<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">On Computational Problems for Infinite Argumentation Frameworks: The Complexity of Finding Acceptable Extensions ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Uri</forename><surname>Andrews</surname></persName>
							<email>andrews@math.wisc.edu</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics</orgName>
								<orgName type="institution">University of Wisconsin</orgName>
								<address>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>San</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Philosophy</orgName>
								<orgName type="institution">University of Bari</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">On Computational Problems for Infinite Argumentation Frameworks: The Complexity of Finding Acceptable Extensions ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1795134E45F471EB8582C44943F4AE13</idno>
					<note type="submission">⋆ A condensed version of this article was submitted to SAFA 2024 and an expanded version was submitted to FCR 2024.</note>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:52+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>infinite argumentation frameworks</term>
					<term>computability theory</term>
					<term>analytic and co-analytic sets</term>
					<term>admissible extensions</term>
					<term>stable extensions</term>
					<term>complete extensions</term>
					<term>Turing degrees</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper investigates infinite argumentation frameworks. We introduce computability theoretic machinery as a robust method of evaluating, in the infinite setting, the complexity of the main computational issues arising from admissible, complete, and stable semantics: in particular, for each of these semantics, we measure the complexity of credulous and skeptical acceptance of arguments, and that of determining existence and uniqueness of extensions. We also propose a way of using Turing degrees to classify, for a given infinite argumentation framework, the exact difficulty of computing an extension in a given semantics and show that these problems give rise to a rich class of complexities.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Abstract argumentation theory is a fundamental research area in AI, providing a powerful paradigm for reasoning about knowledge representation and multi-agent systems. Historically, the focus has predominantly been on finite argumentation frameworks (AFs), leaving the infinite case relatively unexplored. As noted in <ref type="bibr" target="#b0">[1]</ref>, this oversight poses significant theoretical, conceptual, and practical limitations.</p><p>Firstly, infinite frameworks align naturally with Dung's seminal approach <ref type="bibr" target="#b1">[2]</ref>, whose results do not presuppose finiteness. Secondly, representing argumentation scenarios in an infinite manner captures the inherently nonmonotonic nature of argumentation, where arguments can always be challenged by the emergence of new information, making any fixed limit on the space of arguments somewhat artificial. Moreover, if one conceives an argumentative scenario with arguments being added as time proceeds, e.g., the collection of scientific studies, then infinite frameworks naturally emerge as the union of the argumentation frameworks that we see at each finite time. Thirdly, infinite AFs may arise in practical contexts, such as logic programming <ref type="bibr" target="#b2">[3]</ref> and the logical analysis of multi-agent or distributed systems <ref type="bibr" target="#b3">[4]</ref> (the substantial introduction of <ref type="bibr" target="#b0">[1]</ref> provides other concrete examples of applications of infinite AFs, e.g., to multiagent negotiations).</p><p>Fortunately, recent years have seen a growing interest in infinite AFs, with special focus on how the existence and interplay of various semantics-well-understood for finite AFs-are affected in the infinite realm (see, e.g., <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9]</ref>). This increasing recognition underscores the importance of infinite AFs for a broad understanding of argumentation theory.