<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On Computational Problems for Infinite Argumentation Frameworks: The Complexity of Finding Acceptable Extensions⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Uri Andrews</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca San Mauro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics, University of Wisconsin</institution>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Philosophy, University of Bari</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper investigates infinite argumentation frameworks. We introduce computability theoretic machinery as a robust method of evaluating, in the infinite setting, the complexity of the main computational issues arising from admissible, complete, and stable semantics: in particular, for each of these semantics, we measure the complexity of credulous and skeptical acceptance of arguments, and that of determining existence and uniqueness of extensions. We also propose a way of using Turing degrees to classify, for a given infinite argumentation framework, the exact dificulty of computing an extension in a given semantics and show that these problems give rise to a rich class of complexities.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;infinite argumentation frameworks</kwd>
        <kwd>computability theory</kwd>
        <kwd>analytic and co-analytic sets</kwd>
        <kwd>admissible extensions</kwd>
        <kwd>stable extensions</kwd>
        <kwd>complete extensions</kwd>
        <kwd>Turing degrees</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>NMR 2024, 22nd International Workshop on Nonmonotonic Reasoning
November 2-4, 2024, Hanoi, Vietnam
⋆A condensed version of this article was submitted to SAFA 2024
and an expanded version was submitted to FCR 2024.
* Corresponding author.
† These authors contributed equally.
$ andrews@math.wisc.edu (U. Andrews);
luca.sanmauro@gmail.com (L. San Mauro)
 https://math.wisc.edu/~andrews (U. Andrews);
https://www.lucasanmauro.com/ (L. San Mauro)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License</p>
      <p>
        Attribution 4.0 International (CC BY 4.0).
side of mathematical logic is a well-established idea. Over All AFs investigated in this paper are infinite.
the past decades, computability theory has been applied A semantics  assigns to every AF ℱ a set of
extento a wide array of mathematical disciplines, and com- sions  (ℱ ) which are deemed as acceptable. A huge
putability theoretic concepts have found applications in number of semantics, fueled by diferent motivations,
other formal subjects, such as theoretical computer sci- have been proposed and analyzed. Here, we focus on
ence, economics, and linguistics (see, e.g., [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ]). three prominent choices, whose computational aspects
      </p>
      <p>The present paper, we argue, provides compelling ev- are well-understood in the finite setting: admissible,
comidence of the benefits of viewing infinite AFs through plete, and stable semantics (abbreviated by ad, stb, co,
recomputability theoretic lenses. We assess the complex- spectively).
ity of many computational problems—both established Let ℱ = (ℱ , ℱ ) be an AF. Denote by cf(ℱ ) the
and novel—within our framework, illustrating their un- collection of extensions of ℱ which are conflict-free (i.e.,
decidability while providing precise measures of their  ∈ cf(ℱ ) if  ↣̸ , for all ,  ∈ ). Then, for  ∈
complexity. cf(ℱ ),</p>
      <sec id="sec-1-1">
        <title>Organization of the paper</title>
        <p>Section 2 briefly reviews the main semantic concepts
from argumentation theory that are relevant to this
paper, along with the fundamental computational problems
associated with them. In Section 3, we introduce the key
notions of computability theory employed in the work
and we define the concept of computable AFs and the In discussing the complete extensions, we will also
computational issues that emerges from it. Finally, in briefly mention the grounded extension, which is the
Sections 4 through 5, we determine the lower and upper unique smallest fixed point of  ; in any AF, the
bounds of the complexity for our computational prob- grounded extension always exists [2, Theorem 3].
lems: a critical technique for achieving hardness results For a given semantics  , the following are some
wellinvolves suitably encoding trees into AFs. Our main re- known computational problems related to  :
sults are collected in Tables 2 and 3.
•  ∈ ad(ℱ ) if  is self-defending (i.e.,  ⊆</p>
        <p>ℱ ());
•  ∈ co(ℱ ) if  is a fixed point of  (i.e.,  =</p>
        <p>ℱ ());
•  ∈ stb(ℱ ), if  attacks all arguments outside
of it (i.e., + = ℱ ∖ ).</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Argumentation theoretic background</title>
      <sec id="sec-2-1">
        <title>To keep our paper self-contained, we now briefly review</title>
        <p>
          some key concepts of Dung-style argumentation theory,
focusing on the semantics notions considered in this
paper and the fundamental computational problems
associated with them (the surveys [
          <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
          ] ofer an overview
of these topics).
        </p>
        <p>An argumentation framework (AF) ℱ is a pair
(ℱ , ℱ ) consisting of a set ℱ of arguments and an
attack relation ℱ ⊆ ℱ × ℱ . If some argument 
attacks some argument , we may write  ↣  instead
of (, ) ∈ ℱ . Collections of arguments  ⊆ ℱ are
called extensions. For an extension , the symbols + and
− denote, respectively, the arguments that  attacks
and the arguments that attack :
+ = { : (∃ ∈ )( ↣
− = { : (∃ ∈ )( ↣
)};
)}.
 defends an argument , if any argument that attacks
 is attacked by some argument in  (i.e., {}− ⊆ +).</p>
        <p>The characteristic function of ℱ is the following mapping
ℱ which sends subsets of ℱ to subsets of ℱ :
ℱ () := { :  is defended by }.</p>
        <p>• Cred (for credulous acceptance) is the decision
problem whose accepting instances are the pairs
(ℱ , ) so that  ∈  for some  ∈  (ℱ );
• Skept (for skeptical acceptance) is the decision
problem whose accepting instances are the pairs
(ℱ , ) so that  ∈  for all  ∈  (ℱ );
• Exist is the decision problem whose accepting</p>
        <p>instances are the AFs ℱ so that  (ℱ ) ̸= ∅;
• NE is the decision problem whose instances are</p>
        <p>the AFs ℱ so that  (ℱ ) ∖ {∅} ̸= ∅;
• Uni is the decision problem whose accepting</p>
        <p>instances are the AFs ℱ so that | (ℱ )| = 1.</p>
        <p>
          In formal argumentation theory, evaluating the
computational complexity of the aforementioned problems for
various semantics has been a noteworthy research thread
for more than 20 years[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Table 1 collects known
complexity results for the admissible, stable, and complete
semantics. This analysis refers only to finite AFs. In the
next section, we introduce our computability theoretic
perspective that allows us to tackle complexity issues
concerning infinite AFs.
