<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Stable Semantics for Epistemic Abstract Argumentation Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gianvincenzo Alfano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergio Greco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Parisi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Irina Trubitsyna</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Informatics, Modeling, Electronics and System Engineering (DIMES), University of Calabria</institution>
          ,
          <addr-line>Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>11</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>Dung's Abstract Argumentation Framework (AAF) has emerged as a central formalism in AI for modeling disputes among agents. A recent extension of the Dung's framework is the so-called Epistemic Abstract Argumentation Framework (EAAF), which enhances AAF by allowing the representation of some pieces of epistemic knowledge [1]. EAAF generalizes the concept of attack in AAF, introducing strong and weak epistemic attacks, whose intuitive meaning is that an attacked argument is epistemically accepted only if the attacking argument is possibly or certainly rejected, respectively. The semantics of EAAF has been de ned and studied for several argumentation semantics but not for the stable one, which is arguably one of the most investigated semantics in argumentation. Motivated by this, in this paper, we propose an intuitive stable semantics for EAAF that naturally extends that for AAF and coincides with the preferred semantics in the case of odd-cycle free EAAFs (analogously to what happens in the case of AAF). We analyze the complexity of two argumentation problems: existence, i.e. checking whether there is at least one epistemic extension; and acceptance, i.e. checking whether an argument is epistemically accepted.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the last decades, Argumentation [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2, 3, 4</xref>
        ] has become an important research eld in the area
of autonomous agents and multi-agent systems [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Argumentation has applications in several
contexts, including modeling dialogues, negotiation [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ], and persuasion [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It has been widely
used to model agents’ interactions [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9, 10, 11, 12</xref>
        ], especially in the context of debates [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ].
      </p>
      <p>
        Dung’s Abstract Argumentation Framework (AAF) is a simple yet powerful formalism for
modeling disputes between two or more agents [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. An AAF consists of a set of arguments
and a binary attack relation over the set of arguments that speci es the interactions between
arguments: intuitively, if argument a attacks argument b, then b is acceptable only if a is not.
Hence, arguments are abstract entities whose status is entirely determined by the attack relation.
An AAF can be seen as a directed graph, whose nodes represent arguments and edges represent
attacks. Several argumentation semantics—e.g. grounded (gr), complete (co), preferred (pr), and
stable (st) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]—have been de ned for AAF, leading to the characterization of -extensions, that
intuitively consist of the sets of arguments that can be collectively accepted under semantics
{gr, co, pr, st}.
      </p>
      <p>Example 1. Consider an AAF = {a, b}, {(a, b), (b, a)} whose corresponding graph is shown
in Figure 1(left). describes the following scenario. A party planner invites Alice (a) and Bob
(b) to join a party. Due to their old rivalry (i) Alice replies that she will not join the party if
Bob does, and (ii) Bob replies that he will not join the party if Alice does. This situation can be
modeled by AAF , where an argument x states that “(the person whose initial is) x joins the
party”. Under the stable semantics, there are two extensions E1 = {a} and E2 = {b} stating
that only Alice or only Bob will attend the party, respectively.</p>
      <p>
        Thus, as prescribed by E1 and E2, in the previous example we have that the participation
of Alice and Bob to the party is uncertain. To deal with uncertain information represented by
the presence of multiple extensions, credulous and skeptical reasoning has been introduced.
Speci cally, an argument is credulously true (or accepted) if there exists an extension containing
the argument, whereas an argument is skeptically true if it occurs in all extensions. However,
uncertain information in AAF under multiple-status semantics proposed so far cannot be
exploited to determine the status of arguments (which in turn in uences the status of other
arguments) by taking into account the information given by the whole set of extensions, as
in the case of credulous and skeptical acceptance. To overcome such a situation, and thus
provide a natural and compact way for expressing such kind of conditions, the use of epistemic
arguments and attacks has been recently proposed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], leading to the de nition of the
socalled Epistemic Abstract Argumentation Framework (EAAF) which enhances AAF by allowing
the representation of some pieces of epistemic knowledge. Informally, epistemic attacks allow
considering all extensions and not only the current one. Thus, an epistemic attack from a to b
is such that a defeats b if a occurs in at least one extension (strong epistemic attack) or in all
extensions and at least one (weak epistemic attack), as illustrated in the following example.
Example 2. Consider the AAF of Example 1 and assume that there are two more people:
Carol (c) and David (d). Carol’s answer is that she will not attend the party if it is sure (i.e. it
is skeptically true) that Alice will, whereas David answers that he will not attend the party if
the participation of Bob is possible (i.e. it is credulously true). Intuitively, the party planner
should conclude that, as the participation of both Alice and Bob is uncertain, Carol will attend
the party, whereas David will not.
      </p>
      <p>
        This situation can be modeled by means of the Epistemic AAF (EAAF) shown in Figure 1(right)
where a defeats c with a weak epistemic attack, whereas b defeats d with a strong epistemic
attack (we use the two kinds of edges represented in the gure to denote weak and strong
epistemic attacks). Under the stable semantics, there are two extensions: E1 = {a, c} modeling
the fact that Alice and Carol will attend the party, whereas Bob and David will not; and
E2 = {b, c} modeling the fact that Bob and Carol will attend the party, whereas Alice and
David will not. Observe that the epistemic arguments c and d (i.e. the arguments defeated by
an epistemic attack) are deterministic [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], that is, they have the same acceptance status in all
extensions (true for c and false for d).
Contributions. We introduce the stable semantics for Epistemic Abstract Argumentation
Frameworks (EAAFs) and investigate the complexity of two fundamental problems (see below).
The proposed EAAF semantics aims to let epistemic arguments be deterministic [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], that is,
they have the same acceptance status in all extensions; the status of an argument depends on
the credulous or skeptical acceptance of its attackers. Considering the dependence of the status
of an argument on its attackers only is inspired by the well-known directionality property
proposed for AAF [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ], which, if satis ed, then guarantees that the status of each argument
depends only on that of its attackers. Speci cally, our main contributions are as follows.
