<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Fifth International Workshop on Systems and Algorithms for Formal Argumentation, September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>On Computational Problems for Infinite Argumentation Frameworks: Classifying Complexity via Computability?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Uri Andrews</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca San Mauro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics, University of Wisconsin</institution>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Philosophy, University of Bari</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>17</volume>
      <issue>2024</issue>
      <fpage>12</fpage>
      <lpage>26</lpage>
      <kwd-group>
        <kwd>eol&gt;in nite argumentation frameworks</kwd>
        <kwd>computability theory</kwd>
        <kwd>complexity</kwd>
        <kwd>admissible extensions</kwd>
        <kwd>stable extensions</kwd>
        <kwd>complete extensions</kwd>
        <kwd>Turing degrees</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>(the substantial introduction of [1] provides other concrete examples of applications of in nite
AFs, e.g., to multiagent negotiations).</p>
      <p>
        Fortunately, recent years have seen a growing interest in in nite AFs, with special focus
on how the existence and interplay of various semantics—well-understood for nite AFs—are
a ected in the in nite realm (see, e.g., [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7">5, 6, 7, 8, 9</xref>
        ]). This increasing recognition underscores
the importance of in nite AFs for a broad understanding of argumentation theory.
      </p>
      <p>
        However, the literature still lacks a comprehensive framework for systematically exploring
all logical aspects of in nite AFs, particularly regarding their core computational issues. A
signi cant research avenue in nite AFs has been determining the algorithmic complexity of
tasks associated with nding acceptable collections of arguments (up to suitable collection of
semantics), with numerous complexity theoretic results highlighting their inherent
computational di culty (see, e.g., [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">10, 11, 12</xref>
        ]). To our knowledge, no analog study has been conducted
for in nite AFs.
      </p>
      <p>This paper addresses this gap by initiating a systematic study of the complexity of
computational problems in in nite AFs. For this endeavor, we bring into the subject of argumentation
theory the machinery of computability theory, which may be regarded as an in nitary
companion of computational complexity theory and abounds with concepts and hierarchies for
measuring the complexity of computing or de ning countably in nite objects.</p>
      <p>
        The application of computability theoretic tools outside of mathematical logic is a
wellestablished idea. Over the past decades, computability theory has been applied to a wide array
of mathematical disciplines, and computability theoretic concepts have found applications in
other formal subjects, such as theoretical computer science, economics, and linguistics (see, e.g.,
[
        <xref ref-type="bibr" rid="ref11 ref12 ref13">13, 14, 15</xref>
        ]).
      </p>
      <p>The present paper, we argue, provides compelling evidence of the bene ts of viewing in nite
AFs through a computability theoretic lens. We assess the complexity of many computational
problems—both established and novel—within our framework, illustrating their undecidability
while providing precise measures of their complexity.</p>
      <sec id="sec-1-1">
        <title>Organization of the paper</title>
        <p>Section 2 brie y reviews the main semantic concepts from argumentation theory that are
relevant to this paper, along with the fundamental computational problems associated with
them. In Section 3, we introduce the key notions of computability theory employed in the
work and we de ne the concept of computable AFs and the computational issues emerging
from it. Finally, in Section 4, we provide lower bounds for the complexity of our computational
problems. Our results are collected in Table 2.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Argumentation theoretic background</title>
      <p>
        To keep our paper self-contained, we now brie y review some key concepts of Dung-style
argumentation theory, focusing on the semantics notions considered in this paper and the
fundamental computational problems associated with them (the surveys [
        <xref ref-type="bibr" rid="ref14 ref15">16, 17</xref>
        ] o er an overview
of these topics).
      </p>
      <p>An argumentation framework (AF) F is a pair (AF , RF ) consisting of a set AF of arguments
and an attack relation RF ✓ AF ⇥ AF . If some argument a attacks some argument b, we may
write a ⇢ b instead of (a, b) 2RF . Collections of arguments S ✓ AF are called extensions.
For an extension S, the symbols S+ and S denote, respectively, the arguments that S attacks
and the arguments that attack S:</p>
      <p>S+ = {x : (9 y 2S)(y ⇢ x)};
S</p>
      <p>= {x : (9 y 2S)(x ⇢ y)}.</p>
      <p>S defends an argument a, if any argument that attacks a is attacked by some argument in S
(i.e., {a} ✓ S+). The characteristic function of F is the following mapping fF which sends
subsets of AF to subsets of AF :</p>
      <p>fF (S) := {x : x is defended by S}.</p>
      <p>All AFs investigated in this paper are in nite.</p>
      <p>A semantics assigns to every AF F a set of extensions (F ) which are deemed as acceptable.
A huge number of semantics, fueled by di erent motivations, have been proposed and analyzed.
