<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Splitting Argumentation Frameworks with Collective Attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giovanni Buraglio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wolfgang Dvo ák</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matthias König</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefan Woltran</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>TU Wien, Institute of Logic and Computation</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <fpage>41</fpage>
      <lpage>55</lpage>
      <abstract>
        <p>A recurring notion in the abstract argumentation community is that of collective attacks, whereby a set of arguments, rather than a single one, attacks another argument. The resulting frameworks capturing this phenomenon are referred to as SETAFs. Given the possibility of facing an exponential runtime in the size of the framework, techniques have been presented to compute extensions of a given framework incrementally, i.e. restricting the search space to sub-frameworks only, and then combining the obtained results. Existing research has primarily focused on approaches based on SCC-recursiveness, where SETAFs are evaluated along their strongly connected components (SCCs) using generalized semantics and dedicated algorithms. Splitting approaches are more general in this regard, as they do not have to consider SCCs individually and can be used on top of arbitrary argumentation solvers. Splitting techniques have been successfully applied in abstract argumentation but have been neglected for SETAFs so far. Towards lling this gap our work investigates the concept of (modi cation-based) splitting for SETAFs. We show that a splitting-based approach is possible for common semantics (such as admissible, complete, grounded, preferred, and stable), generalizing corresponding results of AFs, which can be seen as a restricted class of SETAFs. Along the way, we point out intricate details that are obvious or trivial for AFs, but help us to understand the underlying ideas in greater detail than before.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;collective attacks</kwd>
        <kwd>splitting</kwd>
        <kwd>abstract argumentation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Most argumentation problems are intractable in general, which means even the best-known
methods for solving these problems oftentimes cannot avoid exploring the whole exponential
size solution-space. The fewer arguments we have to consider for each problem, the more
e cient an approach can be in general, which is why in the setting of abstract argumentation
(see [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]) it can be advantageous to evaluate only parts of a framework at once and then combine
the results. One approach to do this is splitting, as introduced by Baumann for Dung-style
argumentation frameworks (AFs) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and later considered in other settings [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ]. A popular
syntactic addition within argumentation frameworks that has been regarded in the community
are collective attacks (due to Nielsen and Parsons [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]), the resulting frameworks are called
SETAFs [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ]. Collective attacks have proven useful for the instantiation of structured
argumentation, see e.g. [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ]. However, a splitting approach for SETAFs has not yet
been introduced; in this paper we close this gap and investigate interesting di erences and
similarities to the simpler AF-case, which ultimately shines a new light on the existing ideas on
splitting. We show that if we carefully generalize the underlying intuitions, SETAFs yield an
elegant splitting procedure for most common semantics. Splitting techniques have also been
introduced for Abstract Dialectical Frameworks (ADFs) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However, even though SETAFs
can be modeled through ADFs, it is not obvious how these results are applicable in the context
of SETAFs—as ADFs deal with simple links and propositional acceptance conditions whereas
SETAFs rely on directed hypergraphs.
      </p>
      <p>
        Similar to the structure of Baumann [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], on this work, we consider directional splitting,
which means that we split a large SETAF SF into two sub-frameworks SF1 and SF2 in a way
s.t. only SF1 in uences SF2, but not the other way around. Clearly, the choices within the
subframework SF1 determine the acceptable arguments in SF2, which has to be accounted for
in order to correctly solve reasoning problems. In general, for such a scenario there are two
approaches: (a) SF2 is evaluated w.r.t. generalized semantics, that take the decisions in SF1 into
account, or (b) the modi cation-based approach, i.e., SF2 is syntactically modi ed, to simulate
the e ects of the decisions in SF1. While (a) is used for example in SCC-recursiveness [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
(i.e., an approach based on the strongly-connected components), AFs with input/output [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ],
or decomposition-based techniques for AFs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], approach (b) allows us to use unmodi ed
out-of-the-box argumentation solvers on both sub-frameworks. In this paper we will present a
modi cation-based splitting approach for SETAFs. This paper is organized as follows.
• In Section 2 we recall the de nition of SETAFs and their semantics, as well as the splitting
approach in AFs.
• Throughout Section 3 we explain the intuitions and intricacies of splitting in the context
of collective attacks and justify our design choices for the splitting algorithm.
• Section 4 contains the resulting de nition of the splitting approach for SETAFs, as well
as the theoretical underpinning for its correctness. Moreover, we establish its connection
to the directionality principle—a desirable result we already know from AFs.
• Finally, in Section 5 we conclude and discuss related work.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        In this section, we recall the de nition of argumentation frameworks with collective attacks
(SETAFs) [
        <xref ref-type="bibr" rid="ref6 ref7 ref9">6, 7, 9</xref>
        ] and their semantics. As we will see, with a slight abuse of notation, we can
view Dung-style argumentation frameworks (AFs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as a special case of SETAFs.
De nition 1. A SETAF is a pair SF = (A, R) where A is a nite set of arguments, and
R ✓ (2A \ {;} ) ⇥ A is the attack relation. For an attack (T, h) 2 R we call T the tail and h
the head of the attack. SETAFs (A, R), where for all (T, h) 2 R it holds that |T | = 1, amount
to (standard Dung) AFs. We usually write (t, h) to denote the set-attack ({t}, h). For S ✓ A,
we say S attacks an argument a 2 A if there is an attack (T, a) 2 R with T ✓ S. Moreover,
for a set B ✓ A we say that S attacks B if S attacks some b 2 B. We use SR+ to denote the set
{a | S attacks a} and de ne therange of S (w.r.t. R), denoted SR , as the set S [ S+.
R
      </p>
      <p>The fundamental notions of con ict and defense from Dung-style AFs naturally generalize to
SETAFs. These notions are the basis for the semantics we investigate in this paper.
De nition 2. Let SF = (A, R) be a SETAF. A set S ✓ A is con icting in SF if S attacks a for
some a 2 S. S ✓ A is con ict-free in SF , if S is not con icting inSF , i.e. if T [ { h} 6✓ S for
each (T, h) 2 R. cf(SF ) denotes the set of all con ict-free sets inSF . An argument a 2 A is
defended (in SF ) by a set S ✓ A if for each B ✓ A, such that B attacks a, also S attacks B in
SF . A set T ✓ A is defended (in SF ) by S if each a 2 T is defended by S (in SF ).</p>
      <p>
        The semantics we study in this work are the admissible, complete, grounded, preferred, and
stable semantics, which we will abbreviate by adm, com, grd, pref, and stb, respectively [
        <xref ref-type="bibr" rid="ref15 ref6 ref7">6, 7, 15</xref>
        ].
