<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Deletion-Backdoors for Argumentation Frameworks with Collective Attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Wolfgang Dvorˇák</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matthias König</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Woltran</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>TU Wien, Institute of Logic and Computation</institution>
        </aff>
      </contrib-group>
      <fpage>98</fpage>
      <lpage>110</lpage>
      <abstract>
        <p>Analyzing computational aspects of argumentation has the ultimate goal to find efficient tools to reason in an argumentative setting. In particular, exploiting islands of tractability leads to enhancements of our ability to create such tools. In this work, we identify as such an island of tractability deletion-backdoors for argumentation frameworks with collective attacks (SETAFs). A backdoor is the part of a problem instance, the removal of which leads to a simple structure. If we can find such a backdoor and guess the solution on this part (in the context of argumentation: extensions), the rest of the solution follows almost effortlessly. In terms of complexity analysis, this means for constant backdoor sizes, general argumentation tasks become efficiently solvable-they are fixed-parameter tractable. In this work, we generalize the respective techniques that are known for the special case of Dung-style argumentation frameworks (AFs) and show that they also apply to the more general case of SETAFs. In addition, we can show an improvement in the asymptotic runtime compared to earlier approaches for AFs. Along the way, we point out similarities and interesting situations arising from the more general setting.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the last decades of argumentation research, several formalizations have been considered for
suitable abstractions of argumentation processes—Dung’s approach of abstract argumentation
frameworks (AFs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] is nowadays one of the most widely used such formalisms. In AFs,
arguments are abstract entities represented by nodes in a directed graph, the edges form the attack
relation. Several generalizations have been proposed in order to achieve more expressiveness
or to be able to instantiate knowledge bases more easily or intuitively. One such generalization
is the addition of collective attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], the resulting class of frameworks is referred to as
SETAFs. Reasoning in AFs is computationally expensive—in order to still obtain efficient
runtimes in special cases restrictions of the graph structure have been investigated [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ].
While in the general case the same (mostly intractable) complexity upper bounds hold for
SETAFs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], tractable graph classes have only recently been brought to the attention of the
research community [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. The analysis of computational aspects of SETAFs by parameterized
means just started by investigations of the parameter treewidth [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. A particular challenge
hereby is to extend structural parameters (that work well for the simple structure of AFs), to the
hypergraph structure SETAFs provide. In fact, it turned out that while for certain generalizations
the parameterized tractability results of AFs carry over to SETAFs, other scenarios give rise to
interesting behavior that leads to most problems remaining intractable.
      </p>
      <p>
        In this paper, we use the tools of parameterized complexity analysis and focus on the parameter
of minimum-size deletion-backdoors. The backdoor-concept is used in different contexts such as
constraint satisfaction problems (CSP), satisfiability checking (SAT), answer set programming
(ASP) (see e.g. [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10, 11, 12, 13</xref>
        ] for recent work), and has also been investigated in the context
of AFs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Intuitively, a backdoor is one part of an instance that “makes it hard to solve”. In
this work, we focus on deletion-backdoors, i.e. if this backdoor is removed from the instance, the
remaining (sub-)instance is computationally easy. In the context of formal argumentation this
means that a framework belongs to a tractable class (such as acyclicity) after removing certain
arguments. This means we can utilize the tractability results of these easy classes for general
frameworks without restrictions, as arbitrary distances to the tractable fragments are allowed. If
this distance is small (constant), we can reason in polynomial time [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Our main contributions are as follows: (i) we introduce the concept of deletion-backdoors
for SETAFs utilizing the concept of primal-graphs for SETAFs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]; (ii) we present an algorithm
to reason w.r.t. the common admissibility based semantics stable, preferred, complete, and
semi-stable, to exploit given backdoors for the fragments acyclicity and even-cycle-freeness
(as introduced for SETAFs in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]), thereby improving the runtime of the best known
backdoorapproach for AFs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]; and (iii) show that our introduced algorithm is optimal unless the Strong
Exponential Time Hypothesis is false.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        We start by recalling the definition of argumentation frameworks with collective attacks
(SETAFs) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and identify argumentation frameworks (AFs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as a special case.
Definition 1. A SETAF is a pair SF = (A, R) where A is a finite set of arguments, and R ⊆
(2A \ { 0/ )
      </p>
      <p>} × A is the attack relation. For an attack (T, h) ∈ R we call T the tail and h the head
of the attack. SETAFs (A, R), where for all (T, h) ∈ R it holds that |T | = 1, amount to (standard
Dung) AFs. In that case, we usually write (t, h) to denote the set-attack ({t}, h). For S ⊆ A, we
say S attacks an argument a ∈ A if there is an attack (T, a) ∈ R with T ⊆ S. We use SR+ t+o denote
the set {a | S attacks a} and define the range of S (w.r.t. R), denoted SR⊕ , as the set S ∪ SR .</p>
      <p>The well-known notions of conflict and defense from classical Dung-style AFs naturally
generalize to SETAFs.</p>
      <p>Definition 2. Let SF = (A, R) be a SETAF. A set S ⊆ A is conflicting in SF if S attacks a for
some a ∈ S. S ⊆ A is conflict-free in SF, if S is not conflicting in SF, i.e. if T ∪ {h} ̸⊆ S for each
(T, h) ∈ R. cf(SF) denotes the set of all conflict-free sets in SF.</p>
      <p>
        The semantics we study in this work are the admissible, complete, preferred, stable, and
semistable semantics, which we will abbreviate by adm, com, pref, and stb, and sem, respectively [
        <xref ref-type="bibr" rid="ref15 ref2 ref6">2,
6, 15</xref>
        ]. σ (SF) denotes the set of extensions of SF under semantics σ .