Here, we focus on three prominent choices, whose computational aspects are well-understood
in the nite setting: admissible, complete, and stable semantics (abbreviated by ad, co, stb,
respectively).</p>
      <p>Let F = (AF , RF ) be an AF. Denote by cf(F ) the collection of extensions of F which are
con ict-free (i.e., S 2cf(F ) i a 6⇢ b, for all a, b 2S). Then, for S 2cf(F ),
• S 2ad(F ) i S is self-defending (i.e., S ✓ fF (S));
• S 2co(F ) i S is a xed point of fF (i.e., S = fF (S));
• S 2stb(F ), i S attacks all arguments outside of it (i.e., S+ = AF r S).</p>
      <p>In discussing the complete extensions, we will also brie y mention the grounded extension,
which is the unique smallest xed point of fF ; in any AF, the grounded extension always exists
[2, Theorem 3].</p>
      <p>For a given semantics , the following are well-known computational problems related to :
• Cred (for credulous acceptance) is the decision problem whose accepting instances are
the pairs (F , a) so that a 2S for some S 2 (F );
• Skept (for skeptical acceptance) is the decision problem whose accepting instances are
the pairs (F , a) so that a 2S for all S 2 (F );
• Exist is the decision problem whose accepting instances are the AFs F so that (F ) 6= ; ;
• NE is the decision problem whose accepting instances are the AFs F so that (F )r{;} 6 =
; ;
• Uni is the decision problem whose accepting instances are the AFs F so that | (F )| = 1.</p>
      <p>
        In formal argumentation theory, evaluating the computational complexity of the
aforementioned problems for various semantics has been a noteworthy research thread for more than 20
years [
        <xref ref-type="bibr" rid="ref15">17</xref>
        ]. Table 1 collects known complexity results for the admissible, stable, and complete
semantics. This analysis refers only to nite AFs. In the next section, we introduce our
computability theoretic perspective that allows us to tackle complexity issues concerning in nite
AFs.
ad
stb
co
      </p>
      <p>Cred
NP-c
NP-c
NP-c</p>
      <p>Skept
trivial
coNP-c
P-c</p>
      <p>Exist
trivial
NP-c
trivial</p>
      <p>NE Uni
NP-c coNP-c
NP-c DP-c
NP-c coNP-c</p>
    </sec>
    <sec id="sec-3">
      <title>3. Computational problems for AFs through the lens of computability theory</title>
      <p>
        In this section, we introduce computable AFs and we revisit the computational problems of
the last section through the lens of computability theory. We aim at conveying the main ideas
without delving into too many technical details. A more formal and comprehensive exposition of
the fundamentals of computability theory can be found, e.g., in [
        <xref ref-type="bibr" rid="ref16 ref17">18, 19</xref>
        ]. We begin by establishing
standard notation and terminology for some combinatorial notions that appear frequently in
our proofs.
      </p>
      <sec id="sec-3-1">
        <title>3.1. Sequences, strings, and trees</title>
        <p>As is common in computability theory, we denote the set of natural numbers by !. Since there is
no risk of ambiguity, we simply refer to the elements of ! as numbers. The symbol !! denotes
the set of all functions from ! to !. For our purposes, it is convenient to represent elements of
!! as in nite sequences of numbers; we denote by 01 the in nite sequence consisting of only
0’s (or, equivalently, the constant function to 0). The restriction of an in nite sequence ⇡ 2!!
to its rst n-many bits is denoted by ⇡ n.</p>
        <p>We use standard notation and terminology about strings: The set of all nite strings of
numbers is denoted by !&lt;! . The symbol denotes the empty string. The concatenation of
strings , ⌧ is denoted by _⌧ . The length of a string is denoted by | |. If there is ⇢ so that
_⇢ = ⌧ , we say that is a pre x of ⌧ and we write ⌧ . Similarly, if ⇡ 2!&lt;! and = ⇡ n
for some n, we write ⇡ .</p>
        <p>In order to formulate our problems as subsets of !, it will be convenient to encode pairs
of numbers into single numbers. The pairing function does this. Fix p : ! ⇥ ! ! ! to be a
computable bijection. We adopt the common habit of denoting p(x, y) by hx, yi.</p>
        <p>The encodings discussed in Section 4 heavily rely on the di culty of calcuting paths through
trees. As is common in computability theory, we say that a tree is a set T ✓ !&lt;! closed under
pre xes. We picture trees growing upwards, with _i to the left of _j, whenever i &lt; j. A
path ⇡ 2!! through a tree T ✓ !&lt;! is an in nite sequence so that ⇡ n 2 T, for all numbers n.