Moreover, we use (SF ) to denote the set of extensions of SF under semantics .
De nition 3. Given a SETAF SF = (A, R) and a con ict-free setS 2 cf(SF ). Then,
• S 2 adm(SF ), if S defends itself in SF ,
• S 2 com(SF ), if S 2 adm(SF ) and a 2 S for all a 2 A defended by S,
• S 2 grd(SF ), if S 2 com(SF ) and there is no T 2 com(SF ) s.t. T ⇢ S,
• S 2 pref(SF ), if S 2 adm(SF ) and there is no T 2 adm(SF ) s.t. T S, and
• S 2 stb(SF ), if SR = A.
      </p>
      <p>
        The relationship between the semantics has been clari ed in [
        <xref ref-type="bibr" rid="ref15 ref6 ref7">6, 7, 15</xref>
        ] and matches with the
relations between the semantics for Dung AFs, i.e. for any SETAF SF :
      </p>
      <p>stb(SF ) ✓ pref(SF ) ✓ com(SF ) ✓ adm(SF ) ✓ cf(SF )</p>
      <p>
        We now recall Baumann’s splitting approach for AFs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (in a slightly adapted equivalent
form to t our notation).
      </p>
      <p>De nition 4. Let F = (A, R) be an AF, F1 = (A1, R1) and F2 = (A2, R2) two sub-frameworks
of SF s.t. A1 \ A2 = ; , A = A1 [ A2 and R = R1 [ R2 [ R3 with R3 ✓ A1 ⇥ A2. We call
the triple (F1, F2, R3) a splitting of F . For such a splitting the (E, R3)-reduct w.r.t. E ✓ A1 is
the AF AF 0 = (A0, R0) with A0 = A2 \ ER+3 and R0 = R2 \ (A0 ⇥ A0). The set of undecided
arguments w.r.t. E ✓ A1 is de ned asUE = A1 \ ER1 .</p>
      <p>We will later generalize the notion of the reduct to be applicable in the context of SETAFs.
De nition 5. Let (F1, F2, R3) be a splitting for an AF F and E an extension of F1. Moreover,
take F20 = (A02, R20) as the (E, R3)-reduct of F2 and UE as the set of undecided arguments w.r.t.
E. The (UE, R3)-modi cation ofF2 is de ned asmodUE,R3 (F20) = (A02, R20 [ { (b, b) | 9 a 2
UE : (a, b) 2 R3}).</p>
      <p>
        It is easy to see that the de nition of the modi cation does not actually rely on the
undecided arguments, but rather uses the arguments as means to obtain the links which stem
from undecided arguments. Later on, we will make use of this fact to simplify the respective
notions. Baumann [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] showed that by this de nition it is possible for a splitting to compute the
extensions for each sub-framework separately.
      </p>
      <p>
        Theorem 6 ([
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]). Let (F1, F2, R3) be a splitting for an AF F = (A, R) with Fi = (Ai, Ri) and
2 { cf, adm, stb, com, pref, grd}.
1. If E1 2
2. If E 2
(F1) and E2 2
(F ), then E \ A1 2
(modUE,R3 (F20)), then E1 [ E2 2
      </p>
      <p>(F ).
(F1) and E \ A2 2
(modUE,R3 (F20)).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Towards Splitting for SETAFs</title>
      <p>
        In this section, we introduce fundamental ideas for de ning divide and conquer algorithms
based on splitting in the presence of collective attacks. As a starting point, we generalize the
notion of splitting introduced by Baumann [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] for Dung-style AFs. For this, we will in the
following provide comprehensive intuitions.
      </p>
      <p>De nition 7. Let SF = (A, R) be a SETAF, SF1 = (A1, R1) and SF2 = (A2, R2) two
sub-frameworks of SF such that A1 \ A2 = ; , A = A1 [ A2 and R = R1 [ R2 [ R3 with
R3 ✓ (2A1 \ {;} ) [ 2A2 ⇥ A2. We call a splitting of SF the triple (SF1, SF2, R3). Moreover,
we say that R3 is the set of links of the splitting (SF1, SF2, R3).</p>
      <p>In a nutshell, we investigate a large SETAF SF that has two sub-frameworks SF1 and SF2
with attacks within themselves, and attacks R3 that stem from A1 (at least in part) and target
only arguments in SF2. The general idea is to compute extensions of SF1 and SF2, which
combined give us extensions of SF . Due to the links from SF1 to SF2 we have to modify SF2
according to the extension(s) of SF1 to account for the prior accepted and rejected arguments.</p>
      <sec id="sec-3-1">
        <title>3.1. Simple Splitting for SETAFs</title>
        <p>
          We take here into account SETAF splittings where the whole tail of the links is separated from
the respective heads. Notice that, whereas these are indeed straightforward generalizations of
AF splittings [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], they represent only a speci c class of the splittings introduced by De nition 7.
In Section 3.2, we will investigate the problem of splitting SETAFs in full generality.
Example 8. Consider the SETAF SF below with its splitting (SF1, SF2, R3), with SF1 =
(A1, R1) and SF2 = (A2, R2). The dashed line indicates the separation between the
subframeworks. The goal is to compute the extensions of SF by computing the extensions of SF1 and
(a modi ed version of)SF2 separately. Note that throughout the remaining part of this paper we
will refer to the splitting in question always as (SF1, SF2, R3), unless indicated otherwise.
