<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Evaluation of Algorithms for Strong Admissibility</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Caminada</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sri Harikrishnan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cardi University</institution>
          ,
          <addr-line>Cardi</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Wirtschaftsuniversität Wien</institution>
          ,
          <addr-line>Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <fpage>69</fpage>
      <lpage>82</lpage>
      <abstract>
        <p>In the current paper, we evaluate the performance of di erent computational approaches for constructing a strongly admissible labelling for a particular argument. Unlike previous work, which examined di erent approaches for constructing a small strongly admissible labelling for a particular argument, in the current paper we are interested in constructing an arbitrary strongly admissible labelling for a particular argument, without any constraints regarding the size of such a labelling. A strongly admissible labelling relies on its associated min-max numbering to show that it is actually strongly admissible. As such, we also examine the additional computational costs of constructing such a min-max numbering. Overall, our analysis leads to a clear recommendation regarding which of the current computational approaches is best t for purpose.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;strong admissibility</kwd>
        <kwd>polynomial algorithms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In formal argumentation, one would sometimes like to show that a particular argument is
(credulously) accepted according to a particular argumentation semantics, without having
to construct the entire extension the argument is contained in. For instance, to show that
an argument is in a preferred extension, it is not necessary to construct the entire preferred
extension. Instead, it is su cient to construct a set of arguments that is admissible. Similarly,
to show that an argument is in the grounded extension, it is not necessary to construct the
entire grounded extension. Instead, it is su cient to construct a set of arguments that is strongly
admissible.</p>
      <p>
        The concept of strong admissibility was introduced by Baroni and Giacomin [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as one of the
properties to describe and categorise argumentation semantics. It was subsequently studied
by Caminada and Dunne [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] who further developed strong admissibility in both its set and
labelling form. In particular, the strongly admissible sets (resp. labellings) were found to form a
lattice with the empty set (resp. the all-undec labelling) as its bottom element and the grounded
extension (resp. the grounded labelling) as its top element [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>
        A strongly admissible set (or labelling) can be used to explain that a particular argument is in
the grounded extension (for instance, by using the discussion game of [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). A relevant question,
therefore, is how to construct a strongly admissible set (or labelling) for a particular argument
in a computationally e cient way (that is, with minimal runtime).
      </p>
      <p>
        In previous work [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] we focussed on providing algorithms that aim to construct a relatively
small1 strongly admissible labelling for a particular argument (that is, where this argument is
labelled in). These algorithms are approximations in the sense that although they aim to yield a
relatively small strongly admissible labelling, they do not guarantee to yield an absolute smallest
strongly admissible labelling,2 as the task of doing the latter is NP-complete [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], whereas our
algorithms are polynomial [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Overall, we found that our best performing algorithm (Algorithm
3 of [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]) yields labellings that are only marginally bigger than an absolute smallest strongly
admissible labelling, with just a fraction of the runtime [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In the current paper, we examine two additional questions that were not examined in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
The rst question is how to e ciently construct a strongly admissible labelling for an argument,
without any requirement regarding the size of such a labelling. The second question is what is
the additional cost of constructing the min-max numbering of the strongly admissible labelling,
instead of just constructing the labelling itself.
      </p>
      <p>
        The current paper is structured as follows. First, in Section 2 we brie y reiterate some of
the theory regarding strongly admissible sets and strongly admissible labellings. In order to
make the paper self-contained, we also include the algorithms stated in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Then, in Section 3,
we examine which of the existing algorithms for strong admissibility (ours as well as those of
others) are the most e cient when it comes to constructing an arbitrary strongly admissible
labelling for a particular argument, regardless the size of such labelling. Then, in Section 4, we
examine the additional costs (regarding runtime) of computing the min-max numbering of the
strongly admissible labelling, instead of just constructing the labelling itself. We round o with
a discussion of the obtained results in Section 5.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>In the current section, we brie y restate some of the basic concepts in formal argumentation
theory, including strong admissibility. For current purposes, we restrict ourselves to nite
argumentation frameworks.</p>
      <p>De nition 1. An argumentation framework is a pair (Ar , att ) where Ar is a nite set of entities,
called arguments, whose internal structure can be left unspeci ed, and att is a binary relation on
Ar . For any x, y 2 Ar we say that x attacks y i (x, y) 2 att .</p>
      <p>As for notation, we use lower case letters at the end of the alphabet (such as x, y and z) to
denote variables containing arguments, upper case letters at the end of the alphabet (such as X,
Y and Z) to denote program variables containing arguments, and upper case letters at the start
of the alphabet (such as A, B and C) to denote concrete instances of arguments.</p>
      <p>
        When it comes to de ning argumentation semantics, one can distinguish the extension
approach and the labelling approach [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. We start with the extensions approach.
