=Paper=
{{Paper
|id=Vol-3354/paper3
|storemode=property
|title=On Properties and Complexity of Incomplete Argumentation Framework
|pdfUrl=https://ceur-ws.org/Vol-3354/paper3.pdf
|volume=Vol-3354
|authors=Gianvincenzo Alfano,Sergio Greco,Francesco Parisi,Irina Trubitsyna
|dblpUrl=https://dblp.org/rec/conf/aiia/AlfanoGPT22
}}
==On Properties and Complexity of Incomplete Argumentation Framework==
On Properties and Complexity of Incomplete Argumentation Framework Gianvincenzo Alfano, Sergio Greco, Francesco Parisi and Irina Trubitsyna Department of Informatics, Modeling, Electronics and System Engineering (DIMES), University of Calabria, Rende, Italy Abstract Dungβs Argumentation Framework (AF) has been extended in several directions, including the possibility of representing unquantified uncertainty about the existence of arguments and attacks. The framework resulting from such an extension is called incomplete Argumentation Framework (iAF). In this paper, we discuss three satisfaction problems recently proposed for iAF, namely totality, determinism and functionality [1], and analyze their complexity under several semantics. We then show that any iAF can be rewritten into an equivalent one where either only (unattacked) arguments or only attacks are uncertain. Finally, we relate iAF to probabilistic argumentation framework, where uncertainty is quantified. Keywords Formal Argumentation Theory, Uncertainty, Computational Complexity. 1. Introduction Formal argumentation has emerged as one of the important fields in Artificial Intelligence [2, 3, 4]. In particular, Dungβs abstract Argumentation Framework (AF) is a simple yet powerful formalism for modeling disputes between two or more agents [5]. An AF consists of a set of arguments and a binary attack relation over the set of arguments that specifies the interactions between arguments: intuitively, if argument π attacks argument π, then π is acceptable only if π is not. Hence, arguments are abstract entities whose status is entirely determined by the attack relation. An AF can be seen as a directed graph, whose nodes represent arguments and edges represent attacks. Several argumentation semanticsβe.g. grounded (gr), complete (co), preferred (pr), stable (st) [5], and semi-stable (sst) [6]βhave been defined for AF, leading to the characterization of π-extensions, that intuitively correspond to the sets of arguments that can be collectively accepted under semantics π β {gr, co, st, pr, sst}. Various proposals have been made to extend the Dung framework with the aim of better modeling the knowledge to be represented [7, 8, 9, 10, 11, 12, 13, 14]. For the representation of uncertain information, two main extensions have been proposed: incomplete AF (iAF), where arguments and attacks may be uncertain [15, 16], and probabilistic AF (PrAF), where arguments and attacks are associated with a probability [17, 18, 19]. In this paper we focus on iAF, but we 6π‘β Workshop on Advances In Argumentation In Artificial Intelligence (AI3 2022), November 28- December 2, 2022, Udine, Italy $ g.alfano@dimes.unical.it (G. Alfano); greco@dimes.unical.it (S. Greco); fparisi@dimes.unical.it (F. Parisi); i.trubitsyna@dimes.unical.it (I. Trubitsyna) Β© 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) e e a b a b a b c d c d c d Figure 1: iAF Ξ of Example 1(left) and its completions Ξ1 (center) and Ξ2 (right). will also study its connection with PrAF. Example 1. Consider an iAF Ξ = β¨{a, b, c, d}, {e}, {(a, b), (b, a), (a, c), (b, d), (c, d), (d, c), (d, a), (e, a), (e, b)}, β β© whose corresponding graph is shown in Figure 1(left), where dashed nodes represent uncertain arguments (see Definition 1 for the formal definition). Ξ describes the following scenario. A party planner invites Alice, Bob, Carl, David, and Erik to join a party. Due to their old rivalry (i) Alice replies that she will join the party if Bob, David and Erik do not; (ii) Bob replies that he will join the party if Alice and Erik do not; (iii) Carl replies that he will join the party if Alice and David do not; (iv) David replies that he will join the party if Bob and Carl do not; and (v) Erik replies that he is not sure whether he can join the party. This situation can be modeled by iAF Ξ, where an argument x states that β(the person whose namesβ initial is) x joins the partyβ, and argument e =βErik joins the party" is uncertain. β‘ The semantics of an iAF is given by considering all completions, i.e. AFs obtained by removing consistent subsets of the uncertain elements, and for each completion its π-extensions under a given semantics π. The completions of iAF Ξ of Example 1 are the AF Ξ1 and Ξ2 shown in Figure 1, center and right-hand side respectively, where Ξ1 is the AF obtained from Ξ by keeping all the arguments and attacks, while completion Ξ2 is obtained from Ξ by removing the uncertain argument e and, consistently with this, attacks (e, a) and (e, b) starting from e. Since most of the argumentation semantics defined for AF are non-deterministic (i.e. multiple- status, as they prescribe more than one extension), the notions of credulous and skeptical acceptance have been defined. Thus, given a semantics π, an argument is credulously accepted if it occurs in at least one π-extension, whereas it is skeptically accepted if all π-extensions contain it. Acceptance problems have been recently extended to iAF: an argument is possibly