        </p>
        <p>Computational problems for finite AFs. -c denotes complete- in computability theory requiring that paths be infinite.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Computational problems for</title>
    </sec>
    <sec id="sec-4">
      <title>AFs through the lens of computability theory</title>
      <p>
        In this section, we introduce computable AFs and we
revisit the computational problems of the last section
through the lens of computability theory. We aim at
conveying the main ideas without delving into too many
technical details. A more formal and comprehensive
exposition of the fundamentals of computability theory can
be found, e.g., in the textbooks [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. We begin by
establishing standard notation and terminology for some
combinatorial notions that appear frequently in our proofs.
3.1. Sequences, strings, and trees
      </p>
      <sec id="sec-4-1">
        <title>As is common in computability theory, we denote the set</title>
        <p>of natural numbers by . Since there is no risk of
ambiguity, we simply refer to the elements of  as numbers. The
symbol  denotes the set of all functions from  to .</p>
      </sec>
      <sec id="sec-4-2">
        <title>For our purposes, it is convenient to represent elements</title>
        <p>of  as infinite sequences of numbers (where the  + 1th
bit of</p>
        <p>∈  will be the output of the function  on
input ). We denote by 0∞ the infinite sequence consisting
of only 0’s (or, equivalently, the constant function to 0).</p>
        <p>The restriction of an infinite sequence  ∈  to its first
 bits is denoted by  ↾ .</p>
        <p>We use standard notation and terminology about
strings: The set of all finite strings of numbers is denoted
by &lt;. The symbol  denotes the empty string. The
concatenation of strings ,</p>
        <p>is denoted by  ⌢ . The
 ⌢
length of a string  is denoted by | |. If there is  so that
 =  , we say that  is a prefix</p>
        <p>of  and we write
 ⪯  . Similarly, if  ∈  and  =  ↾  for some ,
we write  ≺  .
a set  ⊆
it will be convenient to encode pairs of numbers into
single numbers. The pairing function does this. Fix  :
common habit of denoting (, ) by ⟨, ⟩.
 ×  →  to be a computable bijection. We adopt the</p>
        <p>The encodings discussed in Section 4 heavily rely on
the dificulty of calculating paths through trees. As is
common in computability theory, we say that a tree is</p>
        <p>&lt; closed under prefixes. We picture trees
growing upwards, with  ⌢ to the left of  ⌢,
whenever  &lt; . A path 
∈  through a tree  ⊆
&lt;
is an infinite sequence so that  ↾  ∈  , for all
numbers . The set of paths through a tree  is denoted by
[ ].  is well-founded if [ ] = ∅ and otherwise is
illfounded. Note that we follow the standard terminology
Indeed, if one were to allow paths to be finite, then these
notions trivialize, since one could computably find a path
through any given computable tree. For example, the set
of strings
 := { } ∪ {,</p>
        <p>⌢1 : (∀ &lt; | |)( () = 0)}
}.
is an ill-founded tree with [ ] = {0∞}.</p>
        <p>If  contains strings of arbitrary length, then  has
infinite height . Note that there are trees of infinite height
which are well-founded, e.g.,  = { } ∪ {⌢ : | | ≤
3.2. Computable argumentation</p>
        <p>frameworks
A basic problem that one encounters when attempting
to calibrate the algorithmic complexity of infinite AFs is
that of describing infinite objects in a finitary way.
Computability theory ofers a wide range of tools designed
for this endeavour. Here, we will concentrate on AFs
that are computably presentable, in the sense that there
are Turing machines (or, equivalently, modern computer
programs) that, in finitely many steps, decide whether a
given pair of arguments belongs to the attack relation.
partial computable functions from  to {0, 1}.</p>
        <p>Notation. Let (Φ)∈ be a uniform enumeration of all
Definition 3.1.</p>
        <p>A number  is a computable index for
an AF ℱ = (ℱ , ℱ ) with ℱ = { :  ∈ } so that
Φ(⟨, ⟩) =
{︃1
0
if  ↣
otherwise.</p>
        <p>An AF ℱ is computable, if it has a computable index  ∈ .</p>
        <p>We use the notation ℱ to refer to the AF with
computable index  (note that every computable AF possesses

stb
co
NP-c</p>
        <p>NP-c
ness for the class .</p>
        <p>Skept
coNP-c
NP-c
NP-c
In order to formulate our problems as subsets of , infinitely many computable indices.).