1Small w.r.t. the size of the labelling [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], meaning that the number of in or out labelled arguments is minimal. The
advantage of a small labelling is that this leads to an explanation that can be given in a small number of steps [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
2Please notice that we write “an absolute smallest strongly admissible labelling” instead of “the absolute smallest
strongly admissible labelling” as there might be more than one strongly admissible labelling with minimal size for a
particular argument
De nition 2. Let (Ar , att ) be an argumentation framework, x 2 Ar and Args ✓ Ar . We de ne
x+ as {y 2 Ar | x attacks y}, x as {y 2 Ar | y attacks x}, Args+ as S{x+ | x 2 Args},
and Args as S{x | x 2 Args}. Args is said to be con ict-free i Args \ Args+ = ; . Args
is said to defend x i x ✓ Args+. The characteristic function F : 2Ar ! 2Ar is de ned as
F (Args) = {x | Args defends x}.
      </p>
      <p>De nition 3. Let (Ar , att ) be an argumentation framework. Args ✓ Ar is
• an admissible set i Args is con ict-free and Args ✓ F (Args)
• a complete extension i Args is con ict-free and Args = F (Args)
• a grounded extension i Args is the smallest (w.r.t. ✓ ) complete extension</p>
      <p>
        As mentioned in the introduction, the concept of strong admissibility was originally
introduced by Baroni and Giacomin [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. For current purposes we will apply the equivalent de nition
of Caminada [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>De nition 4. Let (Ar , att ) be an argumentation framework. Args ✓ Ar is strongly admissible
i every x 2 Args is defended by some Args0 ✓ Args \ {x} which in its turn is again strongly
admissible.</p>
      <p>
        It can be shown that each strongly admissible set is con ict-free and admissible [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The
strongly admissible sets form a lattice (w.r.t. ✓ ), of which the empty set is the bottom element
and the grounded extension is the top element [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The above de nitions essentially follow the extension based approach as described in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
It is also possible to de ne the key argumentation concepts in terms of argument labellings
[
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ].
      </p>
      <p>De nition 5. Let (Ar , att ) be an argumentation framework. An argument labelling is a function
Lab : Ar ! { in, out, undec}. An argument labelling is called an admissible labelling i for
each x 2 Ar it holds that:
• if Lab(x) = in then for each y that attacks x it holds that Lab(y) = out
• if Lab(x) = out then there exists a y that attacks x such that Lab(y) = in
Lab is called a complete labelling i it is an admissible labelling and for each x 2 Ar it also holds
that:
• if Lab(x) = undec then there is a y that attacks x such that Lab(y) = undec, and for
each y that attacks x such that Lab(y) 6= undec it holds that Lab(y) = out</p>
      <p>
        As a labelling is essentially a function, we sometimes write it as a set of pairs. Also, if Lab is
a labelling, we write in(Lab) for {x 2 Ar | Lab(x) = in}, out(Lab) for {x 2 Ar | Lab(x) =
out} and undec(Lab) for {x 2 Ar | Lab(x) = undec}. As a labelling is also a partition of
the arguments into sets of in-labelled arguments, out-labelled arguments and undec-labelled
arguments, we sometimes write it as a triplet (in(Lab), out(Lab), undec(Lab)).