credulously (resp. skeptically) accepted if there exists a completion where it is credulously (resp. skeptically) accepted; an argument is necessarily credulously (resp. skeptically) accepted if for all completions it is credulously (resp. skeptically) accepted. Contributions. Our main contributions are as follows. β We present three satisfaction problems for iAF called determinism (DS), totality (TS), and functionality (FS) (Section 3). Intuitively, totality tells us if an argument can be decided whatever the considered scenario (i.e. completion/world) is, while determinism tells us if we can safely make a decision in every scenario. Functionality combines totality and determinism and thus tells us if an argument can be firmly decided whatever the considered scenario is, that is if the information at hand is sufficient to make a decision in every possible scenario. β We investigate the complexity of the problems of checking determinism, totality, and function- ality for general iAF and odd-cycle free iAF (a summary of the results is reported in Table 1). β We show that an iAF Ξ can be rewritten into an βequivalentβ one Ξβ² , such that for every π-extension πΈ of Ξ, there is a π-extension πΈ β² of Ξβ² coinciding with πΈ, modulo some meta- arguments added in the rewriting (Section 4). Particularly, Ξβ² can be of one of the following forms: π) only arguments or only attacks are uncertain (Ξβ² is said to be an arg-iAF or att- iAF, respectively); or ππ) uncertainty is only on arguments that are not attacked by any other argument (Ξβ² is said to be an farg-iAF). We show that an arg-iAF can be translated into an farg-iAF. It can be shown that the results in Table 1 also hold for these restricted forms of iAFs. β Finally, we study the relationships between iAF and PrAF and relate the acceptance problems in iAF to probabilistic acceptance in PrAF (Section 5). We derive a PrAF corresponding a given iAF and show that computing the probability of acceptance of an argument is FP#P -hard even restricting to acyclic iAFs. We assume the reader is familiar with the complexity classes used in the paper [20]. 2. Preliminaries In this section we recall the (abstract) Argumentation Framework (AF) and the incomplete AF. 2.1. Argumentation Framework An abstract Argumentation Framework (AF) [5] is a pair β¨π΄, π β©, where π΄ is a set of arguments and π β π΄ Γ π΄ is a set of attacks. Given an AF Ξ = β¨π΄, π β© and a set π β π΄ of arguments, an argument π β π΄ is said to be i) defeated w.r.t. π iff there exists π β π such that (π, π) β π , and ii) acceptable w.r.t. π iff for every argument π β π΄ with (π, π) β π , there is π β π such that (π, π) β π . The sets of arguments defeated and acceptable w.r.t. π are as follows (where Ξ is understood): β’ Def(π) = {π β π΄ | βπ β π . (π, π) β π }; β’ Acc(π) = {π β π΄ | βπ β π΄ . (π, π) β π β π β Def(π)}. Given an AF β¨π΄, π β©, a set π β π΄ of arguments is said to be conflict-free iff π β© Def(π) = β . Moreover, a set π β π΄ is said to be a complete (co) extension iff it is conflict-free and π = Acc(π). A complete extension π β π΄ is said to be: β’ preferred (pr) iff it is β-maximal; β’ stable (st) iff it is a total preferred extension, i.e. a preferred extension such that π βͺ Def(π) = π΄; β’ semi-stable (sst) iff it is a preferred extension with a maximal set of decided elements; β’ grounded (gr) iff it is β-minimal. In the following, if not specified otherwise, π denotes any semantics in {gr, co, st, pr, sst}. For any AF Ξ and semantics π, π(Ξ) denotes the set of π-extensions of Ξ. All the above- mentioned semantics except the stable admit at least one extension (i.e. π(Ξ) ΜΈ= β ), and the grounded admits exactly one extension (i.e. |gr(Ξ)| = 1) [5, 6]. The grounded semantics is called deterministic (or unique status), whereas the other semantics are called non-deterministic (or multiple status). The stable semantics is said to be total as each argument belongs to either πΈ or Def(πΈ) (i.e. it is either true or false) for every extension πΈ. For any AF Ξ, it holds that st(Ξ) β sst(Ξ) β pr(Ξ) β co(Ξ), and gr(Ξ) β co(Ξ). An AF is acyclic (resp. odd-cycle free) if the associated graph is acyclic (resp. odd-cycle free). For acyclic AFs all the considered semantics coincide. In the following we consider the acceptability of argument literals (or simply literals). A literal is either an argument π or its negation Β¬π. A set of literals π is said to be consistent if it does not contain two literals π and Β¬π. We use Β¬π to denote the set {Β¬π | π β π}, and π * to denote π βͺ Β¬π. To deal with literals, we define the notion of fulfillment of an extension. Given an AF Ξ = β¨π΄, π β© and an extension πΈ for it, the fulfillment of πΈ is πΈ βͺ Β¬Def(πΈ). Clearly, the fulfillment of an extension is a consistent set of literals. Herein, arguments in πΈ are represented as positive literals (i.e. interpreted as true), while arguments defeated by πΈ are represented as negative literals (i.e. interpreted as false). In the rest of the paper, with a little abuse of notation, whenever we refer to an extension we mean its fulfillment. For any AF Ξ = β¨π΄, π β©, semantics π, and literal π β π΄* , we say that π is credulously (resp. skeptically) accepted (under semantics π), denoted as πΆπ΄π (Ξ, π) (resp. ππ΄π (Ξ, π)) if π belongs to at least a (resp. every) π-extension of Ξ. We use CAπ (resp. SAπ ), or simply CA (resp. SA) whenever π