• We formally present EAAF stable semantics; it extends that of AAF and coincides with EAAF
preferred semantics in case of odd-cycle free EAAFs (as it happens for the case of AAF).
• We investigate the complexity of the acceptance and existence problems under stable semantics
      </p>
      <p>Our complexity results are summarized in Table 2 (in Section 4).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>We rst review the Dung’s framework and then discuss and an extension of AAF with epistemic
constraints.</p>
      <sec id="sec-2-1">
        <title>2.1. Abstract Argumentation Framework</title>
        <p>
          An Abstract Argumentation Framework (AAF) is a pair A, , where A is a ( nite) set of
arguments and A A is a set of attacks (also called defeats). Di erent argumentation
semantics have been proposed for AAF, leading to the characterization of collectively acceptable
sets of arguments called extensions [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>Given an AAF = A, and a set S A of arguments, an argument a A is said to be i)
defeated w.r.t. S i b S such that (b, a) ; ii) acceptable w.r.t. S i b A with (b, a) ,
c S such that (c, b) . The sets of defeated and acceptable arguments w.r.t. S are de ned
as follows (where is understood):
• Def(S) = {a A | b S . (b, a) };
• Acc(S) = {a A | b A . (b, a) implies b Def(S)}.</p>
        <p>To simplify the notation, we will often use S+ to denote Def(S).</p>
        <p>Given an AAF A, , a set S
• con ict-free i S S+ = ;
• admissible i it is con ict-free andS Acc(S).</p>
        <p>Given an AAF A, , a set S A is an extension called:</p>
        <sec id="sec-2-1-1">
          <title>A of arguments is said to be:</title>
          <p>• complete (co) i it is con ict-free andS = Acc(S);
• preferred (pr) i it is a -maximal complete extension;
• stable (st) i it is a total complete extension, i.e. a complete extension such thatS
S+ = A;
• grounded (gr) i it is the -smallest complete extension.</p>
          <p>The set of complete (resp. preferred, stable, grounded) extensions of an AAF will be denoted
by co() (resp. pr() , st() , gr() ). It is well-known that the set of complete extensions
forms a complete semilattice w.r.t. , where gr() is the meet element, whereas the greatest
elements are the preferred extensions. All the above-mentioned semantics except the stable
admit at least one extension. The grounded semantics, that admits exactly one extension, is said
to be a unique-status semantics, while the others are said to be multiple-status semantics. With
a little abuse of notation, in the following we also use gr() to denote the grounded extension.
For any AAF , st() pr() co() and gr() co() .</p>
          <p>Example 3. Let = A, be an AAF where A = {a, b, c} and = {(a, b), (b, a), (b, c)},
whose graph is show in Figure 2 (left). The set of complete extensions of is co() = {E0 =
, E1 = {a, c}, E2 = {b}}. E0 is the grounded extension, while E1 and E2 are preferred and
stable extensions.</p>
          <p>Given an AAF = A, and a semantics {gr, co, pr, st}, for g A, the credulous
(resp. skeptical) acceptance problem, denoted as CA (resp. SA ) is deciding whether g is
credulously (resp. skeptically) accepted, that is deciding whether g belongs to any (resp. every)
-extension of . Clearly, CAgr and SAgr coincide.</p>
          <p>
            Recently, a satisfaction problem for AAF called determinism (DS ) has been introduced [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
Given a -extension E, an argument g A is said to be: accepted if g E; rejected if g E;
undecided otherwise (g E E+). For a semantic , an argument is said to be deterministic if
all -extensions assign the same status (either accepted, rejected, or undecided) to it.
          </p>
          <p>Finally, the existence (resp. non-empty existence) problem denoted as Ex (resp. Ex¬ ) is
deciding whether there exists at least one (resp. at least one non-empty) -extension for AAF .</p>
          <p>
            For AAFs, the complexity of the existence and acceptance problems has been investigated
(see [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ] for an overview). The complexity of the determinism problem is investigated in [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ].
The complexity results of these problems are summarized in the left-hand side part of Table 2.
Example 4. Consider the AAF of Example 3. Under preferred and stable semantics, both
arguments a and b are credulously accepted. None of them is skeptically accepted, nor
deterministic.
          </p>
          <p>Considering the AAF obtained from by adding the self-attack (c, c) (see Figure 2 (right)),
there are three complete extensions E0 = , E1 = {a} and E2 = {b}. Both E1 and E2 are
preferred extensions, but only E2 is stable.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. AAF with Epistemic Constraints</title>
        <p>
          An Epistemic Argumentation Framework (EAF) has been proposed in [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. An EAF is a triple
A, , C , where A, is an AAF and C is an epistemic constraint, that is, a propositional
formula extended with the modal operators K and M. Here, the constraint is the belief of an
agent which must be satis ed. Intuitively,K (resp. M ) states that the considered agent
believes that is always (resp. possibly) true. EAF semantics is given by sets of feasible
extensions of the underlying AAF, called -extension sets ( -labeling sets in [
          <xref ref-type="bibr" rid="ref1 ref21">21, 1</xref>
          ]), consisting
of maximal sets of arguments that satis es the constraint. There could be di erent -extension
sets ( -sets) for the same epistemic formula, as shown in the following example.
Example 5. Consider the AAF = A = {a, b, c, d}, = {(a, b), (b, a), (c, d), (d, c), (b, c)
having 5 complete extensions E0 = , E1 = {a}, E2 = {a, c}, E3 = {a, d} and E4 = {b, d}.
E0 is the grounded extension, while E2, E3 and E4 are preferred and stable extensions. Under
the preferred semantics, considering the epistemic constraint C1 = Kc, there exists a unique
set {E2} for EAF A, , C1 , whereas considering C2 = Kc Kd there are the two alternative
-sets {E2} and {E3, E4} for EAF A, , C2 .