a
c
b
d
e
f
g
        </p>
        <p>A1 = {a, b, c, d}
R1 = {(a, a), (a, b), (c, d), (d, c), (c, a)}
A2 = {e, f, g}
R2 = {(e, f ), (f, e), ({e, f }, g)}
R3 = {({b, d}, e), (d, f )}
One can verify that SF1 has two preferred extensions: E1 = {b, c} and E2 = {d}. Let us rst
consider E1. Since d is defeated in SF1 we can argue that the links (i.e., attacks in R3) do not
at all a ect the arguments inSF2, and we can just evaluate SF2 “as is” to obtain the extensions
E1,1 = {e, g} and E1,2 = {f, g}. We can combine the extensions from SF1 and SF2 to obtain
{b, c, e, g} and {b, c, f, g}, which are indeed preferred extensions of SF . Now on the other hand if
we consider E2, it is non-trivial how this a ectsSF2: while f is defeated by d, e is targeted by an
attack from the accepted argument d and the argument b, which in SF1 is neither accepted nor
outright rejected by E2. In the following, we will argue how to properly deal with these cases and
introduce a splitting method that correctly characterizes all extensions.</p>
        <p>In the example above we can see that the status of the arguments in SF1 w.r.t. the extension
of SF1 we investigate determines whether and how the arguments in SF2 are a ected. Indeed,
in the AF case the status of the single argument in the tail of a link solely determines whether
the head is removed or not from the second sub-framework, or whether a self-attack is added
to it (c.f. De nitions 4 and 5). Similarly for SETAFs, it is possible to distinguish three di erent
scenarios for the status of the arguments in A1 after evaluating SF1, corresponding to the cases
where the argument is accepted (i.e., in an extension E1 2 (SF1)), defeated (in (E1)R+1 ) or
undecided (in A1 \ (E1)R1 ). Note however, that while on AFs the status of a link and its one tail
argument coincide, for SETAFs links (like any other attack) can have multiple tail arguments.
Hence, the status of a link (T , h) 2 R3 of a splitting (SF1, SF2, R3) can be determined after
evaluating SF1 as follows: (i) all of the arguments in the tail of a link (that are also in SF1) are
accepted (i.e., in an extension E1 2 (SF1)), (ii) at least one argument in the tail of a link is
+
defeated by E1 (in (E1)R1[ R3 ) or (iii) no argument is defeated but at least one is undecided
(in A1 \ ER1 ). In what follows, we consider cases (i)-(iii) separately and show an intuition on
how these need to be treated. We start with (i) in the Example 9, depicting a situation where
the attack ({x, y}, z) is in. As one can see, in certain circumstances the above de nition of a
splitting corresponds to a straightforward generalization of the AF case.</p>
        <p>
          Example 9. Consider the AF F (left), and the SETAF SF (right) with its splitting (SF1, SF2, R3).
a
b
c
v
w
x
y
z
We look at the preferred extensions {a} for the rst part ofF , and see that b in the second part is
defeated. Thus, by the approach of [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], b is removed when we look at the modi ed second framework,
and its outgoing attack towards c as well. We trivially obtain {c} as a preferred extension for the
modi ed right part. We combine{a} [ { c} to obtain {a, c} as the only preferred extension for F .
        </p>
        <p>Analogously, we have {v, w} as a preferred extension in SF1. Hence, we remove x from SF2 to
obtain the modi ed frameworkSF ?. As in the AF case, any outgoing attack from x (no matter if
2
other arguments are in the tail, like y in our case) cannot a ect their targeted argument (z), as z is
defended against this attack. Hence, we remove the entire attack and obtain SF2? = ({y, z}, ; )
which trivially yields {y, z} as its preferred extension. As a result, one gets {v, w} [ { y, z} as a
preferred extension for SF .</p>
        <p>We next discuss case (ii) for the status of a link in Example 10 below.</p>
        <p>Example 10. For the SETAF SF below, we identify the preferred extension {w, y} in the rst part
(i.e., {w, y} 2 pref(SF1)). Given that w 2 E, we get that x is defeated, which means the link
({x, y}, z) can be seen as out. Intuitively, z needs no more counter-attack for this incoming attack—
since x is already defeated. For this reason, such an attack does not a ect the modi cation ofSF2.
Hence, the modi edSF2? is as depicted on the right, preserving z as an acceptable argument. Note
also that any possible outgoing attacks of z remain untouched. We thus have {w, y} 2 pref(SF1)
and {z} 2 pref(SF ?) as preferred extensions of SF1 and SF2?, respectively. It is easy to see that
2
{w, y} [ { z} is a preferred extension of SF .</p>
        <p>w
x
y
z
w
x
y</p>
        <p>Di erent considerations are due whenever the original SETAF contains a link which is
undecided, corresponding to case (iii).</p>
        <p>Example 11. Consider the SETAF SF displayed below (left) and E = {y} 2 pref(SF1). x is
undecided w.r.t. E, i.e., x 2 A1 \ ER1 . This makes the status of ({x, y}, z) undecided as well,
enforcing a modi cation of the right part of the SETAF. Analogous to the approach for AFs, we
add a self-attack on z, obtaining SF2? = ({z}, {(z, z)}) (right). Intuitively, this models the fact
that z cannot be accepted in SF2?, since there is at least one attack that z is not defended against.
On the other hand, z is not rejected, i.e., if z were to attack other arguments in SF2 they need
defence against z. Hence, we cannot outright remove z as in case (ii). In this situation, one gets
; 2 pref(SF2?). Hence, {y} [ ; is a preferred extension of SF .</p>
        <p>x
y
z
x
y
z
z</p>
        <p>Examples 9, 10, and 11 above display only a special case of splitting for SETAFs, where the
whole tail of an attack is separated from its target. Hence, as of now performing
splittingbased techniques in the presence of collective attacks represents an easy and straightforward
generalization of its AF counterpart. This stems from the fact that modi cation is only slightly
impacted by the presence of multiple arguments in the tail of a link. Consequently, minor
adjustments are needed to handle such situations. However, due to their rich syntax, SETAFs
allow for another possible way to separate an attack via splitting. In the following, we consider
SETAF splittings in full generality.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Diagonal Splitting for SETAFs</title>
        <p>The enriched syntax of SETAFs allows us to take into account splittings that separate arguments
taking part in the same collective attack. In particular, it is possible to split a SETAF in such a
way that two parts of the same tail of a link end up being in di erent sub-frameworks. This is
captured by the possibility of having R3 ✓ (2A1 \ {;} ) [ 2A2 ⇥ A2 as for our De nition 7.
We investigate such scenarios in connection with the cases (i)-(iii) as before. Note however that
we need to consider the cases more carefully, as we now also consider links (T , h) 2 R3 where
the tail T is spread over both A1 and A2. More formally we call a link (T , h) 2 R3:</p>
        <p>ER+1[ R3 and 8 a 2 T \ A1, a 2</p>
        <p>ER+1[ R3 or</p>
        <p>E,
ER+1[ R3 and 9 a 2 T \ A1 s.t. a 2</p>
        <p>A \ ER1 .</p>
        <p>We again give the necessary intuitions for each case, starting with (i).</p>
        <p>Example 12. For the below SETAF SF (left), we consider {x} 2 adm(SF1). Therefore, intuitively
it is the remaining part of the attack stemming from y that is decisive for the status of the target
argument z. Since x is accepted, it su ces for the success of the attack ({x, y}, z) to consider
the status of y alone. Therefore, one can solely consider the remaining part of the attack in SF2.