The set of paths through a tree T is denoted by [T ]. T is well-founded if [T ] = ; and otherwise
is ill-founded. Note that we follow the standard terminology in computability theory requiring
that paths be in nite. Indeed, if one were to allow paths to be nite, then these notions trivialize,
since one could computably nd a path through any given computable tree. For example, the
set of strings</p>
        <p>T := { } [ { ,
_1 : (8 n &lt; | |)( (n) = 0)}
is an ill-founded tree with [T ] = {01 }. If T contains strings of arbitrary length, then T
has in nite height. Note that there are trees of in nite height which are well-founded, e.g.,
T = {n_ : | |  n}.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Computable argumentation frameworks</title>
        <p>A basic problem that one encounters when attempting to calibrate the algorithmic complexity
of in nite AFs is that of describing in nite objects in a nitary way. Computability theory o ers
a wide range of tools designed for this endeavour. Here, we will concentrate on AFs that are
computably presentable, in the sense that there are Turing machines (or, equivalently, modern
computer programs) that, in nitely many steps, decide whether a given pair of arguments
belongs to the attack relation.</p>
        <p>Notation. Let ( e)e2 ! be a uniformly computable enumeration of all computable functions
from ! to {0, 1}.</p>
        <p>De nition 3.1. A number e is a computable index for an AF F = (AF , RF ), if there is a
computable bijection f : ! ! AF so that
e(hx, yi) =
(1
0
if f (x) ⇢ f (y)
otherwise.</p>
        <p>An AF F is computably presented, if it has a computable index e 2!.</p>
        <p>We use the notation Fe to refer to the AF with computable index e (note that every computable
AF possesses in nitely many computable indices.). We let an refer to the element of AFe given
by f (n).</p>
        <p>Remark 3.2. The collection of computable indices for AFs just de ned is noncomputable (in
particular, any index e for a non-total computable function e cannot be a computable index
for an argumentation framework). There are alternative indexings that circumvent this issue;
yet, adopting another indexing would not alter the complexity of the computational problems
we analyze, though it would make the proofs slightly more cumbersome. Hence, we opt for the
simplicity of De nition 3.1.</p>
        <p>The bene t of dealing with computable AFs is that the complexity of the decision problems
associated with them do not arise due to complexity of the argumentation framework itself,
but rather re ects the inherent complexity of the decision problem. Further, the computational
problems associated with computable AFs can be naturally represented as subsets of !, which
are suitable to be classi ed by computability theoretic means:
De nition 3.3. For a semantics :
1. Cred1 := {he, ai 2! : (9 S 2 (Fe))(a 2S)};
2. Skept1 := {he, ai 2! : (8 S 2 (Fe))(a 2S)};
5. Uni1 := {e : (9 !S ✓ AFe )(S 2 (Fe))}.</p>
        <p>We also introduce new semantics which make sense only in the in nite setting. This is
motivated by the idea that, given an in nite AF, we might hope for our accepted sets to give us
in nitely much information:</p>
        <sec id="sec-3-2-1">
          <title>1. S 2infad(F ) if and only if S 2ad(F ) and S is in nite;</title>
        </sec>
        <sec id="sec-3-2-2">
          <title>2. S 2infco(F ) if and only if S 2co(F ) and S is in nite;</title>
        </sec>
        <sec id="sec-3-2-3">
          <title>3. S 2infstb(F ) if and only if S 2stb(F ) and S is in nite.</title>
          <p>In a sense, these new semantics give a measure of how much con ict lies in a given AF. For
example, if infad(F ) = ; for an AF F , then the size of any of its admissible extensions are
negligible in comparison to the size of F , suggesting that the attack relation in F prevents
simultaneously accepting any signi cant fraction of F -arguments.</p>
          <p>As an illustration of why we might want to accept only in nite extensions, we consider that
a given in nite AF may contain a single argument b so that b attacks every other argument, and
every other argument attacks b. We imagine that b is a statement of extreme solipsism denying
the truth of any other statement. While {b} is a stable extension, it represents a negligible
fraction of arguments, and we may prefer not to accept it. In an in nite AF, any nite set is as
negligible as {b}, so we may prefer to accept only in nite extensions.</p>
          <p>The complexity classes that most naturally match the problems of De nition 3.3 are those of
the ⌃ 11 and ⇧ 11 sets. The ⌃ 11 sets are formally de ned as those subsets of ! that are de nable
in the language of second-order arithmetic using a single second-order existential quanti er
ranging over subsets of ! followed by number quanti ers and the rst order functions and
relations (+, ·, &lt;, 0, 1, 2); for more details, see [18, §16]. ⇧ 11 sets are the complements of ⌃ 11
sets.</p>
          <p>Proposition 3.4. For</p>
          <p>2 {ad, stb, co, infad, infstb, infco}, Cred1 , Exist1 , NE1 , are ⌃ 11.</p>
          <p>Proof. We rst consider 2 {ad, stb, co}. To de ne Cred1 , we see from De nition 3.3:
Cred1 := {he, ai 2 ! : (9 S 2 (Fe)(a 2 S))} uses a single existential quanti er over
sets S. This is similarly true for the de nitions of Exist1 and NE1 in De nition 3.3. Thus,
it su ces to see that the condition S 2 (Fe) can be de ned with only quanti cation over
arguments (which are encoded as numbers), not needing quanti cation over sets of arguments.
Note that the de nition of S+ and S uses only quanti ers over arguments. Thus, the de nition
of fF (S) given by a 2fF (S) if and only if {a} ✓ S+ uses only quanti ers over arguments.