</p><p>However, the literature still lacks a comprehensive framework for systematically exploring all logical aspects of infinite AFs, particularly regarding their core computational issues. A significant research avenue in finite AFs has been determining the algorithmic complexity of tasks associated with finding coherent collections of arguments (up to suitable collection of semantics), with numerous complexity theoretic results highlighting their inherent computational intractability (see, e.g., <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>). To our knowledge, no analogous study has been conducted for infinite AFs.</p><p>This paper addresses this gap by initiating a systematic study of the complexity of computational problems in infinite AFs. For this endeavor, we bring into the subject of argumentation theory the machinery of computability theory, which may be regarded as an infinitary companion of computational complexity theory and abounds with concepts and hierarchies for measuring the complexity of computing and defining countably infinite objects, providing the appropriate machinery for this endeavor.</p><p>The application of computability theoretic tools out-side of mathematical logic is a well-established idea. Over the past decades, computability theory has been applied to a wide array of mathematical disciplines, and computability theoretic concepts have found applications in other formal subjects, such as theoretical computer science, economics, and linguistics (see, e.g., <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b14">15]</ref>).</p><p>The present paper, we argue, provides compelling evidence of the benefits of viewing infinite AFs through computability theoretic lenses. We assess the complexity of many computational problems-both established and novel-within our framework, illustrating their undecidability while providing precise measures of their complexity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Organization of the paper</head><p>Section 2 briefly reviews the main semantic concepts from argumentation theory that are relevant to this paper, along with the fundamental computational problems associated with them. In Section 3, we introduce the key notions of computability theory employed in the work and we define the concept of computable AFs and the computational issues that emerges from it. Finally, in Sections 4 through 5, we determine the lower and upper bounds of the complexity for our computational problems: a critical technique for achieving hardness results involves suitably encoding trees into AFs. Our main results are collected in Tables <ref type="table">2 and 3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Argumentation theoretic background</head><p>To keep our paper self-contained, we now briefly review some key concepts of Dung-style argumentation theory, focusing on the semantics notions considered in this paper and the fundamental computational problems associated with them (the surveys <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref> offer an overview of these topics).</p><p>An argumentation framework (AF) ℱ is a pair (𝐴ℱ , 𝑅ℱ ) consisting of a set 𝐴ℱ of arguments and an attack relation 𝑅ℱ ⊆ 𝐴ℱ × 𝐴ℱ . If some argument 𝑎 attacks some argument 𝑏, we may write 𝑎 ↣ 𝑏 instead of (𝑎, 𝑏) ∈ 𝑅ℱ . Collections of arguments 𝑆 ⊆ 𝐴ℱ are called extensions. For an extension 𝑆, the symbols 𝑆 + and 𝑆 − denote, respectively, the arguments that 𝑆 attacks and the arguments that attack 𝑆:</p><formula xml:id="formula_0">𝑆 + = {𝑥 : (∃𝑦 ∈ 𝑆)(𝑦 ↣ 𝑥)}; 𝑆 − = {𝑥 : (∃𝑦 ∈ 𝑆)(𝑥 ↣ 𝑦)}.</formula><p>𝑆 defends an argument 𝑎, if any argument that attacks 𝑎 is attacked by some argument in 𝑆 (i.e., {𝑎} − ⊆ 𝑆 + ). The characteristic function of ℱ is the following mapping 𝑓ℱ which sends subsets of 𝐴ℱ to subsets of 𝐴ℱ : 𝑓ℱ (𝑆) := {𝑥 : 𝑥 is defended by 𝑆}.</p><p>All AFs investigated in this paper are infinite.</p><p>A semantics 𝜎 assigns to every AF ℱ a set of extensions 𝜎(ℱ) which are deemed as acceptable. A huge number of semantics, fueled by different motivations, have been proposed and analyzed. Here, we focus on three prominent choices, whose computational aspects are well-understood in the finite setting: admissible, complete, and stable semantics (abbreviated by ad, stb, co, respectively).</p><p>Let ℱ = (𝐴ℱ , 𝑅ℱ ) be an AF. Denote by cf(ℱ) the collection of extensions of ℱ which are conflict-free (i.e., 𝑆 ∈ cf(ℱ) iff 𝑎 ̸ ↣ 𝑏, for all 𝑎, 𝑏 ∈ 𝑆). Then, for 𝑆 ∈ cf(ℱ),</p><formula xml:id="formula_1">• 𝑆 ∈ ad(ℱ) iff 𝑆 is self-defending (i.e., 𝑆 ⊆ 𝑓ℱ (𝑆)); • 𝑆 ∈ co(ℱ) iff 𝑆 is a fixed point of 𝑓𝐹 (i.e., 𝑆 = 𝑓ℱ (𝑆)); • 𝑆 ∈ stb(ℱ), iff 𝑆 attacks all arguments outside</formula><p>of it (i.e., 𝑆 + = 𝐴ℱ ∖ 𝑆).