is understood, to denote the credulous (resp. skeptical) acceptance problem, that is, the problem of deciding whether a literal is credulously (resp. skeptically) accepted. Clearly, for the grounded semantics, which has exactly one extension, these problems are identical (i.e. CAgr β‘ SAgr ). Example 2. Consider the AF Ξ = β¨{a, b, c, d}, {(a, b), (b, a), (a, c), (b, c), (c, d), (d, c)}β©. Ξ has 4 complete extensions: πΈ0 = β , πΈ1 = {a, Β¬b, Β¬c, d}, πΈ2 = {Β¬a, b, Β¬c, d} and πΈ3 = {Β¬c, d}. That is, co(Ξ) = {πΈ0 , πΈ1 , πΈ2 , πΈ3 }. πΈ0 is the grounded extension, πΈ1 and πΈ2 are stable (preferred and semi-stable) extensions. Thus, a, b, d, as well as Β¬a, Β¬b, Β¬c, are credulously accepted for all semantics except the grounded; only d and Β¬c are skeptically accepted for stable, preferred and semi-stable semantics. β‘ 2.2. Incomplete Argumentation Framework We now recall the incomplete Argumentation Framework (iAF) [15]. Definition 1 (Incomplete AF). An incomplete Argumentation Framework (iAF) is a tuple Ξ = β¨π΄, π΅, π , π β©, where π΄ and π΅ are disjoint sets of arguments, and π and π are disjoint sets of attacks between arguments in π΄ βͺ π΅. Arguments in π΄ and attacks in π are said to be certain, while arguments in π΅ and attacks in π are said to be uncertain. Certain arguments in π΄ are definitely known to exist, while uncertain arguments in π΅ are not known for sure: they may occur or may not. Analogously, certain attacks in π are definitely known to exist if both the incident arguments exist, while for uncertain attacks in π it is not known for sure if they hold, even if both the incident arguments exist. An iAF compactly represents alternative AF scenarios, or possible worlds, called completions. Definition 2 (Completion). A completion for an iAF Ξ = β¨π΄, π΅, π , π β© is an AF Ξ = β¨π΄β² , π β² β© where π΄ β π΄β² β π΄ βͺ π΅ and π β© (π΄β² Γ π΄β² ) β π β² β (π βͺ π ) β© (π΄β² Γ π΄β² ). The set of completions of Ξ is denoted by ππππ(Ξ). An iAF β¨π΄, π΅, π , π β© is acyclic (resp. odd-cycle free) iff the AF β¨π΄ βͺ π΅, π βͺ π β© is acyclic (resp. odd-cycle free). To define acceptability and properties satisfaction of literals for iAFs, we refine the definition of fulfillment of extensions. Given an iAF Ξ = β¨π΄, π΅, π , π β© and an extension πΈ for a completion Ξ = β¨π΄β² , π β² β© of Ξ, the fulfillment of πΈ is πΈ βͺ Β¬π·ππ (πΈ) βͺ Β¬(π΅ β π΄β² ). Herein, arguments in πΈ are represented as positive literals (i.e. interpreted as true), while arguments attacked by πΈ as well as uncertain arguments not occurring in Ξ are represented as negative literals (i.e. interpreted as false). Example 3. The only preferred extension of the completion Ξ2 for the iAF Ξ of Example 1 is {b, c}, whose fulfillment is {Β¬a, b, c, Β¬d, Β¬e}. β‘ Acceptance problems. Credulous and skeptical acceptance for iAF have been recently proposed in [21], where the goal, i.e. the element for which acceptance is checked, is an argument. As we focus on fulfillment of extensions, our goal is a literal. Definition 3 (Possible/Necessary Credulous/Skeptical Acceptance). Let Ξ = β¨π΄, π΅, π , π β© be an iAF and π β {gr, co, st, pr, sst}. Then, a literal π β π΄* βͺ π΅ * is said to be: 1. possibly credulously accepted under π, denoted as ππΆπ΄π (Ξ, π), iff there exists a comple- tion Ξ of Ξ and a π-extension πΈ of Ξ such that π β πΈ; 2. possibly skeptically accepted under π, denoted as πππ΄π (Ξ, π), iff there exists a completion Ξ of Ξ such that π occurs in every π-extension of Ξ; 3. necessarily credulously accepted under π, denoted as ππΆπ΄π (Ξ, π), iff for every completion Ξ of Ξ, there exists a π-extension πΈ of Ξ such that π β πΈ; 4. necessarily skeptically accepted under π, denoted as πππ΄π (Ξ, π), iff for every completion Ξ of Ξ, π occurs in every π-extension of Ξ. We use PCAπ (resp. PSAπ , NCAπ , NSAπ ), or simply PCA (resp. PSA, NCA, NSA) whenever π is understood, to denote the problem of deciding acceptance according to Item 1 (resp. 2, 3, and 4) of Definition 3. For the grounded semantics we have PCAgr β‘ PSAgr and NCAgr β‘ NSAgr . Example 4. Consider the iAF Ξ = β¨{a, b, d}, {c}, {(a, b), (b, a)}, β β© shown in Figure 2 (left), where bidirectional arrows represent mutual attacks. Ξ has 2 completions: Ξ1 = β¨{a, b, d}, {(a, b), (b, a)}β© and Ξ2 = β¨{a, b, c, d}, {(a, b), (b, a)}β© (see Figure 2). Under semantics π β β² β²β² {st, pr, sst}, Ξ1 has the two extensions πΈ1 = {a, Β¬b, Β¬c, d} and πΈ1 = {Β¬a, b, Β¬c, d}; moreover, β² β²β² Ξ2 has the two extensions πΈ2 = {a, Β¬b, c, d} and πΈ2 = {Β¬a, b, c, d}. Thus, a, b, c, d, Β¬a, Β¬b, Β¬c satisfy PCA; c, d, Β¬c satisfy PSA; a, b, d,Β¬a,Β¬b satisfy NCA and only d satisfies NSA. β‘ a b a b a b c d d c d Figure 2: iAF Ξ of Example 4 (left) and its completions Ξ1 (center) and Ξ2 (right). 