Finally, S 2ad(F ), S 2stb(F ), S 2co(F ) are all de ned from fF (S) and S+ using only
quanti ers over arguments.</p>
          <p>In the case of 2 {infad, infstb, infco}, we need to also observe that S being in nite is
de ned via 8 n9 m(am 2S ^ m &gt; n), which uses only quanti ers over numbers.</p>
          <p>Proposition 3.5. For
Uni1 is ⇧ 11.</p>
          <p>2 {ad, stb, co, infad, infstb, infco}, Skept1 is ⇧ 11 and, for
2 {ad, co},
Proof. The de nition of Skept1 in De nition 3.3 uses a single universal set-quanti er followed
by only number quanti ers in the de nition of (Fe).</p>
          <p>For 2 {ad, co}, e 2Uni1 if and only if there are not two di erent extensions (as there is
always at least one extension). This is de ned by the negation of the following formula:
(9 S19 S2)(9 x 2S1 r S2) ^ S1 2 (Fe) ^ S2 2 (Fe)).</p>
          <p>Note that 9 S19 S2 can be replaced by a single existential quanti er by encoding the pair
(S1, S2) as a single set {h1, xi : x 2S1} [ {h 2, yi : y 2S2}. This shows that Uni1 is the
complement of a ⌃ 11 set, thus is ⇧ 11.</p>
          <p>Remark 3.6. The above argument does not su ce to show that Uni1stb is also ⇧ 11, since some
AFs have no stable extension. The most obvious de nition says there exists one stable extension
and there does not exist two, which gives a de nition which is a conjunction of a ⌃ 11 and a
⇧ 11 condition, i.e., a so-called d-⌃ 11 de nition. This is analogous to the fact that in the nite
case Unistb is DP-complete. Similarly, the argument above does not show that Uni1 is ⇧ 11 for
2 {infad, infstb, infco}. It is true that Uni1 is ⇧ 11 for 2 {stb, infad, infstb, infco}, but we
will not include a proof in this paper.</p>
          <p>We note that knowing that a problem is ⌃ 11 does not necessarily mean the problem is
complicated. This only gives an upper bound for its complexity. Sometimes, a simpler de nition
is achievable. As an example, we consider Credcf := {ha, ei : (9 S 2cf(Fe))(a 2S)}. Though
the given de nition is ⌃ 11, to know if an argument a belongs to a con ict-free extension of Fe,
it su ces to check whether a is non-self-defeating, i.e., a 6⇢ a, which is equivalent to checking
the computable fact that e(hf 1(a), f 1(a)i) = 0. In contrast, we will show that for the
computational problems associated to the admissible, stable, and complete semantics, the use of
the quanti er ranging over all sets cannot be avoided.</p>
          <p>
            We will heavily rely on the following fundamental theorem by Kleene which o ers a natural
way of representing ⌃ 11 sets:
Theorem 3.7 (Kleene [
            <xref ref-type="bibr" rid="ref18">20</xref>
            ]). A set X ✓ ! is ⌃ 11 if and only if there is a computable sequence of
computable trees (TnX )n2 ! so that n 2X i TnX is ill-founded.
          </p>
          <p>We call (TnX )n2 ! a tree-sequence for X. As a corollary of Kleene’s theorem, one obtains that
the problem of deciding which computable trees in !&lt;! are ill-founded (or well-founded) is as
hard as any other ⌃ 11 (resp., ⇧ 11) problem.</p>
          <p>Theorem 3.7 gives a reason to consider the ⌃ 11 sets as the natural in nite analogs of the NP
problems. Namely, given an ill-founded computable tree T and a sequence ⇡ which is a path
through T , it’s relatively simple to check that ⇡ 2[T ] (it requires checking in nitely many
simple facts: ⇡ n 2 T, for each n), but nding a sequence ⇡ 2[T ]—or even knowing whether
there exists a sequence ⇡ 2[T ]—is a far harder problem.</p>
          <p>Our main goal is to exactly characterize the complexity of the computational problems
described in De nition 3.3. To do so, we need to show that they are complete for their respective
complexity classes. The following de nition formalizes this notion.
De nition 3.8. Let be a complexity class (e.g., 2 {⌃ 11, ⇧ 11}). A set V ✓ ! is -hard, if for
every X 2 there is a computable function f : ! ! ! so that x 2X if and only if f (x) 2V . If
V is -hard and belongs to , then it is -complete.</p>
          <p>Proposition 3.9. It follows from Theorem 3.7 that the set of indices for ill-founded computable
trees is a ⌃ 11-complete set. Similarly, the set of indices for well-founded computable trees is a
⇧ 11-complete set.</p>
          <p>The following result is far less obvious, but will be useful below to examine Uni1 .