De nition 6 ([
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]). Let Lab and Lab0 be argument labellings of argumentation framework
(Ar , att ). We say that Lab v Lab0 i in(Lab) ✓ in(Lab0) and out(Lab) ✓ out(Lab0).
      </p>
      <p>De nition 7. Let Lab be a complete labelling of argumentation framework (Ar , att ). Lab is
said to be the grounded labelling i Lab is the (unique) smallest (w.r.t. v) complete labelling.</p>
      <p>We refer to the size of a labelling Lab as |in(Lab)[ out(Lab)|. We observe that if Lab v Lab0
then the size of Lab is smaller or equal to the size of Lab0, but not necessarily vice versa. In
the remainder of the current paper, we use the terms smaller, bigger, minimal and maximal in
relation to the size of the respective labellings, unless stated otherwise.</p>
      <p>
        The next step is to de ne a strongly admissible labelling. In order to do so, we need the
concept of a min-max numbering [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>De nition 8. Let Lab be an admissible labelling of argumentation framework (Ar , att ). A
min-max numbering is a total function MMLab : in(Lab) [ out(Lab) ! N [ {1} such that
for each x 2 in(Lab) [ out(Lab) it holds that:
• if Lab(x) = in then MMLab(x) = max({MMLab(y) | y attacks x and Lab(y) =
out}) + 1 (with max(; ) de ned as 0)
• if Lab(x) = out then MMLab(x) = min({MMLab(y) | y attacks x and Lab(y) =
in}) + 1 (with min(; ) de ned as 1 )</p>
      <p>
        It has been proved that every admissible labelling has a unique min-max numbering [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A
strongly admissible labelling can then be de ned as follows [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>De nition 9. A strongly admissible labelling is an admissible labelling whose min-max
numbering yields natural numbers only (so no argument is numbered 1 ).</p>
      <p>
        It has been shown that the strongly admissible labellings form a lattice (w.r.t. v), of which
the all-undec labelling is the bottom element and the grounded labelling is the top element [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The relationship between extensions and labellings has been well-studied [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. A common
way to relate extensions to labellings is through the functions Args2Lab and Lab2Args. These
translate a con ict-free set of arguments to an argument labelling, and an argument labelling to
a set of arguments, respectively. More speci cally, given an argumentation framework (Ar , att ),
and an associated con ict-free set of arguments Args and a labelling Lab, Args2Lab(Args) is
de ned as (Args, Args+, Ar \(Args [ Args+)) and Lab2Args(Lab) is de ned as in(Lab). It has
been proven [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] that if Args is an admissible set (resp. a complete or grounded extension) then
Args2Lab(Args) is an admissible labelling (resp. a complete or grounded labelling), and that if
Lab is an admissible labelling (resp. a complete or grounded labelling) then Lab2Args(Lab) is
an admissible set (resp. a complete or grounded extension). It has also been proven [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] that if
Args is a strongly admissible set then Args2Lab(Args) is a strongly admissible labelling, and
that if Lab is a strongly admissible labelling then Lab2Args(Lab) is a strongly admissible set.
      </p>
      <p>
        Now that the formal preliminaries have been stated, the next step is to include the algorithms
from [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], as these will form the basis of our analysis.3 The rst algorithm (Algorithm 1) basically
constructs a strongly admissible labelling bottom-up, starting with the arguments that have
no attackers and continuing until the main argument (the argument for which one wants to
show membership of a strongly admissible set) is labelled in. The second algorithm (Algorithm
3Another reason for explicitly including these algorithms is that doing so allows us to describe slightly di erent
versions of these, such as Algorithm 10 (Section 2) and Algorithm 100 (section 4).
Algorithm 1 Construct a strongly admissible labelling that labels A in and its associated
min-max numbering.
      </p>
      <p>Input: An argumentation framework AF = (Ar , att),
an argument A 2 Ar that is in the grounded extension of AF .</p>
      <p>Output: A strongly admissible labelling Lab where A 2 in(Lab),
the associated min-max numbering MMLab.