Remark 3.2. The collection of computable indices for AFs
just defined is noncomputable (in particular, any index 
for a non-total computable function Φ cannot be a
computable index for an argumentation framework). There
are alternative indexings that circumvent this issue; yet,
adopting another indexing would not alter the complexity
of the computational problems we analyze, though it would
make the proofs slightly more cumbersome. Hence, we opt
for the simplicity of Definition 3.1.</p>
        <p>We also introduce new semantics which make sense
only in the infinite setting. This is motivated by the idea
that, given an infinite AF, we might hope for our accepted
sets to give us infinitely much information.</p>
        <p>1.  ∈ infad(ℱ ) if and only if  ∈ ad(ℱ ) and  is</p>
        <p>infinite;
2.  ∈ infco(ℱ ) if and only if  ∈ co(ℱ ) and  is</p>
        <p>infinite;
3.  ∈ infstb(ℱ ) if and only if  ∈ stb(ℱ ) and  is</p>
        <p>infinite.</p>
      </sec>
      <sec id="sec-4-3">
        <title>As an illustration of why we might want to accept</title>
        <p>only infinite extensions, we consider that a given infinite
AF may contain a single argument  so that  attacks
every other argument, and every other argument attacks
. We imagine that  is a statement of extreme solipsism
denying the truth of any other statement. While {} is
a stable extension, it represents a negligible fraction of
arguments, and we may prefer not to accept it. In an
infinite AF, any finite set is as negligible as {}, so we
may prefer to accept only infinite extensions.</p>
      </sec>
      <sec id="sec-4-4">
        <title>The complexity classes that most naturally match the</title>
        <p>problems of Definition 3.3 are those of the Σ11 and Π11 sets.</p>
        <p>The Σ11 sets are formally defined as those subsets of  that
are definable in the language of second-order arithmetic
using a single second-order existential quantifier ranging
over subsets of  followed by number quantifiers and the
ifrst order functions and relations (+, · , &lt;, 0, 1, ∈); for
more details, see [18, §16]. Π11 sets are the complements
of Σ11 sets.</p>
        <p>Proposition 3.4. Cred∞, Exist∞, and NE∞ are Σ11, for
 ∈ {ad, stb, co, infad, infstb, infco}.</p>
        <p>The benefit of dealing with computable AFs is that Proof. We first consider  ∈ {ad, stb, co}. To define
the complexity of the decision problems associated with Cred∞, we see from Definition 3.3: Cred∞ := {⟨, ⟩ ∈
them do not arise due to complexity of the argumenta-  : (∃ ∈  (ℱ)( ∈ ))} uses a single existential
tion framework itself, but rather reflects the inherent quantifier over sets . This is similarly true for the
defcomplexity of the decision problem. Further, the compu- initions of Exist∞ and NE∞ in Definition 3.3. Thus, it
tational problems associated with computable AFs can be sufices to see that the condition  ∈  (ℱ) can be
denaturally represented as subsets of , which are suitable ifned with only quantification over arguments, which are
to be classified by computability theoretic means: in bijection with , not needing quantification over sets
of arguments.</p>
        <p>Definition 3.3. For a semantics  : Note that the definition of + and − use only
quanti1. Cred∞ := {⟨, ⟩ : (∃ ∈  (ℱ))( ∈ )}; ifers over arguments. Thus the definition of ℱ () given
by  ∈ ℱ () if and only if {}− ⊆ + uses only
2. Skept∞ := {⟨, ⟩ : (∀ ∈  (ℱ))( ∈ )}; quantifiers over arguments. Finally,  ∈ ad(ℱ ),  ∈
stb(ℱ ),  ∈ co(ℱ ) are all defined from ℱ () and +
3. Exist∞ := { : (∃ ⊆ ℱ ))( ∈  (ℱ))}; using only quantifiers over arguments.
4. NE∞ := { : (∃ ∈  (ℱ))( ̸= ∅)}; In the case of  ∈ {infad, infstb, infco}, we need
to also observe that  being infinite is defined via
5. Uni∞ := { : (∃! ⊆ ℱ )( ∈  (ℱ))}. ∀∃( ∈  ∧  &gt; ), which uses only
quantiifers over numbers.</p>
        <p>1
Proposition 3.5. Skept∞ is Π1, whenever  is in
{ad, stb, co, infad, in1fstb, infco}. Furthermore, for  ∈
{ad, co}, Uni∞ is Π1.</p>
        <p>Proof. The definition of Skept∞ in Definition 3.3 uses a
single universal set-quantifier followed by only number
quantifiers in the definition of  (ℱ).</p>
        <p>For  ∈ {ad, co},  ∈ Uni∞ if and only if there are
not two diferent  extensions (as there is always at least
one  extension). This is defined by the negation of the
following formula:
(∃1∃2)(∃ ∈ 1∖2 ∧ 1 ∈  (ℱ) ∧ 2 ∈  (ℱ)).</p>
        <p>Note that ∃1∃2 can be replaced by a single
existential quantifier by encoding the pair (1, 2) as a single
set {⟨1, ⟩ :  ∈ 1} ∪ {⟨2, ⟩ :  ∈ 2}. This shows
that Uni∞ is the complement of a Σ11 set, thus is Π1.</p>
        <p>1
Remark 3.6. The above argument does not sufice to
show that Unis∞tb is also Π11, since some AFs have no stable
extension. The most obvious definition says there exists
one stable extension and there does not exist two, which
gives a definition which is a conjunction of a Σ11 and
a Π11 condition, i.e., a so-called d-Σ11 definition. This is
analogous to the fact that in the finite case Unistb is
DPcomplete. Similarly, the argument above does not show
that Uni∞ is Π11 for  ∈ {infad, infstb, infco}. Yet, it is
true that Uni∞ is Π11 for  ∈ {stb, infad, infstb, infco} as
we show below in Corollaries 5.5,5.10, and 5.14.</p>
        <p>We note that knowing that a problem is Σ11 does not
necessarily mean the problem is complicated. This only
gives an upper-bound for its complexity. Sometimes,
a simpler definition is achievable. As an example, we
consider Credcf := {⟨, ⟩ : (∃ ∈ cf(ℱ))( ∈ )}.</p>
        <p>
          Theorem 3.7 (Kleene [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]). A set  ⊆  is Σ11 if and
only if there is a computable sequence of computable trees
( )∈ so that  ∈  if  is ill-founded.
        </p>
        <p>Though the given definition is Σ11, to know if an argu- more path than  (e.g.  ′ = {1⌢ :  ∈  } ∪ { :
ment  belongs to a conflict-free extension of ℱ, it (∀ &lt; | |) () = 0}). The fact that UB is itself Π11 is
sufices to check whether  is non-self-defeating, i.e., the subtle part of this example.
