<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Rhodes, Greece
jean-guy.mailly@u-paris.fr (J. Mailly)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jean-Guy Mailly</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Université Paris Cité</institution>
          ,
          <addr-line>LIPADE F-75006 Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>In this paper, we discuss the application of abstract argumentation mechanisms to resources allocation. We show how such problems can be modeled as abstract argumentation frameworks, such that speci c sets of arguments corresponds to interesting solutions of the problem. By interesting solutions, here we mean Local Envy-Free (LEF) allocations. Envy-freeness is an important notion of fairness in resources allocation, assuming than no agent should prefer the resource allocated to another agent. We focus on LEF, a generalized form of envy-freeness, and we show that LEF allocations corresponds to some speci c sets of arguments in our argument-based modeling of the problem. This work in progress paves the way to richer connections between the various models of argumentation and resources allocation problems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Abstract argumentation</kwd>
        <kwd>Resources allocation</kwd>
        <kwd>Fairness</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Fairness issues are important in multi-agent scenarios, including resources allocation. Among
the various fairness criteria, one of them is envy-freeness, i.e. the fact that no agent is envious of
another agent. A generalized version of envy-freeness is local envy-freeness (LEF) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where
agents are part of a social network, and the goal is to assign each agent one object such that none
of them is envious of one of her neighbours in the network. In this work, we study a
transformation from LEF problems to abstract argumentation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. We show that there is a correspondence
between LEF allocations and some speci c extensions of an argumentation framework built from
the LEF problem at hand. The representation of LEF problems as argumentation problems o ers
several advantages. First of all, there are plenty of e cient tools for computing extensions of
argumentation frameworks, which is not the case with LEF problems. Then, the argumentation
process can o er intuitive (and visual) explanations of why an allocation is LEF, or why there is
no such allocation. Finally, the vast literature on argumentation provides tools for other fairness
problems, or for identifying speci c allocations, e.g. weighted argumentation frameworks can
provide means to obtain optimal allocations (w.r.t. agents utility functions or w.r.t. the Pareto
criterion).
      </p>
      <p>Section 2 provides some background notions on LEF allocations and abstract argumentation.
Section 3 discusses our transformation from resources allocation problems to abstract
argumentation, and shows the relation between LEF allocations and speci c extensions. Finally
Section 4 concludes the paper by discussing some interesting questions for future work.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. Local Envy-Freeness</title>
        <p>
          We focus on a resource allocation scenario (previously studied in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]) where agents may know
some other agents, and have preferences over the set of resources that must be allocated. The
other hypotheses in our scenario are the fact that the number of agents is equal to the number
of resources, and the fact that resources are indivisible goods. Formally,
De nition 1. A preference-based allocation problem (PRAP) is a tuple P RAP =
O, N , , G :
• O = {o1, . . . , on} is the set of objects,
• N = {1, . . . , n} is the set of agents,
• is a set of binary relations { i| i N } where
        </p>
        <p>preferences of agent i over O,
• G = N, E is an undirected graph representing the social network of agents.
i is a linear order expressing the</p>
        <p>We are interested in the problem of local envy-freeness, i.e. whether we can assign each
agent i an object ok s.t. i does not prefer the object assigned to one of her neighbors, formally
j N s.t. {i, j} E, ol i ok, where ok and ol are (respectively) the object assigned to i and
the object assigned to j.</p>
        <p>To characterize formally this concept, we represent an allocation as a set of pairs (i, ok)
N O. Given such a pair x = (i, ok), we use Ag(x) and Obj(x) to denote respectively the
agent i and the object ok of this pair. An allocation is valid if for each x, y , if x = y
then Ag(x) = Ag(y) and Obj(x) = Obj(y), i.e. no agent receives several objects, and no
object is assigned to several agents. A valid allocation can be partial if | | &lt; |O|, and total if
| | = |O| = |N |.</p>
        <p>De nition 2. Given P RAP =
total valid allocation such that i, j</p>
        <sec id="sec-2-1-1">
          <title>O, N , , G , an allocation is local envy-free (LEF) i it is a</title>
          <p>N s.t. {i, j} E, if (i, ok), (j, ol) then ol i ok.</p>
          <p>Example 1. Figure 1a describes P RAP = O, N , , G where the agents are N = {A, B, C},
the objects are O = {1, 2, 3} with 1 representing some money, 2 a motorbike, and 3 a car. The social
network G is shown at the top of the Figure, and the agents preferences are given underneath.