1: Lab : Ar ! { in, out, undec} // We start with the type de nitions
2: MMLab : in(Lab) [ out(Lab) ! N [ {1}
3: undec_pre : Ar ! N
4: unproc_in : [X1, ...Xn] (Xi 2 Ar for each 1  i  n) // list of arguments
5: unproc_in [] // We initialize and process the arguments that have no attackers
6: for each X 2 Ar do
7: Lab(X) undec
8: undec_pre(X) | X |
9: if undec_pre(X) = 0 then
10: add X to the rear of unproc_in
11: Lab(X) in
12: MMLab(X) 1
13: if X = A then return Lab and MMLab
14: end if
15: end for
16: while unproc_in is not empty do // We now process the arguments that do have attackers
17: let X be the argument at the front of unproc_in
18: remove X from unproc_in
19: for each Y 2 X+ with Lab(Y ) 6= out do
20: Lab(Y ) out
21: MMLab(Y ) MM Lab(X) + 1
22: for each Z 2 Y + with Lab(Z) = undec do
23: undec_pre(Z) undec_pre(Z) 1
24: if undec_pre(Z) = 0 then
25: add Z to the rear of unproc_in
26: Lab(Z) in
27: MMLab(Z) MM Lab(Y ) + 1
28: if Z = A then return Lab and MMLab
29: end if
30: end for
31: end for
32: end while
2) then takes the output of the rst algorithm and tries to prune it. That is, it tries to identify
only those in and out labelled arguments that are actually needed in the strongly admissible
labelling. The third algorithm (Algorithm 3) then combines Algorithm 1 (which is used as the
construction phase) and Algorithm 2 (which is used as the pruning phase). Overall, we assume</p>
      <p>Algorithm 2 Prune a strongly admissible labelling that labels A in and its associated min-max
numbering.</p>
      <p>Input: An argumentation framework AF = (Ar , att ),
an argument A 2 Ar that is in the grounded extension of AF , A strongly admissible
labelling LabI where A 2 in(LabI ), the associated min-max numbering MMLabI .
Output: A strongly admissible labelling LabO v LabI where A 2 in(LabO),
the associated min-max numbering MMLabO.
1: // We start with the type de nitions
2: LabO : Ar ! { in, out, undec}
3: MMLabO : in(LabO) [ out(LabO) ! N [ {1}
4: unproc_in : [X1, ...Xn] (Xi 2 Ar for each 1  i  n) // list of arguments
5: // Initialize LabO and include the main argument
6: LabO (; , ; , Ar ) // LabO becomes the all-undec labelling
7: unproc_in [A]
8: LabO(A) in
9: MMLabO(A) MM LabI (A)
10:
11: // Next, process the other arguments in a top-down way
12: while unproc_in is not empty do
13: let X be the argument at the front of unproc_in
14: remove X from unproc_in
15: for each attacker Y of X do
16: LabO(Y ) out
17:
18:</p>
      <sec id="sec-2-1">
        <title>MMLabO(Y ) MM LabI (Y )</title>
        <p>if there is no minimal (w.r.t. MMLabI ) in labelled (w.r.t. LabI ) attacker of Y that
is also labelled in by LabO then</p>
        <p>Let Z be a minimal (w.r.t. MMLabI ) in labelled (w.r.t. LabI ) attacker of Y
Add Z to the rear of unproc_in
LabO(Z) in</p>
        <p>MM LabI (Z)
19:
20:
21:
22: MMLabO(Z)
23: end if
24: end for
25: end while
that it has already been established that the main argument is in the grounded extension and
that the aim is merely to nd a (relatively small) strongly admissible labelling that shows this.</p>
        <p>
          It has been proven that each of the above three algorithms terminates (in polynomial time)
and provides a strongly admissible labelling that labels the argument in (provided that such
a strongly admissible labelling exists, which requires the argument to be in the grounded
extension) together with the min-max numbering of this labelling [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Also, in Algorithm 2 it
holds that LabO v LabI , which implies that its output is smaller or equal to its input [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. We
refer to [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] for a more detailed discussion of algorithms 1, 2 and 3.