 ̸↣ , which is equivalent to checking the
computable fact that Φ(⟨, ⟩) = 0. In contrast, we will
show that for the computational problems associated to
the admissible, stable, and complete semantics, the use
of the quantifier ranging over all sets cannot be avoided.</p>
      </sec>
      <sec id="sec-4-5">
        <title>We will heavily rely on the following fundamental</title>
        <p>theorem by Kleene which ofers a natural way of
representing Σ11 sets:</p>
        <p>Theorem 3.7 along with Definition 3.8 suggest a
natural approach for gauging the complexity of the
computational problems of Definition 3.3. Namely, given
another Σ11 (or Π11) set , we translate the question
asking whether  ∈  to the question of if the tree 
is ill-founded (resp., well-founded), and then we need
to computably find an instance of our computational
problem which should be accepted if and only if  is
ill-founded (resp., well-founded). This involves coding a
tree, or more precisely, the collection of paths through
a tree into the  extensions in an argumentation
framework. We do exactly this in Section 4.</p>
        <p>We call ( )∈ a tree-sequence for . As a corollary
of Kleene’s theorem, one obtains that the problem of
deciding which computable trees in &lt; are ill-founded
(or well-founded) is as hard as any other Σ11 (resp., Π1)
1
problem.</p>
        <p>Theorem 3.7 gives a reason to consider the Σ11 sets as
the natural infinite analogs of the NP problems. Namely,
given an ill-founded computable tree  and a sequence 
which is a path through  , it is relatively simple to check
that  ∈ [ ] (it requires checking infinitely many simple
facts:  ↾  ∈  , for each ), but finding a sequence  ∈
[ ]—or even knowing whether there exists a sequence
 ∈ [ ]—is a far harder problem.</p>
      </sec>
      <sec id="sec-4-6">
        <title>Our main goal is to exactly characterize the complexity</title>
        <p>of the computational problems described in Definition</p>
      </sec>
      <sec id="sec-4-7">
        <title>3.3. To do so, we need to show that they are complete for their respective complexity classes. The following definition formalizes this notion.</title>
        <p>Definition 3.8. Let Γ be a complexity class (e.g., Γ ∈
{Σ11, Π11}). A set  ⊆  is Γ-hard, if for every  ∈ Γ
there is a computable function  :  →  so that  ∈ 
if and only if  () ∈  . If  is Γ-hard and belongs to Γ,
then it is Γ-complete.</p>
        <p>Proposition 3.9. It follows from Theorem 3.7 that the
1
set of indices for ill-founded computable trees is a
Σ1complete set. Similarly, the set of indices for well-founded
computable trees is a Π11-complete set.</p>
      </sec>
      <sec id="sec-4-8">
        <title>The following example is far less obvious, but will be</title>
        <p>useful below to examine Uni∞.</p>
        <p>Theorem 3.10 ([20, Theorem 18.11]). The set UB of
in1
dices for computable trees with exactly one path is a
Π1complete set.</p>
        <p>Remark 3.11. The hardness in Theorem 3.10 is quite
easy. We can reduce the question of whether a tree  is
well-founded to whether a tree  ′ has two paths, where
 ′ always has at least one path, by simply giving  ′ one</p>
        <p>Remark 3.12. As noted before, the Σ11 sets are natural
analogs in the infinitary setting of the NP sets, and the
Π11 sets are the natural analogs of the coNP sets. With
the exception of Skeptc∞o and Unis∞tb , Table 2 follows this
translation from Table 1 for the first three rows. These
two results mark surprising diferences in the infinite
setting.</p>
        <p>The trivial entries are due to the fact that ∅ is always
an admissible extension and the grounded extension is
always a complete extension.
3.3. Spectra of  extensions</p>
      </sec>
      <sec id="sec-4-9">
        <title>We propose a way to more fully understand the complex</title>
        <p>ity of the problem of finding a  extension in a given AF
ℱ .</p>
        <p>Definition 3.13. For each  ∈  and semantics  , let
Spec¬∅(ℱ) be the set of Turing degrees of non-empty sets
 ⊆  so that { :  ∈ } is a  extension in ℱ.</p>
        <p>The notion Spec¬∅(ℱ) exactly captures the dificulty
of computing a non-empty  extension in ℱ. We will
be relating the problem of computing a  extension in
ℱ to the problem of finding a path through a particular
tree. So, we define the analogous notion of the spectrum
of a tree.</p>
        <p>Definition 3.14. Given any computable tree  , we let
Spec( ) be set of Turing degrees of paths  ∈ [ ].</p>
        <p>Table 3 collects our results on spectra of extensions.

stb
co
infad
infstb
infco</p>
        <p>Cred∞
Π11-c 4.4,3.5
Π11-c * , 3.5
For any computable tree  , there is a computable argumen- pose that  is admissible. Observe that  and  cannot

ad
stb
co
infad
infstb
infco</p>
        <p>Spec¬∅
Exactly Spec( )
Exactly Spec( )
Any Spec( )
Exactly Spec( )
Exactly Spec( )</p>
        <p>Any Spec( )
of ℱ  is computable and consists of { :</p>
        <p>∈  }∪{ : Theorem 4.2. The following hold:
tation framework ℱ so that Spec( ) = Spec¬∅(ℱ). When
 ∈ {ad, stb, infad, infstb}, the converse also holds. Namely,
for every , there is a computable tree so that Spec¬∅(ℱ) =
per bound for the complete or infinite complete cases.</p>
        <p>Spec( ). We do not know how to attain a corresponding
up</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Encoding a tree into an argumentation framework</title>
      <p>Given a tree  ⊆ &lt;, we will define an argumentation
framework ℱ  = ( ,  ). The set of arguments 
all and only the following edges:
 ∈  } ∪ {}. The attack relation  of ℱ  contains
For all  ∈  ,
1.  ↣
2.  ↣
3.  ↣
4.  ↣
5.  ↣
6.  ↣
 ;
 ;
.
 , if | | = | | + 1;
 , if | | = | | + 1 and  ̸⪯  ;
 for every  ∈  ;
Notation. For  ∈ [ ], let  be the set { :  ≺  }.</p>
      <p>Lemma 4.1. A non-empty extension  of ℱ  is stable
if  is complete if  is admissible if  is exactly  for
some  ∈ [ ].</p>
      <p>Proof. Stable always implies complete, which always
implies admissible. It is straightforward to check that  is
stable for any</p>
      <p>∈ [ ], so we need only show that any
non-empty admissible extension is exactly some  .