        </p>
        <p>
          We point out that despite the name Epistemic Argumentation Framework is used, the role of
epistemic formulae is only that of introducing constraints over the set of feasible extensions,
that is it is similar to that of constraints or preferences in AAF [
          <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26">22, 23, 24, 25, 26</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Epistemic Abstract Argumentation Framework</title>
      <p>We augment AAF with epistemic attacks, leading to the concept of Epistemic Abstract
Argumentation Framework (EAAF).</p>
      <sec id="sec-3-1">
        <title>3.1. Syntax</title>
        <sec id="sec-3-1-1">
          <title>We start by recalling the syntax of EAAF [1].</title>
          <p>De nition 1 (Epistemic AAF). An Epistemic AAF is a quadruple =
set of arguments, A A is a set of (standard) attacks, A
attacks, and A A is a set of strong (epistemic) attacks such that</p>
          <p>A, , , where A is a
A is a set of weak (epistemic)
= = = .</p>
          <p>In the following, we represent attacks (a, b) by a b, (a, b) by a b, (a, b)
by a b. An EAAF A, , , can be seen as a directed graph, where A denotes the set of
nodes and , , and denotes three di erent kinds of edges. Arguments defeated through
epistemic attacks are called epistemic arguments.</p>
          <p>We say that there is a path from an argument a A to argument b A if either (i) there
exists an attack (a, b) in or (ii) there exists an argument c A and two paths, from a to c
and from c to b. We say that an argument b A depends on an argument a A if b is reachable
from a in , that is, if there exists a path from a to b in . Moreover, an argument a depends
on attack ( ) if there exists a path in that contains and reaches a.</p>
          <p>We now introduce well-formed and plain EAAFs.</p>
          <p>De nition 2. An EAAF</p>
          <p>is said to be:
• well-formed if there are no cycles in</p>
          <p>with epistemic edges.
• in plain form if every epistemic argument is attacked by a single (epistemic) attack.
a
b
c
d
e
f
a
b
a
b
c
a
b
d
e
f
,
and
of Example 9.</p>
          <p>In the following we assume that our EAAFs are well-formed. The reason for such a restriction is
to guarantee that there exists at most one world view (c.f. Theorem 1). In the following we also
assume that our EAAFs are in plain form. As it will be clear after introducing EAAF semantics,
for well-formed EAAFs in plain form, epistemic arguments are deterministic (c.f. Proposition 2).
Example 6. The EAAF = A = {a, b, c, d}, = {(a, b), (b, a)}, = {(a, c)}, =
{(b, d} of Example 2, whose graph is shown in Figure 1 (right), is well-formed and in plain
form.</p>
          <p>The semantics of EAAF is given by relying on the concept of sub-framework (sub-EAAF),
which is de ned as follows.</p>
          <p>De nition 3. Given two EAAFs and , we say that is a sub-EAAF of (denoted as
) if is obtained from by deleting a subset S of the set of epistemic arguments of
and all the arguments depending on an argument in S w.r.t. . Moreover, we write if
and = .</p>
          <p>Clearly, in De nition3 by deleting arguments we also delete attacks having as a source or
target element a deleted argument.</p>
          <p>Example 7. Consider the EAAF = {a, b, c, d, e, f}, {(a, b), (b, a), (a, e), (d, f), (e, f),
(f, e)}, {(a, c)}, {(b, d)} shown in Figure 3 (left). We have four sub-EAAFs , as shown
in the gure: the rst one (from left to right) coincides with , the others are obtained by
deleting all arguments depending on: (i) both arguments c and d, (ii) only d, and (iii) only c,
respectively.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Semantics</title>
        <p>We rst introduce thestable semantics of EAAF and then present some results concerning
properties of the proposed framework.</p>
        <p>For any EAAF = A, , , , a set W of sets of arguments in A is called world view of
. Informally, a world view can be seen as a set of extensions that are to be used to compute
the status of epistemic arguments. Given EAAF = A , , , , we denote by
W = {S A | S W } the projection of W over A .</p>
        <p>With the aim of providing EAAF semantics by extending AF semantics, we rst extend
the de nitions of defeated and acceptable arguments for EAAF by taking into account the
additional concept of world view, that is a candidate set of extensions, which is used to decide if
an argument is epistemically defeated/acceptable. Given an EAAF , a world view W of ,
and a set S
follows:
• Def (W, S) = {b
• Acc(W, S) = {b</p>
        <p>A | ( a
( T
( T
A | a
((a
((a
((a</p>
        <p>S . a
W . a
W . a
b)</p>
        <p>T . a</p>
        <p>T . a
A .</p>
        <p>b) implies a
b) implies
b) implies
b)
b)}.</p>
        <p>T
T</p>
        <p>Def (W, S))</p>
        <p>W . a Def (W, T ))</p>
        <p>W . a Def (W, T )).</p>
        <p>W , the sets of arguments defeated (resp. accepted) w.r.t. S and W are de ned as
Example 8. Considering the EAAF of Example 7 and the world view W = {S1 = {c},
S2 = {a, c}, S3 = {b, c}}, we have that:
• Def (W, S1) = {d}</p>
        <p>and Acc(W, S1) = {c};
• Def (W, S2) = {b, d} and Acc(W, S2) = {a, c}; and
• Def (W, S3) = {a, d} and Acc(W, S3) = {b, c}.</p>
        <p>Given an EAAF =</p>
        <p>A, , ,
and a world view W of , a set S</p>
        <p>W is:
• W-con ict-free if S</p>
        <p>Def (W, S) = ;
• W-admissible if it is W-con ict-free andS</p>
        <p>Acc(W, S);
• W-complete (W -co) if it is W-con ict-free andS = Acc(W, S).</p>
        <sec id="sec-3-2-1">
          <title>Moreover, a W-complete set S is said to be :</title>
          <p>• W-preferred (W -pr) if S is -maximal;
• W-stable (W -st) if S</p>
          <p>Def (W, S) = A;
• W-grounded (W -gr) if S is -minimal.</p>
          <p>
            We are now ready to de ne EAAF semantics.The meaning of EAAF under the grounded,
complete and preferred semantics has been introduced in [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. For the sake of completeness and
to easy readability we include those semantics in the next de nition, where the meaning of
EAAF under stable semantics is de ned by generalizing the de nition in1[].