Algorithm 3 Construct a relatively small strongly admissible labelling that labels A in and its
associated min-max numbering.
        </p>
        <p>Input: An argumentation framework AF = (Ar , att ),
an argument A 2 Ar that is in the grounded extension of AF .</p>
        <p>Output: A strongly admissible labelling Lab where A 2 in(Lab),
the associated min-max numbering MMLab.
1: run Algorithm 1
2: LabI L ab</p>
      </sec>
      <sec id="sec-2-2">
        <title>3: MMLabI MM Lab</title>
        <p>4: run Algorithm 2
5: Lab L abO
6: MMLab MM LabO</p>
        <p>
          As an aside, although Algorithm 1 has been written with the aim of constructing a strongly
admissible labelling (and associated min-max numbering) for a particular argument, it can easily
be altered to yield the grounded labelling (and associated min-max numbering) instead. This
could be done by commenting out lines 13 and 28, and by adding the following line (line 33) at
the end of the algorithm:
return Lab and MMLab
We refer to the thus modi ed algorithm as Algorithm 10. It has been proven that Algorithm 10
indeed yields the grounded labelling and its associated min-max numbering [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].4
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Computing an Arbitrary Strongly Admissible Labelling</title>
      <p>
        In our previous work [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] we focused our attention on the problem of nding a small strongly
admissible labelling (for a particular argument) in a time e cient way. In the current section,
we proceed to examine the question of how to nd an arbitrary strongly admissible labelling
(for a particular argument) in a time e cient way. That is, we are interested in nding a fast
way of constructing a strongly admissible labelling (that labels the argument in question in)
without regards of how big or small this labelling is.5
      </p>
      <p>
        In order to maintain consistency and to allow for a like-for-like comparison, we examine
this question using the same set of benchmark examples as was used in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. That is, we use the
benchmark examples of ICCMA’17 and ICCMA’196 that have a non-empty grounded extension.
There are 277 such benchmark examples in total. For each of these benchmark examples,
we generate a query argument that is in the grounded extension. When selecting the query
argument, we followed the suggestion of ICCMA’17 and ICCMA’19 whenever such a suggestion
was available (for instance, when considering the benchmark examples of the Admbuster class,
we took ‘a’ to be the queried argument, as this was suggested by the authors of this class).
4In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] Algorithm 1 was referred to as “the algorithm of Lemma 9”.
5It can be mentioned that ICCMA’17 and ICCMA’19 describe the somewhat similar task of nding an arbitrary
extension for a particular semantics, without any further constraints of what this extension should look like.
6See http://argumentationcompetition.org/
      </p>
      <p>
        Similar to what was done in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], we conducted our experiments on a MacBook Pro 2020 with
8GB of memory and an Intel Core i5 processor. To run the ASPARTIX system we used clingo
5.6.2. We set a timeout limit of 1000 seconds and a memory limit of 8GB per query.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] it was found that the output of Algorithm 3 is on average 32% smaller than the output
of Algorithm 1. As for runtime, however, Algorithm 3 takes on average 103.51% more time
(more than double) than Algorithm 1. Figure 1 depicts a detailed comparison regarding the
runtime of Algorithm 1 versus the runtime of Algorithm 3. In this gure, as well as in similar
gures further on in the paper, each dot represents one of the 277 benchmark examples we
tested for. Each dot below the dashed line represents an example where the algorithm on the
vertical axis (in this case: Algorithm 1) ran faster than the algorithm on the horizontal axis. (in
this case: Algorithm 3)
      </p>
      <p>
        We are not aware of any dedicated third party algorithms or other computational approaches
that aim to construct an arbitrary strongly admissible labelling in the shortest possible time. We
are, however, aware of computational approaches that aim to either construct a minimal strongly
admissible labelling (the ASPARTIX approach of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]) or a maximal strongly admissible labelling
(that is, to construct the grounded labelling). As for the former, Figure 2 depicts a detailed
comparison regarding the runtime of Algorithm 1 versus the runtime of the ASPARTIX approach
of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for constructing a minimal strongly admissible labelling. On average, the ASPARTIX
approach of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for constructing a smallest strongly admissible labelling takes 540.78% more
time (more than 6 times as much) than Algorithm 1 on the 277 benchmark examples that we
tested for.7
7This is despite the fact that the ASPARTIX approach of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] only constructs a (minimal) strongly admissible labelling,
      </p>
      <p>
        As for comparing the performance of Algorithm 1 with an algorithm for constructing the
grounded labelling, we have chosen Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] as a benchmark, as it is an imperative
program (just like Algorithm 1) allowing for a like-for-like comparison. Figure 3 depicts a
whereas Algorithm 1 constructs both a strongly admissible labelling and its associated min-max numbering.