Supbe in  since these are self-defeating. So some 
since  is non-empty. Note that since  ↣</p>
      <p>, we must
have 
∈ . Next, observe that if</p>
      <p>∈ , then there
must be some  so that  ⌢ ∈ : this is because some
element of  must defend  from  and such an
element must be an  with | | = | | + 1. But it must have
 ≺  as otherwise  would attack  . It follows that</p>
      <p>∈ 
 contains  for some 
cannot properly contain  , so  =  .</p>
      <p>∈ [ ]. Since  is stable,</p>
      <p>We are now in a position to obtain hardness results for
the computational problems described in Definition 3.3.</p>
      <p>1. for</p>
      <p>∈ {ad, stb, co, infad, infstb, infco}, NE∞ is
Σ11-hard;
2. for</p>
      <p>hard;
3. for 
is Σ11-hard.</p>
      <p>1
∈ {stb, infad, infstb, infco}, Exist∞ is
Σ1∈ {ad, stb, co, infad, infstb, infco}, Cred∞
Σ11-hard.</p>
      <p>Proof. 1. Let  ∈
Σ11 and let ( )∈ be a
tree</p>
      <p>1
sequence for , as given by Theorem 3.7. To show
Σ1hardness, we need to produce a computable function
 so that  ∈  if and only if  () ∈ NE∞. We let</p>
      <p>() be a computable index for ℱ  . Then Lemma 4.1
shows that  ∈  if and only if  is ill-founded if
and only if ℱ  has a non-empty  extension for each</p>
      <p>∈ {ad, stb, co, infad, infstb, infco}.</p>
      <p>2. For each of these  , the empty set is not a 
extension, so Exist∞ = NE∞, which we showed above is
0</p>
      <p>1
10

11
10
0
10
0


11
1


11
1
resulting AF. When applied to trees  of infinite height, [ ] will be encoded into the stable, complete, and admissible extensions
of ℱ . For the example shown in the figure, the only admissible extension of ℱ is the empty one, since [ ] = ∅.
{
, 0, 1, 10, 11}, the right-side is the
 
to NE∞ by sending  to ℱ  . Note that ℱ  has a non-  (0) = 0 if and only if ′ has only one path (see the
3. In the proof of 1. above, we reduced a given Σ11 set</p>
      <p>for ℱ  shows that Cred∞ is Σ11-hard.
empty  extension if and only if  is in some  extension.</p>
      <p>Thus sending  to ⟨,  ⟩ where  is a computable index
Uni∞ is Π11-hard.</p>
      <p>Theorem 4.3. For  ∈ {ad, stb, co, infad, infstb, infco},
Proof.</p>
      <p>We first consider 
let (</p>
      <p>∖ )∈ be a tree-sequence for its complement.</p>
      <p>Consider the sequence of AFs (ℱ 
∅ is an admissible extension in any AF and since every</p>
      <p>)∈. Note that
∖
∈ {ad, co}. Let  ∈ Π11 and
argument in ℱ 
extension. Thus, ℱ 
∖
∖
is attacked, ∅ is also a complete</p>
      <p>has a unique  extension if
the Π11-hardness of Uni∞.
which shows that Unia∞d and Unic∞o are Π11-hard.
and only if</p>
      <p>∖ is well founded if and only if  ∈ ,</p>
      <p>For the other  , ∅ is not a  extension. We use Theorem
3.10 to show Π1-hardness. Let  be any Π11 set. Then</p>
      <p>1
we get from Remark 3.11 a sequence of trees ′ so that
0∞ ∈ [′] for each , and { : ′ has only one path}
is Π11-hard. It follows from Lemma 4.1 that this holds if
and only if ℱ ′ has a unique  extension, which shows
Theorem 4.4. For any 
Skept∞ is Π11-hard.</p>
      <p>∈ {stb, infstb, infco, infad},
Proof. Let  be a Π11 set. Then we get from Remark 3.11
a sequence of trees ′ so that 0∞
and { : ′ has only one path} is Π11-hard. Then note
that ⟨, 0⟩ ∈ Skept∞ where  is a computable index
for  := ℱ′ if and only if ′ only has paths</p>
      <p>with
This shows the Π11-hardness of Skept∞.
definition of ′ in Remark 3.11) if and only if  ∈ .</p>
      <p>Theorem 4.5. For</p>
      <p>∈ {ad, stb, co, infad, infstb, infco}
AF ℱ so that Spec¬∅(ℱ) = Spec( ).
and for any computable tree  , there exists a computable
Proof. Observe that for the AF ℱ = ℱ  , it follows
from Lemma 4.1 that the non-empty  extensions are all
infinite and are in the same Turing degrees as the paths
through  .
5. Trees coding extensions in  (ℱ )</p>
      <sec id="sec-5-1">
        <title>In this section, we give upper bounds to the complexity of</title>
        <p>Spec¬∅ for</p>
        <p>∈ {ad, stb, infad, infstb} as well as giving
upper bounds for the complexity of Uni∞ for any  ∈
{stb, infad, infstb, infco}. We do this by describing how
to computably encode the collection of extensions in
 (ℱ ) into the set of paths through a tree.</p>
        <sec id="sec-5-1-1">
          <title>The admissible case</title>
          <p>Given a computable argumentation framework ℱ</p>
          <p>, we
will describe a computable tree  ℱ so that the paths of
 ℱ encode the non-empty admissible extensions in ℱ
We begin with an intuitive description of how a path 
.
∈ [′] for each , through the tree  ℱ will encode an admissible extension</p>
          <p>, and we give the formal definition of  ℱ below.</p>
          <p>Branching in  ℱ will come in three flavors. The first Since  ∈  ℱ , it follows that In is conflict-free, so
branching is used to give the least element of the admis-  ↣̸  . Next, observe that  defends itself. If  ↣ 
sible extension . This is to ensure that the extension is and  ∈ , then there is some  so that  = (,  ).
non-empty. If we wished to allow the empty extension, Then consider  =  ↾ +1. We must have  () =  + 1
we could omit this branching. For any  &gt; 0, the branch- for some  with  ∈  and  ↣ .
ing on level 2 serves to code whether or not  ∈ . Finally, note that both the map from  to  and from 
Branching on the odd levels serve to explain how  sat- to  are computable if ℱ is computable and are inverses
isfies the hypothesis of being an admissible extension. If of each other.
