RAF = ⟨A, K, s, t⟩ be a RAF and let Utriv = ⟨Striv, Qtriv⟩ be the RAF trivial
part of RAF . The partial hard RAF of RAF , denoted by R˜A︁F hard , is defined as R˜A︁F hard =
︁⟨ A˜ , K˜ , s˜, t˜, sh, th⟩︁ with A˜ = A \ Striv, K˜ = K \ Qtriv, sh : K˜ → A s.t. ∀α ∈ K˜ , sh(α ) = s(α ) and
th : K˜ → (A ∪ K) s.t. ∀α ∈ K˜ , th(α ) = t(α ) (s˜ and t˜ are defined as in Definition 3).
The partial hard RAF with input is ⟨︂R˜A︁F hard , I = ⟨Sinp, Qinp⟩, Linp⟩︂, where Sinp = {s(α ) ∈
(A \ A˜)|α ∈ K˜ }, Qinp = ∅ and Linp is the grounded labelling of the elements in I.</p>
          <p>Although a partial hard RAF is a partial RAF, we only consider the input labelling that coincides
with the grounded labelling of the initial RAF. So the corresponding partial hard RAF with input
is trivially unique, the labelling of its inputs being unique.</p>
          <p>Example 3. Figure 3 illustrates R˜A︁F hard , the partial hard RAF corresponding to the RAF shown
in Figure 1. In this partial hard RAF, two attacks have no source (λ and ξ ). This partial hard
RAF has one input; so I = ⟨{ f }, ∅⟩ and Linp = {( f , in)}.</p>
          <p>For each input element, several cases have to be considered and this can be very time consuming.
In order to avoid this cost for elements that are in the “trivial part”, we simply cut that part from the
a
δ
d
α
γ
b
β
c
ρ
h
m
ξ
o</p>
          <p>π
k
l
ι
ψ
?
λ
i
RAF and, only after that, look for clusters. So, given a RAF RAF = ⟨A, K, s, t⟩, the RAFDivider
algorithm starts by computing Lgr, the grounded labelling of RAF and Utriv the trivial part
corresponding to it. Once the trivial part has been computed, the algorithm removes it from RAF
to produce R˜A︁F hard the partial hard RAF of RAF , as well as R˜A︁F hard input elements I with their
labelling issued from Lgr. Then, if possible, R˜A︁F hard is split into several connected components
(see Definition 10), producing the set CCSet. CCSet is a set of partial hard RAFs (with input).
a
δ
d
α
γ
b
β
c
ρ
h
m
κ
ι</p>
          <p>ξ
f
λ
i
ψ
o</p>
          <p>π
k
l
(a) Component 1: r˜a︂f 1
(b) Component 2: r˜a︂f 2
Example 4. Figure 4 illustrates the two connected components of R˜A︁F hard , the partial hard RAF
illustrated in Figure 3. The CCSet will then contain these two partial RAFs.
4.2. Identifying Clusters
For each connected component, a clustering can be performed using any clustering method
partitioning the partial RAF (even a random partition method). See in Section 6 such a method
that returns the set of clusters identified, that is, a set of partial RAFs.</p>
          <p>Example 5. Following Example 4, let us consider that the chosen clustering method produces
only one cluster for component 1. Let r˜a︂f 2 be the other component and let the following partition
be the one produced by the chosen clustering method:</p>
          <p>Ω = {ω1 = {h, i, m, ι , κ , λ , ρ , ψ } , ω2 = {k, l, ξ , o, π }}</p>
          <p>Figure 5 illustrates the partial RAFs corresponding to the partitioning of r˜a︂f 2, that is r˜a︂f 2 ↓ω1 8
(also denoted by r˜a︂f 2.1) and r˜a︂f 2 ↓ω2 (also denoted by r˜a︂f 2.2).</p>
          <p>Note that, following this clustering, m and ψ also become inputs for r˜a︂f 2.2. Note also that
this clustering must also take into account attacks and not only arguments (as it is the case for
AFDivider). See in Section 6 an example of such a clustering.
4.3. Computing the Labellings
The next step is the computation of the component labellings in a distributed way relying on the
clustering made. The σ -labellings of each cluster are computed simultaneously. Unlike the case
8r˜a︂f 2 ↓ω1 produces a partial RAF built from r˜a︂f 2 keeping only the elements of ω1.