Resulting from this, we obtain SF2? = ({y, z}, {(y, z)}) (right). Given that {y} 2 adm(SF2?), we
retrieve {x} [ { y} as an admissible set of SF .</p>
        <p>x
y
z
x
y
z</p>
        <p>More generally, given a set of arguments E which is accepted in SF1, the success of any link
(T , h) 2 R3 where T \ A1 ✓ E is dependent only on the status of T \ E in SF2. Opposite
considerations can be made when arguments in the links’ tails are defeated (case (ii)).
Example 13. Consider the following SETAF SF (left) with E = {w} 2 adm(SF1). As in
Example 10, the argument w 2 E attacks part of the link’s tail (i.e. x), thereby neutralizing
the collective attack ({x, y}, z). As a result, w is compatible with both y and z. More formally,
the rightmost part of SF is modi ed to obtainSF2? = ({y, z}, ; ) (middle). Indeed, their
setunion {w} [ { y, z} is an admissible set of SF . Note that this case (ii) can also occur via a link.
Consider the splitting for the SETAF SF † (right) where {a, b} is a preferred extension in the left
sub-framework. Since a defeats c, the link ({b, c}, d)) has to be deleted in the modi ed framework,
even though all tail-arguments of the link within A1 (i.e., in our case b) are accepted.
w
x
y
z
w
x
y
z
a
b
c
d</p>
        <p>As before, we can directly exploit (ii) in order to guide the modi cation of SF2 to get
extensions for the whole SETAF. It is however less straightforward to nd a correct modi cation
for case (iii), where a link is undecided due to what happens in SF1.</p>
        <p>Example 14. For SF (left), we have E = ; 2 adm(SF1) which means x 2 A1 \ ER1 , i.e.,
the link ({x, y}, z) is undecided. By naively applying the same technique as in the AF case (see
Example 11), we make z self-attacking. However, it is not immediately clear whether one should
modify SF2 to include (y, z) 2 R2? or not. It turns out that both options, i.e., (a) including (y, z),
and (b) not including (y, z) both lead to an undesired result.</p>
        <p>We see that {v} is admissible in both case (a) and (b). However, the additional self-loop (z, z)
resulting from modi cation makesz not acceptable in both cases. This is in contrast with the fact
that ; [ { v, z} is indeed an admissible extension of SF .
x
y
z
v
w
x
y
z</p>
        <p>v
(a)
w
x
y
z</p>
        <p>v
(b)
w</p>
        <p>We see that a naive generalization of the AF approach, where we blindly make those arguments
that are attacked by an undecided attack self-attacking, does not work as intended. In contrast
to the AF case, these attacks can still be counter-attacked if in the second part of the framework
an argument of the tail is attacked—as is the case in Example 14 where y is defeated by v.
In this situation, z should remain acceptable. In particular, we have to ensure that (1) {z} is
con ict-free in the modi ed SF2?, and (2) z can only be accepted if the remaining part of the
attack ({x, y}, z) is counter-attacked (e.g., in Example 14, if y is attacked). In fact, being out,
the attack (y, z) is too weak and gets overwritten by the undec self-loop over z, thereby letting
the status of z be entirely dependent on that of x. This is in opposition to what happens in the
original SETAF, where the acceptance of z depends on the fact that y is defeated.</p>
        <p>
          In order to present a splitting-based algorithm that works in a truly incremental and modular
fashion, we consider a possible modi cation that is intermediate between adding an attack
or not. For this, we have to make sure that the remaining part of the link is not “powerful”
enough to actually defeat z—while at the same time indicating a need for z to defend against
the remaining part of the attack. In the SCC-recursive schema for SETAFS [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] this issue has
been resolved by marking certain attacks as mitigated attacks, i.e., those are attacks that have to
be counter-attacked in order to accept the target argument, but cannot be used to attack the
target argument in order to defend some other argument. In a nutshell, a con ict-free set is
admissible if for each attack towards the set (mitigated or not) a non-mitigated counter-attack
exists. However, in our modi cation-based approach we cannot add new syntactic concepts
and adjusted semantics but have to encode this behavior within the standard SETAF syntax.
A way to do this is by adding a self-attacking argument in the second sub-framework which
participates in the collective attack along with the remaining part of it. This duplicate argument
carries out the work of the undecided argument that is lost after splitting. Such modi cation
can be visualized in the following example.
        </p>
        <p>Example 15. Contrary to the idea of mitigated attacks discussed before, we do not need labeling for
attacks in this scenario. Instead, we add a dummy argument ⇤ for the undecided attack ({x, y}, z)
such that ⇤ is self-attacking and attacks z together with y (via the attack ({⇤ , y}, z)).
x
y
z
w
x
y
z
⇤
w
Modifying the second part of the framework in this way successfully neutralizes the acceptance
of w, which is now faced by an undecided attack. Notably, the second part of the framework is
identical to the whole SETAF prior to modi cation.</p>
        <p>Such an addition can result in augmenting the number of arguments and attacks in the
rightmost part of the framework. More importantly, such an unwanted outcome can be easily
avoided. In fact, we can employ the very same target argument to do the job that was previously
done by the dummy argument. As a consequence, the dummy argument becomes obsolete,
and the modi ed attack collapses onto one singular (set)-self-attack on the target, as the next
example illustrates.</p>
        <p>Example 16. As a nal strategy we introduce a more concise and elegant modi cation of the
second part of the framework at hand. Instead of using a dummy argument to make the attack
towards z undecided, we choose to use z itself. This way, we obtain the expected result without
creating a duplicate of x in the second part of the framework. This means, to account for the attack
({x, y}, z) with the undecided argument x in the original framework (left), we introduce in the
modi cation the attack({y, z}, z) which is a “set-self-attack” (right). Note that z is not a classic
“self-attacker” as in the AF-case, since we do not introduce an attack (z, z).</p>
        <p>x
y
z
w
x</p>
        <p>w
y
z
In the modi cation (right), the attack({z, y}, z) can never defeat its head z (since its con icting
tail {y, z} would have to be accepted). Since z is not defeated, it is undecided, which carries over to
w via the unaltered attack (z, w). This yields the admissible set ; [ { y} as desired.</p>
        <p>As a sanity check, note that this is indeed a generalization of the AF modi cation. In fact, for
attacks (T, h) with |T | = 1, e.g. for (T, h) = ({t}, h), we have T \ {t} = ; . Thus, we add the
self-attack (; [ { t}, t) which is the attack (t, t).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Reduct, SETAF Modification, and Splitting Theorem</title>
      <p>
        In this section, we introduce the formal de nitions that are needed to prove the correctness of
our proposed splitting-based algorithm. Following Baumann [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], we generalize the notions of
reduct and modi cation, in application to the rightmost part of the original SETAFs. Intuitively,
the reduct takes care of the arguments in SF2 that are already defeated by E1 by removing them,
and modi es the links that we characterize as in–case (1)—s.t. the remaining attack appears in
the reduct SF20. The modi cation then “modi es” the undecided links by adding the targeted
argument to the tail—we add (set-)self-attacks, as discussed in Example 16.