3. Totality, Determinism and Functionality In this section we present three satisfaction problems for iAF called determinism (DS), totality (TS), and functionality (FS) that have been recently proposed in [1]. Informally, an argument is said to be deterministic if in every completion all extensions assign the same status (either accepted, rejected, or undecided) to it. Moreover, an argument is said to be total, if for all extensions it is either accepted or rejected (i.e. it is never undecided). Totality is inspired by the criterion leading to stable semantics [5]. In fact, it requires the same property as the stable semantics but for a given goal argument (instead of all arguments). When both totality and determinism hold for a given argument, we say that it is functional. Thus, for iAF, totality tells us if an argument can be decided whatever the considered scenario (i.e. completion/world) is, while determinism tells us if we can safely make a decision in every scenario (completion). Functionality combines totality and determinism and thus tells us if an argument can be firmly decided whatever the considered scenario is, as shown in the following example. Example 5. Continuing with Example 1, suppose the party planner is interested to know if, what- ever Erik decides to do, he has sufficient information to decide whether or not Alice (resp. Bob) joins the party. The preferred (stable/semi-stable) extensions of Ξ1 and Ξ2 are {{c, e}, {d, e}} and {{b, c}}, respectively. As a and b are functional, the party planner concludes that a decision on the fact that Alice (resp. Bob) joins or not the party can be taken in both the scenarios that Erik joins or not the party. Note that such questions cannot be answered by possible/necessary credulous/skeptical accep- tance. In fact, a is functional but not possible credulously accepted, and b is functional but not necessary skeptically accepted. β‘ Definition 4 (Total, deterministic, functional literals). Let Ξ = β¨π΄, π΅, π , π β© be an iAF, π β {gr, co, st, pr, sst}, and π β π΄* βͺ π΅ * a goal literal. We say that π is: β’ total under π, denoted as π ππ (Ξ, π), if for each Ξ β ππππ(Ξ), i) π(Ξ) ΜΈ= β and ii) for each πΈ β π(Ξ), either π β πΈ or Β¬π β πΈ; β’ deterministic under π, denoted as π·ππ (Ξ, π), if for each Ξ β ππππ(Ξ), i) π(Ξ) ΜΈ= β , and ii) either ππ΄π (Ξ, π) or ππ΄π (Ξ, Β¬π) or (Β¬πΆπ΄π (Ξ, π) β§ Β¬πΆπ΄π (Ξ, Β¬π)); β’ functional under π, denoted as πΉππ (Ξ, π), if π is total and deterministic under π, that is, for each Ξ β ππππ(Ξ), i) π(Ξ) ΜΈ= β and ii) either ππ΄π (Ξ, π) or ππ΄π (Ξ, Β¬π). The next result immediately derives from definitions. Fact 1. Let Ξ be an iAF, π β {gr, co, st, pr, sst} and π a literal. We have that i) π π π (Ξ, π) β‘ π π π (Ξ, Β¬π), ii) π·π π (Ξ, π) β‘ π·π π (Ξ, Β¬π), and iii) πΉ π π (Ξ, π) β‘ πΉ π π (Ξ, Β¬π) hold. 1 d d d2 a b c a b c a b c a b c Figure 3: iAF Ξ of Example 6 (left), its completions Ξ1 and Ξ2 (center), and its derived PrAF Ξπ (right). Example 6. Consider the iAF Ξ = β¨π΄ = {a, b, c}, π΅ = {d}, π = {(a, b), (b, a), (b, c), (c, c), (d, a), (d, b)}, π = β β© reported in Figure 3, left side. Ξ has two completions Ξ1 = β¨π΄, π β {(d, a), (d, b)}β© and Ξ2 = β¨π΄ βͺ π΅, π β©, also shown in Figure 3 (center). For Ξ1 there are three complete extensions (recall that we refer to the fulfillments): πΈ0 = {Β¬d}, πΈ1 = {a, Β¬b, Β¬d} and πΈ2 = {Β¬a, b, Β¬c, Β¬d}. The grounded extension is πΈ0 , while πΈ1 is preferred, and πΈ2 is stable, preferred, and semi-stable. For Ξ2 there is only one complete extension πΈ3 = {Β¬a, Β¬b, d}, which is grounded, preferred, and semi-stable. The goal b is π) total only for semantics pr and sst (it is not total for st as Ξ2 does not have stable extensions) and ππ) deterministic for semantics gr, st and sst (it is not deterministic for pr as the two preferred extensions, πΈ1 and πΈ2 , of Ξ1 are such that πΈ1 contains Β¬b while πΈ2 contains b). Thus, b is functional for sst only. β‘ We use TSπ (resp. DSπ , FSπ ), or simply FS (resp. TS, DS) whenever π is understood, to denote the problem of deciding whether a literal is total (resp. deterministic, functional). The next proposition provides conditions under which unattacked arguments are functional. Proposition 1. For any iAF Ξ = β¨π΄, π΅, π , π β© and unattacked argument π β π΄ βͺ π΅, it holds that π is functional i) under semantics π β {gr, co, pr, sst}, and ii) under semantics π = st if Ξ is odd-cycle free. Thus, under semantics π β {co, gr, pr, sst}, every unattacked argument is total and deter- ministic. However, this does not hold for general iAFs under stable semantics, as there could be completions prescribing no extensions. We conclude this section by providing the complexity of the problems of deciding whether a literal is total, deterministic, and functional for the case of general and odd-cycle free iAFs. Theorem 1. For general/odd-cycle free iAFs, the complexity results of Table 1 hold. The odd-cycle free property guarantees that, except for the grounded and complete seman- tics, the complexity of checking determinism and functionality decreases by one level of the polynomial hierarchy whereas checking totality becomes trivial. 4. Equivalent Forms of iAFs In this section we show that iAFs can be rewritten into equivalent iAFs where uncertainty is restricted to either attacks or (unattacked) arguments. Definition 5. An iAF Ξ = β¨π΄, π΅, π , π β© is said to be argument-incomplete (arg-iAF for short) if π = β , whereas it is said to be attack-incomplete (att-iAF for short) if π΅ = β . (General) iAF odd-cycle free iAF π TS DS FS TS DS FS gr coNP-c trivial coNP-c coNP-c trivial coNP-c co coNP-c coNP-c coNP-c coNP-c coNP-c coNP-c st Ξ π2 -c Ξ π2 -c Ξ π2 -c trivial coNP-c coNP-c π π pr Ξ 2 -c Ξ 2 -c Ξ π2 -c trivial coNP-c coNP-c sst Ξ π2 -c Ξ π2 -c Ξ π2 -c trivial coNP-c coNP-c Table 1 Complexity of totality (TS), determinism (DS), and functionality (FS) problems for iAFs. For any complexity class π, π-c means C-complete. Given an iAF Ξ, we denote by πππ(Ξ) the arg-iAF derived from Ξ by