      </p>
      <p>Definition 4. Given a SETAF SF = (A, R) and a conflict-free set S ∈ cf(SF). Then,
• S ∈ adm(SF), if S defends itself in SF,
• S ∈ com(SF), if S ∈ adm(SF) and a ∈ S for all a ∈ A defended by S,
• S ∈ pref(SF), if S ∈ adm(SF) and there is no T ∈ adm(SF) s.t. T ⊃ S,
• S ∈ stb(SF), if SR⊕ = A,
• S ∈ sem(SF), if S ∈ adm(SF) and ∄T ∈ adm(SF) s.t. T R⊕ ⊃ SR⊕ .</p>
      <p>
        The relationship between the semantics has been clarified in [
        <xref ref-type="bibr" rid="ref15 ref2 ref6">6, 2, 15</xref>
        ] and matches with the
relations between the semantics for Dung AFs, i.e. for any SETAF SF:
      </p>
      <p>stb(SF) ⊆ sem(SF) ⊆ pref(SF) ⊆ com(SF) ⊆ adm(SF) ⊆ cf(SF)</p>
      <p>
        We assume the reader to have basic knowledge in computational complexity theory1, in
particular we make use of the complexity classes P (polynomial time), NP (non-deterministic
polynomial time), coNP, Σ2P, and ΠP. For a SETAF SF = (A, R) and an argument a ∈ A, we
2
consider the standard reasoning problems (under semantics σ ):
• Credulous acceptance Credσ : Is a contained in at least one σ extension of SF?
• Skeptical acceptance Skeptσ : Is a contained in all σ extensions of SF?
The complexity landscape of SETAFs coincides with that of Dung AFs and is depicted in Table 1.
As SETAFs generalize Dung AFs the hardness results for Dung AFs [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] carry over to SETAFs,
also the same upper bounds hold for SETAFs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        For a more fine-grained complexity analysis we also make use of the complexity class FPT
(fixed-parameter tractability): a problem is fixed-parameter tractable w.r.t. a parameter if there
is an algorithm with runtime O( f (p) · poly(n)), where n is the size of the input, p is an integer
describing the instance called the parameter value, and f (· ) is an arbitrary computable function
independent of n (typically at least exponential in p). We also make use of the class XP. A
problem is in XP w.r.t. a parameter if there is an algorithm with runtime O(nO(p)), where n is the
size of the input, and p is the parameter value. We have that P ⊆ FPT ⊆ XP.
1For a gentle introduction to complexity theory in the context of formal argumentation, see [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
d
a
h
e
i
b
f
j
g
c
(b)
d
a
h
e
      </p>
      <p>
        f
i
b
j
g
c
3. Graph Properties and Backdoors for SETAFs
The underlying structure of SETAFs is a directed hypergraph, which makes it hard to apply
certain notions of graph properties. We can avoid these issues by utilizing “standard” directed
graphs to describe SETAFs, and analyze graph properties (such as backdoors). There are different
such directed graph-representations [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]; we focus on the primal graph, as it arguably is the
most intuitive way to embed SETAFs into directed graphs and fits our purposes best. An example
for a primal graph is given in Figure 1; the corresponding SETAF will serve as a running example
throughout the paper. We utilize the primal graph to define primal-backdoors.
Definition 5 ([
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]). Let SF = (A, R) be a SETAF. The primal graph of SF is defined as
Primal(SF) = (A, R′), where R′ = {(t, h) | (T, h) ∈ R, t ∈ T }. A (primal-)cycle of length n
in SF is a non-repeating sequence (a1, a2, . . . , an) of arguments such that for each 1 ≤ i ≤ n − 1
there is (Ai, ai+1) ∈ R such that ai ∈ Ai, and there is (An, a1) ∈ R with an ∈ An. Equivalently, a
primal cycle corresponds to a directed cycle in Primal(SF). SETAFs SF with
• no (primal-)cycles are called (primal-)acyclic,
• no (primal-)cycles of even length are called even-(primal-)cycle-free,
      </p>
      <p>
        It is easy to see that several SETAFs can map to the same primal graph. However, restrictions on
the primal graph are often useful to obtain computational speedups for otherwise hard problems [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7,
8, 9</xref>
        ]. We denote the classes of acyclic, even-cycle-free SETAFs by ACYC, NOEVEN, respectively.
Note that in the special case of AFs these classes coincide with the standard definitions, i.e.,
they properly generalize the standard case. For AFs, also the classes of bipartite and symmetric
frameworks have been investigated. However, while finding suitable backdoors to these classes
was shown to be parameterized-tractable, reasoning in AFs with constant backdoor-size to
these frameworks remains hard [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Even though there are generalizations of symmetry and
bipartiteness for SETAFs where reasoning also becomes tractable [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], as these classes generalize
the respective properties of AFs, the hardness-results for backdoor evaluation carry over to
the general SETAFs. Hence, we focus on the fragments ACYC and NOEVEN. On AFs, all of
these classes are considered as the tractable fragments of argumentation, as for many semantics
there are efficient algorithms to reason in AFs that belong to one of these classes [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ].