      </p>
      <p>Hence, after computing an extension E1 in SF1, we obtain the reduct of SF2 w.r.t. E1 (i.e.,
SF20) as follows:</p>
      <p>+ which are defeated by E1, together with their
in1. We remove the arguments a 2 (E1)R3
and outgoing attacks, which we realize by only keeping those attacks from R2 which are
completely within the new set of arguments A02 (as in the original approach of Baumann),
2. we add the remaining part T \ A02 of a link (T, h) 2 R3 if the tail arguments in T \ A1
are all in E1 and no tail argument t 2 T is defeated via R3 (as showcased in Example 12),
given that there are any tail-arguments left in SF2 (i.e., T \ A02 6= ; ).</p>
      <p>This allows us to retain all the information concerning defeated arguments and in attacks of SF1.
Formally this translates to the following notion of reduct (which we illustrate in Example 20):
De nition 17 (Reduct). Let (SF1, SF2, R3) be a splitting for a SETAF SF . We de ne the
(E1, R3)-reduct (or simply reduct) of SF2 for some extension E1 of SF1 as the SETAF SF20 =
+
(A02, R20) where, A02 = {a 2 A2 | a 2 / (E1)R3 } and</p>
      <p>R20 ={(T, h) 2 R2 | T ✓ A02, h 2 A02} [</p>
      <p>{(T \ A02, h) | (T, h) 2 R3, T \ A02 6= ; , h 2 A02, T \ A1 ✓ E1, T \ (E1)R+3 = ;}
We have argued throughout this paper that in fact, when dealing with undecidedness, what
guided our intuition towards a certain modi cation is not the status of the arguments in SF1,
but rather the status of the links (corresponding to cases (i)-(iii)). In fact, if we closely examine
De nition 5 we can see that even in the AF case we add self-attacks to those arguments that are
targeted by an undecided link—the set UE of undecided arguments is merely a tool to formally
obtain those links. In the context of SETAFs, where an attack is not associated to exactly one
attacker, this becomes even more evident. Hence, we decide to slightly tweak the de nition to
omit such detour, and base our notion solely on the undecided links.</p>
      <p>De nition 18 (Undecided Links). Given a splitting (SF1, SF2, R3) for a SETAF SF and an
extension E1 2 SF1 we de ne theset of undecided links w.r.t. E1 as:</p>
      <p>URE31 = {(T, h) 2 R3 | T \ (E1)R1[ R3 = ; and 9 t 2 T : t 2 A1 \ (E1)R1 }</p>
      <p>+</p>
      <p>In what follows, we de ne the modi cation, which is applied on the reduct, and accounts
for the e ects of the undecided links. In particular, for each undecided link, we add to the
targeted argument a (set-)self-attack incorporating the remaining part of the link (as intuitively
explained in Example 16).</p>
      <p>De nition 19 (Modi cation). Let (SF1, SF2, R3) be a splitting for a SETAF SF and E1 an
extension of SF1. Take SF20 as the (E1, R3)-reduct of SF2 and URE31 as the set of undecided links
w.r.t. E1. We denote with modER13 (SF20) the URE31 -modi cation (or simply modi cation) ofSF20 s.t.:
modER13 (SF20) = (A02, R20 [ { ((T \ A02) [ { h}, h) | (T, h) 2 URE31 , h 2 A02})</p>
      <p>Before we present the main result of this paper we want to illustrate De nitions 17–19 in the
following example, while covering many interesting cases at once.</p>
      <p>Example 20. In (a) we have a new SETAF SF with a splitting that separates the arguments
A1 = {a, b, c, d} from A2 = {v, w, x, y, z}. We see that E1 = {c} is admissible in the left part
of the splitting. In (b) we see the reduct w.r.t. the set {c}, where a and d are defeated by c (as
{c}R+1 = {a, d}) and b is undecided. This reduct contains from the right part all arguments except
z, which is defeated by c (as {c}R+3 = {z}). We see that most attacks are removed from the right
part, but (x, w) persists (since it is in R2 and all involved arguments remain), and the attack
({c, y}, x) is changed to (y, x). The attack ({b, z}, y) is removed since z is defeated. The attack
({b, w}, v) is also removed, as b is undecided (i.e., {b, w} \ A1 * E1). However, in (c) we see that
the latter case is important for the modi cation: the attack({b, w}, v) is an undecided link, which
means in the modi cation we introduce the attack({v, w}, v). For the right part of the splitting
we see that {y, w} is admissible, and obtain {c, y, w} as an admissible set for SF .
a
c
b
d</p>
      <p>v
x y
w
z
a
c
b
d</p>
      <p>v
x y
w
z
a
c
b
d</p>
      <p>v
x y
w
z
(a) SETAF SF
(b) ({c}, R3)-reduct
(c) UR{c3}-modi cation
Note that in the rst step, for the left part of the splitting, instead of the set{c} we could also
investigate the admissible sets ; , {a}, or {a, d}, which result in di erent reducts and modi cations.</p>
      <p>Having these notions at hand, we now establish the adequacy of our splitting technique for
SETAFs. We start by establishing that (a) con ict-freeness of the sub-frameworks SF1 and SF2
carries over to the whole SETAF SF , and (b) con ict-free sets of SF induce con ict-free subsets
in SF1 and SF20.</p>
      <p>Proposition 21. Let (SF1, SF2, R3) be a splitting for a SETAF SF = (A, R) with SF1 =
(A1, R1) and SF2 = (A2, R2). Let SF2? = modER13 (SF20).</p>
      <p>1. If E1 2 cf(SF1) and E2 2 cf(SF2?), then E1 [ E2 2 cf(SF ).</p>
      <p>2. If E 2 cf(SF ), then E \ A1 2 cf(SF1) and E \ A2 2 cf(SF20).</p>
      <p>Proof. (1.) We need to show for each (T, h) 2 R1 [ R2 [ R3 that T [ { h} * E = E1 [ E2.