We can easily nd a LEF allocation by giving each agent her preferred object.</p>
          <p>Now consider P RAP 2 given at Figure 1b, where this time all the agents know each other, and
agent C’s preferences are slightly modi ed as well. Assume there is a LEF allocation . Neither A
nor C can receive the object 1 (because otherwise the one receiving another object would be envious
of the one receving the object 1). Thus we must have (B, 1) . But in this case, both agents A
and C are envious of agent B. So there is no LEF allocation for P RAP 2.
A :
B :
C :
1
2
3
&gt;
&gt;
&gt;
(a) PRAP1
2
3
2
&gt;
&gt;
&gt;
3
1
1</p>
          <p>A :
B :
C :
1
2
1
&gt;
&gt;
&gt;
(b) PRAP2
2
3
3
&gt;
&gt;
&gt;
3
1
2</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Abstract Argumentation</title>
        <p>
          Now let us recall basic notions of Dung’s abstract argumentation [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>De nition 3. An abstract argumentation framework (AF) is a directed graph F =
A is the set of arguments and R A is the attack relation.</p>
        <p>A</p>
        <p>Classical reasoning with AF uses the notion of extensions, i.e. sets of arguments that can be
jointly accepted. Various semantics have been proposed to obtain the set of extensions of an
AF. Formally, an extension-based semantics is a function such that for any AF F = A, R ,
(F ) 2A. In this paper, we only need the notions of con ict-free sets and stable extensions:
where
A, R
De nition 4. Given F = A, R , S A is con ict-free (S cf(F )) if a, b S, (a, b) .R
Then, S is a stable extension (S stb(F )) if S cf(F ) and b A \ S, a S s.t. (a, b) R.</p>
        <p>
          Among the various generalizations of Dung’s argumentation framework, we are interested
in preference-based AFs (PAFs) [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
        </p>
        <p>De nition 5. A preference-based argumentation framework is a tuple P = A, R,</p>
        <sec id="sec-2-2-1">
          <title>A, R is an AF, and A is a preference relation over the set of arguments.</title>
          <p>A</p>
          <p>The preference relation is only assumed to be a pre-order, i.e. a re exive and transitive binary
relation. The main approach for reasoning with a PAF consists in reducing it into a standard AF
by combining the attacks and the preferences into a defeat relation. Then, the extensions of the
PAF for a semantics are the extensions of the defeat graph under the same semantics.
where
De nition 6. Given a PAF P =
x}. Then, (P ) = ( A, D ).</p>
          <p>A, R, , we de ne the defeat relation D = {(x, y)
R | y</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Translation into Abstract Argumentation</title>
      <p>In this section we show how to transform a PRAP into a PAF, such that there is a correspondence
between LEF allocations and some sets of arguments, namely con ict-free sets of size |N |, which
are guaranteed to be stable extensions as well in our case.
De nition 7. Given P RAP =</p>
      <p>O, N , , G , we de ne the PAF PLEF =</p>
      <p>A, R,
with
• A = {(i, oj ) | i
• R = R1 R2</p>
      <p>N, oj</p>
      <sec id="sec-3-1">
        <title>R3, with</title>
      </sec>
      <sec id="sec-3-2">
        <title>O} (one argument</title>
        <p>allocation of an object to an agent),
– R1 = {((i, oj ), (i, ok)) | i
– R2 = {((i, ok), (j, ok)) | i, j
– R3 = {((i, ok), (j, ol)) | i, j
N, oj , ok</p>
        <p>N, ok
N, ok, ol</p>
      </sec>
      <sec id="sec-3-3">
        <title>O} (only one object per agent),</title>
      </sec>
      <sec id="sec-3-4">
        <title>O} (only one agent per object),</title>
        <p>O, {i, j} E and ol i ok} (envy),
•
= {((i, ok), (i, oj )) | i</p>
        <p>N, ok</p>
        <p>i oj } (preferences).</p>
        <p>Obviously, any allocation corresponds to a set of arguments in A. Observe also that the
defeat relation will only remove some of the attacks in R1, namely, for each pair of arguments
x = (i, oj ) and y = (i, ok), the defeat relation will contain the defeat (x, y) if oj i ok, and
the defeat (y, x) if ok i oj . The other attack relations R2 and R3 are not impacted by the
preferences, so they are included in the defeat relation of this PAF.</p>
        <p>Example 2. Let us consider again P RAP 1 from Example 1. Figure 2 gives the defeat relation
of the corresponding PAF PLEF. More precisely, Figure 2a gives the combination of R1 with the
preferences, Figure 2b (resp. 2c) shows R2 (resp. R3). In Figure 2c, the red arrows correspond to the
situations where agent A is envious (for instance, because she has received the object 2 while B has
received the object 1), blue arrows are for agent B, and green arrows correspond to agent C.