However, these fragments restrict the possible structure of an AF. In order to exploit the speedup
while still keeping the full expressiveness, the requirements have been weakened to allow for
arbitrary distance to these fragments. We generalize this so-called backdoor-approach by Dvorˇák
et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
d
a
h
e
i
b
f
j
g
c
(b)
d
h
      </p>
      <p>i
e
f
j
g
c</p>
      <p>For this, we need the notion of the projection. Intuitively, a SETAF SF = (A, R) projected to
a set of arguments S ⊆ A (we write SF↓S) can be seen as the result of removing the arguments
outside of S while retaining as much of the original structure as possible.</p>
      <p>Definition 6. Let SF = (A, R) be a SETAF and let C be a class of SETAFs. We call a set B ⊆ A a
C-backdoor if SF↓A\B belongs to C, where</p>
      <p>SF↓A\B= (A \ B, {(T \ B, h) | (T, h) ∈ R, T \ B ̸= 0/ , h ∈ A \ B}).</p>
      <p>We denote the size of a smallest C-backdoor by bdC(SF).</p>
      <p>Corollary 7. Let SF be a SETAF.</p>
      <p>1. We can recognize whether SF belongs to ACYC or NOEVEN in polynomial time.
2. We can find a NOEVEN-backdoor of size at most p in time |SF|O(p) (or if no such backdoor
exists correctly detect so).
3. We can find an ACYC-backdoor of size at most p in time f (p) · poly|SF| (or if no such
backdoor exists correctly detect so).</p>
      <p>This means, that the fragment ACYC is in principle suitable for FPT algorithms, while for
NOEVEN we aim for XP algorithms (however, it is principally possible that faster algorithms for
ifnding NOEVEN-backdoors exist).</p>
    </sec>
    <sec id="sec-3">
      <title>4. Backdoor Evaluation</title>
      <p>
        In this section we tackle the evaluation of backdoors of constant size, i.e., assume we are given a
backdoor, how can we efcfiiently compute the extensions. We adapt the results from [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and
generalize the therein mentioned notions such as partial labelings and propagation algorithms
to SETAFs. Our approach however differs from the one in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] as it is tailored to the fragments
ACYC and NOEVEN. This allows us to give a tighter upper bound for the runtime: O(2p · poly(n))
instead of O(3p · poly(n)) (p is the size of the given backdoor and n is the size of the instance).
Our improved algorithm is applicable to SETAFs as well as AFs, as the latter is just a special
case of the former.
      </p>
      <p>The basic idea of the backdoor evaluation algorithm is to guess parts of an extension on the
arguments in the backdoor, and then cleverly propagate this guess to the rest of the instance. As the
remaining instance is even-cycle-free, there are no supportive cycles to consider in the propagation
step. Algorithm 1 captures the whole process; in the following we will verify its correctness
and give an intuition for each step. If we provide for a SETAF SF a NOEVEN-backdoor B,
Algorithm 1 returns a set of admissible candidates pref ∗ (SF, B) for preferred extensions.</p>
      <p>Algorithm 1: Computation of pref ∗ (SF, B)
1 pref ∗ (SF, B) ← 0/ ;
2 foreach I ⊆ B do
3 let λ be a partial labeling on B;
4 set λ (a) = in for a ∈ I;
5 set λ (a) = out for a ∈ B \ I;
6 λ ∗ ← propagateIO(SF, λ );
7 set λ ∗ (a) = und for a ∈ A \ DEF(λ ∗ );
8 λ † ← propagateU(SF, λ ∗ );
9 if IN(λ †) ∩ B = I then
10 pref ∗ (SF, B) ← pref ∗ (SF, B) ∪ {IN(λ †)};</p>
      <p>
        We capture the concept of the partial guess by partial labelings (cf. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]).
      </p>
      <p>Definition 8. Let SF = (A, R) be a SETAF and let X ⊆ A be a set of arguments. A partial
labeling is a function λ : X → {in, out, und}. By IN(λ ) we denote the set {a ∈ X | λ (a) = in}
(similarly, OUT(λ ), UND(λ )). We write DEF(λ ) to identify the set X . For a set S ⊆ X we fix the
corresponding partial labeling on X as
λS(a) =
⎧in
⎪
⎨</p>
      <p>if a ∈ S,
out if a ∈ SR+,
⎪⎩und else, i.e. a ∈ X \ SR⊕ .</p>
      <p>A labeling λ is compatible with a set S ⊆ A if ∀a ∈ DEF(λ ) it holds λ (a) = λS(a).</p>
      <p>We consider two “phases” of propagation. In the first, we propagate the in/out labels of
the guess as far as possible. The second phase fixes incorrectly labeled arguments and assured
admissibility in the generated labeling. We will show that with this approach we can capture all
preferred extensions.