Let SF20 = (A02, R20) and SF2? = (A?2, R2?). If (T, h) 2 R1 we immediately get T [ { h} * E,
since we know E1 is con ict-free in SF1. For (T, h) 2 R2 there are two cases: either (a) the
attack is removed when we construct the reduct or (b) the attack remains, i.e., (T, h) in SF2?.
+
Case (a) happens if some a 2 T [ { h} is attacked by E1, i.e., (T [ { h}) \ (E1)R1[ R3 6= ; .
Then at least one argument a 2 T [ { h} of the attack does not occur in the modi cation (i.e.,
(T [ { h}) * A?2), and since we assume E2 2 cf(SF2?) we know E2 ✓ A?2. Hence we obtain
T [ { h} * E. For case (b) we get from E2 2 cf(SF ?) that at least one argument a 2 T [ { h}
is not in E2, which also means T [ { h} * E. Finally, for (T, h) 2 R3 we again consider two
cases: (a) T \ A1 ✓ E1, and (b) T \ A1 * E1. For case (a) we either have T ✓ A1 in which
case h 2 (E1)R+3 and we obtain h 2 / E (since then h 2 / A02 while we know E2 ✓ A02), or if
T * A1 we get an attack (T \ A02, h) 2 R2? (if otherwise T \ A02 = ; this means we removed
some a 2 T \ A2 when constructing the reduct, which means a 2 / E2 and consequently a 2 / E),
which since E2 2 cf(SF2?) either means T \ A02 * E2 or h 2 / E20, both give us T [ { h} * E.
For case (b) we have T \ A1 * E1, which means T [ { h} * E.</p>
      <p>(2.) Suppose now that E 2 cf(SF ). From this we derive that E \ A1 2 cf(SF1) because
every subset of a con ict-free set is also con ict-free. We now show that E \ A2 2 cf(SF20).
Given that E 2 cf(SF ), then for all T ✓ E \ A1 and a 2 E \ A2, we have (T, a) 2 / R3.
Hence, no argument in E is deleted going from SF2 to the reduct SF20. Thus, we conclude that
E \ A2 ✓ A02. Moreover, by E 2 cf(SF ) we know for each (T, h) 2 R2 that T [ { h} * E
which carries over to SF20, since the attacks in R2 may be removed, but are never changed.
Finally, whenever for a link (T, h) 2 R3 with T \ A1 ✓ E we add an attack (T \ A02, h) 2 R20
when constructing the reduct, we also obtain (T \ A02) [ { h} * E since otherwise T [ { h} ✓ E.
Therefore, E \ A2 2 cf(SF20) concluding the proof.</p>
      <p>
        Finally, we are ready to characterize the splitting algorithm by proving the main theorem
of this paper for the standard Dung semantics. In particular, we show that 1. if one computes
an extension E1 in SF1, then applies the previously discussed reduct and modi cation, and
obtains an extension E2 of the remaining sub-framework, the set-union of the two indeed make
for an extension of the whole framework SF . This characterizes the incremental computation
of the extension E by evaluating the two sub-frameworks. Conversely, we show that 2. if
we project an arbitrary extension E of the whole framework SF to the sub-frameworks, we
obtain extensions E1 for SF1 and E2 for the (w.r.t. E1)-modi ed version of SF2. This result
generalizes the corresponding result of AFs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Due to space constraints we present proof details only for admissible semantics, which are
prototypical for the other semantics. Details for the remaining semantics can be found in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
Theorem 22. Let (SF1, SF2, R3) be a splitting for a SETAF SF = (A, R) with SF1 = (A1, R1),
SF2 = (A2, R2), and 2 { stb, adm, com, pref, grd}.
      </p>
      <p>Proof. (admissible). (1.) Since admissibility implies con ict-freeness, we know from
Proposition 21 that E = E1 [ E2 2 cf(SF ). We need to show that E defends itself in SF , i.e. for all
a 2 E, if (T, a) 2 R1 [ R2 [ R3, then (T 0, t) 2 R1 [ R2 [ R3 for T 0 ✓ E and t 2 T . Consider
an argument a 2 E1. E1 defends a from each attack in R1 towards a since E1 2 adm(SF1).
Therefore, E1 2 adm(SF ). Consider now an argument a 2 E2 and an arbitrary attack
(T, a) 2 R2 [ R3 towards a. If T \ (E1)R+1[ R3 6= ; we know a is defended (in SF ) by E1
+
against (T, a) and we are done, hence, we proceed with the assumption T \ (E1)R1[ R3 = ; .
This means that either (T \ A02, a) 2 R2? (via the reduct) or ((T \ A02) [ { a}, a) 2 R2? (via the
modi cation). Since a 2 E2 and E2 2 adm(SF2?) we know there is a counter-attack in R2?
which defends a. Even in case ((T \ A02) [ { a}, a) 2 R2? this counter-attack cannot be against a
since this violates con ict-freeness of E2 in SF2?. Hence, there is some (S, t) 2 R2? s.t. S ✓ E2
and t 2 T \ A02 with t 2 / S. Hence, either (a) (S, t) 2 R2 in which case a is defended by E in
SF or (b) there is some (S0, t) 2 R3 with S0 S s.t. S0 \ A1 ✓ E1, in which case a is defended
(in SF ) by E via the attack (S0, t) since then S0 ✓ E1 [ E2. In any case we showed that a is
defended in SF by E, i.e., E 2 adm(SF ).</p>
      <p>(2.) By Proposition 21 we get E1 = E \ A1 2 cf(SF1) and E2 = E \ A2 2 cf(SF20). Since E
is defends itself in SF we get E \ A1 2 adm(SF1) because (SF1, SF2, R3) is a splitting of SF ,
i.e. no argument in E \ A1 is attacked by a subset of A2 or defended by E \ A2. That is, in SF1
every attack towards an argument in E \ A1 is countered by E \ A1. It remains to show that
E \ A2 2 adm(SF2?). Consider now an argument a 2 E2 and an arbitrary attack (T, a) 2 R2?
against a. This attack (T, a) either corresponds to an attack (T, a) 2 R2 or (T 0, a) 2 R3 with
T 0 T \ {a} (which accounts for both the case of addition in the reduct and the modi cation).</p>
      <p>+ +
In both cases we have that T \ (E1)R1[ R3 = ; (or T 0 \ (E1)R1[ R3 = ; , resp.) as otherwise
(T, a) would not be in R2?. However, since a is defended by E in SF , there is a counter-attack
(S, t) 2 R2 [ R3 s.t. S ✓ E and t 2 (T \ {a}) (or t 2 (T 0 \ {a}), resp.). If (S, t) 2 R2 then from
S ✓ E and E2 ✓ A02 (which we get from E2 2 cf(SF20) via Proposition 21) and the fact that
then (S, t) 2 R20 since S [ { t} ✓ A02 we get that E2 defends a via (S, t) against (T, a) in SF2?.