(A, 1)
(B, 1)
(C, 1)
(A, 1)
(B, 1)
(C, 1)
(A, 1)
(B, 1)
(C, 1)
(A, 2)
(B, 2)
(C, 2)
(A, 2)
(B, 2)
(C, 2)
(A, 2)
(B, 2)</p>
        <p>(C, 2)
(B, 3)
(b) R2
(A, 3)
(B, 3)
(C, 3)
(A, 3)
(C, 3)
(A, 3)
(C, 3)
(a) R1 +</p>
        <p>The following lemmas will help us to prove the correspondance between LEF allocations and
con ict-free sets (and stable extensions) of size |N |.</p>
        <p>Lemma 1. Given an allocation , if
cf(PLEF) then
is valid.</p>
        <p>Proof. Assume is not valid. If x, y s.t. Ag(x) = Ag(y), then (x, y), (y, x) R1, which
implies that either (x, y) or (y, x) is in the defeat relation of PLEF, so cf(FLEF). Similarly,
if x, y s.t. Obj(x) = Obj(y), then (x, y) R2, which implies cf(PLEF).
Lemma 2. Given a valid allocation , if
cf(PLEF) then
is not LEF.</p>
        <p>(B, 3)
(c) R3
Proof. Assume a valid allocation which is not con ict-free in PLEF. By construction, since
is valid, there are no x, y such that (x, y) R1 or (x, y) R2, so we deduce that x, y
such that (x, y) R3 which implies that is not LEF.</p>
        <p>Proposition 1. Let be an allocation. is LEF i
cf(PLEF) and | | = |N |.</p>
        <p>Proof. First assume that is a LEF allocation. From Lemma 2 we deduce that is con ict-free.
By de nition, since is LEF then is total. Hence the rst part of the result.</p>
        <p>Now assume that cf(PLEF) and | | = |N |. From Lemma 1, we know that is valid.
Then, since cf(PLEF), we can guarantee that there are no x, y such that (x, y) R3.
This means that, for any i N such that (i, ok) , there is no j N such that (j, ol) ,
{i, j} E and ol i ok. By de nition, this means that is LEF.</p>
        <p>
          Proposition 1 implies that LEF allocations can be easily computed thanks to a minor modi
cation of a very classical approach for solving argumentation problems. Most of the e cient
approaches for reasoning with abstract argumentation frameworks use SAT solvers. For the
basic notion of con ict-freeness, it is enough to consider clauses which forbid to accept together
arguments which are connected by an attack. We will use a MaxSAT version of this encoding [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ],
where the clauses usually corresponding to con ict-freeness will be hard clauses, and additional
(unit) soft clauses will be added to ensure that the solver will return a maximal solution (in
terms of cardinality). Formally,
De nition 8. Given PRAP = O, N , , G , and PLEF = A, R, the corresponding PAF. D
denotes the defeat relation obtained from R and . We de ne the following sets of hard clauses hc
and soft clauses sc:
hc = {¬x
¬y | (x, y)
        </p>
        <p>D}
sc = {(x, 1) | x</p>
        <p>A}</p>
        <p>
          Given the sets of clauses hc and sc, a MaxSAT solver returns a con ict-free set of PLEF of
maximal cardinality. If this solution has a cardinality equal to |N |, then it is a LEF allocation.
Otherwise, there is no LEF allocation. Another possible approach consists in adding one
cardinality constraint [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] xA x = |N | to the set of hard clauses. In this case, if a LEF
allocation exists then it will be provided by a SAT solver, otherwise the solver will answer
UNSAT.
        </p>
        <p>Notice that such an allocation also corresponds to a stable extension of cardinality |N |.
Corollary 1. Let be an allocation. is LEF i
stb(PLEF) and | | = |N |.</p>
        <p>Proof. One side of the equivalence is obvious: if stb(PLEF), then cf(PLEF), so under
the assumption that | | = |N |, the result follows Proposition 1.</p>
        <p>Now, assume that is a LEF allocation. From Proposition 1, we know that cf(PLEF) and
| | = |N |. For a given object ok, there is an argument a = (i, ok) , i.e. the object ok has
been assigned to agent i. By de nition of R2, a defeats all the arguments of the form (j, ok) for
j = i. Since this is true for all the objects, any argument not in is defeated by some argument
in , so stb(PLEF).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>
        Argumentation has already shown its interest for providing explanations to other problems, like
e.g. scheduling [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] or case-based reasoning [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], so drawing connections between argumentation
and resources allocation is a natural question.