Theorem 3.10 ([21, Theorem 18.11]). The set UB of indices for computable trees with exactly one
path is a ⇧ 11-complete set.</p>
          <p>Remark 3.11. The hardness in Theorem 3.10 is quite easy. We can reduce the question of
whether a tree T is well-founded to whether a tree T 0 has two paths, where T 0 always has at
least one path, by simply giving T 0 one more path than T (e.g. T 0 = {1_ : 2 T } [ { :
(8 n &lt; | |) (n) = 0}). The fact that UB is itself ⇧ 11 is the subtle part of Theorem 3.10.</p>
          <p>Theorem 3.7 along with De nition 3.8 suggest a natural approach for gauging the complexity
of the computational problems of De nition 3.3. Namely, given another ⌃ 11 (or ⇧ 11) set X, we
translate the question asking whether n 2X to the question of if the tree TnX is ill-founded
(resp., well-founded), and then we need to computably nd an instance of our computational
problem which should be accepted if and only if TnX is ill-founded (resp., well-founded). This
involves coding a tree, or more precisely, the collection of paths through a tree into the
extensions in an argumentation framework. We do exactly this in Section 4.</p>
          <p>Remark 3.12. As noted before, the ⌃ 11 sets are natural analogs in the in nitary setting of the
NP sets, and the ⇧ 11 sets are the natural analogs of the coNP sets. With the exception of Skept1co
and Uni1stb, Table 2 follows this translation from Table 1 for the rst three rows. These two
results mark surprising di erences in the in nite setting.</p>
          <p>The trivial entries are due to the fact that ; is always an admissible extension and the grounded
extension is always a complete extension.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Spectra of extensions</title>
        <p>We propose a way to more fully understand the complexity of the problem of nding a
extension in a given AF F .</p>
        <p>De nition 3.13. For each e 2! and semantics , let Spec¬; (Fe) be the set of Turing degrees of
non-empty sets X ✓ ! so that {an : n 2X} is a extension in Fe.</p>
        <p>The notion Spec¬; (Fe) exactly captures the di culty of computing a non-empty extension
in Fe. We will be relating the problem of computing a extension in Fe to the problem of
nding a path through a particular tree. So, we de ne the analogous notion of the spectrum of
a tree.</p>
        <p>De nition 3.14. Given any computable tree T , we let Spec(T ) be set of Turing degrees of paths
X 2[T ].</p>
        <p>Our main result in this direction is the following:
Theorem 3.15. For 2 {ad, stb, co, infad, infstb, infco} and for any computable tree T , there
exists a computable AF Fe so that Spec¬; (Fe) = Spec(T ).</p>
        <p>When 2 {ad, stb, infad, infstb}, future work will show the converse, namely that for every
e, there is a computable tree so that Spec¬; (Fe) = Spec(T ). Table 3 collects our results on
Spectra of extensions.</p>
        <p>ad
stb
co
infad
infstb
infco</p>
        <p>Spec¬;
Exactly Spec(T )
Exactly Spec(T )
Any Spec(T )
Exactly Spec(T )
Exactly Spec(T )</p>
        <p>Any Spec(T )</p>
        <p>We now discuss some consequences of these characterizations on the problem of, given a
computable argumentation framework, computing some extension. The hyperarithmetical
sets are, in a very general sense, considered the collection of constructible subsets of the
natural numbers. Formally, a set is hyperarithmetical if and only if it is both ⌃ 11 and ⇧ 11.
The hyperarithmetical degrees are particularly useful as a yardstick of complexity because a
set X is hyperarithmetical if and only if it is computed from a set Y which can be reached
by (trans nitely) iterating the halting jump operator. Thus, the number of iterations of the
halting jump needed to compute X yields a useful yardstick for the complexity of X. For more
information about the hyperarithmetical hierarchy, see [19, Chapter 5].</p>
        <p>Proposition 3.16. For each 2 {ad, stb, co, infad, infstb, infco}, there is a computable
argumentation framework Fe which has continuum many non-empty extensions, yet no hyperarithmetical
non-empty extension.</p>
        <p>(We take this to mean that there is no uniform way to construct—even with arbitrary access to
the halting jump operator—a extension).</p>
        <p>Proof. There exists a computable tree with uncountably many paths yet no hyperarithmetical
path [18, Corollary XLI(b)]. Applying Theorem 3.15 to this tree yields a computable
argumentation framework with uncountably many non-empty extensions, yet no hyperarithmetical
non-empty extension.</p>
        <p>In the case of Proposition 3.16, there are extensions that are not particularly computationally
powerful. They are not hyperarithmetical, but they also compute no hyperarithmetical sets. We
can think of them as on the side of the hyperarithmetical hierarchy, thus simply not measured
by the yardstick. This is always the case if an in nite AF has continuum many extensions.
On the other hand, if a computable argumentation framework has a unique extension, the
picture is quite di erent. In forthcoming work, we will settle the following conjecture.
Conjecture 3.17. Let be in {ad, stb, co, infad, infstb, infco} and suppose that Fe is a computable
argumentation framework with a unique non-empty extension. Then, the non-empty extension
of Fe is hyperarithmetical.</p>
        <p>On the other hand, we can show that there is no bound in the hyperarithmetical hierarchy
on how complicated this extension might be.</p>
        <p>Theorem 3.18. Let be in {ad, stb, co, infad, infstb, infco} and let H be a hyperarithmetical set.