replacing every uncertain attack (π, π) with the certain attacks (π, πΌππ ), (πΌππ , π½ππ ), (π½ππ , π), where πΌππ (resp. π½ππ ) is a fresh certain (resp. uncertain) argument. Analogously, we denote by ππ‘π‘(Ξ) the att-iAF derived from Ξ as follows: for each uncertain argument π, make π certain and add an uncertain attack (πΌ, π), where πΌ is a fresh certain argumentβ it is sufficient to add only one fresh argument πΌ. Example 7. Consider the iAF Ξ = β¨{b, c}, {a}, {(a, b), (b, a)}, {(b, c)}β© shown in Figure 4 (left). The arg-iAF derived from Ξ is Ξβ² = β¨{b, c, πΌbc }, {a, π½bc }, {(a, b), (b, a), (b, πΌbc ), (πΌbc , π½bc ), (π½bc , c)}, β β© shown in Figure 4 (center), whereas the att-iAF derived from Ξ is Ξβ²β² = β¨{b, c, a, πΌ}, β , {(a, b), (b, a)}, {(b, c), (πΌ, a)}β© shown in Figure 4 (right). β‘ The transformations described above to eliminate uncertain attacks/arguments are inspired by those to eliminate attacks/arguments with probability less than 1 in probabilistic AF [22]. We now introduce a special class of arg-iAFs. Definition 6. An arg-iAF Ξ = β¨π΄, π΅, π , β β© is said to be fact-uncertain (farg-iAF) iff β(π, π) β π , π ΜΈβ π΅. Observe that the iAF of Example 1 is an farg-iAF. Given an arg-iAF Ξ, ππππ(Ξ) denotes the farg-iAF derived from Ξ as follows: for each uncertain argument π which is attacked in Ξ, make π certain and add the attacks (ππ’ , ππ ), (ππ , π), where ππ (resp. ππ’ ) is a fresh certain (resp. uncertain) argument. With a little abuse of notation, for any iAF Ξ we use ππππ(Ξ) to denote ππππ(πππ(Ξ)). Example 8. Considering the iAF Ξ of Example 7, the derived farg-iAF π πππ(Ξ) is shown in Figure 5. The completions of π πππ(Ξ) are obtained by selecting all subsets of the set {aπ’ , π½bc π’ } of uncertain arguments. β‘ Given an iAF Ξ = β¨π΄, π΅, π , π β©, let π β {πππ, ππ‘π‘, π πππ}, for any Ξβ² = β¨π΄β² , π β² β© β ππππ(π(Ξ)), ππΞ (Ξβ² ) denotes the AF Ξβ²β² = β¨π΄β²β² , π β²β² β© β ππππ(Ξ) with: β’ π΄β²β² = π΄ βͺ ((π΅ β© π΄β² ) β {π | (πΌ, π) β π β² β¨ ππ’ ΜΈβ π΄β² }), and β’ π β²β² = (π β©(π΄β²β² Γπ΄β²β² )) βͺ ((π β©(π΄β²β² Γπ΄β²β² ))β{(π, π) | (π½ππ ΜΈβ π΄β² )β¨(π½ππ π β π΄β² β§π½ π’ ΜΈβ π΄β² )}. ππ a b c a b Ξ±bc Ξ²bc c Ξ± a b c Figure 4: iAF Ξ of Example 7 (left), arg-iAF Ξβ² derived from Ξ (center), and att-iAF Ξβ²β² derived from Ξ (right). a b Ξ±bc Ξ²bc c c u ac au Ξ²bc Ξ²bc Figure 5: Farg-iAF of Example 8. Herein, the set {π | (πΌ, π) β π β² β¨ ππ’ ΜΈβ π΄β² } is used to avoid considering arguments either (π) attacked by πΌ in ππππ(ππ‘π‘(Ξ)) or (ππ) always false in ππππ(π πππ(Ξ)) as ππ’ ΜΈβ π΄β² . Analogously, {(π, π) | (π½ππ ΜΈβ π΄β² ) β¨ (π½ππ π β π΄β² β§ π½ π’ ΜΈβ π΄β² )} is used to avoid considering uncertain attacks ππ that are chosen to not occur in either (π) ππππ(πππ(Ξ)), as π½ππ ΜΈβ π΄β² , or (ππ) ππππ(π πππ(Ξ)) π β π΄β² β§ π½ π’ ΜΈβ π΄β² ). as (π½ππ ππ Example 9. Consider the iAF Ξ of Example 7 and its farg-iAF ππππ(Ξ) of Example 8. For Ξ = β¨π΄ βͺ {au }, π β {(π½bcu , π½ c )}β© β ππππ(π πππ(Ξ)), containing the uncertain argument au but bc u not π½bc , ππΞ (Ξ) = β¨{a, b, c}, {(a, b), (b, a)}β© β ππππ(Ξ) that contains the uncertain argument a and does not contain the uncertain attack (b, c). β‘ Lemma 1. For any iAF Ξ and π β {πππ, ππ‘π‘, ππππ}, ππΞ : ππππ(π(Ξ)) β ππππ(Ξ) is a surjective function. The next theorem states the βequivalenceβ between iAFs and the iAFs derived by applying the previous mappings. Theorem 2. Let Ξ = β¨π΄, π΅, π , π β© be an iAF, π β {gr, co, st, pr, sst}, and π β {πππ, ππ‘π‘, ππππ}. Then, ππππ(Ξ) = {ππΞ (Ξ) | Ξ β ππππ(π(Ξ))}, and π(Ξβ² ) = {πΈ β© (π΄ βͺ π΅) | Ξ β ππππ(π(Ξ)) β§ Ξβ² = ππΞ (Ξ) β§ πΈ β π(Ξ)} βΞβ² β ππππ(Ξ). Thus, any iAF Ξ is equivalent to an arg-iAF (resp. farg-iAF, att-iAF) Ξβ² in the sense that there is mapping between the completions of π(Ξ) and the completions of Ξ, and for any pair of AFs for which the mapping holds, the two AFs have the same (modulo arguments added in the rewriting) set of π-extensions, for π β {gr, co, st, pr, sst}. This result entails that arg-iAFs (resp. farg-iAF, att-iAF) have the same expressivity of general iAFs, though arg-iAFs (resp. farg- iAF, att-iAF) have a simpler structure. The results of Theorem 2 with those of Theorem 1 entail that the complexity results for the problems of checking totality, determinism, and functionality for iAFs in Table 1 also hold for att-iAF, arg-iAF and f-arg-iAF. Finally, as shown next, the restricted forms of iAF allow to establish a tight connection between iAF and Probabilistic AF, and simplify the presentation as it suffices to focus on arg-iAF and an analogous form of restricted Probabilistic AF where only arguments are uncertain. 