out
d
a
out
h
e</p>
      <p>i
in
b
out
in
j
f
in
out
g
c
in
(a)
(b)
in
d
a
in
h
e
in
i
out
b
in
f
in
j
out
in
g
c
out</p>
      <p>Definition 9. Let SF = (A, R) be a SETAF and λ be a partial labeling on X ⊆ A. Consider the
following propagation rules for λ :
1. set λ ∗ (a) = out if ∃(T, a) ∈ R with T ⊆ IN(λ ∗ ),
2. set λ ∗ (a) = in if ∀(T, a) ∈ R there is a t ∈ T with λ ∗ (t) = out.</p>
      <p>We define propagateIO(SF, λ ) as the result of initializing λ ∗ with λ on DEF(λ ), and then
exhaustively applying the rules 1. and 2. to each argument a ∈ A \ DEF(λ ).</p>
      <p>3. set λ †(a) = und if λ †(a) = in and there is (T, a) ∈ R s.t. ∄t ∈ T : λ †(t) = out,
4. set λ †(a) = und if λ †(a) = out and there is no (T, a) ∈ R s.t. T ⊆ IN(λ †).
We define propagateU(SF, λ ) as the result of initializing λ † with λ on DEF(λ ), and then
exhaustively applying the rules 3. and 4. to each argument a ∈ IN(λ ) ∪ OUT(λ ).</p>
      <p>In the following Lemma 10 we formalize the intuition of propagateIO. We propagate the
labels we guessed on B and treat them at this stage as if they are “confirmed”, i.e., whenever
we have a reason to assume an argument is defended, we add it (by labeling it in), whenever
we have a reason to assume an argument is defeated, we keep track of this fact (by labeling
it out). In this stage, no argument will be labeled und. We revisit our running example from
Figure 2. Assume we guess λ1(a) = λ1(b) = out for the backdoor {a, b}. The labeling λ 1∗ after
exhaustively applying rules 1. and 2. is depicted in Figure 3(a). In general, we will incorrectly
label arguments: as can be seen, the argument a is labeled out, but there is no attack towards a
that verifies this label. Now assume we guess λ2(a) = λ2(b) = in. One can see in Figure 3(b)
that there is a problem with the propagated labeling λ 2∗ : the arguments d and a are both labeled
in, effectively causing a conflict. Though we will correct this problem in the second step of the
propagation algorithm, we will have to change the label of a from in to und. We will see that we
can actually already stop at this point, as we will then compute (a subset of) the extension we
get from the guess λ3(a) = out, λ3(b) = in. In the following lemma we establish that we label all
arguments a ∈ ER⊕ correctly (i.e., in and out, resp.).</p>
      <p>Lemma 10. Let SF = (A, R) be a SETAF, let E ∈ pref(SF), and B ⊆ A a NOEVEN-backdoor for
SF. For the input (SF, B) to Algorithm 1, assume in step 2 we choose I = E ∩ B, let λ be the
corresponding partial labeling from steps 4 and 5. Set λ ∗ = propagateIO(SF, λ ). Then for each
a ∈ A:
(a) if λ ∗ (a) = in then a ∈/ ER+,
(b) if λ ∗ (a) = out then a ∈/ E,
(c) if a ∈/ DEF(λ ∗ ) then a ∈/ ER⊕ ,
(d) E ⊆ IN(λ ∗ ), and
(e) ER+ ⊆ OUT(λ ∗ ).</p>
      <p>Proof. We show (a) and (b) by induction on the number of labeled arguments in the construction
of λ ∗ . For the base case λ ∗ = λ it is easy to see that all conditions (a) and (b) hold (by assumption
we have OUT(λ ) = B \ IN(λ ) = (A ∩ B) \ E). For the step we consider the rules 1. and 2.:</p>
      <p>Assume a is labeled via rule 1., i.e. we set λ ∗ (a) = out for some a ∈ A \ DEF(λ ). Clearly, (a)
is not violated by labeling a as out, for (b) we show a ∈/ E. Since we invoked rule 1., there is
an attack (T, a) ∈ R with T ⊆ IN(λ ∗ ). By our induction hypothesis we know that (a) holds for
each t ∈ T , i.e. T ∩ ER+ = 0/. This means E does not defend a against the attack (T, a), and since
E ∈ pref(SF), we get a ∈/ E.</p>
      <p>Now assume a is labeled via rule 2., i.e. we set λ ∗ (a) = in for some a ∈ A \ DEF(λ ). Clearly,
(b) is not violated by labeling a as in, for (a) we show a ∈/ E+. Since we invoked rule 2., for all
R
attacks (T, a) ∈ R there is some t ∈ T with λ ∗ (t) = out. By our induction hypothesis we know
that (b) holds for each such t, i.e. t ∈/ E. Hence, there can be no attack (T, a) with T ⊆ E, i.e.,
a ∈/ E+.</p>
      <p>R</p>
      <p>For (c) assume towards contradiction there is an argument a1 ∈ E such that a1 ∈/ DEF(λ ∗ ).