(a) Cluster 1: r˜a︂f 2.1 = r˜a︂f 2 ↓ω1
(b) Cluster 2: r˜a︂f 2.2 = r˜a︂f 2 ↓ω2
of connected components, the partial RAF corresponding to the computed clusters may admit
several input labellings. In order to compute all the possible σ -labellings of a given cluster, every
possible case concerning its input elements has to be considered. We call “context” a particular
input labelling of a partial RAF:9
Definition 14. Let R˜A︁F = ⟨︁ A˜ , K˜ , s˜, t˜, s, t⟩︁ be a partial RAF and I = ⟨︁ Sinp, Qinp⟩︁ be the input of
R˜A︁F . A context µ of a partial RAF is a labelling of I.</p>
          <p>Example 6. Following Figure 5, in the worst case, there exist 27 contexts of r˜a︂f 2.2 (3 inputs with
3 possible values, so 33 = 27 ). Nevertheless, some of these 27 contexts are not compatible with
the labelling Lgr ( f must be labelled in). So only 9 contexts are compatible.</p>
          <p>As one can notice from Example 6, it may be useless to consider some cluster contexts. So
three optimizations can enhance the computation time:
• First optimization: Given a cluster, if one of its input elements is also an input element of
the partial hard RAF then this element should only be labelled as in the grounded labelling
Lgr (see Example 6).
• Second optimization: If an input attack is unattacked (a so-called valid attack) in the initial
RAF, then this attack will always be labelled in following all semantics we are interested
in.</p>
          <p>Example 7. The attack ψ is an input of r˜a︂f 2.2 and a valid one in RAF and in R˜A︁F hard .</p>
          <p>
            Hence, it is useless to consider contexts where ψ is not labelled in.
• Third optimization: Some contexts can lead to the same labellings. For instance, let us
consider an inward attack y, the context putting y to out, or the context putting s(y) to
outgive exactly the same labellings for t(y). This can be used in order to decrease the
number of contexts to consider (see [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] for more details).
9Obviously, each context of a partial RAF will induce a specific set of labellings of this partial RAF.
Example 8. Applying the previous optimizations on the running example leads to 3 (resp. 3, 6)
complete labellings for r˜a︂f 1 (resp. r˜a︂f 2.1, r˜a︂f 2.2) with 1 (resp. 1, 3) context. For instance, among
the 3 (resp. 6) labellings for r˜a︂f 2.1 (resp. r˜a︂f 2.2), we have L2.1.1 = {(i, out), (h, out), (m, in),
(ι, in), (κ, in), (λ , in), (ρ, in), (ψ, in)} (resp. L2.2.1 = {(k, in), (l, out), (ξ , out), (o, in),
(π, in)}).
4.4. Reunifying the Results
The labelling reunifying process is made in two steps: first, the reunification of the component
labellings (i.e. the reunification of their cluster labellings together) and second, the reunification
of the whole RAF labellings (i.e. the reunification of its component labellings together).
          </p>
          <p>
            For the component labelling reunification, a CSP (Constraint Satisfaction Problem) is created.
The aim is to identify the compatibility between the labellings of the elements that are in the
“interface” of clusters in the same component (see our technical report [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ] for details).
Example 9. The reunification of the 3 labellings of r˜a︂f 2.1 with the 6 labellings of r˜a︂f 2.2 produces
6 labellings for the component r˜a︂f 2. And L2.1 = {(i, out), (h, out), (m, in), (k, in), (l, out),
(ι, in), (κ, in), (λ , in), (ρ, in), (ψ, in), (ξ , out), (o, in), (π, in)} is one of them (built from
the labellings given in Example 8: L2.1.1 for r˜a︂f 2.1 and L2.2.1 for r˜a︂f 2.2).
          </p>
          <p>
            A special step has to be carried out for the preferred semantics as this reunifying process does
not ensure the maximality (w.r.t. ⊑) of the set of in-labelled elements. Indeed, the preferred
semantics is not bottom-up decomposable (see [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]). A maximality check must be done in order
to keep only the wanted labellings. Moreover, when computing the stable semantics, the set of
labellings Lσ returned by the algorithm may be empty. It happens when one of the component
clusters has no stable labelling.