          </p>
        </sec>
        <sec id="sec-3-2-2">
          <title>De nition 4 (EAAF Semantics). Let</title>
          <p>of EAAF . Then, W is a -world view for
{gr, co, pr, st} be a semantics and W a world view</p>
          <p>if the following conditions hold:
(i) every S</p>
          <p>W
is a W</p>
          <p>- set, and
(ii) there is no world view W
.</p>
          <p>for
such that W</p>
          <p>W
and every S</p>
          <p>W is W - for
{ , {a}, {b}} {{a}, {b}}
{{c}, {a, c}, {b, c}} {{a, c}, {b, c}}
{ , {f}, {a, f}, {b}, {b, e}, {b, f}} {{a, f}, {b, e}, {b, f}}
{{c}, {c, f}, {a, c, f}, {b, c}, {b, c, e}, {b, c, f}} {{a, c, f}, {b, c, e}, {b, c, f}}</p>
          <p>
            We now explain De nition4. Given a semantics , a W - set intuitively represents a candidate
set of -extensions for an EAAF. Then, such a set turns out to actually be a set of extensions
if the conditions in De nition4 hold, whose rationale is as follows. Given a world view W
of an EAAF , we check that for all sub-frameworks , every element S W = W is a
W - set (condition i) and W is maximal (condition ii). Intuitively, the rst condition ensures
that the status of an argument is con rmed in all sub-frameworks considered. The second
condition of De nition4 ensures that, if there is a larger -world view for which condition i)
holds, then we prefer to take it. That is, intuitively, we aim at having the whole set of extensions.
In [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ], it is shown that this set is unique under grounded, complete and preferred semantics.
Finally, as shown below in Example 9, checking that the above-mentioned conditions hold for
all sub-frameworks is important to avoid returning wrong conclusions (i.e., world views that
contradict our intuition).
          </p>
          <p>It is worth noting that whenever = = , we have that the de nitions of defeated and
acceptable arguments coincide with the ones de ned for AAF, that isDef ({S}, S) = Def (S)
and Acc({S}, S) = Acc(S). This lead to the following result that states that EAAF semantics
extends that of AAF.</p>
          <p>Proposition 1. Let =
the AAF corresponding to</p>
          <p>A, , , be a well-formed EAAF with = = , and = A,</p>
          <p>. Then, if st() = then st() is the only stable-world view of .</p>
          <p>Clearly, as stable semantics is not guaranteed to exist in AAF, the same holds in EAAF. Indeed,
as stated next, any well-formed EAAF has at most one stable world view.</p>
          <p>Theorem 1. Any well-formed EAAF admits at most one st-world view.</p>
          <p>For any (well-formed) EAAF and semantics {gr, co, pr, st} we use ()
the -world view of , and will often call its elements -extensions.
to denote
Example 9. Continuing with Example 7, Table 1 reports the -world view for each EAAF
in Figure 3 and {gr, co, pr, st}.</p>
          <p>Now, consider the EAAF (shown in Figure 3), the world view W = {S = {a}}, and the
stable semantics. If in De nition4 we had only focused on the given EAAF without looking
at its sub-frameworks, as S is a W -stable set and W is maximal (i.e., both conditions (i) and (ii)
of De nition4 are satis ed if focusing on only), we would have concluded that c is defeated.
However, we had expected that c would have been accepted. Indeed, according to De nition4,
the only stable-world view of is W = {{a, c}, {b, c}} (cf. Table 1). In fact, considering
the sub-framework (cf. Figure 3) obtained from by deleting the epistemic argument c,
the only stable-world view of is W = W = {{a}, {b}}, which using De nition4 allows
us to discard W = {{a}} from being a stable-world view of .</p>
          <p>According to the proposed EAAF semantics, epistemic arguments are deterministic, that
is, they have the same “truth assignment” in a world view, that in turn depends on either the
credulous or skeptical acceptance of its attackers.</p>
          <p>Proposition 2. Let = A, , , be an EAAF, and W the st-world view of . Then, any
epistemic argument x A is deterministic, that is, one of the following three conditions hold:
i) S W . x Acc(W, S);
ii) S W . x Def (W, S);
iii) S W . x (Acc(W, S) Def (W, S)).</p>
          <p>An alternative way to de nestable extensions for EAAF could be that of choosing among
complete extensions those that are total, as it is done for AAF. More in detail, given an EAAF
and its complete-world view W = co() , we could have de ned thestable-world view for as
st() = {S W | S Def (W, S) = A} ). This is di erent from what is done in De nition4
where to de ne ast-world view we start with a world view W that is not necessarily co() .