If there is no attack (T, a1) ∈ R towards a1, we would have λ ∗ (a1) = in, hence, there is such an
attack. Moreover, there is a (T, a1) ∈ R s.t. for no t ∈ T we have λ ∗ (t) = out, otherwise we would
have λ ∗ (a1) = in. However, by admissibility of E there is at least one t1 ∈ T ∩ E+. For this t1 we
R
have t1 ∈ A \ DEF(λ ∗ ), i.e. t1 is unlabeled (the only other option, the label in, violates (b)). Since
t1 ∈ E+, there is an attack (S,t1) ∈ R, but since t1 is unlabeled, S ̸⊆ IN(λ ∗ ), i.e., there is an a2 ∈ S</p>
      <p>R
such that a2 is unlabeled. We have a1 ̸= a2, as this would imply an even-length cycle (a2,t1). As
for a2 we can reason in the same way as for a1, we obtain another unlabeled argument t2 ∈ E+,
R
and eventually a sequence a1,t1, a2,t2, . . . of arguments. However, as SF is finite and all ai are
different, eventually there is either (i) an unlabeled argument ak where no attack (Tk, ak) towards
ak has an unlabeled tk ∈ Tk, but then λ ∗ (ak) = in, a contradiction, or (ii) an unlabeled argument
tk where there is no counter-attack (Sk,tk) with an unlabeled ak+1 ∈ Sk, but then λ ∗ (tk) = out, a
contradiction. Hence, no such a1 can exist. Assuming there is an unlabeled argument t1 ∈ ER+
analogously leads to a contradiction.</p>
      <p>Finally, from (a) and (c) follows (d) and from (b) and (c) follows (e).</p>
      <p>Lemma 11 shows that the procedure propagateU(SF, λ ) is sound. In particular, it is easy to
see that any partial labeling λ ∗ with DEF(λ ∗ ) = A that we give as input to propagateU will
give us an admissible set (rule 3. removes conflicts and both rules 3. and 4. resolve undefended
arguments). An argument is incorrectly labeled in if it is not defended against each attack; it is
incorrectly labeled out if it is not attacked from within the set IN(λ ). By exhaustively applying
the propagation rules 3. and 4. we fix these incorrect labels. To illustrate this, we revisit our
running example. In Figure 3 we see the resulting labelings λ 1∗ , λ 2∗ for the backdoor B = {a, b}
for the guesses (a) λ1(a) = λ1(b) = out, and (b) λ2(a) = λ2(b) = in. Following Algorithm 1, in
step 7 we set the un-labeled argument to und and compute propagateU for both labelings. In
und
d
a
und
und und
h i
e
und
b
out
in
j
f
in
out
g
c
in
(a)
(b)
und
d
a
und
und und
h i
e
und</p>
      <p>f
b
in
in
j
out
in
g
c
out</p>
      <p>Figure 4 we see the resulting labelings λ1†, λ2†. Our algorithm outputs the sets {c, f , j}, {b, g, j}
respectively, and it can be indeed verified that these sets are preferred in SF. Now consider the
guess λ3(a) = out, λ3(b) = in. It turns out that λ3† = λ2†: the fact that both labelings result in the
same propagation means in particular that there is no preferred extension E where {a, b} ⊆ E,
as by trying to construct such an extension in (b) we had to correct the label of a. In general,
whenever we re-label one of the guessed in-labels, we can abort the run of the algorithm on this
guess and proceed with a different guess, as we will always compute (a superset of) the thereby
“missed” set when we start with the corresponding “correct” labeling on the backdoor arguments.</p>
      <p>We show in the following Lemma 11 that for every argument a where we fix the label und, a is
indeed neither in the corresponding extension nor attacked by it, i.e. a ∈/ ER⊕ . This together with
the results of Lemma 10 suffices to show that if we guess correctly, the algorithm computes every
preferred extension.</p>
      <p>Lemma 11. Let SF = (A, R) be a SETAF, let E ∈ pref(SF), and B ⊆ A a NOEVEN-backdoor for
SF. For the input (SF, B) to Algorithm 1, assume in step 2 we choose I = E ∩ B, let λ ∗ be the
corresponding propagated partial labeling from step 7 with und labels. Set λ † = propagateU(SF, λ ∗ ).