Then, there exists a computable AF Fe with a single non-empty extension X so that X computes
H .</p>
        <p>Proof. This follows from Theorem 3.15 by encoding a tree with a single path ⇡ so that ⇡ computes
H . Such a tree is known to exist for any hyperarithmetical H [18, Corollary XLIV(d)].</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Encoding a tree into an argumentation framework</title>
      <p>This section is devoted to our hardness results: we provide lower bounds for the complexity of our
computational problems. In particular, given a tree T ✓ ! &lt;! , we will de ne an argumentation
framework F T = (AT , RT ). The set of arguments AT of F T is computable and consists of
{a : 2 T } [ { b : 2 T }. The attack relation RT of F T contains all and only the following
edges: For all 2 T,
10</p>
      <p>11
0
1
a10
a0
b10
b0
a
a11
a1
b
b11
b1</p>
      <p>.</p>
      <p>Notation. For ⇡ 2[T ] and n 2!, let S⇡n be the set {a :
⇡ and | |
n}.</p>
      <p>Lemma 4.1. A non-empty extension S of F T is admissible i S is exactly S⇡n for some ⇡ 2[T ]
and n 2!.</p>
      <p>Proof. ()): Suppose that S 6= ; belongs to ad(F T ). First, observe that no b can be in S, as all
such arguments are self-defeating and S must be con ict-free. Next, observe that, if a⌧ 2S,
then there must be some i so that a⌧ _i 2S: this is because some element of S must defend
a⌧ from b⌧ and such an element must be an a with | | = |⌧ | + 1. But it must have ⌧ as
otherwise a would attack a⌧ .</p>
      <p>Finally, take ⇢ of minimal length so a⇢ 2S. Then the previous paragraph shows that S
contains S⇡|⇢ | for some ⇡ 2[T ] with ⇢ ⇡ . Since ⇢ was chosen of minimal length, no a⌧ with
⌧ shorter can be in S. Moreover, no a⌧ with |⌧ | |⇢ | and ⌧ 6 ⇡ can be in S, as otherwise S
would not be con ict-free. Thus, S = S⇡|⇢ |.</p>
      <p>(( ): Any element which attacks a⇡ n is itself attacked by either a⇡ n+1 or a⇡ n+2 , so S⇡n ✓
fFT (S).</p>
      <p>Lemma 4.2. An extension S of F T is stable i S is exactly S⇡0 for some ⇡ 2[T ].
Proof. ()): Suppose that S 2stb(F T ). Then, since S is admissible, we know S = S⇡n for some
⇡ 2[T ] and n 2!. Since b is the only the argument that attacks a and b 2/S, it must be
the case that a 2S. Thus, n = 0.</p>
      <p>(( ): Observe that S⇡0 is con ict-free and any other argument of F T is contained in (S⇡0)+.
Thus, S⇡0 is a stable extension of F T .</p>
      <p>Lemma 4.3. A non-empty extension S of F T is complete i S is S⇡0 for some ⇡ 2[T ].
Proof. ()): Suppose that S 6= ; belongs to co(F T ). Since complete extensions are admissible,
we see that S = S⇡n, for some X 2[T ] and n 2!. But observe that if n &gt; 0, then S would not
be complete: indeed, a with = ⇡ n 1 would be defended by S but not in S. Thus, n must
be equal to 0.</p>
      <p>(( ): This follows since S⇡0 is stable and all stable extensions are complete.</p>
      <p>We are now in a position to obtain hardness results for the computational problems described
in De nition 3.3.</p>
      <p>Theorem 4.4. The following hold:
1. for
2. for
3. for
2 {ad, stb, co, infad, infstb, infco}, NE1 is ⌃ 11-hard;
2 {stb, infad, infstb, infco}, Exist1 is ⌃ 11-hard;
2 {ad, stb, co, infad, infstb, infco}, Cred1 is ⌃ 11-hard.</p>
      <p>Proof. 1. Let X 2⌃ 11 and let (TnX )n2 ! be a tree-sequence for X, as given by Theorem 3.7. To
show ⌃ 11-hardness, we need to produce a computable function f so that n 2X if and only if
f (n) 2NE1 . We let f (n) be a computable index for F TnX . Then Lemmas 4.1, 4.2, and 4.3 prove
that n 2X if and only if TnX is ill-founded if and only if F TnX has a non-empty extension for
each 2 {ad, stb, co, infad, infstb, infco}.</p>
      <p>2. For each of these , the empty set is not a extension, so Exist1 = NE1 , which we
showed above is ⌃ 11-hard.</p>
      <p>3. In the proof of 1. above, we reduced a given ⌃ 11 set X to NE1 by sending n to F TnX . Note
that F TnX has a non-empty extension if and only a is in some extension. Thus sending n
to the he, a i where e is a computable index for F TnX shows that Cred1 is ⌃ 11-hard.