However, the above-mentioned alternative way to de nestable extensions for EAAF may lead
to counter-intuitive solutions, as shown in the following example.</p>
          <p>Example 10. Consider the EAAF = {a, b, c, d}, {(a, b), (b, a), (a, c), (b, c)}, {(c, d)}, ,
shown in Figure 4, and the stable semantics. Intuitively, the strong epistemic attack states that
d is accepted if c is skeptically rejected. The stable extensions of , that is, the elements in
its st-world view are {a, d} and {b, d}. Thus, we obtain that c is skeptically defeated and,
consequently, d is accepted.</p>
          <p>However, if we start with the complete-world view co() , we have that there are three
complete extensions S1 = , S2 = {a} (with b and c defeated and d undecided) and S3 = {b}
(with a and c defeated and d undecided). As there are no total sets in co() , we conclude that
under the above-mentioned “alternative” stable semantics there is no stable status for d and c ,
contradicting our intuition.</p>
          <p>As stated next, di erently from AAF,stable extensions are not guaranteed to be complete
extensions of EAAF. Related to this, even in AAF credulous and skeptical acceptance may give
di erent results under di erent semantics.</p>
          <p>Proposition 3. There exists an EAAF
such that S
st()
and S
co() .</p>
          <p>Particularly, consider the EAAF = {a, b, c, d, e, f}, {(a, b), (b, a), (a, c), (b, c), (c, d)},
{(d, e) (e, f)}, . With a little e ort, it ca be checked thatst() = {S1 = {a, d, f}, S2 =
{b, d, f}} and co() = { , {a, d}, {b, d}}, and thus neither S1 co() nor S2 co() .</p>
          <p>Finally, stable semantics coincides with preferred semantics in case of odd-cycle free EAAFs.
Proposition 4. Let
be a well-formed, odd-cycle free EAAF. Then, it holds that st() =
pr() .</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Complexity</title>
      <p>We investigate the complexity of two fundamental reasoning problems for EAAF under stable
semantics. In particular, we study the existence and credulous/skeptical acceptance problems,
that are often considered for analyzing the complexity of argumentation frameworks.</p>
      <p>
        We recall the main complexity classes used in this section and, in particular, the de nition
of the classes P, ph, ph and ph, with h 0 (see e.g. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]). For h &gt; 0: 0p = 0p = 0p = P ;
p p
1p = NP and 1p = coNP ; ph = P h 1 ; ph = NP h 1 , and ph = co ph. Herein, P C (resp.
NP C ) denotes the class of problems that can be solved in polynomial time using an oracle in the
class C by a deterministic (resp. non-deterministic) Turing machine. The class ph = ph[log n]
denotes the subclass of ph consisting of the problems that can be solved in polynomial time
bUDynphhp+dai1edretithtePeirsmSsttiPhaneAnisdcCtaoiEcrndjTaucunnordcmintipgophlnemxoaiftcyah-iphdtnh+eeec1oipsreieortfniocphpram+rso1isbnulgmemOptph(iinl+oon1gsphn,aw)nPecdSahlaPlasdAvteeCoctiEahsnia.otAnorpdaphrecolcebisliienomnpht+hipne1roclbaphlse.smHph+eiphn1scien1,.
D1p (or simply DP) denotes the class of the problems that are a conjunction of a problem in NP
and one in coNP . Under the standard complexity-theoretic assumptions, we have that NP
DP, coNP DP, and DP 2p.
      </p>
      <p>Given an EAAF = A, , , and a semantics
{gr, co, pr, st}:
• the existence (resp. non-empty existence) problem for EAAF, denoted as Ex (resp. Ex¬ )
consists in deciding whether there exists at least one (resp. at least one non-empty) -extension
S for ;
• the credulous (resp. skeptical) acceptance problem, denoted as CA (resp. SA ), consists in
deciding whether a given goal argument g A belongs to any (resp. every) -extension of .</p>
      <p>Observe that if argument g is epistemic, credulous and skeptical acceptance problems coincide
(cf. Proposition 2). Therefore, we call this problem epistemic acceptance and denote it as EA .</p>
      <p>The following fact states that the epistemic acceptance problem captures the credulous and
skeptical acceptance problems also for non-epistemic arguments under stable semantics.
Fact 1. Let =</p>
      <p>A, , ,
be an EAAF, g</p>
      <p>A any of its non-epistemic arguments. Then:
• CAst( , g) = EAst( , g ) with
• SAst( , g) = EAst( , g ) with
= A
= A
{g , g },
{g , g },
{(g, g )},
{(g, g )}, ,
{(g , g )},
{(g , g )} .</p>
      <p>Thus, asking for the credulous and skeptical acceptance of an argument g w.r.t. an EAAF
is equivalent to asking for the epistemic acceptance of a fresh epistemic argument g w.r.t. an
EAAF , that is obtained from by adding only a pair of attacks.</p>
      <p>For this reason and for the fact that epistemic arguments are deterministic (Proposition 2),
w.l.o.g. we study the complexity of existence and epistemic acceptance problems in EAAFs
(without considering credulous and skeptical acceptance that, as shown above, can be immediately
reduced to epistemic acceptance).</p>
      <p>The next theorem states the complexity of epistemic acceptance under stable semantics.
Theorem 2. EAst is DP-hard.</p>
      <p>The following corollary states that for EAAF the existence of at least one extension is not
always guaranteed, as for the case of AAF.</p>
      <p>Corollary 1. Exst coincides with Ex¬st and it is NP-hard.</p>
      <p>
        The results of this section, along with some related complexity results for AAF, are
summarized in Table 2. We have also reported the results for {gr, co, pr} which are from [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ];
those for st are new. We found that the complexity generally increases w.r.t. that of AAF for
the acceptance problems under stable semantics. This particularly holds if we compare the
complexity of EAst for EAAF with that of CAst and SAst for AAF . Finally, deciding
acceptance (resp. existence) in EAAF under stable semantics is at least hard as checking determinism
(resp. existence) in AAF. For future work we plan to close the complexity gap related to the
complexity of acceptance problems in EAAF under the di erent semantics.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Future Work</title>
      <p>
        Several proposals have been made to extend Dung’s framework with the aim of better modeling
the knowledge to be represented. The extensions include Bipolar AAF [
        <xref ref-type="bibr" rid="ref28 ref29">28, 29</xref>
        ], AAF with
recursive attacks and supports [
        <xref ref-type="bibr" rid="ref30 ref31 ref32">30, 31, 32</xref>
        ], Dialectical framework [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], Abstract Reasoning
Framework [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ], AAF with preferences [
        <xref ref-type="bibr" rid="ref35 ref36">35, 36</xref>
        ] and constraints [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ], as well extensions for
representing uncertain information, e.g. incomplete AAF [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] and probabilistic AAF [
        <xref ref-type="bibr" rid="ref38 ref39 ref40 ref41 ref42 ref43 ref44">38, 39, 40,
41, 42, 43, 44</xref>
        ].