Then E = IN(λ †).</p>
      <p>Proof. We first show by induction on the number of re-labeled arguments (i.e., arguments that
are labeled und during the construction of λ †) that for each a ∈ A it holds if λ †(a) = und then
a ∈ A \ ER⊕ . The base case where λ † = λ ∗ is covered by Lemma 10(c). For the inductive step
consider the rules 3. and 4.:</p>
      <p>Assume a is re-labeled by rule 3., i.e. we set λ †(a) = und for some a ∈ IN(λ ∗ ). By
Lemma 10(a) we know a ∈/ E+, we show a ∈/ E. Since we invoked rule 3., there is (T, a) ∈ R</p>
      <p>R
s.t. ∄t ∈ T with λ †(t) = out. By induction hypothesis and Lemma 10(a) and (c), this means
E+</p>
      <p>R ∩ T = 0/, i.e. a is not defended by E against (T, a). By admissibility this means a ∈/ E.</p>
      <p>Assume a is re-labeled by rule 4., i.e. we set λ †(a) = und for some a ∈ OUT(λ ∗ ). By
Lemma 10(b) we know a ∈/ E, we show a ∈/ E+. Since we invoked rule 4., there is no (T, a) ∈ R</p>
      <p>R
s.t. T ⊆ IN(λ ∗ ). By induction hypothesis and Lemma 10(c), this means T ̸⊆ E, i.e. a is not
attacked by E.</p>
      <p>Next, we show IN(λ †) ∈ adm(SF). By E′ we identify the set IN(λ †). Assume towards
contradiction there is a conflicting attack (T, h) ∈ R with T ∪ {h} ⊆ E′. However, this means
we would re-label h by rule 3., as there is no t ∈ T with λ †(t) = out, a contradiction. Hence,
E′ ∈ cf(SF). Now assume towards contradiction there is an undefended argument a ∈ E′, i.e.,
there is an attack (T, a) ∈ R s.t. for no t ∈ T there is an attack (S,t) ∈ R with S ⊆ E′. As a ∈ E′,
there is some t ∈ T where either (i) we set λ ∗ (t) = out during the computation of λ ∗ and did not
change the label later, in which case we did not invoke propagation rule 4., and there is indeed
an attack (S,t) ∈ R towards t with S ⊆ E′ and a is defended, or (ii) we set λ ∗ (t) = out during
the computation of λ ∗ and during the computation of λ † update it to λ †(t) = und, but then if no
t′ ∈ T with λ †(t′) = out is left, we would have invoked propagation rule 3. for a and set it to und,
and if such a t′ exists where we did not change the label, then a is also defended as in case (i). In
all cases we see that indeed a is defended by E′ and can conclude E′ ∈ adm(SF).</p>
      <p>Finally, by Lemma 10(d) and the formerly established fact that for each a ∈ A it holds if
λ †(a) = und then a ∈ A \ ER⊕ we know also E ⊆ E′. Since E′ ∈ adm(SF) and we assumed E is
preferred, we get E = E′.</p>
      <p>These correctness results for the propagation procedures are the basis for the main result of this
section, namely the efficient computation of preferred extensions if a suitable backdoor is given.
Theorem 12. Let C ∈ {NOEVEN, ACYC} be a SETAF class, let SF = (A, R) be a SETAF, and
B ⊆ A a C-backdoor for SF with |B| ≤ p. With Algorithm 1 we can enumerate all σ -extensions
in time 2p · poly(|SF|) for σ ∈ {pref, stb, sem} on input (SF, B).</p>
      <p>Proof. Let E ∈ pref(SF), we show that E is in the output of Algorithm 1, i.e., E ∈ pref ∗ (SF, B).
Since in step 2 we try all subsets of B, we will try I = E ∩ B. Lemma 11 ensures E ∈ pref ∗ (SF, B).
It remains to show that all steps 3-10 can be done in polynomial time w.r.t. |SF|. It is easy to
see that (assuming we use reasonable data structures) this is the case for steps 3-5, 7, 9, and 10.
For step 6 and 8 note that each argument is (re)-labeled at most once, and the check for each
propagation rule can clearly be carried out in polynomial time. Hence, the overall runtime is
2p · poly(|SF|). Finally, we can then check whether the extensions are (range)-subset-maximal or
attack every argument not in them, as all candidates are available. Hence, we can remove those
sets that are not preferred/stable/semi-stable.</p>
      <p>
        As we can efficiently enumerate all extensions, also reasoning becomes efficient in this
case. This result also carries over to admissible and complete semantics, as the respective
credulous acceptance problems coincide with preferred semantics, Skeptcom is already possible in
polynomial time and Skeptadm is trivial. We want to highlight that even if we have a
NOEVENbackdoor of size p, there can be up to O(3p) complete extensions. Clearly we cannot enumerate
them with our approach, which is why we capture the preferred extensions (in contrast to the AF
approach [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]).
      </p>
      <p>Corollary 13. Let C ∈ {NOEVEN, ACYC} be a SETAF class, let SF = (A, R) be a SETAF, and
B ⊆ A a C-backdoor for SF with |B| ≤ p. Then we can decide the problems Credσ and Skeptσ in
time 2p · poly(|SF|) for σ ∈ {adm, com, pref, stb, sem}.</p>
      <p>Combining Corollary 7 and Corollary 13, we immediately obtain the following main result
that captures finding and exploiting minimal backdoors for SETAFs.</p>
      <p>Theorem 14. Let SF be a SETAF and let σ ∈ {adm, com, pref, stb, sem} be a semantics.
1. If bdACYC(SF) ≤ p, we can solve Credσ and Skeptσ in FPT w.r.t. parameter p.
2. If bdNOEVEN(SF) ≤ p, we can solve Credσ and Skeptσ in XP w.r.t. parameter p.</p>
      <p>
        In fact, our algorithm for exploiting a small backdoor that is already given is only in 2p for the
parameter value p, which is an improvement over the existing 3p approach [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This also has
implications in practice, as it turns out that finding the minimal backdoor-size often comes with
high computational cost: for example, one known FPT algorithm for the computation of minimal
NOEVEN-backdoors of size p for directed graphs G has runtime 4p · p! · poly(|G|) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which
is often impractical even for small parameter values. Instead, recent implementations focus on
ifnding backdoors heuristically, cf. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Hence, our results are also relevant for the development
of fast algorithms for AFs, since Theorem 12 &amp; 14 and Corollary 13 also hold in the special case
of AFs.
5. Conditional Lower Bounds for Backdoor Evaluation
In this section we show a so-called conditional lower bound [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] for NOEVEN/ACYC-backdoor
evaluation, i.e. we show that our algorithm is basically optimal based on some well-known
conjecture. The conjecture we are going to use is the Strong exponential-time hypothesis (SETH) [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ].