</p><p>In discussing the complete extensions, we will also briefly mention the grounded extension, which is the unique smallest fixed point of 𝑓𝐹 ; in any AF, the grounded extension always exists [2, <ref type="bibr">Theorem 3]</ref>.</p><p>For a given semantics 𝜎, the following are some wellknown computational problems related to 𝜎:</p><p>• Cred𝜎 (for credulous acceptance) is the decision problem whose accepting instances are the pairs (ℱ, 𝑎) so that 𝑎 ∈ 𝑆 for some 𝑆 ∈ 𝜎(ℱ); • Skept 𝜎 (for skeptical acceptance) is the decision problem whose accepting instances are the pairs (ℱ, 𝑎) so that 𝑎 ∈ 𝑆 for all 𝑆 ∈ 𝜎(ℱ); • Exist𝜎 is the decision problem whose accepting instances are the AFs ℱ so that 𝜎(ℱ) ̸ = ∅; • NE𝜎 is the decision problem whose instances are the AFs ℱ so that 𝜎(ℱ) ∖ {∅} ̸ = ∅; • Uni𝜎 is the decision problem whose accepting instances are the AFs ℱ so that |𝜎(ℱ)| = 1.</p><p>In formal argumentation theory, evaluating the computational complexity of the aforementioned problems for various semantics has been a noteworthy research thread for more than 20 years <ref type="bibr" target="#b16">[17]</ref>. Table <ref type="table">1</ref> collects known complexity results for the admissible, stable, and complete semantics. This analysis refers only to finite AFs. In the next section, we introduce our computability theoretic perspective that allows us to tackle complexity issues concerning infinite AFs. Table <ref type="table">1</ref> Computational problems for finite AFs. 𝒞-c denotes completeness for the class 𝒞.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Computational problems for AFs through the lens of computability theory</head><p>In this section, we introduce computable AFs and we revisit the computational problems of the last section through the lens of computability theory. We aim at conveying the main ideas without delving into too many technical details. A more formal and comprehensive exposition of the fundamentals of computability theory can be found, e.g., in the textbooks <ref type="bibr" target="#b17">[18]</ref>. We begin by establishing standard notation and terminology for some combinatorial notions that appear frequently in our proofs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Sequences, strings, and trees</head><p>As is common in computability theory, we denote the set of natural numbers by 𝜔. Since there is no risk of ambiguity, we simply refer to the elements of 𝜔 as numbers. The symbol 𝜔 𝜔 denotes the set of all functions from 𝜔 to 𝜔.</p><p>For our purposes, it is convenient to represent elements of 𝜔 𝜔 as infinite sequences of numbers (where the 𝑖+1th bit of 𝜋 ∈ 𝜔 𝜔 will be the output of the function 𝜋 on input 𝑖). We denote by 0 ∞ the infinite sequence consisting of only 0's (or, equivalently, the constant function to 0). The restriction of an infinite sequence 𝜋 ∈ 𝜔 𝜔 to its first 𝑛 bits is denoted by 𝜋 ↾𝑛.</p><p>We use standard notation and terminology about strings: The set of all finite strings of numbers is denoted by 𝜔 &lt;𝜔 . The symbol 𝜆 denotes the empty string. The concatenation of strings 𝜎, 𝜏 is denoted by 𝜎 ⌢ 𝜏 . The length of a string 𝜎 is denoted by |𝜎|. If there is 𝜌 so that 𝜎 ⌢ 𝜌 = 𝜏 , we say that 𝜎 is a prefix of 𝜏 and we write 𝜎 ⪯ 𝜏 . Similarly, if 𝜋 ∈ 𝜔 𝜔 and 𝜎 = 𝜋 ↾𝑛 for some 𝑛, we write 𝜎 ≺ 𝜋.</p><p>In order to formulate our problems as subsets of 𝜔, it will be convenient to encode pairs of numbers into single numbers. The pairing function does this. Fix 𝑝 : 𝜔 × 𝜔 → 𝜔 to be a computable bijection. We adopt the common habit of denoting 𝑝(𝑥, 𝑦) by ⟨𝑥, 𝑦⟩.</p><p>The encodings discussed in Section 4 heavily rely on the difficulty of calculating paths through trees. As is common in computability theory, we say that a tree is a set 𝒯 ⊆ 𝜔 &lt;𝜔 closed under prefixes. We picture trees growing upwards, with 𝜎 ⌢ 𝑖 to the left of 𝜎 ⌢ 𝑗, when-ever 𝑖 &lt; 𝑗. A path 𝜋 ∈ 𝜔 𝜔 through a tree 𝒯 ⊆ 𝜔 &lt;𝜔 is an infinite sequence so that 𝜋 ↾𝑛 ∈ 𝒯 , for all numbers 𝑛. The set of paths through a tree 𝒯 is denoted by <ref type="bibr">[𝒯 ]</ref>. 