Theorem 4.5. For</p>
      <p>2 {ad, stb, co, infad, infstb, infco}, Uni1 is ⇧ 11-hard.</p>
      <p>Proof. We rst consider 2 {ad, co}. Let X 2⇧ 11 and let (Tn!!rrXX. )Nno2t!e btheaat t;reise-asneqaudemnicsesibfoler
its complement. For n 2!, consider the sequence of AFs F Tn
extension in any AF and since every argument in F Tn!rX is attacked, ; is also a complete
extension. Thus, F Tn!rX has a unique extension if and only if Tn!rX is well founded if and
only if n 2X, which shows that Uni1ad and Uni1co are ⇧ 11-hard.</p>
      <p>For the other , ; is not a extension. We use Theorem 3.10 to show ⇧ 11-hardness. Let X be
any ⇧ 11 set. Then we get from Remark 3.11 a sequence of trees Tn0 so that 01 2[Tn0] for each n,
and {n : Tn0 has only one path} is ⇧ 11-hard. It follows from Lemmas 4.1, 4.2, and 4.3 that this is
if and only if F Tn0 has a unique extension, which shows that ⇧ 11-hardness of Uni1 .</p>
      <p>F T , Skept1infad = ; .</p>
      <p>Theorem 4.7. Skept1infad is ⇧ 11-hard.</p>
      <p>Theorem 4.6. For any</p>
      <p>2 {stb, infstb, infco}, Skept1 is ⇧ 11-hard.</p>
      <p>Proof. Let X be a ⇧ 11 set. Then we get from Remark 3.11 a sequence of trees Tn0 so that 01 2[Tn0]
for each n, and {n : Tn0 has only one path} is ⇧ 11-hard. Then, note that he, a0i 2Skept1 where
e is a computale index for Tn0 if and only if Tn0 only has paths ⇡ with ⇡ (0) = 0 if and only if Tn0
has only one path (see the de nition of Tn0 in Remark 3.11) if and only if n 2X. This shows the
⇧ 11-hardness of Skept1 .</p>
      <p>We note that the above argument does not work for infad since, even if ⇡ is the only path
through a tree T , each S⇡n is an in nite admissible extension in F T and Tn S⇡n = ; , so in any
Proof. Let X be a ⇧ 11 set. We get from Remark 3.11 a sequence of trees Tn0 so that each has one
path 01 2 Tn0 and has another path extending 1 if and only if n 2/X.</p>
      <p>For each n 2!, we construct an AF Gn = (AGn , RGn ) slightly larger than F Tn0 . In particular
AGn = AFTn0 [ { x0, y0, x1, y1}. We let (w, z) 2RGn if
• w, z 2AFTn0 and (x, y) 2RFTn0
• w = yi and z = yi
• w = xi and z = x1 i
• w = xi and z = yi
• w = yi and z = a where (0) = i
• w = a with (0) = i and z = y1 i
Lemma 4.8. An in nite S ✓ AGn is an admissible extension if and only if it equals a set
S⇡k [ { x⇡ (0)} for some ⇡ 2[Tn0] and k 2!.</p>
      <p>Proof. Let U be an in nite admissible extension. Note rst that arguments y0, y1 and b cannot
be in U since they are self-defeating. Then, since U is in nite, U must contain elements a for
Bu2tthTne0.nBsyintcheeesaacmheelaermguemnteonft Sa sn⇡ iins Laettmacmkaed4.b1y,wy⇡e(g0)e,twtheamtUus\t hAavFeTnx0⇡ =(0)S2⇡nfUortsoodmeefe⇡ nd them.
2[Tn0].</p>
      <p>This excludes x1 ⇡ (0) from U since U is con ict-free.</p>
      <p>It is straightforward to check that each of these are in fact admissible extensions.</p>
      <p>Finally, note that x0 is in every in nite admissible extension of Gn if and only if there is no
⇡ 2[Tn0] which extends 1 if and only if n 2X, showing that Skept1infad is ⇧ 11-hard.
Theorem 4.9. For 2 {ad, stb, co, infad, infstb, infco} and for any computable tree T , there
exists a computable AF Fe so that Spec¬; (Fe) = Spec(T ).</p>
      <p>Proof. Observe that for the AF Fe = F T , it follows from Lemmas 4.1, 4.2, and 4.3 that the
non-empty extensions are all in nite and are in the same Turing degrees as the paths through
T .</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and future work</title>
      <p>In this paper, we initiated a systematic exploration of the complexity issues inherent to in nite
argumentation frameworks. To pursue this direction, we employed computability-theoretic
techniques which are ideally suited for assessing the complexity of in nite mathematical
objects. Our focus was on the credulous and skeptical acceptance of arguments, as well as
the existence and uniqueness of extensions, for admissible, complete, and stable semantics.
The computational problems we examined were found to be maximally complex, properly
belonging to the complexity classes of ⌃ 11 and ⇧ 11 sets. We also introduced and explored new
semantics that are meaningful exclusively in the in nite setting, concerning the existence of
in nite extensions that satisfy a given semantics .</p>
      <p>It is natural to conceive of an argumentative scenario with arguments being added as time
proceeds, such as the ongoing accumulation of scienti c studies. Then, in nite frameworks
naturally emerge as the union of the frameworks observed at each nite time. A key question,
then, is how the acceptance of arguments within the in nite framework F can be related to
the acceptance within the nite frameworks (Ft) which have appeared by time t. Our results
show that, for complexity reasons alone, credulous and skeptical acceptance of arguments in F
cannot be understood in terms of any kind of limiting procedure applied to the same problems
in Ft.</p>
      <p>A plethora of intriguing questions regarding the complexity of in nite AFs remains open.