          </p>
          <p>Now that all the component labellings are built, we can reunify the labellings of the whole
RAF. Indeed, given that the trivial part is a fixed part of all σ -labellings of RAF and that each
connected component has a unique context (these contexts being compatible with each other), the
σ -labellings of the whole RAF are built by performing a simple cartesian product between the
labellings of all the components and the trivial part labelling. If one of the components has no
labelling then the whole RAF has no labelling (so Lσ = ∅).</p>
          <p>Example 10. The complete semantics produces 18 labellings for the running example, with for
instance the following labelling:
⎧ ⎫
⎪⎪⎪⎪ (e, in), ( f , in), (g, out), (ε, out), (ζ , in), (η, in), (θ , in), ⎪⎪⎪⎪
⎪⎨⎪ (a, in), (b, out), (c, in), (d, out), (α, in), (β , in), (γ, in), (δ , in), ⎪⎬⎪
⎪⎪⎪⎪⎪ (i, out), (h, out), (m, in), (k, in), (l, out), ⎪⎪⎪⎪⎪
⎩⎪ (ι, in), (κ, in), (λ , in), (ρ, in), (ψ, in), (ξ , out), (o, in), (π, in) ⎭⎪
(in this labelling, the first line corresponds to the grounded labelling for the trivial part, the
second one is for r˜a︂f 1 and the two last lines are the labelling L2.1 given in Example 9 for r˜a︂f 2)</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. RAFDivider: Algorithms and Properties</title>
      <p>1 Utriv, Lgr ←
Algorithms 1 and 2 give the formal definition of the RAFDivider algorithm. Similarly to
AFDivider, they are said to be generic algorithms in the sense that any clustering method can be used
to split the framework and any sound and complete procedure that computes the semantics σ ,
can be used to compute the labellings of the different clusters.</p>
      <p>Algorithm 1: RAFDivider algorithm.</p>
      <p>Input: Let RAF = ⟨A, K, s,t⟩ be a RAF and σ be a semantics
Result: Lσ ∈ 2L (RAF ): the set of the σ -labellings of RAF</p>
      <p>ComputeRAFTrivialPart(RAF )
2 R˜A︁F hard, I ← RemoveRAFTrivialPart(RAF , Utriv)
3 CCSet ← SplitPartialRAFConnectedComponents(R˜A︁F hard)
4 for all r˜a︂f i ∈ CCSet do in parallel
5 PartRAFSet ← ComputePartRAFs(r˜a︂f i) // clustering
6 Lσ (r˜a︂f i) ← ComputeRAFCompLabs(σ , PartRAFSet, I, Lgr)
7 Lσ ← { Lgr ↓Utriv} × ∏r˜a︂f i∈CCSet Lσ (r˜a︂f i)
8 return Lσ
Algorithm 2: ComputeRAFCompLabs algorithm.</p>
      <p>Input: Let σ be a semantics, PartRAFSet be a set of clusters (partial RAFs) for a
component r˜a︂f i, I be the input of the partial hard RAF and Lgr be the grounded
labelling of the initial RAF</p>
      <p>Result: Lσ ∈ 2L (r˜a︂f i): the set of the σ -labellings of r˜a︂f i
1 for all r˜a︂f i. j ∈ PartRAFSet do in parallel
2</p>
      <p>Lσr˜a︂f i.j ← ComputePartRAFLabs(σ , r˜a︂f i. j, I, Lgr)
4 if σ = pr then Lσ ← {
5 return Lσ
3 Lσ ← ReunifyComp({Lσr˜a︂f i.j |r˜a︂f i. j ∈ PartRAFSet})</p>
      <p>L|L ∈ Lσ s.t. ∄L′ ∈ Lσ s.t. in(L) ⊏ in(L′)}
// using a CSP solver
// external solver call</p>
      <p>
        Before giving the properties of these algorithms, let us focus on two key elements of
Algorithm 2:
• ComputePartRAFLabs: this function contains the call to an external solver able to compute
the labellings of a given RAF. Such a trivial solver could be defined in three steps: (1)
translation of any RAF into an AF using the flattening proposed in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] then (2) computation
of the labellings of this AF using any solver defined for AF (as the ones used for the
ICCMA competition [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]) and finally (3) computation of the RAF labellings from these
AF labellings using the properties that give the links between these AF labellings and
the labellings of the initial RAF (see [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]). Another kind of solver could be built in two
steps: (1) direct translation of a RAF into a logical base then (2) computation of the RAF
semantics using the logical models of this base (see [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ]).
• ReunifyComp: this function is in charge of aggregating the labellings obtained for each
cluster in order to obtain the labellings of the component containing these clusters (see
Section 4.4). This aggregation, called reunification, must respect the compatibility of the
resulting labellings; this is done in two steps: (1) creation of a CSP, then (2) resolution of
this CSP using any CSP solver. The precise definition of this CSP is given in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. 10
The RAFDivider algorithm gives all the expected labellings (so it is complete) and only good
labellings (it is sound) for the complete, stable and preferred semantics. The proof of the following
proposition is given in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. It is very similar to the proofs given for AFDivider in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
Proposition 2. Algorithms 2 and 1 are complete and sound for the stable, complete and preferred
semantics.