𝒯 is well-founded if [𝒯 ] = ∅ and otherwise is illfounded. Note that we follow the standard terminology in computability theory requiring that paths be infinite. Indeed, if one were to allow paths to be finite, then these notions trivialize, since one could computably find a path through any given computable tree. For example, the set of strings</p><formula xml:id="formula_2">𝒯 := {𝜆} ∪ {𝜎, 𝜎 ⌢ 1 : (∀𝑛 &lt; |𝜎|)(𝜎(𝑛) = 0)} is an ill-founded tree with [𝒯 ] = {0 ∞ }.</formula><p>If 𝒯 contains strings of arbitrary length, then 𝒯 has infinite height. Note that there are trees of infinite height which are well-founded, e.g., 𝒯 = {𝜆} ∪ {𝑛 ⌢ 𝜎 : |𝜎| ≤ 𝑛}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Computable argumentation frameworks</head><p>A basic problem that one encounters when attempting to calibrate the algorithmic complexity of infinite AFs is that of describing infinite objects in a finitary way. Computability theory offers a wide range of tools designed for this endeavour. Here, we will concentrate on AFs that are computably presentable, in the sense that there are Turing machines (or, equivalently, modern computer programs) that, in finitely many steps, decide whether a given pair of arguments belongs to the attack relation.</p><p>Notation. Let (Φ𝑒)𝑒∈𝜔 be a uniform enumeration of all partial computable functions from 𝜔 to {0, 1}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3.1.</head><p>A number 𝑒 is a computable index for an AF ℱ = (𝐴ℱ , 𝑅ℱ ) with 𝐴ℱ = {𝑎𝑛 : 𝑛 ∈ 𝜔} so that</p><formula xml:id="formula_3">Φ𝑒(⟨𝑛, 𝑚⟩) = {︃ 1 if 𝑎𝑛 ↣ 𝑎𝑚 0 otherwise. An AF ℱ is computable, if it has a computable index 𝑒 ∈ 𝜔.</formula><p>We use the notation ℱ𝑒 to refer to the AF with computable index 𝑒 (note that every computable AF possesses infinitely many computable indices.).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Remark 3.2. The collection of computable indices for AFs just defined is noncomputable (in particular, any index 𝑒 for a non-total computable function Φ𝑒 cannot be a computable index for an argumentation framework). There are alternative indexings that circumvent this issue; yet, adopting another indexing would not alter the complexity</head><p>of the computational problems we analyze, though it would make the proofs slightly more cumbersome. Hence, we opt for the simplicity of Definition 3.1.</p><p>The benefit of dealing with computable AFs is that the complexity of the decision problems associated with them do not arise due to complexity of the argumentation framework itself, but rather reflects the inherent complexity of the decision problem. Further, the computational problems associated with computable AFs can be naturally represented as subsets of 𝜔, which are suitable to be classified by computability theoretic means: Definition 3.3. For a semantics 𝜎:</p><formula xml:id="formula_4">1. Cred ∞ 𝜎 := {⟨𝑒, 𝑛⟩ : (∃𝑆 ∈ 𝜎(ℱ𝑒))(𝑎𝑛 ∈ 𝑆)}; 2. Skept ∞ 𝜎 := {⟨𝑒, 𝑛⟩ : (∀𝑆 ∈ 𝜎(ℱ𝑒))(𝑎𝑛 ∈ 𝑆)}; 3. Exist ∞ 𝜎 := {𝑒 : (∃𝑆 ⊆ 𝐴ℱ 𝑒 ))(𝑆 ∈ 𝜎(ℱ𝑒))}; 4. NE ∞ 𝜎 := {𝑒 : (∃𝑆 ∈ 𝜎(ℱ𝑒))(𝑆 ̸ = ∅)}; 5. Uni ∞ 𝜎 := {𝑒 : (∃!𝑆 ⊆ 𝐴ℱ 𝑒 )(𝑆 ∈ 𝜎(ℱ𝑒))}.</formula><p>We also introduce new semantics which make sense only in the infinite setting. This is motivated by the idea that, given an infinite AF, we might hope for our accepted sets to give us infinitely much information.</p><formula xml:id="formula_5">1. 𝑆 ∈ infad(ℱ) if and only if 𝑆 ∈ ad(ℱ) and 𝑆 is infinite; 2. 𝑆 ∈ infco(ℱ) if and only if 𝑆 ∈ co(ℱ) and 𝑆 is infinite; 3. 𝑆 ∈ infstb(ℱ) if and only if 𝑆 ∈ stb(ℱ) and 𝑆 is infinite.</formula><p>As an illustration of why we might want to accept only infinite extensions, we consider that a given infinite AF may contain a single argument 𝑏 so that 𝑏 attacks every other argument, and every other argument attacks 𝑏. We imagine that 𝑏 is a statement of extreme solipsism denying the truth of any other statement. While {𝑏} is a stable extension, it represents a negligible fraction of arguments, and we may prefer not to accept it. In an infinite AF, any finite set is as negligible as {𝑏}, so we may prefer to accept only infinite extensions.</p><p>The complexity classes that most naturally match the problems of Definition 3.3 are those of the Σ 1 1 and Π 1 1 sets. The Σ 1  1 sets are formally defined as those subsets of 𝜔 that are definable in the language of second-order arithmetic using a single second-order existential quantifier ranging over subsets of 𝜔 followed by number quantifiers and the first order functions and relations (+, •, &lt;, 0, 1, ∈); for more details, see <ref type="bibr">[18, §16]</ref> Note that the definition of 𝑆 + and 𝑆 − use only quantifiers over arguments. Thus the definition of 𝑓ℱ (𝑆) given by 𝑎 ∈ 𝑓ℱ (𝑆) if and only if {𝑎} − ⊆ 𝑆 + uses only quantifiers over arguments. Finally, 𝑆 ∈ ad(ℱ), 𝑆 ∈ stb(ℱ), 𝑆 ∈ co(ℱ) are all defined from 𝑓ℱ (𝑆) and 𝑆 + using only quantifiers over arguments.