If (S, t) 2 R3 since S ✓ E we have S \ A1 ✓ E1, and hence we get an attack (S \ A02, t) 2 R20
which again defends a against (T, a) in SF2?. Hence, in every case a is defended in SF2?, i.e.,
E2 2 adm(SF2?).</p>
      <p>
        To further establish the adequacy of our splitting approach for SETAFs, we want to highlight
that we retain the close connection to the directionality principle [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] already proven for AFs [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Before introducing the de nition of directionality, we rst recall the notion of in uence: in
a SETAF SF = (A, R) an argument a 2 A in uences an argument b 2 A if there is a
path (a, p1, . . . , pn, b) in SF s.t. for 1  i &lt; n, (Ti, pi+1) 2 R with pi 2 Ti, as well as
(T0, p1), (Tn, b) 2 R with a 2 T0, pn 2 Tn holds (i.e., there is a path from a to b if we “break
up” the hyperedges to standard directed edges—the primal graph of SF ). A set S ✓ A is an
unin uenced setin SF (denoted S 2 US(SF )) if no a 2 A \ S in uences any b 2 S. In other
words, a set S is unin uenced in SF if it has no incoming edges. In a nutshell, directionality
states that the projection SF #U of a SETAF SF to an unin uenced set U yields the same
extensions as the original framework (ignoring the arguments removed under projection).
De nition 23. A semantics satis esdirectionality if for all SETAFs SF and every U 2 US(SF )
it holds (SF #U ) = {E \ U | E 2 (SF )}, where SF #U = (U, {(T 0, h) | (T, h) 2 R, h 2
U, T 0 = T \ U, T 0 6= ;} ).
      </p>
      <p>We are now able to generalize the following result regarding directionality from AFs [4,
Theorem 4.13].</p>
      <p>Theorem 24. Let be a semantics s.t. | (SF )| 1 for each SETAF SF . If allows splitting (i.e.,
Theorem 22 holds for ) then satis es directionality.</p>
      <p>Proof. Assume towards contradiction this is not the case, i.e., for some SETAF SF = (A, R) and
some U 2 US(SF ) it holds (SF#U ) 6= {E \ U | E 2 (SF )}. Observe that (SF#U , SF2, R3)
is a splitting of SF , where SF2 = (A \ U, R \ (2A\U ⇥ (A \ U ))) and R3 contains exactly
those attacks of SF that are neither in SF#U nor SF2.</p>
      <p>(✓6 ): This means there is some E1 2 (SF #U ) s.t. E1 6= {E \ U } for any E 2 (SF ).
By Theorem 22 and since | (SF2?)| 1 we get E2 2 (SF2?), where SF2? = modER13 (SF20)
and SF20 is the (E1, R3)-reduct of SF2. Then by Theorem 22 we get E1 [ E2 2 (SF ), a
contradiction to the assumption that there is no E 2 (SF ) s.t. E1 = E \ U .</p>
      <p>(◆6 ): This means there is some E 2 (SF ) s.t. there is no E1 2 (SF#U ) with E1 = {E \ U },
directly contradicting Theorem 22.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>
        In this paper, we introduced a modi cation-based splitting approach for SETAFs, and showed
that it generalizes the important key features of its AF counterpart. In the following, we clarify
the relation of our splitting approach to SCC-recursiveness (as due to [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] for SETAFs) and
splitting for abstract dialectal frameworks (ADFs) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In the incremental computation approach
induced by the SCC-recursive property, one computes the extensions in subframeworks of a
given SETAF, and ultimately combines the thereby computed extension parts (as in the splitting
approach). In contrast to splittings however, this is restricted to subframeworks that make up
strongly connected components w.r.t. the primal graph of the SETAF. Splitting on the other hand
is more general in this regard, as the subframeworks do not have to be strongly connected.
Finally, SCC-recursiveness relies on a generalized semantics to deal with the decisions of prior
parts of the framework, in contrast to the syntactic manipulation-based approach of splitting.
      </p>
      <p>
        ADFs [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] are an expressive argumentation formalism, where each argument is associated
with a propositional formula over arguments as variables as an acceptance condition. It is
wellknown that SETAFs can be interpreted as a special kind of ADFs with acceptance conditions in
the form of a conjunction of disjunctive clauses of negated literals [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. That is, in principle we
can apply ADF splitting to SETAFs. However, it is not clear that following the ADF approach
the modi ed second framework again is of the desired (SETAF-like) form and whether one
can avoid certain overheads in the simpler case of SETAFs. Upon closer inspection and with
minor syntactic manipulation the ADF approach in the special case of SETAF-like frameworks is
similar to what we discussed in Example 15, where we introduced arti cial “dummy”-arguments.
However, such a trick is not needed in our case, as we have illustrated.
      </p>
      <p>In summary, we showed how the splitting technique can be applied in the context of collective
attacks, where in contrast to the AF case also intricate situations like “diagonal splitting” can
occur. We furthermore showed that the splitting theorem holds in the setting of SETAFs, and
established that we retain the strong link to directionality which is known for AFs.</p>
      <p>
        Our result can serve as a starting point for more general splitting ideas like parameterized
splitting (cf. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for AFs), as well as a broader consideration in the context of dynamic
argumentation. Future work includes the generalization to parameterized splitting also for SETAFs, as
well as an implementation of the algorithm.