5. Relationship with Probabilistic Acceptance Probabilistic Argumentation Framework (PrAF) has been investigated in the recent years [18, 23, 24, 25, 26, 27, 28]. Incomplete AF is tightly connected to PrAF, as every completion of an iAF corresponds to a so-called possible world in PrAF. Here we highlight this relationship and relate acceptance problems in iAF, to probabilistic acceptance in PrAF. W.l.o.g. we focus on PrAF where only arguments are uncertain (and attacks are certain, i.e. their probability is 1), since as shown in [22] a PrAF with probabilities on arguments and attacks can be transformed into an equivalent PrAF where only arguments may have probability lower than 1 (that is, the probability of arguments is greater than 0 and lower than or equal to 1, while that of attacks is 1). Here, an argument π β π΄ is viewed as a probabilistic event that is independent from events associated with other arguments π β π΄ (with π ΜΈ= π). Analogously to what is said above, since any iAF is equivalent to an arg-iAF, w.l.o.g. in the following we consider arg-iAFs and denote them by triples β¨π΄, π΅, π β© (i.e. omitting the empty set of uncertain attacks). Definition 7 (PrAF). A Probabilistic Argumentation Framework (PrAF) is a triple β¨π΄, π , π β© where β¨π΄, π β© is an AF, and π is a function assigning a non-zero probability value to every argument in π΄, that is, π : π΄ β (0, 1]. Observe that assigning probability equal to 0 to arguments is useless. Basically, the value assigned by π to any argument π represents the probability that π actually occurs. Moreover, every attack (π, π) occurs with conditional probability 1, that is, π attacks π whenever both π and π occur. The meaning of a PrAF is given in terms of possible worlds. Given a PrAF β = β¨π΄, π , π β©, a possible world of β is an AF Ξ = β¨π΄β² , π β² β© such that π΄β² β π΄ and π β² = π β© (π΄β² Γ π΄β² ). We use ππ€(β) to denote the set of all possible worlds of β. An interpretation for a PrAF β = β¨π΄, π , π β© is a probability distribution function (PDF) πΌ over the set ππ€(β) of the possible worlds. Each Ξ = β¨π΄β² , π β² β© β ππ€(β) is assigned by πΌ probability πΌ(Ξ), where: βοΈ βοΈ πΌ(Ξ) = π (π) Β· (1 β π (π)). πβπ΄ πβπ΄βπ΄β² We now define a PrAF Ξπ encoding an iAF Ξ. Definition 8 (Derived PrAF). Given an arg-iAF Ξ = β¨π΄, π΅, π β©, the PrAF derived from Ξ is Ξπ = β¨π΄βͺπ΅, π , π β©, where π : π΄ βͺ π΅ β {1/2, 1} with π (π) = 1 for π β π΄ and π (π) = 1/2 for π β π΅. It is easy to check that, given an arg-iAF Ξ = β¨π΄, π΅, π β©, for every Ξ β ππ€(Ξπ ), πΌ(Ξ) is 1 equal to either 0 or 2|π΅| . As stated next, non-zero probability possible worlds of derived PrAF π Ξ one-to-one correspond to completions of Ξ. Proposition 2. For any arg-iAF Ξ, ππππ(Ξ) = {Ξ | Ξ β ππ€(Ξπ ) β§ πΌ(Ξ) > 0}. Example 10. Consider the arg-iAF Ξ of Example 6 (see Figure 3). The derived PrAF Ξπ = β¨π΄ βͺ π΅, π , π β©, with π (π₯) = 1 for π₯ β {a, b, c} and π (d) = 1/2, is shown in Figure 3 (right). There are only two possible worlds with probability greater than 0: Ξ1 = β¨π΄, π β {(d, a), (d, b)}β© and Ξ2 = β¨π΄ βͺ π΅, π β© with πΌ(Ξ1 ) = πΌ(Ξ2 ) = 1/2. β‘ Given a PrAF, the probabilistic acceptance provides the probability that a given goal is accepted [28]. Specifically, given a PrAF β, a semantics π, and a goal literal π, the probability βοΈassociating to every extension πΈ β π(Ξ), with Ξ β ππ€(β), that π is accepted can be computed by a probability π π(πΈ, Ξ, π) so that πΈβπ(Ξ) π π(πΈ, Ξ, π) = 1 (the sum of the probabilities of the π-extensions of Ξ is equal to 1). More in detail, a PrAF Ξπ derived from a given iAF Ξ is considered, and a PDF over the set π(Ξ) of the extensions of each possible world Ξ β ππ€(Ξπ ) is required. This means that the condition π(Ξ) ΜΈ= β must hold. To ensure this, in the rest of this section, if not specified otherwise, whenever we write semantics π and (arg-)iAF Ξ we mean that either i) π β {gr, co, pr, sst} and Ξ is an (arg-)iAF without restrictions or ii) π = st and Ξ is odd-cycle free; in the latter case, the existence of an extension is guaranteed since st(Ξ) = sst(Ξ) = pr(Ξ) ΜΈ= β for all Ξ β ππ€(Ξπ ). Definition 9 (Probabilistic Acceptance). Given an arg-iAF Ξ = β¨π΄, π΅, π β© and a literal π β π΄* βͺ π΅ * , the probability π ππ΄πΞ (π) that π is acceptable w.r.t. semantics π is: βοΈ π ππ΄πΞ (π) = πΌ(Ξ) Β· π π(πΈ, Ξ, π) Ξ β ππ€(Ξπ )β§ πΈ β π(Ξ) β§ π β πΈ where π π(Β·, Ξ, π) is a PDF over the set π(Ξ). Hereafter, we consider the uniform PDF assigning to every π-extension of Ξ the same proba- bility (1/π where π is the number of π-extensions). Our results still hold for other PDFs over π(Ξ), such as that used in [28]. Given an arg-iAF Ξ and a literal π, the problem of computing the value π ππ΄πΞ (π) (under a given semantics π) is denoted by PrAπ , or simply PrA whenever π is understood. We recall that PrAπ is defined after choosing an arbitrary but fixed PDF over the set of extensions. As stated next, PrAπ is FP#P -hard, regardless of the chosen PDF and semantics π. Theorem 3. PrAπ is FP#P -hard, even for acyclic arg-iAF and for any chosen PDF. We observe that, consistently with our intuition, the complexity of the probabilistic counterpart of the verification problem, that is computing the probability that a set of arguments is a π- extension for a PrAF [24], is not harder than that of PrAπ which focuses on acceptance. The following propositions highlight the relations between iAFs and PrAFs (with uniform PDF over extensions). Proposition 3. For any goal π, we have that: ππΆπ΄π (Ξ, π) is false iff π ππ΄πΞπ (π) = 0; and πππ΄π (Ξ, π) is true iff π ππ΄πΞπ (π) = 1. The connection between iAF and PrAF is also investigated in [16], where the PrAF associated to an iAF assigns a probability in (0, 1) to each uncertain argument. Moreover, PCA, PSA, NCA, and NSA are related to the concept of probabilistic credulous/skeptical acceptance [29], which is different from that of probabilistic acceptance of Definition 9. Indeed, the probability that an argument π is credulously (resp. skeptically) accepted is the sum of the probabilities of the possible worlds where π is credulously (resp. skeptically) accepted, according to a