</p><p>In the case of 𝜎 ∈ {infad, infstb, infco}, we need to also observe that 𝑆 being infinite is defined via ∀𝑛∃𝑚(𝑎𝑚 ∈ 𝑆 ∧ 𝑚 &gt; 𝑛), which uses only quantifiers over numbers.</p><formula xml:id="formula_6">Proposition 3.5. Skept ∞ 𝜎 is Π 1 1 , whenever 𝜎 is in {ad, stb, co, infad, infstb, infco}. Furthermore, for 𝜎 ∈ {ad, co}, Uni ∞ 𝜎 is Π 1 1 .</formula><p>Proof. The definition of Skept ∞ 𝜎 in Definition 3.3 uses a single universal set-quantifier followed by only number quantifiers in the definition of 𝜎(ℱ𝑒).</p><p>For 𝜎 ∈ {ad, co}, 𝑒 ∈ Uni ∞ 𝜎 if and only if there are not two different 𝜎 extensions (as there is always at least one 𝜎 extension). This is defined by the negation of the following formula:</p><formula xml:id="formula_7">(∃𝑆1∃𝑆2)(∃𝑥 ∈ 𝑆1∖𝑆2 ∧ 𝑆1 ∈ 𝜎(ℱ𝑒) ∧ 𝑆2 ∈ 𝜎(ℱ𝑒)).</formula><p>Note that ∃𝑆1∃𝑆2 can be replaced by a single existential quantifier by encoding the pair (𝑆1, 𝑆2) as a single set {⟨1, 𝑥⟩ : 𝑥 ∈ 𝑆1} ∪ {⟨2, 𝑦⟩ : 𝑦 ∈ 𝑆2}. This shows that Uni ∞ 𝜎 is the complement of a Σ 1 1 set, thus is Π 1 1 .</p><p>Remark 3.6. The above argument does not suffice to show that Uni ∞ stb is also Π 1 1 , since some AFs have no stable extension. The most obvious definition says there exists one stable extension and there does not exist two, which gives a definition which is a conjunction of a Σ 1 1 and a Π 1  1 condition, i.e., a so-called d-Σ 1 1 definition. This is analogous to the fact that in the finite case Uni stb is DPcomplete. Similarly, the argument above does not show that Uni</p><formula xml:id="formula_8">∞ 𝜎 is Π 1 1 for 𝜎 ∈ {infad, infstb, infco}. Yet, it is true that Uni ∞ 𝜎 is Π 1 1 for 𝜎 ∈ {stb, infad, infstb</formula><p>, infco} as we show below in Corollaries 5.5,5.10, and 5.14.</p><p>We note that knowing that a problem is Σ 1  1 does not necessarily mean the problem is complicated. This only gives an upper-bound for its complexity. Sometimes, a simpler definition is achievable. As an example, we consider Cred cf := {⟨𝑒, 𝑛⟩ :</p><formula xml:id="formula_9">(∃𝑆 ∈ cf(ℱ𝑒))(𝑎𝑛 ∈ 𝑆)}.</formula><p>Though the given definition is Σ 1  1 , to know if an argument 𝑎𝑛 belongs to a conflict-free extension of ℱ𝑒, it suffices to check whether 𝑎𝑛 is non-self-defeating, i.e., 𝑎𝑛 ̸ ↣ 𝑎𝑛, which is equivalent to checking the computable fact that Φ𝑒(⟨𝑛, 𝑛⟩) = 0. In contrast, we will show that for the computational problems associated to the admissible, stable, and complete semantics, the use of the quantifier ranging over all sets cannot be avoided.</p><p>We will heavily rely on the following fundamental theorem by Kleene which offers a natural way of representing Σ 1  1 sets:</p><formula xml:id="formula_10">Theorem 3.7 (Kleene [19]). A set 𝑋 ⊆ 𝜔 is Σ 1 1 if and only if there is a computable sequence of computable trees (𝒯 𝑋 𝑛 )𝑛∈𝜔 so that 𝑛 ∈ 𝑋 iff 𝒯 𝑋 𝑛 is ill-founded.</formula><p>We call (𝒯 𝑋 𝑛 )𝑛∈𝜔 a tree-sequence for 𝑋. As a corollary of Kleene's theorem, one obtains that the problem of deciding which computable trees in 𝜔 &lt;𝜔 are ill-founded (or well-founded) is as hard as any other Σ 1 1 (resp., Π 1 1 ) problem.</p><p>Theorem 3.7 gives a reason to consider the Σ 1 1 sets as the natural infinite analogs of the NP problems. Namely, given an ill-founded computable tree 𝒯 and a sequence 𝜋 which is a path through 𝒯 , it is relatively simple to check that 𝜋 ∈ [𝒯 ] (it requires checking infinitely many simple facts: 𝜋 ↾𝑛 ∈ 𝒯 , for each 𝑛), but finding a sequence 𝜋 ∈ [𝑇 ]-or even knowing whether there exists a sequence 𝜋 ∈ [𝑇 ]-is a far harder problem.</p><p>Our main goal is to exactly characterize the complexity of the computational problems described in Definition 3.3. To do so, we need to show that they are complete for their respective complexity classes. The following definition formalizes this notion. Definition 3.8. Let Γ be a complexity class (e.g., Γ ∈ {Σ 1  1 , Π 1 1 }). A set 𝑉 ⊆ 𝜔 is Γ-hard, if for every 𝑋 ∈ Γ there is a computable function 𝑓 : 𝜔 → 𝜔 so that 𝑥 ∈ 𝑋 if and only if 𝑓 (𝑥) ∈ 𝑉 . If 𝑉 is Γ-hard and belongs to Γ, then it is Γ-complete. Proposition 3.9. It follows from Theorem 3.7 that the set of indices for ill-founded computable trees is a Σ 1 1complete set. Similarly, the set of indices for well-founded computable trees is a Π 1 1 -complete set.