      </p>
      <sec id="sec-5-1">
        <title>Acknowledgments</title>
        <p>This work has been supported by the European Union’s Horizon 2020 research and innovation
programme (under grant agreement 101034440). Moreover, this research has been supported
by the Vienna Science and Technology Fund (WWTF) through project ICT19-065, and through
the Austrian Science Fund (FWF) through projects 10.557766/COE12 and P32380.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          ,
          <article-title>Splitting an argumentation framework</article-title>
          ,
          <source>in: Proceedings of LPNMR</source>
          <year>2011</year>
          , volume
          <volume>6645</volume>
          <source>of LNCS</source>
          , Springer,
          <year>2011</year>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>53</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Linsbichler</surname>
          </string-name>
          ,
          <article-title>Splitting abstract dialectical frameworks</article-title>
          ,
          <source>in: Proceedings of COMMA</source>
          <year>2014</year>
          , volume
          <volume>266</volume>
          of Frontiers in
          <source>Arti cial Intelligence and Applications</source>
          , IOS Press,
          <year>2014</year>
          , pp.
          <fpage>357</fpage>
          -
          <lpage>368</lpage>
          . doi:
          <volume>10</volume>
          .3233/978-1-
          <fpage>61499</fpage>
          -436-7-357.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          ,
          <article-title>Metalogical Contributions to the Nonmonotonic Theory of Abstract Argumentation</article-title>
          , College Publications - Studies in Logic,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          , G. Brewka, W. Dvo ák, S. Woltran,
          <article-title>Parameterized splitting: A simple modi cation-based approach</article-title>
          ,
          <source>in: Correct Reasoning - Essays on Logic-Based AI in Honour of Vladimir Lifschitz</source>
          , volume
          <volume>7265</volume>
          <source>of LNCS</source>
          , Springer,
          <year>2012</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <article-title>A generalization of Dung's abstract framework for argumentation: Arguing with sets of attacking arguments</article-title>
          ,
          <source>in: Proceedings of ArgMAS 2006</source>
          , Springer,
          <year>2006</year>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>73</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -75526-
          <issue>5</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Flouris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bikakis</surname>
          </string-name>
          ,
          <article-title>A comprehensive study of argumentation frameworks with sets of attacking arguments</article-title>
          ,
          <source>Int. J. Approx. Reason</source>
          .
          <volume>109</volume>
          (
          <year>2019</year>
          )
          <fpage>55</fpage>
          -
          <lpage>86</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ijar.
          <year>2019</year>
          .
          <volume>03</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvo ák</surname>
          </string-name>
          , M. König,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Principles and their computational consequences for argumentation frameworks with collective attacks</article-title>
          ,
          <source>J. Artif. Intell. Res</source>
          .
          <volume>79</volume>
          (
          <year>2024</year>
          )
          <fpage>69</fpage>
          -
          <lpage>136</lpage>
          . doi:
          <volume>10</volume>
          .1613/JAIR.1.14879.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bikakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          , W. Dvo ák, G. Flouris,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <article-title>Joint attacks and accrual in argumentation frameworks</article-title>
          ,
          <source>in: Handbook of Formal Argumentation</source>
          , volume
          <volume>2</volume>
          ,
          <string-name>
            <surname>College</surname>
            <given-names>Publications</given-names>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Attack semantics and collective attacks revisited, Argument and Computation (</article-title>
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3233/AAC-230011, pre-press.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Just a matter of perspective - intertranslating expressive argumentation formalisms</article-title>
          ,
          <source>in: Proceedings of COMMA</source>
          <year>2022</year>
          , volume
          <volume>353</volume>
          <source>of FAIA</source>
          , IOS Press,
          <year>2022</year>
          , pp.
          <fpage>212</fpage>
          -
          <lpage>223</lpage>
          . doi:
          <volume>10</volume>
          .3233/FAIA220154.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dimopoulos</surname>
          </string-name>
          , W. Dvo ák, M. König,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Rede ning ABA+ semantics via abstract set-to-set attacks</article-title>
          ,
          <source>in: Proceedings of AAAI</source>
          <year>2024</year>
          , AAAI Press,
          <year>2024</year>
          , pp.
          <fpage>10493</fpage>
          -
          <lpage>10500</lpage>
          . doi:
          <volume>10</volume>
          .1609/AAAI.V38I9.28918.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. W. N. van der</given-names>
            <surname>Torre</surname>
          </string-name>
          , S. Villata,
          <article-title>On the input/output behavior of argumentation frameworks</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>217</volume>
          (
          <year>2014</year>
          )
          <fpage>144</fpage>
          -
          <lpage>197</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2014</year>
          .
          <volume>08</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <article-title>Toward incremental computation of argumentation semantics: A decompositionbased approach</article-title>
          , Ann. Math. Artif. Intell.
          <volume>67</volume>
          (
          <year>2013</year>
          )
          <fpage>319</fpage>
          -
          <lpage>358</lpage>
          . doi:
          <volume>10</volume>
          .1007/ S10472-013-9364-8.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvo ák</surname>
          </string-name>
          , A. Greßler,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Evaluating SETAFs via answer-set programming</article-title>
          ,
          <source>in: Proceedings of SAFA</source>
          <year>2018</year>
          , volume
          <volume>2171</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Buraglio</surname>
          </string-name>
          , W. Dvo ák, M. König,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Splitting Argumentation Frameworks with Collective Attacks</article-title>
          ,
          <source>Technical Report DBAI-TR-2024-126</source>
          , Technische Universität Wien,
          <year>2024</year>
          . URL: https://dbai.tuwien.ac.at/research/report/dbai-tr
          <string-name>
            <surname>-</surname>
          </string-name>
          2024-126.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Brewka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ellmauthaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Strass</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Abstract dialectical frameworks</article-title>
          , in: Handbook of Formal Argumentation, College Publications,
          <year>2018</year>
          , pp.
          <fpage>237</fpage>
          -
          <lpage>285</lpage>
          . Also appears in
          <source>IfCoLog Journal of Logics and their Applications</source>
          <volume>4</volume>
          (
          <issue>8</issue>
          ):
          <fpage>2263</fpage>
          -
          <lpage>2318</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>W.</surname>
          </string-name>
          <article-title>Dvo ák, A. Keshavarzi Zafarghandi, S. Woltran, Expressiveness of SETAFs and supportfree ADFs under 3-valued semantics</article-title>
          ,
          <source>J. Appl. Non Class. Logics</source>
          <volume>33</volume>
          (
          <year>2023</year>
          )
          <fpage>298</fpage>
          -
          <lpage>327</lpage>
          . doi:
          <volume>10</volume>
          . 1080/11663081.
          <year>2023</year>
          .
          <volume>2244361</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>