detailed comparison regarding the runtime of Algorithm 1 versus the runtime of Algorithm 3
of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. On average, Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] takes 2.99% more time than Algorithm 1 on the 277
benchmark examples that we tested for.8
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Computing a Min-Max Numbering</title>
      <p>
        Algorithms 1, 2 and 3 construct not only a strongly admissible labelling but also its associated
min-max numbering. The relevance of min-max numberings goes beyond merely determining
(by the absence of 1 ) whether its associated admissible labelling is strongly admissible or not.
A min-max numbering also serves as the basis for playing the Grounded Discussion Game [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
which can be used for explaining why a particular argument is in the grounded extension. This
explanation is done in an interactive way, consisting of a structured discussion between human
and computer. The min-max numbering serves as a roadmap regarding the moves that should
be done by the computer in order to win the discussion (see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for details).
      </p>
      <p>Although a min-max numbering does have its usefulness, the question is what are the
computational resources needed to construct it. In particular, what is the additional runtime
that is required for constructing the min-max numbering of a strongly admissible labelling?</p>
      <p>
        In order to answer this question, we compare the runtime of Algorithm 1 with the runtime of
a modi ed version of Algorithm 1 which only constructs the strongly admissible labelling itself
(without also constructing its min-max numbering). This can be done by commenting out the
lines 12, 21 and 27, and by returning only Lab (instead of both Lab and MMLab in lines 13
and 28. We refer to the thus modi ed algorithm as Algorithm 100.
8This is despite the fact that Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] only constructs a strongly admissible (grounded) labelling, whereas
Algorithm 1 constructs both a strongly admissible labelling and its associated min-max numbering.
      </p>
      <p>Figure 4 depicts the results of Algorithm 100 versus the runtime of Algorithm 1 (each dot
represents one of the 277 benchmark examples that we tested for). On average, Algorithm 1
takes just 1.83% more time than Algorithm 100.</p>
      <p>Similar to the way in which we modi ed Algorithm 1, one may wonder what would happen
if the min-max numbering was no longer constructed by Algorithm 3. That is, what if we
change Algorithm 3 (call it Algorithm 300) to include Algorithm 100 (instead of Algorithm 1) and
Algorithm 200 (instead of Algorithm 2), where Algorithm 200 does not use or yield any min-max
numbering? Unfortunately, this turns out not to be possible. The point is that Algorithm 2 (in
lines 18 and 19) requires the min-max numbering that is produced by Algorithm 1.</p>
      <p>To see the essence of the problem, consider the argumentation framework of Figure 5. Suppose
the argument in question is E. Algorithm 1 would yield the strongly admissible labelling
({A, C, E}, {B, D}, ; ) and associated min-max numbering {(A : 1), (B : 2), (C : 3), (D :
4), (E : 5)}, which are subsequently fed into Algorithm 2. By the time Algorithm 2 reaches
argument B, it will choose B’s attacker A instead of E, as A has the smallest min-max number,
and the algorithm will terminate. However, without the min-max numbering provided by
Algorithm 1, Algorithm 2 would not know whether to choose A or E, which means it might
enter an in nitive loop if it chooses E consistently.9 As such, the fact that we can remove the
concept of a min-max numbering from Algorithm 1 does not imply we can also remove the
concept of a min-max numbering from Algorithm 2, at least not in any straightforward way.</p>
      <p>A</p>
      <p>B
E</p>
      <p>C
D</p>
      <p>There is, however, at least one additional way in which we can assess the computational
costs of constructing the min-max labelling. Recall that Algorithm 1 can be modi ed in order to
compute the grounded labelling by commenting out lines 13 and 28, and by adding the following
line (line 33) at the end of the algorithm:
return Lab and MMLab
The thus modi ed algorithm is referred to as Algorithm 10.</p>
      <p>
        Of course, we could compare the performance of Algorithm 10 with the performance of a
modi ed version of Algorithm 10 that constructs only the grounded labelling (without its
associated min-max numbering). However, it would be more interesting to compare the performance
of Algorithm 10 with an algorithm that was optimised for constructing the grounded labelling
9Apart from that, not having access to the min-max numbering of Algorithm 1 could also cause Algorithm 2 to yield
a bigger strongly admissible labelling than it would otherwise have yielded.
only. For this, we will use Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Although somewhat similar to our Algorithm 10,
Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] uses a set instead of an ordered list for processing the arguments, as it does
not need to provide any min-max numbering.10
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>
        Our empirical results indicate that when it comes to constructing an arbitrary strongly admissible
labelling (for a particular argument) Algorithm 1 provides a relatively e cient way (regarding
runtime) of doing so. In the examples we tested for, Algorithm 1 clearly outperformed some of
its alternatives (Algorithm 3 by a factor 2, the ASPARTIX approach of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] by a factor of more
than 6, and Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] by almost 3%). Moreover, where some of its alternatives only
yield a strongly admissible labelling, Algorithm 1 yields both a strongly admissible labelling
and its associated min-max numbering.
10See [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for a discussion of why an ordered list is necessary when the aim is to construct the min-max numbering
as well.
      </p>
      <p>
        One of the things we did not do in our current work is to compare the performance of
Algorithm 1 with µ-toksia [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], which is the fastest correct algorithm for grounded semantics
that was submitted to ICCMA’19.11 However, we did run some additional experiments with
respect to the ASPARTIX encodings for grounded semantics [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and found that Algorithm 3
of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] runs in just 7.8% of the time that is needed by ASPARTIX for grounded semantics. As
the ICCMA’19 results indicate that µ-toksia for grounded semantics runs in 25.9% of the time
needed by ASPARTIX for grounded semantics, it seems likely that Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] would
run faster than µ-toksia in a direct comparison. Given that our Algorithm 1 already outperforms
Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], it is likely that it will also outperform µ-toksia.
      </p>
      <p>
        Our results indicate that the additional computational time required to construct the min-max
numbering (that is, the di erence in runtime between constructing both a strongly admissible
labelling and its min-max numbering, and constructing a strongly admissible labelling only)
is negligible.12 In particular, commenting out the code in Algorithm 1 that constructs the
min-max numbering (Algorithm 100) yields a performance increase of less than 2%. Moreover,
our approach to constructing the grounded labelling (Algorithm 10), which also constructs the
associated min-max numbering, even outperforms (by more than 3%) the fastest imperative
algorithm for constructing the grounded extension/labelling in the literature that we are aware
of (Algorithm 3 of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]), even though the latter does not even construct the min-max numbering.
      </p>
      <p>Overall, our ndings indicate that Algorithm 1 is a good candidate for computing strong
admissibility. As such, we would consider submitting it to ICCMA in case a track on strong
admissibility is opened.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was supported by the BMK Endowed Professorship for Data-Driven Knowledge
Generation: Climate Action (FFG project number 891607).
11ICCMA’19 was the last ICCMA that had a track on grounded semantics.