</p><p>The following example is far less obvious, but will be useful below to examine Uni ∞ 𝜎 .</p><p>Theorem 3.10 ([20, <ref type="bibr">Theorem 18.11]</ref>). The set UB of indices for computable trees with exactly one path is a Π 1 1complete set.</p><p>Remark 3.11. The hardness in Theorem 3.10 is quite easy. We can reduce the question of whether a tree 𝒯 is well-founded to whether a tree 𝒯 ′ has two paths, where 𝒯 ′ always has at least one path, by simply giving 𝒯 ′ one more path than 𝒯 (e.g. 𝒯 ′ = {1 ⌢ 𝜎 : 𝜎 ∈ 𝒯 } ∪ {𝜎 : (∀𝑛 &lt; |𝜎|)𝜎(𝑛) = 0}). The fact that UB is itself Π 1  1 is the subtle part of this example. Theorem 3.7 along with Definition 3.8 suggest a natural approach for gauging the complexity of the computational problems of Definition 3.3. Namely, given another Σ 1 1 (or Π 1 1 ) set 𝑋, we translate the question asking whether 𝑛 ∈ 𝑋 to the question of if the tree 𝒯 𝑋 𝑛 is ill-founded (resp., well-founded), and then we need to computably find an instance of our computational problem which should be accepted if and only if 𝒯 𝑋 𝑛 is ill-founded (resp., well-founded). This involves coding a tree, or more precisely, the collection of paths through a tree into the 𝜎 extensions in an argumentation framework. We do exactly this in Section 4.</p><p>Table <ref type="table">2</ref> collects our results regarding complexities of the computational problems examined for computable argumentation frameworks. Remark 3.12. As noted before, the Σ 1  1 sets are natural analogs in the infinitary setting of the NP sets, and the Π 1  1 sets are the natural analogs of the coNP sets. With the exception of Skept ∞ co and Uni ∞ stb , Table <ref type="table">2</ref> follows this translation from Table <ref type="table">1</ref> for the first three rows. These two results mark surprising differences in the infinite setting.</p><p>The trivial entries are due to the fact that ∅ is always an admissible extension and the grounded extension is always a complete extension.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Spectra of 𝜎 extensions</head><p>We propose a way to more fully understand the complexity of the problem of finding a 𝜎 extension in a given AF ℱ. Definition 3.13. For each 𝑒 ∈ 𝜔 and semantics 𝜎, let Spec ¬∅ 𝜎 (ℱ𝑒) be the set of Turing degrees of non-empty sets 𝑋 ⊆ 𝜔 so that {𝑎𝑛 : 𝑛 ∈ 𝑋} is a 𝜎 extension in ℱ𝑒.</p><p>The notion Spec ¬∅ 𝜎 (ℱ𝑒) exactly captures the difficulty of computing a non-empty 𝜎 extension in ℱ𝑒. We will be relating the problem of computing a 𝜎 extension in ℱ𝑒 to the problem of finding a path through a particular tree. So, we define the analogous notion of the spectrum of a tree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 3.14. Given any computable tree 𝒯 , we let Spec(𝒯 ) be set of Turing degrees of paths 𝑋 ∈ [𝒯 ].</head><p>Table <ref type="table">3</ref> collects our results on spectra of extensions.</p><formula xml:id="formula_11">𝜎 Cred ∞ 𝜎 Skept ∞ 𝜎 Exists ∞ 𝜎 NE ∞ 𝜎 Uni ∞ 𝜎 ad Σ 1 1 -c 4.2,3.4 trivial trivial Σ 1 1 -c 4.2 3.4 Π 1 1 -c 4.3,3.5 stb Σ 1 1 -c 4.2,3.4 Π 1 1 -c 4.4,3.5 Σ 1 1 -c 4.2, 3.4 Σ 1 1 -c 4.2,3.4 Π 1 1 -c 4.3, 5.10 co Σ 1 1 -c 4.2, 3.4 Π 1 1 -c *, 3.5 trivial Σ 1 1 -c 4.2, 3.4 Π 1 1 -c 4.3,3.5 infad Σ 1 1 -c 4.2,3.4 Π 1 1 -c 4.4,3.5 Σ 1 1 -c 4.2, 3.4 Σ 1 1 -c 4.2, 3.4 Π 1 1 -c 4.3,5.5 infstb Σ 1 1 -c 4.2,3.4 Π 1 1 -c 4.4,3.5 Σ 1 1 -c 4.2, 3.4 Σ 1 1 -c 4.2, 3.4 Π 1 1 -c 4.3,5.10 infco Σ 1 1 -c 4.2,3.4 Π 1 1 -c 4.4,3.5 Σ 1 1 -c 4.2, 3.4 Σ 1 1 -c 4.2, 3.4 Π<label>1</label></formula><p>1 -c 4.3, 5.14 Table <ref type="table">2</ref> Computational problems for computable AFs. 𝒞-c denotes completeness for the class 𝒞. The entry with an asterisk is not fully proved in this paper. Rather, the Π 1 1 -hardness for Skept ∞ co is deferred to future work focusing on the grounded semantics. It is included in the table here (though partially unproved) to give a more complete picture. The numbers in each cell of the table refer to the Theorem number providing the lower bound and upper bounds for the result in that cell. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝜎</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3</head><p>For any computable tree 𝒯 , there is a computable argumentation framework ℱ𝑒 so that Spec(𝒯 ) = Spec ¬∅ 𝜎 (ℱ𝑒). When 𝜎 ∈ {ad, stb, infad, infstb}, the converse also holds. Namely, for every 𝑒, there is a computable tree so that Spec ¬∅ 𝜎 (ℱ𝑒) = Spec(𝒯 ). We do not know how to attain a corresponding upper bound for the complete or infinite complete cases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Encoding a tree into an argumentation framework</head><p>Given a tree 𝒯 ⊆ 𝜔 &lt;𝜔 , we will define an argumentation framework ℱ 𝒯 = (𝐴 𝒯 , 𝑅 𝒯 ). The set of arguments 𝐴 𝒯 of ℱ 𝒯 is computable and consists of {𝑎𝜎 : 𝜎 ∈ 𝒯 }∪{𝑏𝜎 : 𝜎 ∈ 𝒯 } ∪ {𝑐}. The attack relation 𝑅 𝒯 of ℱ 𝒯 contains all and only the following edges:</p><p>For all 𝜎 ∈ 𝒯 , 1. 𝑏𝜎 ↣ 𝑏𝜎;</p><p>2. 𝑏𝜎 ↣ 𝑎𝜎;</p><formula xml:id="formula_12">3. 𝑎𝜎 ↣ 𝑏𝜏 , if |𝜎| = |𝜏 | + 1; 4. 𝑎𝜎 ↣ 𝑎𝜏 , if |𝜎| = |𝜏 | + 1 and 𝜏 ̸ ⪯ 𝜎;</formula><p>5. 𝑐 ↣ 𝑎𝜏 for every 𝜏 ∈ 𝒯 ;</p><p>6. 𝑎 𝜆 ↣ 𝑐. Figure <ref type="figure">1</ref> gives an example of our encoding for a finite tree. We next consider which extensions in ℱ 𝒯 are admissible, stable, or complete.</p><p>Notation. For 𝜋 ∈ [𝒯 ], let 𝑆𝜋 be the set {𝑎𝜎 : 𝜎 ≺ 𝜋}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 4.1. A non-empty extension</head><formula xml:id="formula_13">𝑆 of ℱ 𝒯 is stable iff 𝑆 is complete iff 𝑆 is admissible iff 𝑆 is exactly 𝑆𝜋 for some 𝜋 ∈ [𝒯 ].</formula><p>Proof. Stable always implies complete, which always implies admissible. It is straightforward to check that 𝑆𝜋 is stable for any 𝜋 ∈ [𝒯 ], so we need only show that any non-empty admissible extension is exactly some 𝑆𝜋. Suppose that 𝑆 is admissible. Observe that 𝑐 and 𝑏𝜎 cannot be in 𝑆 since these are self-defeating. So some 𝑎𝜎 ∈ 𝑆 since 𝑆 is non-empty. Note that since 𝑐 ↣ 𝑎𝜎, we must have 𝑎 𝜆 ∈ 𝑆. Next, observe that if 𝑎𝜏 ∈ 𝑆, then there must be some 𝑖 so that 𝑎𝜏⌢𝑖 ∈ 𝑆: this is because some element of 𝑆 must defend 𝑎𝜏 from 𝑏𝜏 and such an element must be an 𝑎𝜎 with |𝜎| = |𝜏 | + 1. But it must have 𝜏 ≺ 𝜎 as otherwise 𝑎𝜎 would attack 𝑎𝜏 . It follows that 𝑆 contains 𝑆𝜋 for some 𝜋 ∈ [𝒯 ]. Since 𝑆𝜋 is stable, 𝑆 cannot properly contain 𝑆𝜋, so 𝑆 = 𝑆𝜋.</p><p>We are now in a position to obtain hardness results for the computational problems described in Definition 3.3.</p><p>Theorem 4.2. The following hold:</p><formula xml:id="formula_14">1. for 𝜎 ∈ {ad, stb, co, infad, infstb, infco}, NE ∞ 𝜎 is Σ 1 1 -hard; 2. for 𝜎 ∈ {stb, infad, infstb, infco}, Exist ∞ 𝜎 is Σ 1 1 - hard; 3. for 𝜎 ∈ {ad, stb, co, infad, infstb, infco}, Cred ∞ 𝜎 is Σ 1 1 -hard.</formula><p>Proof. 1. Let 𝑋 ∈ Σ 1 1 and let (𝒯 𝑋 𝑛 )𝑛∈𝜔 be a treesequence for 𝑋, as given by Theorem 3.7. To show Σ Theorem 4.5. For 𝜎 ∈ {ad, stb, co, infad, infstb, infco} and for any computable tree 𝒯 , there exists a computable AF ℱ𝑒 so that Spec ¬∅ 𝜎 (ℱ𝑒) = Spec(𝒯 ).</p><p>Proof. Observe that for the AF ℱ𝑒 = ℱ 𝒯 , it follows from Lemma 4.1 that the non-empty 𝜎 extensions are all infinite and are in the same Turing degrees as the paths through 𝒯 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Trees coding extensions in 𝜎(ℱ)</head><p>In this section, we give upper bounds to the complexity of Spec ¬∅ 𝜎 for 𝜎 ∈ {ad, stb, infad, infstb} as well as giving upper bounds for the complexity of Uni ∞ 𝜎 for any 𝜎 ∈ {stb, infad, infstb, infco}. We do this by describing how to computably encode the collection of extensions in 𝜎(ℱ) into the set of paths through a tree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The admissible case</head><p>Given a computable argumentation framework ℱ, we will describe a computable tree 𝒯 ℱ so that the paths of 𝒯 ℱ encode the non-empty admissible extensions in ℱ. We begin with an intuitive description of how a path 𝜋 through the tree 𝒯 ℱ will encode an admissible extension 𝑆, and we give the formal definition of 𝒯 ℱ below.</p><p>Branching in 𝒯 ℱ will come in three flavors. The first branching is used to give the least element of the admissible extension 𝑆. This is to ensure that the extension is non-empty. If we wished to allow the empty extension, we could omit this branching. For any 𝑗 &gt; 0, the branching on level 2𝑗 serves to code whether or not 𝑗 ∈ 𝑆. Branching on the odd levels serve to explain how 𝑆 satisfies the hypothesis of being an admissible extension. If 𝑎𝑖 ↣ 𝑎𝑗 is the 𝑛th element of some computable enumeration of all attacking pairs of arguments, then 𝜎(2𝑛 + 1) will be 0 if 𝑎𝑗 / ∈ 𝑆 and otherwise will be 𝑘 + 1 where 𝑘 is least so that 𝑎 𝑘 ∈ 𝑆 and 𝑎 𝑘 ↣ 𝑎𝑖.