      </p>
      <p>We have presented the stable semantics for Epistemic Abstract Argumentation Framework, a
generalization of Dung’s framework where epistemic attacks and arguments can be expressed.
We also provided complexity bounds for the existence and acceptance problems in EAAF under
the well-known stable argumentation semantics. Our complexity analysis shows that the
epistemic elements (i.e., epistemic attacks/arguments) impact on the complexity of some of the
problems considered. In general, it turns out that EAAF is more expressive than AAF.</p>
      <p>
        The idea of extending logic with epistemic constructs has been investigated also in the eld
of Answer Set Programming (ASP) [
        <xref ref-type="bibr" rid="ref45 ref46 ref47">45, 46, 47</xref>
        ]. Epistemic logic programs, rstly proposed in
[
        <xref ref-type="bibr" rid="ref45">45</xref>
        ], extend disjunctive logic programs under the stable model semantics with modal constructs
called subjective literals [
        <xref ref-type="bibr" rid="ref46 ref47 ref48 ref49">46, 48, 49, 47</xref>
        ]. The introduction of this extension was originally
motivated to correctly represent incomplete information in programs that have several stable
models. Using subjective literals, it is possible to check whether a literal is true in every or
some stable model of the program. These models in this context are also called belief sets, being
collected in a set called world view. The main idea was to expand the syntax and semantics of
Answer Set Programming by modal operators K and M where K holds if is true in all answer
sets of a program and M holds if is true in at least one answer set. Using this notation,
not Kp not K p would correspond to “the truth value of p is unknown” even in the presence
of multiple answer sets. In such a context, several problems are still open and they regard the
support required by stable models, as well as splitting properties that are satis ed by classical
ASP semantics, but not satis ed by epistemic ASP-based semantics [
        <xref ref-type="bibr" rid="ref49 ref50 ref51">50, 49, 51</xref>
        ].
      </p>
      <p>
        Although our focus is on argumentation, we believe that our results could be of interest
to the logic community. In fact, by exploiting the correspondence between AF and Logic
Programming [
        <xref ref-type="bibr" rid="ref52">52</xref>
        ], the proposed EAAF semantics could be seen as an alternative semantics
for a special class of epistemic logic programs whose complexity and computation can be
characterized by using our results.
      </p>
      <p>
        Future work will be devoted to considering other argumentation semantics such as the
semistable semantics. Another interesting direction for future work is exploring EAF in a dynamic
setting [
        <xref ref-type="bibr" rid="ref53 ref54 ref55 ref56 ref57 ref58 ref59">53, 54, 55, 56, 57, 58, 59</xref>
        ], where objective evidence (underlying AF) and subjective
beliefs (epistemic formulae) may change over time.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>We acknowledge the support of the PNRR project FAIR - Future AI Research (PE00000013),
Spoke 9 - Green-aware AI, under the NRRP MUR program funded by the NextGenerationEU.
This work was also funded by the Next Generation EU - Italian NRRP, Mission 4, Component
2, Investment 1.5, call for the creation and strengthening of ‘Innovation Ecosystems’, building
‘Territorial R&amp;D Leaders’ (Directorial Decree n. 2021/3277) - project Tech4You - Technologies
for climate change adaptation and quality of life improvement, n. ECS0000009. This work
re ects only the authors’ views and opinions, neither the Ministry for University and Research
nor the European Commission can be considered responsible for them.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Epistemic abstract argumentation framework: Formal foundations, computation and complexity</article-title>
          ,
          <source>in: Proc. of AAMAS</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>409</fpage>
          -
          <lpage>417</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          , Argumentation in arti cial intelligence,
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <year>2007</year>
          )
          <fpage>619</fpage>
          -
          <lpage>641</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          , I. Rahwan (Eds.),
          <source>Argumentation in Arti cial Intelligence</source>
          , Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hunter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <article-title>Towards arti cial argumentation</article-title>
          ,
          <source>Arti cial Intelligence Magazine</source>
          <volume>38</volume>
          (
          <year>2017</year>
          )
          <fpage>25</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shoham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Leyton-Brown</surname>
          </string-name>
          , Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations, Cambridge University Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dimopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Moraitis</surname>
          </string-name>
          , A uni ed and
          <article-title>general framework for argumentation-based negotiation</article-title>
          ,
          <source>in: Proc. of AAMAS</source>
          ,
          <year>2007</year>
          , p.
          <fpage>158</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dimopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mailly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Moraitis</surname>
          </string-name>
          ,
          <article-title>Argumentation-based negotiation with incomplete opponent pro les</article-title>
          ,
          <source>in: Proc. AAMAS</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1252</fpage>
          -
          <lpage>1260</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <article-title>Models of persuasion dialogue</article-title>
          ,
          <source>in: Argumentation in Arti cial Intelligence</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Serrurier</surname>
          </string-name>
          ,
          <article-title>Agents that argue and explain classi cations</article-title>
          ,
          <source>Auton. Agents Multi Agent Syst</source>
          .
          <volume>16</volume>
          (
          <year>2008</year>
          )
          <fpage>187</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Á. Carrera</surname>
            ,
            <given-names>C. A.</given-names>
          </string-name>
          <string-name>
            <surname>Iglesias</surname>
          </string-name>
          ,
          <article-title>A systematic review of argumentation techniques for multi-agent systems research</article-title>
          , Artif.
          <source>Intell. Rev</source>
          .
          <volume>44</volume>
          (
          <year>2015</year>
          )
          <fpage>509</fpage>
          -
          <lpage>535</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ontañón</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Plaza,</surname>
          </string-name>
          <article-title>An argumentation-based framework for deliberation in multi-agent systems</article-title>
          , in: Int. Workshop, ArgMAS, volume
          <volume>4946</volume>
          ,
          <year>2007</year>
          , pp.