given semantics π. Hence, the probability of a world Ξ is added to the summation iff π belongs to at least one (resp. every) π-extension of Ξ. In contrast, with the aim of offering a more granular approach, Definition 9 uses the probabilities assigned to π-extensions by the PDF π π(Β·, Ξ, π). For instance, taking the PrAF Ξπ of Example 10 (see Figure 3), under the complete semantics the probabilistic skeptical (resp. credulous) acceptance of b is 0 (resp. 1/2), while π ππ΄co Ξπ (b) = 1/6 as b belongs to one of three extensions of one of the two worlds (see Example 11 below). Although the conditions of Proposition 3 are similar to those identified in [16], they refer to different notions of probabilistic acceptance. In fact, while probabilistic skeptical and credulous acceptance define an interval, Definition 9 provides a precise value in that interval. The next proposition considers acyclic arg-iAFs, a subclass of odd-cycle free iAFs. Proposition 4. Let Ξ = β¨π΄, π΅, π β© be an acyclic arg-iAF and π a goal. It holds that: β πππ΄π (Ξ, π) β‘ ππΆπ΄π (Ξ, π) and πππ΄π (Ξ, π) β‘ ππΆπ΄π (Ξ, π); 1 β πππ΄π (Ξ, π) is true iff π ππ΄πΞπ (π) β₯ 2|π΅| ; 1 β πππ΄π (Ξ, π) is false iff π ππ΄πΞπ (π) β€ 1 β 2|π΅| . Our last result relates the satisfaction of properties (e.g. totality) to probabilistic acceptance. π π βοΈ A goal π is total iff π ππ΄Ξ (π) + π ππ΄Ξ (Β¬π) = 1; and deterministic iff βΞ β Theorem 4. ππππ(Ξ), π π(πΈ, Ξ, π) = 1, where either: πΌ (π) πΌ = πΈ β π(Ξ) β§ π β πΈ or (ππ) πΌ = πΈ β π(Ξ) β§ Β¬π β πΈ or (πππ) πΌ = πΈ β π(Ξ) β§ (π ΜΈβ πΈ β§ Β¬π ΜΈβ πΈ). Example 11. Consider again the iAF of Example 6. Assuming a uniform distribution for the probabilities of extensions, the probabilistic acceptance of literals is as reported in the following table, where a grey cell means that the literal of the cellβs column is total, under the semantics of the cellβs row. a Β¬a b Β¬b c Β¬c d Β¬d gr 0 1/2 0 1/2 0 0 1/2 1/2 co 1/6 2/3 1/6 2/3 0 1/6 1/2 1/2 st 0 1/2 1/2 0 0 1/2 0 1/2 pr 1/4 3/4 1/4 3/4 0 1/4 1/2 1/2 sst 0 1 1/2 1/2 0 1/2 1/2 1/2 β‘ 6. Conclusions and Future Work We have presented the totality, determinism and functionality properties for iAFs, and provided complexity bounds for the problems of checking whether these properties hold under five well- known argumentation semantics [1]. Analogously to several other computational approaches in formal argumentation, these problems generally suffers from high computational complexity [30, 31, 32, 33, 28, 34, 35, 36, 37]. We have also identified equivalent forms of iAFs (in terms of extensions), investigated possible and necessary variants of the credulous and skeptical acceptance problems for iAFs. We have also explored the relationship between acceptance problems in iAFs and probabilistic acceptance in PrAFs. As future work we plan to consider other notions of acceptance that, as totality, determinism, and functionality, require the existence of an extension (e.g. skeptical acceptance under stable semantics requiring non-emptyness [38]). We envisage that SAT-based approaches for computing credulous and skeptical acceptance [39] could be used to define algorithms for checking function- ality, totality and determinism since these properties can be defined in terms of credulous and skeptical acceptance for AFs. More elaborated solutions need to be investigated for iAF. Con- sidering the connections between iAFs and Control AFs [40, 41, 42, 43], we plan to investigate totality, determinism, and functionality also in that context. Finally, it would be interesting to consider the concepts of totality, determinism, and functionality in the presence of some kinds of preferences, such as those in [10, 11, 14, 44, 45]. References [1] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Incomplete argumentation frameworks: Properties and complexity, in: Proc. of AAAI, 2022, pp. 5451β5460. [2] T. Bench-Capon, P. E. Dunne, Argumentation in artificial intelligence, Artif. Intell. 171 (2007) 619 β 641. [3] G. R. Simari, I. Rahwan (Eds.), Argumentation in Artificial Intelligence, Springer, 2009. [4] K. Atkinson, P. Baroni, M. Giacomin, A. Hunter, H. Prakken, C. Reed, G. R. Simari, M. Thimm, S. Villata, Towards artificial argumentation, AI Magazine 38 (2017) 25β36. [5] P. M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games, Artif. Intell. 77 (1995) 321β358. [6] M. Caminada, Semi-stable semantics, in: Proceedings of the 1st International Conference on Computational Models of Argument (COMMA), 2006, pp. 121β130. [7] A. Cohen, S. Gottifredi, A. J. Garcia, G. R. Simari, An approach to abstract argumentation with recursive attack and support, J. of Applied Logic 13 (2015) 509β533. [8] C. Cayrol, J. Fandinno, L. F. del Cerro, M. Lagasquie-Schiex, Structure-based semantics of argumentation frameworks with higher-order attacks and supports, in: Proc. of COMMA, 2018, pp. 29β36. [9] G. Brewka, H. Strass, S. Ellmauthaler, J. P. Wallner, S. Woltran, Abstract dialectical frameworks revisited, in: Proc. of IJCAI, 2013, pp. 803β809. [10] L. Amgoud, C. Cayrol, On the acceptability of arguments in preference-based argumentation, in: Proc. of UAI, 1998, pp. 1β7. [11] S. Modgil, H. Prakken, A general account of argumentation with preferences, Artif. Intell. 