 ↣  is the th element of some computable
enumeration of all attacking pairs of arguments, then  (2 + 1) Corollary 5.3. For every computable AF ℱ, there exists
will be 0 if  ∈/  and otherwise will be  + 1 where  a computable tree  so that Speca¬d∅(ℱ) = Spec( ).
is least so that  ∈  and  ↣ . Proof. It follows immediately from Theorem 5.2 that</p>
          <p>Let ℱ = (ℱ , ℱ ) be a computable AF. Let ()∈
be a computable sequence of all elements of ℱ . If  = Speca¬d∅(ℱ) = Spec( ℱ ).
(,  ), we denote  by − and  by + . We now
define the tree  ℱ .</p>
          <p>Corollary 5.4. For every computable AF ℱ, there exists
a computable tree ̂︀ so that Speci¬nf∅ad(ℱ) = Spec(̂︀ ).</p>
          <p>Definition 5.1. Any given string  ∈ &lt; defines two
subsets of arguments in ℱ :
• Out = { :  &lt;  (0)}∪{ :  &gt; 0∧ (2) =
0}∪{ : (∃)( (2+1) = 0∧+ = )}∪{ :
(∃)( (2 + 1) &gt;  + 1 ∧  ↣ − )}.</p>
          <p>Proof. Given a non-empty admissible extension  of ℱ ,
we define the corresponding path  in  ℱ as follows. Let
 (0) be the least element of . For  &gt; 0, let  (2) = 1
if  ∈  and  (2) = 0 otherwise. Let  (2 + 1) be 0
if + ∈/  and be  + 1 where  is least so that  ∈ 
and  ↣ − otherwise. It is straightforward to check
that  ∈ [ ℱ ].</p>
          <p>Given a path  through  ℱ , first note that whenever
there is some  ≺  so that  ∈ In , then  (2) = 1.</p>
          <p>This is because whenever  ⪯  , then In ⊆ In . Then
since  :=  ↾ max(| |,2+1) is in  ℱ , we cannot have
 (2) = 0 since  ∈ In . Thus  (2) =  (2) = 1. It
follows that ⋃︀ ≺  In = { :  (2) = 1}. The same
argument shows that ⋃︀ ≺  Out = { :  (2) = 0}.</p>
          <p>Let  = { :  (2) = 1}.</p>
          <p>Note that  is conflict-free, since if ,  ∈  then
there is some long enough  ≺  so that ,  ∈ In .</p>
          <p>1
Corollary 5.5. Unii∞nfad is Π1.</p>
          <p>Proof.  is in Uniinfad if and only if the tree ̂︀ in Corollary</p>
          <p>1
5.4 has a unique path. By Theorem 3.10, this is a Π1
condition.</p>
        </sec>
        <sec id="sec-5-1-2">
          <title>The stable case</title>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>Similarly, we can construct a tree encoding the stable</title>
        <p>extensions by making  () = 0 if  ∈  and otherwise
making  () be  + 1 where  is least so that  ∈ 
and  ↣ .</p>
        <p>Definition 5.6. Any given string  ∈ &lt; defines two
subsets of arguments in ℱ :
• In = { :  () = 0} ∪ { ()− 1 :  &lt; | | ∧
 () &gt; 0};
• Out = { :  &lt; | | ∧  () &gt; 0} ∪ { :
(∃) () &gt;  + 1 ∧  ↣  )}.</p>
        <p>We define  ℱ as the set of  so that
• In is conflict-free;
• In ∩ Out = ∅
• If  &lt; | | and  () =  + 1, then  ↣
 .</p>
        <p>Theorem 5.7. Let ℱ be a (computable) argumentation
framework. Then the stable extensions of ℱ are in
(computable) bijection with the paths in  ℱ .</p>
        <p>Out . It follows that ⋃︀
 = { :  () = 0}.
is least so that  ∈  and  ↣
straightforward to check that 
Proof. Given a stable extension  of ℱ
corresponding path  in  ℱ as follows. For each , let
 () be 0 if  ∈  and let  () be  + 1 where 
, we define the
 otherwise. It is
This is because whenever  ⪯  , then In ⊆</p>
        <p>Given a path  through  ℱ , first note that whenever
there is some  ≺  so that  ∈ In , then  () = 0.
In . Then
since 
 () ̸= 0 since  ∈ In and therefore cannot be in
=  ↾ max(| |,+1) is on  ℱ , we cannot have
∈ [
is conflict-free. Next observe that for any , either  ∈
.</p>
        <p>In particular, if  () = 0, then  ∈  and otherwise
 ()− 1 ∈  and  ()− 1 ↣
.</p>
        <p>Finally, note that both the map from  to  and from 
to  are computable if ℱ is computable and are inverses
computable tree  so that Specs¬tb∅(ℱ) = Spec( ).
Corollary 5.8. For any computable AF ℱ there exists a
Proof. This follows directly from Theorem 5.7 along with
the fact that ∅ is never a stable extension.</p>
        <p>Corollary 5.9. For any computable AF ℱ there exists a
computable tree  so that Speci¬nf∅stb(ℱ) = Spec( ).
Proof. We add layers of branching to the tree as in
Corollary 5.4 so that, e.g.,  (2) =  means that  is the th
least number so that  ∈ . This produces a tree ̂ ︂ℱ
so that the paths are in computable bijection with the
infinite stable extensions of ℱ
.</p>
        <p>1
Corollary 5.10. Unis∞tb and Unii∞nfstb are Π1.</p>
        <p>Proof. As the paths through  ℱ are in bijection with
the stable extensions,  ∈ Unis∞tb if and only if  ℱ has a
are in bijection with the infinite stable extensions in
unique path. As the paths through ̂︀ ℱ (see Corollary 5.9)
By Theorem 3.10, these are both Π11 conditions.
we have  ∈ Uniinfstb if and only if ̂︀ ℱ has a unique path.</p>
        <sec id="sec-5-2-1">
          <title>The complete case</title>
          <p>Given an argumentation framework ℱ</p>
          <p>, we can similarly
and + as follows:
also their attacked sets +.
plete extensions. In order to ensure that ℱ () ⊆
will need the paths in  ℱ to not only code sets  but</p>
          <p>, we</p>
          <p>Given an extension , we will let  ∈  ℱ encode 
construct a tree  ℱ so that paths through  ℱ code com-  (2) = 0} and  = { :  (2 + 1) ̸= 0}. We note that
 ↣</p>
          <p>.