          <fpage>178</fpage>
          -
          <lpage>196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sierra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Jennings</surname>
          </string-name>
          ,
          <article-title>Agents that reason and negotiate by arguing</article-title>
          ,
          <source>J. Log. Comput</source>
          .
          <volume>8</volume>
          (
          <year>1998</year>
          )
          <fpage>261</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>X.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>Agent strategies for aba-based information-seeking and inquiry dialogues</article-title>
          ,
          <source>in: Proc. of ECAI</source>
          , volume
          <volume>242</volume>
          ,
          <year>2012</year>
          , pp.
          <fpage>324</fpage>
          -
          <lpage>329</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>McBurney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <article-title>Dialogue games for agent argumentation</article-title>
          ,
          <source>in: Argumentation in Arti cial Intelligence</source>
          , Springer,
          <year>2009</year>
          , pp.
          <fpage>261</fpage>
          -
          <lpage>280</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          , G. Sartor,
          <article-title>Modelling reasoning with precedents in a formal dialogue game</article-title>
          ,
          <source>Artif. Intell. Law</source>
          <volume>6</volume>
          (
          <year>1998</year>
          )
          <fpage>231</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>P. M. Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Incomplete argumentation frameworks: Properties and complexity</article-title>
          ,
          <source>in: Proc. of AAAI</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>5451</fpage>
          -
          <lpage>5460</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          , G. Guida,
          <article-title>Scc-recursiveness: a general schema for argumentation semantics</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>168</volume>
          (
          <year>2005</year>
          )
          <fpage>162</fpage>
          -
          <lpage>210</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>On principle-based evaluation of extension-based argumentation semantics</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>171</volume>
          (
          <year>2007</year>
          )
          <fpage>675</fpage>
          -
          <lpage>700</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Computational problems in formal argumentation and their complexity</article-title>
          ,
          <source>FLAP</source>
          <volume>4</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C.</given-names>
            <surname>Sakama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Son</surname>
          </string-name>
          ,
          <article-title>Epistemic argumentation framework: Theory and computation</article-title>
          ,
          <source>J. Artif. Intell. Res</source>
          .
          <volume>69</volume>
          (
          <year>2020</year>
          )
          <fpage>1103</fpage>
          -
          <lpage>1126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Coste-Marquis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Devred</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marquis</surname>
          </string-name>
          ,
          <article-title>Constrained argumentation frameworks</article-title>
          ,
          <source>in: Proc. of (KR)</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>112</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Arieli</surname>
          </string-name>
          ,
          <article-title>Con ict-free and con ict-tolerant semantics for constrained argumentation frameworks</article-title>
          ,
          <source>J. Appl. Log</source>
          .
          <volume>13</volume>
          (
          <year>2015</year>
          )
          <fpage>582</fpage>
          -
          <lpage>604</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Abstract argumentation framework with conditional preferences</article-title>
          ,
          <source>in: Proc. of AAAI</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>6218</fpage>
          -
          <lpage>6227</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Preferences and constraints in abstract argumentation</article-title>
          ,
          <source>in: Proceedings of International Joint Conference on Arti cial Intelligence (IJCAI)</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bernreiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Abstract argumentation with conditional preferences</article-title>
          ,
          <source>in: Proc. of COMMA</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C. H.</given-names>
            <surname>Papadimitriou</surname>
          </string-name>
          , Computational complexity, Addison-Wesley,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>F.</given-names>
            <surname>Nouioua</surname>
          </string-name>
          ,
          <article-title>Afs with necessities: Further semantics and labelling characterization</article-title>
          ,
          <source>in: Proc. of SUM</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. W. N. van der Torre</surname>
          </string-name>
          ,
          <article-title>Modelling defeasible and prioritized support in bipolar argumentation</article-title>
          , Ann. Math. Artif. Intell.
          <volume>66</volume>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gottifredi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>An approach to abstract argumentation with recursive attack and support</article-title>
          ,
          <source>J. Appl. Log</source>
          .
          <volume>13</volume>
          (
          <year>2015</year>
          )
          <fpage>509</fpage>
          -
          <lpage>533</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gottifredi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Characterizing acceptability semantics of argumentation frameworks with recursive attack and support relations</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>262</volume>
          (
          <year>2018</year>
          )
          <fpage>336</fpage>
          -
          <lpage>368</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. F.</given-names>
            <surname>del Cerro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>Structure-based semantics of argumentation frameworks with higher-order attacks and supports</article-title>
          ,
          <source>in: Proc. of COMMA</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>G.</given-names>
            <surname>Brewka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Strass</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ellmauthaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Abstract dialectical frameworks revisited</article-title>
          ,
          <source>in: Proc. of IJCAI</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>803</fpage>
          -
          <lpage>809</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>On acceptance conditions in abstract argumentation frameworks</article-title>
          ,
          <source>Information Sciences 625</source>
          (
          <year>2023</year>
          )
          <fpage>757</fpage>
          -
          <lpage>779</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <article-title>Inferring from inconsistency in preference-based argumentation frameworks</article-title>
          ,
          <source>J. Autom. Reason</source>
          .