195 (2013) 361β397. [12] S. Coste-Marquis, C. Devred, P. Marquis, Constrained argumentation frameworks, in: Proc. of KR, 2006, pp. 112β122. [13] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, Argumentation frameworks with strong and weak constraints: Semantics and complexity, in: Proc. of AAAI, 2021, pp. 6175β6184. [14] G. Alfano, S. Greco, F. Parisi, I. Trubitsyna, On preferences and priority rules in abstract argumentation, in: Proc. of IJCAI, 2022, pp. 2517β2524. [15] D. Baumeister, D. Neugebauer, J. Rothe, H. Schadrack, Verification in incomplete argumen- tation frameworks, Artif. Intell. 264 (2018) 1β26. [16] D. Baumeister, M. JΓ€rvisalo, D. Neugebauer, A. Niskanen, J. Rothe, Acceptance in incomplete argumentation frameworks, Artif. Intell. (2021) 103470. [17] P. M. Dung, P. M. Thang, Towards (probabilistic) argumentation for jury-based dispute resolution, in: Proc. of COMMA, 2010, pp. 171β182. [18] H. Li, N. Oren, T. J. Norman, Probabilistic argumentation frameworks, in: Proc. of TAFA, 2011, pp. 1β16. [19] A. Hunter, Some foundations for probabilistic abstract argumentation, in: Proc. of COMMA, 2012, pp. 117β128. [20] C. H. Papadimitriou, Computational complexity, Addison-Wesley, 1994. [21] D. Baumeister, D. Neugebauer, J. Rothe, Credulous and skeptical acceptance in incomplete argumentation frameworks, in: Proc. of COMMA, 2018, pp. 181β192. [22] T. Mantadelis, S. Bistarelli, Probabilistic abstract argumentation frameworks, a possible world view, International Journal of Approximate Reasoning 119 (2020) 204β219. [23] T. Rienstra, Towards a probabilistic Dung-style argumentation system, in: Proc. of the International Conference on Agreement Technologies, 2012, pp. 138β152. [24] B. Fazzinga, S. Flesca, F. Parisi, On the complexity of probabilistic abstract argumentation frameworks, ACM Transactions on Computational Logic 16 (2015) 22:1β22:39. [25] B. Fazzinga, S. Flesca, F. Furfaro, Complexity of fundamental problems in probabilistic abstract argumentation: Beyond independence, Artificial Intelligence 268 (2019) 1β29. [26] B. Fazzinga, S. Flesca, F. Furfaro, Abstract argumentation frameworks with marginal probabilities, in: Proc. of IJCAI, 2022, pp. 2613β2619. [27] B. Fazzinga, S. Flesca, F. Furfaro, Probabilistic bipolar abstract argumentation frameworks: complexity results, in: Proc. of IJCAI, 2018, pp. 1803β1809. [28] G. Alfano, M. Calautti, S. Greco, F. Parisi, I. Trubitsyna, Explainable acceptance in probabilistic abstract argumentation: Complexity and approximation, in: Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning (KR), 2020, pp. 33β43. [29] B. Fazzinga, S. Flesca, F. Furfaro, Credulous and skeptical acceptability in probabilistic abstract argumentation: complexity results, Intelligenza Artificiale 12 (2018) 181β191. [30] W. DvorΓ‘k, M. JΓ€rvisalo, J. P. Wallner, S. Woltran, Complexity-sensitive decision procedures for abstract argumentation, Artificial Intelligence 206 (2014) 53β78. [31] M. KrΓΆll, R. Pichler, S. Woltran, On the complexity of enumerating the extensions of abstract argumentation frameworks, in: Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), 2017, pp. 1145β1152. [32] G. Alfano, S. Greco, F. Parisi, On scaling the enumeration of the preferred extensions of abstract argumentation frameworks, in: Proceedings of ACM/SIGAPP Symposium on Applied Computing (SAC), 2019, pp. 1147β1153. [33] G. Alfano, A. Cohen, S. Gottifredi, S. Greco, F. Parisi, G. R. Simari, Dynamics in abstract argumentation frameworks with recursive attack and support relations, in: Proceedings of the 24th European Conference on Artificial Intelligence (ECAI), 2020, pp. 577β584. [34] G. Alfano, S. Greco, Incremental skeptical preferred acceptance in dynamic argumentation frameworks, IEEE Intelligent Systems 36 (2021) 6β12. [35] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation of warranted arguments in dynamic defeasible argumentation: the rule addition case, in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (SAC), 2018, pp. 911β917. [36] G. Alfano, S. Greco, F. Parisi, Incremental computation in dynamic argumentation frame- works, IEEE Intell. Syst. 36 (2021) 80β86. [37] G. Alfano, S. Greco, F. Parisi, G. I. Simari, G. R. Simari, Incremental computation for structured argumentation over dynamic DeLP knowledge bases, Artificial Intelligence 300 (2021) 103553. [38] P. E. Dunne, M. Wooldridge, Complexity of abstract argumentation, in: Argumentation in Artificial Intelligence, Springer, 2009, pp. 85β104. [39] M. JΓ€rvisalo, SAT for argumentation, in: Proceedings of the International Workshop on Systems and Algorithms for Formal Argumentation (SAFA), volume 2171, 2018, pp. 1β3. [40] D. Neugebauer, J. Rothe, K. Skiba, Complexity of nonemptiness in control argumentation frameworks, in: Proc. of ECSQARU, 2021, pp. 117β129. [41] F. Gaignier, Y. Dimopoulos, J. Mailly, P. Moraitis, Probabilistic control argumentation frameworks, in: Proc. of AAMAS, 2021, pp. 519β527. [42] Y. Dimopoulos, J. Mailly, P. Moraitis, Control argumentation frameworks, in: Proceedings of the AAAI Conference on Artificial Intelligence, 2018, pp. 4678β4685. [43] A. Niskanen, D. Neugebauer, M. JΓ€rvisalo, Controllability of control argumentation frameworks, in: Proc. of IJCAI, 2020, pp. 1855β1861. [44] T. Lukasiewicz, E. Malizia, Complexity results for preference aggregation over (m)cp-nets: Pareto and majority voting, Artif. Intell. 272 (2019) 101β142. [45] T. Lukasiewicz, E. Malizia, Complexity results for preference aggregation over (m)cp-nets: Max and rank voting, Artif. Intell. 303 (2022) 103636.