12This may be related to the fact that Algorithm 1 constructs the strongly admissible labelling and its associated
minmax number concurrently, rather than rst constructing the strongly admissible labelling and then constructing
its associated min-max numbering.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>On principle-based evaluation of extension-based argumentation semantics</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>171</volume>
          (
          <year>2007</year>
          )
          <fpage>675</fpage>
          -
          <lpage>700</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <article-title>Strong admissibility revisited</article-title>
          , in: S. Parsons,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          (Eds.),
          <source>Computational Models of Argument; Proceedings of COMMA</source>
          <year>2014</year>
          , IOS Press,
          <year>2014</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Strong admissibility revisited: theory and applications</article-title>
          ,
          <source>Argument &amp; Computation</source>
          <volume>10</volume>
          (
          <year>2019</year>
          )
          <fpage>277</fpage>
          -
          <lpage>300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <article-title>A discussion game for grounded semantics</article-title>
          , in: E. Black,
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          , N. Oren (Eds.),
          <source>Theory and Applications of Formal Argumentation (proceedings TAFA 2015)</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Harikrishnan</surname>
          </string-name>
          ,
          <article-title>Tractable algorithms for strong admissibility</article-title>
          ,
          <source>Argument &amp; Computation</source>
          (
          <year>2024</year>
          ). In print.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Minimal strong admissibility: a complexity analysis</article-title>
          , in: H.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          Taticchi (Eds.),
          <source>Proceedings of COMMA</source>
          <year>2020</year>
          , IOS Press,
          <year>2020</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvo</surname>
          </string-name>
          <string-name>
            <surname>ák</surname>
          </string-name>
          , J. Wallner,
          <article-title>Computing strongly admissible sets</article-title>
          , in: H.
          <string-name>
            <surname>Prakken</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          Taticchi (Eds.),
          <source>Proceedings of COMMA</source>
          <year>2020</year>
          , IOS Press,
          <year>2020</year>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>190</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Abstract argumentation frameworks and their semantics</article-title>
          ,
          <source>in: Handbook of Formal Argumentation</source>
          , volume
          <volume>1</volume>
          ,
          <string-name>
            <surname>College</surname>
            <given-names>Publications</given-names>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Arti cial Intelligence</source>
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <article-title>On the issue of reinstatement in argumentation</article-title>
          , in: M.
          <string-name>
            <surname>Fischer</surname>
            , W. van der Hoek,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Konev</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Lisitsa (Eds.),
          <source>Logics in Arti cial Intelligence; 10th European Conference, JELIA 2006</source>
          , Springer,
          <year>2006</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>123</lpage>
          . LNAI 4160.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <article-title>A logical account of formal argumentation</article-title>
          ,
          <source>Studia Logica</source>
          <volume>93</volume>
          (
          <year>2009</year>
          )
          <fpage>109</fpage>
          -
          <lpage>145</lpage>
          .
          <article-title>Special issue: new ideas in argumentation theory</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          , G. Pigozzi,
          <article-title>On judgment aggregation in abstract argumentation</article-title>
          ,
          <source>Autonomous Agents and Multi-Agent Systems</source>
          <volume>22</volume>
          (
          <year>2011</year>
          )
          <fpage>64</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nofal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Computing grounded extensions of abstract argumentation frameworks</article-title>
          ,
          <source>The Computer Journal</source>
          <volume>64</volume>
          (
          <year>2021</year>
          )
          <fpage>54</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Järvisalo, µ-toksia: An e cient abstract argumentation reasoner</article-title>
          ,
          <source>in: Proceedings of the 17th International Conference of Knowledge Representation and Reasoning (KR</source>
          <year>2020</year>
          ),
          <year>2020</year>
          , pp.
          <fpage>800</fpage>
          -
          <lpage>804</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvo ák</surname>
          </string-name>
          , A. Rapberger,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Aspartix-v19 - an answer-set programming based system for abstract argumentation</article-title>
          ,
          <source>in: International Symposium on Foundations of Information and Knowledge Systems</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>89</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>