      </p>
    </sec>
    <sec id="sec-7">
      <title>6. A Clustering Method</title>
      <p>
        The main idea of the clustering presented in this section is to ensure that the Strongly Connected
Components (SCC)11 are not split into different clusters. The following method is inspired by
those proposed in [
        <xref ref-type="bibr" rid="ref12 ref18">12, 18</xref>
        ] for testing the AFDivider algorithms. Given a RAF, the so-called
“USCC-clustering” forms clusters as follows (each cluster being an U SCCra f , see Definition 8).
First, the set of SCC is computed. Then neighbour SCC singletons are joined together in order to
form a cluster using the following definition of neighbourhood:
Definition 15. Let RAF = ⟨A, K, s, t⟩. Let x and y be two elements of RAF . x and y are considered
as neighbour iff: either [x ∈ K and (y = s(x) or y = t(x))] or [x ∈ A and y ∈ K and (s(y) = x or
t(y) = x)].
      </p>
      <p>In the third step, each SCC that is not a singleton is joined with its neighbour SCC singletons
(those that are neighbours with at least an element in the non-singleton SCC) producing a cluster.
This merging must respect the following constraint (the idea is to put the attacks and their source
in the same cluster in order to have all the necessary elements for identifying the status of the
target):
Definition 16. Let U SCCra f be a cluster. Let x be a singleton SCC that is a neighbour of U SCCra f .
x will be joined with U SCCra f if either x ∈ K and s(x) ∈ U SCCra f or x ∈ A and ∃y ∈ U SCCra f
s.t. s(y) = x.</p>
      <p>The last step is to join clusters together so that there are not too many clusters of little size.
This is done in an iterative way. The smallest group is merged to its smallest neighbour group,
and that continues until there is no group of less than a certain number of arguments. Some
experiments would be necessary in order to identify this threshold wrt the RAF that we take into
account.</p>
      <p>
        Using this method, we can retrieve the clustering proposed in Section 4.2 for the component
r˜a︂f 2 (two clusters: {λ , i, ι , m, ρ , h, κ , ψ } and {k, π , l, o, ξ }, see Figure 5).
10Note that this CSP contains two types of variables: one variable for each cluster and one variable for each input of
these clusters. The domains of these variables correspond to their possible labellings. The constraints express the
links between the labellings of the clusters and the labellings of their inputs.
11See in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] the details about the definition of the SCCs for a RAF.
      </p>
    </sec>
    <sec id="sec-8">
      <title>7. Conclusion and Future Works</title>
      <p>This paper presents RAFDivider, one of the first algorithms for the enumeration of acceptable sets
in a Recursive Argumentation Framework (RAF), an argumentation framework enriched with
higher-order attacks. This algorithm, proven sound and complete, is based on a cutting of the
framework which allows a distributed and parallel computation, technique successfully used for
the enumeration of acceptable sets in an AF by AFDivider. An example of a clustering method,
USCC-clustering, which can be used with this algorithm, is provided. An implementation of
RAFDivider is to come with an experimental evaluation of such algorithms.</p>
      <p>
        The extension of the algorithmic approach to other kinds of enriched argumentation frameworks
may be investigated: argumentation frameworks which consider support interactions in addition
to attacks, notably (see [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] for an overview of such enrichments).
      </p>
      <p>
        To go further, such algorithms for argumentation frameworks with higher-order attacks may
encourage the extension to RAFs of the reasoning tasks proposed for AFs at the International
Competition on Computational Models of Argumentation (ICCMA) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. It would be the
opportunity to define some benchmarks adapted to the higher-order frameworks that could be
taken into account in the experimental evaluation previously mentioned.
      </p>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgments</title>
      <p>The authors wish to thank Mickaël Lafages, the work of this article being mostly based on his
PhD Thesis.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Á.</given-names>
            <surname>Carrera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Iglesias</surname>
          </string-name>
          ,
          <article-title>A systematic review of argumentation techniques for multi-agent systems research</article-title>
          ,
          <source>Artificial Intelligence Review</source>
          <volume>44</volume>
          (
          <year>2015</year>
          )
          <fpage>509</fpage>
          -
          <lpage>535</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname>Barringer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Woods</surname>
          </string-name>
          ,
          <article-title>Temporal dynamics of support and attack networks: From argumentation to zoology</article-title>
          ,
          <source>in: Mechanizing Mathematical Reasoning</source>
          , Essays in Honor of Jörg H.
          <source>Siekmann on the Occasion of His 60th Birthday. LNAI 2605</source>
          , Springer Verlag,
          <year>2005</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <article-title>An abstract theory of argumentation that accommodates defeasible reasoning about preferences</article-title>
          ,
          <source>in: Proc. of ECSQARU</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>648</fpage>
          -
          <lpage>659</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <article-title>Reasoning about preferences in argumentation frameworks</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>173</volume>
          (
          <year>2009</year>
          )
          <fpage>901</fpage>
          -
          <lpage>934</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Computing with infinite argumentation frameworks: The case of AFRAs</article-title>
          , in
          <source>: Proc. of TAFA, Revised Selected Papers</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Guida, AFRA: Argumentation framework with recursive attacks, Intl</article-title>
          .