          <volume>29</volume>
          (
          <year>2002</year>
          )
          <fpage>125</fpage>
          -
          <lpage>169</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <article-title>A general account of argumentation with preferences</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>195</volume>
          (
          <year>2013</year>
          )
          <fpage>361</fpage>
          -
          <lpage>397</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>D.</given-names>
            <surname>Baumeister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Neugebauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rothe</surname>
          </string-name>
          ,
          <article-title>Acceptance in incomplete argumentation frameworks, Artif</article-title>
          . Intell. (
          <year>2021</year>
          )
          <fpage>103470</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <surname>P. M. Dung</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          <string-name>
            <surname>Thang</surname>
          </string-name>
          ,
          <article-title>Towards (probabilistic) argumentation for jury-based dispute resolution</article-title>
          ,
          <source>in: Proc. of COMMA</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>171</fpage>
          -
          <lpage>182</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Norman</surname>
          </string-name>
          ,
          <article-title>Probabilistic argumentation frameworks</article-title>
          ,
          <source>in: Proc. of TAFA</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hunter</surname>
          </string-name>
          ,
          <article-title>Some foundations for probabilistic abstract argumentation</article-title>
          ,
          <source>in: Proc. of COMMA</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>128</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calautti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Explainable acceptance in probabilistic abstract argumentation: Complexity and approximation</article-title>
          ,
          <source>in: Proc. of KR</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fazzinga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Flesca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Furfaro</surname>
          </string-name>
          ,
          <article-title>Complexity of fundamental problems in probabilistic abstract argumentation: Beyond independence (extended abstract)</article-title>
          ,
          <source>in: Proc. of IJCAI</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>6362</fpage>
          -
          <lpage>6366</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fazzinga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Flesca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Furfaro</surname>
          </string-name>
          ,
          <article-title>Complexity of fundamental problems in probabilistic abstract argumentation: Beyond independence</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>268</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calautti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>Explainable acceptance in probabilistic and incomplete abstract argumentation frameworks</article-title>
          ,
          <source>Arti cial Intelligence</source>
          (
          <year>2023</year>
          )
          <fpage>103967</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gelfond</surname>
          </string-name>
          ,
          <article-title>Strong introspection</article-title>
          , in: T. L.
          <string-name>
            <surname>Dean</surname>
            ,
            <given-names>K. R.</given-names>
          </string-name>
          <string-name>
            <surname>McKeown</surname>
          </string-name>
          (Eds.),
          <source>Proc AAAI Conf</source>
          .,
          <year>1991</year>
          , pp.
          <fpage>386</fpage>
          -
          <lpage>391</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gelfond</surname>
          </string-name>
          ,
          <article-title>New semantics for epistemic speci cations</article-title>
          ,
          <source>in: Proc. of LPNMR Conf.</source>
          , volume
          <volume>6645</volume>
          ,
          <year>2011</year>
          , pp.
          <fpage>260</fpage>
          -
          <lpage>265</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Faber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gelfond</surname>
          </string-name>
          ,
          <article-title>Thirty years of epistemic speci cations</article-title>
          ,
          <source>Theory Pract. Log. Program</source>
          .
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <fpage>1043</fpage>
          -
          <lpage>1083</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>P.</given-names>
            <surname>Cabalar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. F.</given-names>
            <surname>del Cerro</surname>
          </string-name>
          ,
          <article-title>Autoepistemic answer set programming</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>289</volume>
          (
          <year>2020</year>
          )
          <fpage>103382</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>P.</given-names>
            <surname>Cabalar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fandinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. F.</given-names>
            <surname>del Cerro</surname>
          </string-name>
          ,
          <article-title>Splitting epistemic logic programs</article-title>
          ,
          <source>Theory Pract. Log. Program</source>
          .
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <fpage>296</fpage>
          -
          <lpage>316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Eiter</surname>
          </string-name>
          ,
          <article-title>Considering constraint monotonicity and foundedness in answer set programming</article-title>
          , in: L. D.
          <string-name>
            <surname>Raedt</surname>
          </string-name>
          (Ed.),
          <source>Proc. of IJCAI</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>2741</fpage>
          -
          <lpage>2747</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>A.</given-names>
            <surname>Herzig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yuste-Ginel</surname>
          </string-name>
          ,
          <article-title>On the epistemic logic of incomplete argumentation frameworks</article-title>
          ,
          <source>in: Proc. of KR</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>681</fpage>
          -
          <lpage>685</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Trubitsyna</surname>
          </string-name>
          ,
          <article-title>On the semantics of abstract argumentation frameworks: A logic programming approach</article-title>
          ,
          <source>Theory Pract. Log. Program</source>
          .
          <volume>20</volume>
          (
          <year>2020</year>
          )
          <fpage>703</fpage>
          -
          <lpage>718</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <article-title>Computing stable and preferred extensions of dynamic bipolar argumentation frameworks</article-title>
          ,
          <source>in: Proc. of the 1st Workshop on Advances In Argumentation In Arti cial Intelligence AI3</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>28</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. I.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Incremental computation for structured argumentation over dynamic delp knowledge bases, Artif</article-title>
          . Intell.
          <volume>300</volume>
          (
          <year>2021</year>
          )
          <fpage>103553</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <article-title>Computing extensions of dynamic abstract argumentation frameworks with second-order attacks</article-title>
          ,
          <source>in: Proc. of the 22nd International Database Engineering &amp; Applications Symposium (IDEAS)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <article-title>On scaling the enumeration of the preferred extensions of abstract argumentation frameworks</article-title>
          ,
          <source>in: Proceedings of ACM/SIGAPP Symposium on Applied Computing (SAC)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1147</fpage>
          -
          <lpage>1153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Parisi</surname>
          </string-name>
          ,
          <article-title>Incremental computation in dynamic argumentation frameworks</article-title>
          ,
          <source>IEEE Intell. Syst</source>
          .
          <volume>36</volume>
          (
          <year>2021</year>
          )
          <fpage>80</fpage>
          -
          <lpage>86</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Järvisalo, µ-toksia: An e cient abstract argumentation reasoner</article-title>
          ,
          <source>in: Proc. ofKR</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>800</fpage>
          -
          <lpage>804</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>G.</given-names>
            <surname>Alfano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <article-title>Incremental skeptical preferred acceptance in dynamic argumentation frameworks</article-title>
          ,
          <source>IEEE Intell. Syst</source>
          .
          <volume>36</volume>
          (
          <year>2021</year>
          )
          <fpage>6</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>