•  (2) = 0 if  ∈  and otherwise  (2) =
 + 1 where  is least so  ∈/ + and  ↣</p>
          <p>.
•  (2 + 1) = 0 if  ∈/ + and otherwise  (2 +</p>
          <p>1) =  + 1 where  is least so  ∈  and</p>
          <p>Note that  (2) explains why  is either in  or it is
not in ℱ (), i.e., ℱ () ⊆
verifies that the elements which  says are in + are in</p>
          <p>, while  (2 + 1) simply
fact in +.</p>
          <p>Formally, we define  ℱ as follows:
Definition 5.11.
subsets of arguments in ℱ :</p>
          <p>Any given string  ∈ &lt; defines four
• In = { :  (2) = 0</p>
          <p>} ∪ { : (∃)( (2 +
1) =  + 1</p>
          <p>}
1) &gt;  + 1 ∧  ↣</p>
          <p>)}
• Out = { :  (2) ̸= 0</p>
          <p>} ∪ { : (∃) (2 +
 (2 + 1) = 0</p>
          <p>}
 )} ∪ { :  (2 + 1) ̸= 0</p>
          <p>}
• InSplus</p>
          <p>= { : (∃)( (2) &gt;  + 1 ∧  ↣
• OutSplus

= { : (∃) (2) =  + 1</p>
          <p>} ∪ { :
We define  ℱ as the set of  so that
1. In is conflict-free;
2. In ∩ Out = ∅;
3. InSplus ∩ OutSplus = ∅;
4. If  (2) =  + 1, then  ↣</p>
          <p>;
5. If  (2 + 1) =  + 1, then  ↣</p>
          <p>;
then  ↣̸</p>
          <p>;
then  ↣̸
ℱ ()).
6. For ,  &lt; | |, if  ∈ OutSplus and  ∈ In
7. For ,  &lt; | |, if  ∈ OutSplus and  ∈ In ,</p>
          <p>(i.e.,  does not contradict  ⊆
ℱ, jection with the set of paths [ ℱ ].</p>
          <p>Theorem 5.12. The complete extensions of ℱ are in
biProof. Let  be any complete extension. We can define
 from  as described at the beginning of this section. It
is straightforward to verify that each condition (1-7) of</p>
        </sec>
      </sec>
      <sec id="sec-5-3">
        <title>Definition 5.11 is satisfied by</title>
        <p>↾  for each .</p>
        <p>Given a path  ∈ [ ℱ ], we can define sets  = { :
 = ⋃︀</p>
        <p>≺  InSplus .
when  ⪯  , In ⊆
the previous theorems, that  = ⋃︀</p>
        <p>In . It follows from this fact, as in
 ≺  In . Similarly,</p>
        <p>Next we see that  = +. If  ∈  , then  (2+1) ̸=
0 and by condition 5, we have  (2+1)− 1 attacks . But
then  (2+1)− 1 ∈ In ↾ 2+2 , so  (2+1)− 1 ∈ . Thus
 ⊆
6 for all  of length &gt; 2 + 1 ensures that there is no
+. On the other hand if  ∈/  , then condition
 ∈  so  ↣
. Thus + ⊆
 .</p>
        <p>Finally, we verify that  is complete.  is clearly
conΠ11 sets.
that satisfy a given semantics  . The computational
problems we examined were found to be maximally complex,
properly belonging to the complexity classes of Σ11 and
lfict free by Condition 1. Condition 7 ensures that any</p>
      </sec>
      <sec id="sec-5-4">
        <title>A plethora of intriguing questions regarding the com</title>
        <p>∈  is also in ℱ (), since if  ∈/  , then  ↣̸
To see that ℱ () ⊆
, note that any  ∈/  has</p>
        <p>.
condition 4. Thus  ∈/ ℱ ().
 () ̸= 0 and  ()− 1 ∈/ + and  ()− 1 ↣</p>
        <p>by
Remark 5.13. The map from paths 
plete extensions  ⊆</p>
        <p>
          ℱ is computable, but to compute
 ∈  ℱ we need both  and +. Thus, we are able to
say that for any computable AF ℱ, the set of Turing
degrees of pairs (, +) where  is a complete
extension is always Spec( ) for a computable tree  , but note
plexity of infinite AFs remains open. First, we shall fill the
gaps that we left behind (such as proving the Π11-hardness
for Skeptc∞o ). Next, we aim at investigating whether the
computational problems considered in this paper become
more tractable if we restrict to special classes of AFs, such
receives finitely many attacks only [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]). Finally, future
research will extend our analysis to analogous problems
associated with other key semantics for AFs, including
grounded, preferred, and ideal semantics. Given that the
definitions of these semantics are more intricate than
∈ [ ℱ ] to com- as the finitary
ones (i.e., those in which each argument
gree. Thus, we are currently unable to fully characterize
that  and + are not generally of the same Turing de- those we examined here, we anticipate the need for
additional techniques to thoroughly analyze them.