          <source>Journal of Approximate Reasoning</source>
          <volume>52</volume>
          (
          <year>2011</year>
          )
          <fpage>19</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Fariñas del Cerro</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>Valid attacks in argumentation frameworks with recursive attacks</article-title>
          ,
          <source>AMAI Journal 89</source>
          (
          <year>2020</year>
          )
          <fpage>53</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vallati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanella</surname>
          </string-name>
          ,
          <article-title>An SCC recursive meta-algorithm for computing preferred labellings in abstract argumentation</article-title>
          ,
          <source>in: Proc. of KR</source>
          , AAAI Press,
          <year>2014</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>W. Dvorˇák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pichler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Towards fixed-parameter tractable algorithms for abstract argumentation</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>186</volume>
          (
          <year>2012</year>
          )
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <article-title>Toward incremental computation of argumentation semantics: A decompositionbased approach</article-title>
          ,
          <source>Annals of Mathematics and Artificial Intelligence</source>
          <volume>67</volume>
          (
          <year>2013</year>
          )
          <fpage>319</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lafages</surname>
          </string-name>
          , M.-
          <string-name>
            <given-names>C.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>A distributed and clustering-based algorithm for the enumeration problem in abstract argumentation</article-title>
          ,
          <source>in: Proc. of PRIMA</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <article-title>On the issue of reinstatement in argumentation</article-title>
          , in: JELIA,
          <year>2006</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>An introduction to argumentation semantics, Knowledge Eng</article-title>
          .
          <source>Review</source>
          <volume>26</volume>
          (
          <year>2011</year>
          )
          <fpage>365</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Charwat</surname>
          </string-name>
          , W. Dvorˇák,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Methods for solving reasoning problems in abstract argumentation - A survey</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>220</volume>
          (
          <year>2015</year>
          )
          <fpage>28</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Van Der</given-names>
            <surname>Torre</surname>
          </string-name>
          , S. Villata,
          <article-title>On the input/output behavior of argumentation frameworks</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>217</volume>
          (
          <year>2014</year>
          )
          <fpage>144</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lafages</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>Argumentation Frameworks with HigherOrder Attacks: Labellings and Complexity</article-title>
          , in: M.
          <string-name>
            <surname>Alamaniotis</surname>
          </string-name>
          , S. Pan (Eds.),
          <source>Proc. of ICTAI</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1210</fpage>
          -
          <lpage>1217</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lafages</surname>
          </string-name>
          ,
          <article-title>Algorithms for Enriched Abstract Argumentation Frameworks for Largescale Cases</article-title>
          ,
          <source>Phd thesis</source>
          , Toulouse University, Toulouse, France,
          <year>2021</year>
          . URL: https://tel. archives-ouvertes.fr/tel-03664752.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex, RAFDivider, Research Report IRIT/RR-2022
          <string-name>
            <surname>-</surname>
          </string-name>
          07-FR, IRIT - Institut de recherche en informatique de Toulouse,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Computational problems in formal argumentation and their complexity, in: Handbook of formal argumentation</article-title>
          , College publication,
          <year>2018</year>
          , pp.
          <fpage>631</fpage>
          -
          <lpage>688</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21] ICCMA,
          <source>International Competition on Computational Models of Argumentation</source>
          ,
          <year>2021</year>
          . URL: http://argumentationcompetition.org.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>Logical theories and abstract argumentation: A survey of existing works</article-title>
          ,
          <source>Argument and Computation</source>
          <volume>11</volume>
          (
          <year>2020</year>
          )
          <fpage>41</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C.</surname>
          </string-name>
          Lagasquie-Schiex,
          <article-title>Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports</article-title>
          ,
          <source>International Journal on Artificial Intelligence Tools</source>
          <volume>29</volume>
          (
          <year>2020</year>
          )
          <article-title>2060003</article-title>
          . URL: https://hal.archives-ouvertes.fr/hal-02874146.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>Higher-order interactions (bipolar or not) in abstract argumentation: A state of the art</article-title>
          ,
          <source>in: Handbook of Formal Argumentation</source>
          , Volume
          <volume>2</volume>
          ,
          <string-name>
            <surname>College</surname>
            <given-names>Publications</given-names>
          </string-name>
          ,
          <year>2021</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>118</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>