In forthcoming extensions of this work, we shall ll the gaps that we left behind (such as the
entries marked with a dagger in Table 2). Next, we will show that the techniques introduced
here enable the construction of a single argumentation framework witnessing our hardness
results, thereby proving that solving these problems is not only challenging for the entire class
of argumentation frameworks but also remains di cult for an individual, speci c framework.</p>
      <p>Finally, future research will extend our analysis to analogous problems associated with other
key semantics for AFs, including grounded, preferred, and ideal semantics. Given that the
de nitions of these semantics are more intricate than those we examined here, we anticipate
the need for additional techniques to thoroughly analyze them.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments References</title>
      <p>Andrews was partially supported by NSF grant DMS-2348792. San Mauro is a member of
INDAM-GNSAGA.
[1] P. Baroni, F. Cerutti, P. E. Dunne, M. Giacomin, Automata for in nite argumentation
structures, Arti cial Intelligence 203 (2013) 104–150.
[2] P. M. Dung, On the acceptability of arguments and its fundamental role in nonmonotonic
reasoning, logic programming and n-person games, Arti cial intelligence 77 (1995) 321–
357.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>García</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Defeasible logic programming: An argumentative approach, Theory and practice of logic programming 4 (</article-title>
          <year>2004</year>
          )
          <fpage>95</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          , G. Guida,
          <article-title>Self-stabilizing defeat status computation: dealing with con ict management in multi-agent systems</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>165</volume>
          (
          <year>2005</year>
          )
          <fpage>187</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Verheij</surname>
          </string-name>
          , De og:
          <article-title>on the logical interpretation of prima facie justi ed assumptions</article-title>
          ,
          <source>Journal of Logic and Computation</source>
          <volume>13</volume>
          (
          <year>2003</year>
          )
          <fpage>319</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <article-title>Grounded semantics and in nitary argumentation frameworks</article-title>
          ,
          <source>in: Proceedings of the 26th Benelux Conference on Arti cial Intelligence</source>
          , BNAIC,
          <year>2014</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Spanring, In nite argumentation frameworks: On the existence and uniqueness of extensions, in: Advances in Knowledge Representation, Logic Programming</article-title>
          , and Abstract Argumentation: Essays Dedicated to Gerhard
          <source>Brewka on the Occasion of his 60th Birthday</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>281</fpage>
          -
          <lpage>295</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Computing with in nite argumentation frameworks: The case of afras</article-title>
          , in: Theorie and Applications of Formal Argumentation: First International Workshop,
          <string-name>
            <surname>TAFA</surname>
          </string-name>
          <year>2011</year>
          . Barcelona, Spain,
          <source>July 16-17</source>
          ,
          <year>2011</year>
          , Springer,
          <year>2012</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          , et al.,
          <source>Weighted argumentation., FLAP</source>
          <volume>8</volume>
          (
          <year>2021</year>
          )
          <fpage>1589</fpage>
          -
          <lpage>1622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Coherence in nite argument systems</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>141</volume>
          (
          <year>2002</year>
          )
          <fpage>187</fpage>
          -
          <lpage>203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <surname>P. E. Dunne,</surname>
          </string-name>
          <article-title>The computational complexity of ideal semantics</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>173</volume>
          (
          <year>2009</year>
          )
          <fpage>1559</fpage>
          -
          <lpage>1591</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <surname>W.</surname>
          </string-name>
          <article-title>Dvo ák, S. Woltran, Complexity of semi-stable and stage semantics in argumentation frameworks</article-title>
          ,
          <source>Information Processing Letters</source>
          <volume>110</volume>
          (
          <year>2010</year>
          )
          <fpage>425</fpage>
          -
          <lpage>430</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Brattka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hertling</surname>
          </string-name>
          ,
          <article-title>Handbook of computability and complexity in analysis</article-title>
          , Springer,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K. V.</given-names>
            <surname>Velupillai</surname>
          </string-name>
          ,
          <article-title>Computable foundations for economics</article-title>
          ,
          <source>Routledge</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Jäger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rogers</surname>
          </string-name>
          ,
          <article-title>Formal language theory: re ning the chomsky hierarchy</article-title>
          ,
          <source>Philosophical Transactions of the Royal Society B: Biological Sciences</source>
          <volume>367</volume>
          (
          <year>2012</year>
          )
          <fpage>1956</fpage>
          -
          <lpage>1970</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Semantics of abstract argument systems, Argumentation in arti cial intelligence (</article-title>
          <year>2009</year>
          )
          <fpage>25</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          ,
          <article-title>Complexity of abstract argumentation, Argumentation in arti cial intelligence (</article-title>
          <year>2009</year>
          )
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Rogers</surname>
          </string-name>
          Jr,
          <article-title>Theory of recursive functions and e ective computability</article-title>
          , MIT press,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Ash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Knight</surname>
          </string-name>
          ,
          <article-title>Computable structures and the hyperarithmetical hierarchy</article-title>
          ,
          <source>Elsevier</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Kleene</surname>
          </string-name>
          ,
          <article-title>Arithmetical predicates and function quanti ers</article-title>
          ,
          <source>Transactions of the American Mathematical Society</source>
          <volume>79</volume>
          (
          <year>1955</year>
          )
          <fpage>312</fpage>
          -
          <lpage>340</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kechris</surname>
          </string-name>
          ,
          <article-title>Classical descriptive set theory</article-title>
          , volume
          <volume>156</volume>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>Science</given-names>
          </string-name>
          &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>