        </p>
        <p>Specc¬o∅ or Speci¬nf∅co.</p>
        <p>1
Corollary 5.14. Unii∞nfco is Π1.
that this is a Π11 condition.</p>
        <p>Proof. We can alter the tree  ℱ as in Corollary 5.4 to get
a new tree ̂︀ so that the paths through ̂︀ are in bijection
with the infinite complete extensions. Then  ∈ Unii∞nfco
if and only if ̂︀ has a unique path. Theorem 3.10 shows
Corollary 5.15. Fix  ∈ {ad, stb, co, infad, infstb, infco}
and suppose that ℱ has only countably many non-empty
 extensions. Then there is a hyperarithmetical set  so
that { :  ∈ } is a  extension of ℱ.</p>
        <p>Proof. If</p>
        <p>∈ {ad, stb, infad, infstb}, let  be a tree so
that Spec¬∅(ℱ) = Spec( ). If</p>
        <p>∈ {, infco}, let  be
a tree so that the set of Turing degrees of pairs (, +) of
 extensions is exactly Spec( ). Then  is a computable
tree with countably many paths. By a classic result of
Kreisel [21, Theorem 3.9],  has a hyperarithmetical
path, which corresponds to a hyperarithmetical  so that
{ :  ∈ } is a  extension of ℱ.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we initiated a systematic exploration of
the complexity issues inherent to infinite
argumentation frameworks. To pursue this direction, we employed
computability-theoretic techniques which are ideally
suited for assessing the complexity of infinite
mathematical objects. Our focus was on the credulous and skeptical
acceptance of arguments, as well as the existence and
uniqueness of extensions, for admissible, complete, and
stable semantics. We introduced and explored new
semantics that are meaningful exclusively in the infinite
setting, concerning the existence of infinite extensions</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <sec id="sec-7-1">
        <title>Andrews was partially supported by NSF grant DMS2348792. San Mauro is a member of INDAM-GNSAGA.</title>
        <p>281–295.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Automata for infinite argumentation structures</article-title>
          ,
          <source>Artiifcial Intelligence</source>
          <volume>203</volume>
          (
          <year>2013</year>
          )
          <fpage>104</fpage>
          -
          <lpage>150</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artificial intelligence 77</source>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>García</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <article-title>Defeasible logic programming: An argumentative approach, Theory and practice of logic programming 4 (</article-title>
          <year>2004</year>
          )
          <fpage>95</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          , G. Guida,
          <article-title>Self-stabilizing defeat status computation: dealing with conflict management in multi-agent systems</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>165</volume>
          (
          <year>2005</year>
          )
          <fpage>187</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Verheij</surname>
          </string-name>
          ,
          <article-title>Deflog: on the logical interpretation of prima facie justified assumptions</article-title>
          ,
          <source>Journal of Logic and Computation</source>
          <volume>13</volume>
          (
          <year>2003</year>
          )
          <fpage>319</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <article-title>Grounded semantics and infinitary argumentation frameworks</article-title>
          ,
          <source>in: Proceedings of the 26th Benelux Conference on Artificial Intelligence, BNAIC</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Spanring</surname>
          </string-name>
          ,
          <article-title>Infinite argumentation frameworks: On the existence and uniqueness of extensions, in: Advances in Knowledge Representation, Logic Programming</article-title>
          , and Abstract Argumentation: Essays Dedicated to Gerhard
          <source>Brewka on the Occasion of his 60th Birthday</source>
          , Springer,
          <year>2015</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Computing with infinite argumentation frameworks: The case of afras</article-title>
          , in: Theorie and Applications of Formal Argumentation: First International Workshop,
          <string-name>
            <surname>TAFA</surname>
          </string-name>
          <year>2011</year>
          . Barcelona, Spain,
          <source>July 16-17</source>
          ,
          <year>2011</year>
          , Springer,
          <year>2012</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bistarelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Santini</surname>
          </string-name>
          , et al.,
          <source>Weighted argumentation., FLAP</source>
          <volume>8</volume>
          (
          <year>2021</year>
          )
          <fpage>1589</fpage>
          -
          <lpage>1622</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Coherence in finite argument systems</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>141</volume>
          (
          <year>2002</year>
          )
          <fpage>187</fpage>
          -
          <lpage>203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>P. E. Dunne,</surname>
          </string-name>
          <article-title>The computational complexity of ideal semantics</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>173</volume>
          (
          <year>2009</year>
          )
          <fpage>1559</fpage>
          -
          <lpage>1591</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Complexity of semi-stable and stage semantics in argumentation frameworks</article-title>
          ,
          <source>Information Processing Letters</source>
          <volume>110</volume>
          (
          <year>2010</year>
          )
          <fpage>425</fpage>
          -
          <lpage>430</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Brattka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hertling</surname>
          </string-name>
          ,
          <article-title>Handbook of computability and complexity in analysis</article-title>
          , Springer,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K. V.</given-names>
            <surname>Velupillai</surname>
          </string-name>
          ,
          <article-title>Computable foundations for economics</article-title>
          ,
          <source>Routledge</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Jäger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rogers</surname>
          </string-name>
          ,
          <article-title>Formal language theory: refining the chomsky hierarchy</article-title>
          ,
          <source>Philosophical Transactions of the Royal Society B: Biological Sciences</source>
          <volume>367</volume>
          (
          <year>2012</year>
          )
          <fpage>1956</fpage>
          -
          <lpage>1970</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Baroni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Giacomin</surname>
          </string-name>
          ,
          <article-title>Semantics of abstract argument systems</article-title>
          ,
          <source>Argumentation in artificial intelligence</source>
          (
          <year>2009</year>
          )
          <fpage>25</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wooldridge</surname>
          </string-name>
          , Complexity of abstract argumentation,
          <source>Argumentation in artificial intelligence</source>
          (
          <year>2009</year>
          )
          <fpage>85</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H.</given-names>
            <surname>Rogers</surname>
          </string-name>
          Jr,
          <article-title>Theory of recursive functions and efective computability</article-title>
          , MIT press,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Kleene</surname>
          </string-name>
          ,
          <article-title>Arithmetical predicates</article-title>
          and function quantifiers,
          <source>Transactions of the American Mathematical Society</source>
          <volume>79</volume>
          (
          <year>1955</year>
          )
          <fpage>312</fpage>
          -
          <lpage>340</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kechris</surname>
          </string-name>
          ,
          <article-title>Classical descriptive set theory</article-title>
          , volume
          <volume>156</volume>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>Science</given-names>
          </string-name>
          &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Cenzer</surname>
          </string-name>
          ,
          <article-title>Π10 Classes in Computability Theory, in: Studies in Logic and the Foundations of Mathematics</article-title>
          , volume
          <volume>140</volume>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>1999</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>