We show this for AFs; the result carries over to SETAFs.
      </p>
      <p>Conjecture 1 (Strong Exponential Time Hypothesis (SETH)). For each ε &gt; 0 there is a k such
that k-CNF-SAT on n variables and m clauses cannot be solved in O(2(1− ε)n · poly(n + m)) time.</p>
      <p>Let p be the parameter for the backdoor size. We will show that any NOEVEN-backdoor
evaluation that runs in time O(2(1− ε)p · poly(|F|)) for AFs F would violate SETH and thus imply
a major break-through in the development of SAT algorithms.</p>
      <p>Theorem 15. Let F = (A, R) be an AF and let C ∈ {NOEVEN, ACYC} and let p the size of the
given backdoor. There is no O(2(1− ε)p · poly(|A|)) C-backdoor evaluation algorithm for Credσ
for σ ∈ {adm, com, pref, stb, sem} unless SETH is false.</p>
      <p>
        Proof. Given an instance from SETH, i.e. a CNF formula ϕ with n variables and m clauses.
Let X = {x1, . . . , xn} be the set of variables and C = {c1, . . . , cm} be the set of clauses appearing
in ϕ. Consider the standard translation [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] from a CNF formula ϕ to an AF Fϕ = (A, R) (cf.
Figure 5) with A = {ϕ} ∪ C ∪ X ∪ X¯ and R = {(c, ϕ) | c ∈ C} ∪ {(x, x¯), (x¯, x) | x ∈ X } ∪ {(x, c) |
x ∈ c, c ∈ C} ∪ {(x¯, c) | x¯ ∈ c, c ∈ C}. We know that the formula ϕ is satisfiable iff the argument
ϕ is credulously accepted w.r.t. σ [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Moreover, we have that the set X is a C-backdoor of Fϕ
and has size n.
      </p>
      <p>Towards, a contradiction let us assume we have a O(2(1− ε)p · poly(|A|)) C-backdoor evaluation
algorithm. Then we can decide whether a CNF formula ϕ is satisfiable as follows: We first
construct the AF Fϕ (which is polynomial in n + m) and then run the C-backdoor evaluation with
backdoor X and return the answer for the credulous decision problem as answer to the satisfiability
problem. By assumption the latter step has a running time of O(2(1− ε)n · poly(n + m)). That is, we
have a O(2(1− ε)n · poly(n + m)) algorithm for k-CNF-SAT for arbitrary k &gt; 1, which contradicts
SETH.
ϕ
c2
c1</p>
      <p>c3
y1
y¯1
y2
y¯2
z1
z¯1
z2
z¯2</p>
    </sec>
    <sec id="sec-4">
      <title>6. Conclusion</title>
      <p>In this paper, we have applied the well known concept of backdoors for the first time to
argumentation frameworks with collective attacks. Instead of simply adapting previous work in
this direction, we came up with a genuinely new approach for computing extensions utilizing
backdoors to acyclicity and no-even graphs that shows improved runtime bounds compared to the
known algorithms for standard AFs. Moreover, we proved that under some complexity-theoretic
assumptions further such improvements are not possible. We focused on graph restrictions on the
primal graph rather than the SETAF’s hypergraph structure, as this allows us to exploit established
ideas for finding backdoors—the situation for directed hypergraphs is less diverse. Future work
includes the implementation of these techniques and the optimization for heuristics to find suitable
backdoors.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This research has been supported by the Vienna Science and Technology Fund (WWTF) through
project ICT19-065, and by the Austrian Science Fund (FWF) through projects P32830 and Y698.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <article-title>A generalization of Dung's abstract framework for argumentation: Arguing with sets of attacking arguments</article-title>
          ,
          <source>in: Proceedings of ArgMAS 2006</source>
          , Springer,
          <year>2006</year>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>73</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -75526-5\_4.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Coste-Marquis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Devred</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marquis</surname>
          </string-name>
          ,
          <article-title>Symmetric argumentation frameworks</article-title>
          ,
          <source>in: Proceedings of ECSQARU</source>
          <year>2005</year>
          , volume
          <volume>3571</volume>
          <source>of LNCS</source>
          , Springer,
          <year>2005</year>
          , pp.
          <fpage>317</fpage>
          -
          <lpage>328</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Computational properties of argument systems satisfying graph-theoretic constraints</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <year>2007</year>
          )
          <fpage>701</fpage>
          -
          <lpage>729</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J. M.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          ,
          <article-title>Complexity and Combinatorial Properties of Argument Systems</article-title>
          ,
          <source>Technical Report</source>
          , Dept. of Computer Science, University of Liverpool,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Greßler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Evaluating SETAFs via answer-set programming</article-title>
          ,
          <source>in: Proceedings of SAFA</source>
          <year>2018</year>
          , volume
          <volume>2171</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , M. König,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Graph-classes of argumentation frameworks with collective attacks</article-title>
          ,
          <source>in: Proceedings of JELIA</source>
          <year>2021</year>
          , volume
          <volume>12678</volume>
          <source>of LNCS</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -75775-5\_1.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , M. König,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>On the complexity of preferred semantics in argumentation frameworks with bounded cycle length</article-title>
          ,
          <source>in: Proceedings of KR</source>
          <year>2021</year>
          ,
          <year>2021</year>
          , pp.