      </p>
      <p>
        The preliminary study of this connection allows us to envision deeper relations between
both frameworks. For instance, it seems possible to assign numerical values to assignments
(e.g. the preferred object ok of agent i receives the value n, her second preferred object receives
n 1, etc.) in order to de ne a Strength-based Argumentation Framework (StrAF) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] where the
strength of an argument can intuitively correspond to the utility of allocating the object ok to
the agent i. Then using the semantics of StrAFs could induce interesting allocations. We plan to
investigate this connection.
      </p>
      <p>
        We are also interested in the methods allowing the explanation of arguments status in abstract
argumentation (e.g. [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]). They could allow to simply explain why the allocation of a speci c
object to an agent is necessary (or impossible). Also, the approach proposed by [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] could
provide interesting means to reduce the size of the argumentation graph, hence providing a
better visual explanation of the (non-)existence of desirable allocation.
      </p>
      <p>
        Another interesting way to go further in the study of argumentation applied to resources
allocation consists in using the con ict-tolerant semantics of Weighted Argumentation
Frameworks (WAFs) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] in order to obtain optimal (non-LEF) allocations for instances which do not
admit any LEF allocation.
      </p>
      <p>These few ideas are only a small part of the possible connections between resources allocation
and computational argumentation, and pave the way to a rich body of work that will allow to
provide explainable solutions to fairness issues in resources allocation problem.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work bene ted from the support of the project AGGREEY ANR-22-CE23-0005 of the French
National Research Agency (ANR).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Beynier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chevaleyre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gourvès</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Harutyunyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lesca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Maudet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wilczynski</surname>
          </string-name>
          ,
          <article-title>Local envy-freeness in house allocation problems</article-title>
          , Auton.
          <source>Agents Multi Agent Syst</source>
          .
          <volume>33</volume>
          (
          <year>2019</year>
          )
          <fpage>591</fpage>
          -
          <lpage>627</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          . URL: https://doi.org/10.1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>94</issue>
          )
          <fpage>00041</fpage>
          -
          <lpage>X</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>94</issue>
          )
          <fpage>00041</fpage>
          -
          <lpage>X</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <article-title>A reasoning model based on the production of acceptable arguments</article-title>
          , Ann. Math. Artif. Intell.
          <volume>34</volume>
          (
          <year>2002</year>
          )
          <fpage>197</fpage>
          -
          <lpage>215</lpage>
          . URL: https://doi.org/10.1023/A:1014490210693. doi:
          <volume>10</volume>
          .1023/A:
          <fpage>1014490210693</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bacchus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Martins</surname>
          </string-name>
          ,
          <article-title>Maximum satis abiliy</article-title>
          , in: A.
          <string-name>
            <surname>Biere</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Heule</surname>
          </string-name>
          , H. van Maaren, T. Walsh (Eds.),
          <source>Handbook of Satis ability - Second Edition</source>
          , volume
          <volume>336</volume>
          of Frontiers in
          <source>Arti cial Intelligence and Applications</source>
          , IOS Press,
          <year>2021</year>
          , pp.
          <fpage>929</fpage>
          -
          <lpage>991</lpage>
          . URL: https://doi.org/10.3233/FAIA201008. doi:
          <volume>10</volume>
          .3233/FAIA201008.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Roussel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Manquinho</surname>
          </string-name>
          ,
          <article-title>Pseudo-boolean and cardinality constraints</article-title>
          , in: A.
          <string-name>
            <surname>Biere</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Heule</surname>
          </string-name>
          , H. van Maaren, T. Walsh (Eds.),
          <source>Handbook of Satis ability - Second Edition</source>
          , volume
          <volume>336</volume>
          of Frontiers in
          <source>Arti cial Intelligence and Applications</source>
          , IOS Press,
          <year>2021</year>
          , pp.
          <fpage>1087</fpage>
          -
          <lpage>1129</lpage>
          . URL: https://doi.org/10.3233/FAIA201012. doi:
          <volume>10</volume>
          .3233/FAIA201012.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Cyras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Letsios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Misener</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>Argumentation for explainable scheduling</article-title>
          ,
          <source>in: The Thirty-Third AAAI Conference on Arti cial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2019</year>
          ,
          <article-title>The Thirty-First Innovative Applications of Arti cial Intelligence Conference</article-title>
          ,
          <string-name>
            <surname>IAAI</surname>
          </string-name>
          <year>2019</year>
          ,
          <source>The Ninth AAAI Symposium on Educational Advances in Arti cial Intelligence</source>
          ,
          <source>EAAI</source>
          <year>2019</year>
          , Honolulu, Hawaii, USA, January 27 - February 1,
          <year>2019</year>
          , AAAI Press,
          <year>2019</year>
          , pp.
          <fpage>2752</fpage>
          -
          <lpage>2759</lpage>
          . URL: https://doi.org/10.1609/aaai.v33i01.33012752. doi:
          <volume>10</volume>
          .1609/aaai.v33i01.
          <fpage>33012752</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Paulino-Passos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>On monotonicity of dispute trees as explanations for case-based reasoning with abstract argumentation</article-title>
          , in: K. Cyras,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kampik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Cocarascu</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Rago (Eds.),
          <source>1st International Workshop on Argumentation for eXplainable AI co-located with 9th International Conference on Computational Models of Argument (COMMA</source>
          <year>2022</year>
          ), Cardi , Wales,
          <year>September 12</year>
          ,
          <year>2022</year>
          , volume
          <volume>3209</volume>
          <source>of CEUR Workshop Proceedings</source>
          , CEURWS.org,
          <year>2022</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3209</volume>
          /8465.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rossit</surname>
          </string-name>
          , J.-G. Mailly,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dimopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Moraitis</surname>
          </string-name>
          ,
          <article-title>United we stand: Accruals in strengthbased argumentation</article-title>
          ,
          <source>Argument Comput</source>
          .
          <volume>12</volume>
          (
          <year>2021</year>
          )
          <fpage>87</fpage>
          -
          <lpage>113</lpage>
          . URL: https://doi.org/10.3233/ AAC-200904. doi:
          <volume>10</volume>
          .3233/AAC-200904.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <article-title>Smallest explanations and diagnoses of rejection in abstract argumentation</article-title>
          , in: D.
          <string-name>
            <surname>Calvanese</surname>
          </string-name>
          , E. Erdem, M. Thielscher (Eds.),
          <source>Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR 2020, Rhodes, Greece,
          <source>September 12-18</source>
          ,
          <year>2020</year>
          ,
          <year>2020</year>
          , pp.
          <fpage>667</fpage>
          -
          <lpage>671</lpage>
          . URL: https://doi.org/10. 24963/kr.2020/67. doi:
          <volume>10</volume>
          .24963/kr.2020/67.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <article-title>Strong explanations in abstract argumentation</article-title>
          ,
          <source>in: ThirtyFifth AAAI Conference on Arti cial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2021</year>
          ,
          <article-title>Thirty-Third Conference on Innovative Applications of Arti cial Intelligence</article-title>
          ,
          <source>IAAI</source>
          <year>2021</year>
          ,
          <source>The Eleventh Symposium on Educational Advances in Arti cial Intelligence</source>
          ,
          <source>EAAI</source>
          <year>2021</year>
          ,
          <string-name>
            <given-names>Virtual</given-names>
            <surname>Event</surname>
          </string-name>
          ,
          <source>February 2-9</source>
          ,
          <year>2021</year>
          , AAAI Press,
          <year>2021</year>
          , pp.
          <fpage>6496</fpage>
          -
          <lpage>6504</lpage>
          . URL: https://ojs.aaai.org/index.php/AAAI/article/ view/16805.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Duchatelle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>Explaining semantics and extension membership in abstract argumentation</article-title>
          ,
          <source>Intell. Syst. Appl</source>
          .
          <volume>16</volume>
          (
          <year>2022</year>
          )
          <article-title>200118</article-title>
          . URL: https://doi.org/10.1016/j.iswa.
          <year>2022</year>
          .
          <volume>200118</volume>
          . doi:
          <volume>10</volume>
          .1016/j.iswa.
          <year>2022</year>
          .
          <volume>200118</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Duchatelle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>Visual explanations for defence in abstract argumentation</article-title>
          , in: N.
          <string-name>
            <surname>Agmon</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>An</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ricci</surname>
          </string-name>
          , W. Yeoh (Eds.),
          <source>Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, AAMAS</source>
          <year>2023</year>
          , London, United Kingdom, 29 May 2023 - 2
          <article-title>June 2023</article-title>
          , ACM,
          <year>2023</year>
          , pp.
          <fpage>2346</fpage>
          -
          <lpage>2348</lpage>
          . URL: https://dl.acm.org/doi/10.5555/3545946.3598929. doi:
          <volume>10</volume>
          .5555/3545946.3598929.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hunter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>McBurney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          , Weighted argument systems: Basic de nitions, algorithms, and complexity results,
          <source>Artif. Intell</source>
          .
          <volume>175</volume>
          (
          <year>2011</year>
          )
          <fpage>457</fpage>
          -
          <lpage>486</lpage>
          . URL: https://doi.org/10.1016/j.artint.
          <year>2010</year>
          .
          <volume>09</volume>
          .005. doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2010</year>
          .
          <volume>09</volume>
          .005.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>