          <fpage>671</fpage>
          -
          <lpage>675</lpage>
          . doi:
          <volume>10</volume>
          .24963/kr.2021/67.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , M. König,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Treewidth for argumentation frameworks with collective attacks</article-title>
          ,
          <source>in: Proceedings of COMMA</source>
          ,
          <year>2022</year>
          . To appear.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gaspers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ordyniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <article-title>Backdoor sets for CSP, in: The Constraint Satisfaction Problem: Complexity and Approximability</article-title>
          , volume
          <volume>7</volume>
          of
          <string-name>
            <given-names>Dagstuhl</given-names>
            <surname>Follow-Ups</surname>
          </string-name>
          ,
          <source>Schloss Dagstuhl - Leibniz-Zentrum für Informatik</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>157</lpage>
          . URL: https://doi.org/10. 4230/DFU.Vol7.
          <volume>15301</volume>
          .5. doi:
          <volume>10</volume>
          .4230/DFU.Vol7.
          <volume>15301</volume>
          .5.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Fichte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <article-title>Backdoors to tractable answer set programming</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>220</volume>
          (
          <year>2015</year>
          )
          <fpage>64</fpage>
          -
          <lpage>103</lpage>
          . URL: https://doi.org/10.1016/j.artint.
          <year>2014</year>
          .
          <volume>12</volume>
          .001. doi:
          <volume>10</volume>
          .1016/j. artint.
          <year>2014</year>
          .
          <volume>12</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ordyniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schidler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <article-title>Backdoor dnfs</article-title>
          , in: Z.
          <string-name>
            <surname>Zhou</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of IJCAI</source>
          <year>2021</year>
          ,
          <article-title>ijcai</article-title>
          .org,
          <year>2021</year>
          , pp.
          <fpage>1403</fpage>
          -
          <lpage>1409</lpage>
          . URL: https://doi.org/10.24963/ijcai.
          <year>2021</year>
          /194. doi:
          <volume>10</volume>
          .24963/ijcai.
          <year>2021</year>
          /194.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gaspers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Misra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ordyniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zivný</surname>
          </string-name>
          ,
          <article-title>Backdoors into heterogeneous classes of SAT and CSP</article-title>
          , in: C. E.
          <string-name>
            <surname>Brodley</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          Stone (Eds.),
          <source>Proceedings of AAAI</source>
          , AAAI Press,
          <year>2014</year>
          , pp.
          <fpage>2652</fpage>
          -
          <lpage>2658</lpage>
          . URL: http://www.aaai.org/ocs/index.php/AAAI/AAAI14/ paper/view/8177.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , S. Ordyniak,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <article-title>Augmenting tractable fragments of abstract argumentation</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>186</volume>
          (
          <year>2012</year>
          )
          <fpage>157</fpage>
          -
          <lpage>173</lpage>
          . URL: http://www.sciencedirect.com/ science/article/pii/S0004370212000239. doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2012</year>
          .
          <volume>03</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Flouris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bikakis</surname>
          </string-name>
          ,
          <article-title>A comprehensive study of argumentation frameworks with sets of attacking arguments</article-title>
          ,
          <source>Int. J. Approx. Reason</source>
          .
          <volume>109</volume>
          (
          <year>2019</year>
          )
          <fpage>55</fpage>
          -
          <lpage>86</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ijar.
          <year>2019</year>
          .
          <volume>03</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , P. E. Dunne,
          <article-title>Computational problems in formal argumentation and their complexity</article-title>
          ,
          <source>in: Handbook of Formal Argumentation</source>
          , College Publications,
          <year>2018</year>
          , pp.
          <fpage>631</fpage>
          -
          <lpage>687</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. O</given-names>
            <surname>'Sullivan</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Razgon</surname>
          </string-name>
          ,
          <article-title>A fixed-parameter algorithm for the directed feedback vertex set problem</article-title>
          ,
          <source>J. ACM</source>
          <volume>55</volume>
          (
          <year>2008</year>
          )
          <volume>21</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          :
          <fpage>19</fpage>
          . URL: https://doi.org/ 10.1145/1411509.1411511. doi:
          <volume>10</volume>
          .1145/1411509.1411511.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorˇák</surname>
          </string-name>
          , M. Hecher,
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schidler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Szeider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Tractable abstract argumentation via backdoor-treewidth</article-title>
          ,
          <source>in: Proceedings of AAAI</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>5608</fpage>
          -
          <lpage>5615</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Abboud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>Popular Conjectures Imply Strong Lower Bounds for Dynamic Problems</article-title>
          , in: Proceedings of FOCS,
          <year>2014</year>
          , pp.
          <fpage>434</fpage>
          -
          <lpage>443</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Impagliazzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Paturi</surname>
          </string-name>
          ,
          <article-title>Complexity of k-SAT</article-title>
          , in: Proceedings of CCC,
          <year>1999</year>
          , pp.
          <fpage>237</fpage>
          -
          <lpage>240</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Impagliazzo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Paturi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zane</surname>
          </string-name>
          , Which Problems Have Strongly Exponential Complexity?,
          <source>in: Proceedings of FOCS</source>
          ,
          <year>1998</year>
          , pp.
          <fpage>653</fpage>
          -
          <lpage>662</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>