</p><p>Let ℱ = (𝐴ℱ , 𝑅ℱ ) be a computable AF. Let (𝑔𝑛)𝑛∈𝜔 be a computable sequence of all elements of 𝑅ℱ . If 𝑔𝑛 = (𝑎𝑖, 𝑎𝑗), we denote 𝑎𝑖 by 𝑔 − 𝑛 and 𝑎𝑗 by 𝑔 + 𝑛 . We now define the tree 𝒯 ℱ . Definition 5.1. Any given string 𝜎 ∈ 𝜔 &lt;𝜔 defines two subsets of arguments in 𝐴ℱ :</p><formula xml:id="formula_15">• In𝜎 = {𝑎 𝜎(0) }∪{𝑎𝑗 : 𝑗 &gt; 0∧𝜎(2𝑗) = 1}∪{𝑎 𝑘 : (∃𝑗)(𝜎(2𝑗 + 1) = 𝑘 + 1)} ∪ {𝑎𝑖 : (∃𝑗)(𝜎(2𝑗 + 1) &gt; 0 ∧ 𝑔 + 𝑗 = 𝑎𝑖)}; • Out𝜎 = {𝑎𝑖 : 𝑖 &lt; 𝜎(0)}∪{𝑎𝑗 : 𝑗 &gt; 0∧𝜎(2𝑗) = 0}∪{𝑎𝑖 : (∃𝑗)(𝜎(2𝑗+1) = 0∧𝑔 + 𝑗 = 𝑎𝑖)}∪{𝑎𝑖 : (∃𝑗)(𝜎(2𝑗 + 1) &gt; 𝑖 + 1 ∧ 𝑎𝑖 ↣ 𝑔 − 𝑗 )}.</formula><p>We define 𝒯 ℱ as the set of 𝜎 so that</p><formula xml:id="formula_16">• In𝜎 is conflict-free; • In𝜎 ∩ Out𝜎 = ∅ • If 0 &lt; 2𝑗 &lt; |𝜎|, then 𝜎(2𝑗) ∈ {0, 1}; • If 2𝑗 + 1 &lt; |𝜎| and 𝜎(2𝑗 + 1) = 𝑘 + 1, then 𝑎 𝑘 ↣ 𝑔 − 𝑗 .</formula><p>Theorem 5.2. Let ℱ be a (computable) argumentation framework. Then the non-empty admissible extensions of ℱ are in (computable) bijection with the paths in 𝒯 ℱ .</p><p>Proof. Given a non-empty admissible extension 𝑆 of ℱ, we define the corresponding path 𝜋 in 𝒯 ℱ as follows. Let 𝜋(0) be the least element of 𝑆. For 𝑗 &gt; 0, let 𝜋(2𝑗) = 1 if 𝑎𝑗 ∈ 𝑆 and 𝜋(2𝑗) = 0 otherwise. Let 𝜋(2𝑛 + 1) be 0 if 𝑔 + 𝑛 / ∈ 𝑆 and be 𝑘 + 1 where 𝑘 is least so that 𝑎 𝑘 ∈ 𝑆 and</p><formula xml:id="formula_17">𝑎 𝑘 ↣ 𝑔 − 𝑛 otherwise. It is straightforward to check that 𝜋 ∈ [𝒯 ℱ ].</formula><p>Given a path 𝜋 through 𝒯 ℱ , first note that whenever there is some 𝜎 ≺ 𝜋 so that 𝑎𝑛 ∈ In𝜎, then 𝜋(2𝑛) = 1. This is because whenever 𝜎 ⪯ 𝜏 , then In𝜎 ⊆ In𝜏 . Then since</p><formula xml:id="formula_18">𝜏 := 𝜋 ↾ max(|𝜎|,2𝑛+1) is in 𝒯 ℱ , we cannot have 𝜏 (2𝑛) = 0 since 𝑎𝑛 ∈ In𝜏 . Thus 𝜋(2𝑛) = 𝜏 (2𝑛) = 1. It follows that ⋃︀ 𝜎≺𝜋 In𝜎 = {𝑎𝑛 : 𝜋(2𝑛) = 1}. The same argument shows that ⋃︀ 𝜎≺𝜋 Out𝜎 = {𝑎𝑛 : 𝜋(2𝑛) = 0}. Let 𝑆 = {𝑎𝑛 : 𝜋(2𝑛) = 1}.</formula><p>Note that 𝑆 is conflict-free, since if 𝑎𝑖, 𝑎𝑗 ∈ 𝑆 then there is some long enough 𝜎 ≺ 𝜋 so that 𝑎𝑖, 𝑎𝑗 ∈ In𝜎.</p><p>Since 𝜎 ∈ 𝒯 ℱ , it follows that In𝜎 is conflict-free, so 𝑎𝑖 ̸ ↣ 𝑎𝑗. Next, observe that 𝑆 defends itself. If 𝑎𝑖 ↣ 𝑎𝑗 and 𝑎𝑗 ∈ 𝑆, then there is some 𝑛 so that 𝑔𝑛 = (𝑎𝑖, 𝑎𝑗). Then consider 𝜎 = 𝜋 ↾𝑛+1. We must have 𝜎(𝑛) = 𝑘 + 1 for some 𝑘 with 𝑎 𝑘 ∈ 𝑆 and 𝑎 𝑘 ↣ 𝑎𝑖.</p><p>Finally, note that both the map from 𝜋 to 𝑆 and from 𝑆 to 𝜋 are computable if ℱ is computable and are inverses of each other.</p><p>Corollary 5.3. For every computable AF ℱ𝑒, there exists a computable tree 𝒯 so that Spec ¬∅ ad (ℱ𝑒) = Spec(𝒯 ).</p><p>Proof. It follows immediately from Theorem 5.2 that Spec ¬∅ ad (ℱ𝑒) = Spec(𝒯 ℱ𝑒 ).</p><p>Corollary 5.4. For every computable AF ℱ𝑒, there exists a computable tree ̂︀ 𝒯 so that Spec ¬∅ infad (ℱ𝑒) = Spec( ̂︀ 𝒯 ).</p><p>Proof. The tree needed here is a slight alteration of the tree 𝒯 ℱ . In 𝒯 ℱ , we made 𝜎(0) tell us the least 𝑘 so 𝑎 𝑘 ∈ 𝑆 so as to ensure that 𝑆 ̸ = ∅. We do the same on infinitely many layers, e.g., instead of having 𝜎(2𝑛) be 0 or 1 to tell us whether or not 𝑛 ∈ 𝑆, we have 𝜎(2𝑛) tell us the 𝑛th least number 𝑘 so that 𝑎 𝑘 ∈ 𝑆. With the tree altered like this, paths are in computable bijection with the infinite admissible extensions.</p><formula xml:id="formula_19">Corollary 5.5. Uni ∞ infad is Π 1 1 .</formula><p>Proof. 𝑒 is in Uni infad if and only if the tree ̂︀ 𝒯 in Corollary 5.4 has a unique path. By Theorem 3.10, this is a Π 1 1 condition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The stable case</head><p>Similarly, we can construct a tree encoding the stable extensions by making 𝜎(𝑛) = 0 if 𝑎𝑛 ∈ 𝑆 and otherwise making 𝜎(𝑛) be 𝑘 + 1 where 𝑘 is least so that 𝑎 𝑘 ∈ 𝑆 and 𝑎 𝑘 ↣ 𝑎𝑛. Definition 5.6. Any given string 𝜎 ∈ 𝜔 &lt;𝜔 defines two subsets of arguments in 𝐴ℱ :</p><formula xml:id="formula_20">• In𝜎 = {𝑎𝑖 : 𝜎(𝑖) = 0} ∪ {𝑎 𝜎(𝑖)−1 : 𝑖 &lt; |𝜎| ∧ 𝜎(𝑖) &gt; 0}; • Out𝜎 = {𝑎𝑖 : 𝑖 &lt; |𝜎| ∧ 𝜎(𝑖) &gt; 0} ∪ {𝑎𝑖 : (∃𝑗)𝜎(𝑗) &gt; 𝑖 + 1 ∧ 𝑎𝑖 ↣ 𝑎𝑗)}.</formula><p>We define 𝒯 ℱ as the set of 𝜎 so that Given a path 𝜋 through 𝒯 ℱ , first note that whenever there is some 𝜎 ≺ 𝜋 so that 𝑎𝑛 ∈ In𝜎, then 𝜋(𝑛) = 0. This is because whenever 𝜎 ⪯ 𝜏 , then In𝜎 ⊆ In𝜏 . Then since 𝜏 = 𝜋 ↾ max(|𝜎|,𝑛+1) is on 𝒯 ℱ , we cannot have 𝜏 (𝑛) ̸ = 0 since 𝑎𝑛 ∈ In𝜏 and therefore cannot be in Out𝜏 . It follows that</p><formula xml:id="formula_21">• In𝜎 is conflict-free; • In𝜎 ∩ Out𝜎 = ∅ • If 𝑗 &lt; |𝜎|</formula><formula xml:id="formula_22">⋃︀ 𝜎≺𝜋 In𝜎 = {𝑎𝑛 : 𝜋(𝑛) = 0}. Let 𝑆 = {𝑎𝑛 : 𝜋(𝑛) = 0}.</formula><p>Note that 𝑆 is conflict-free, since if 𝑎𝑖, 𝑎𝑗 ∈ 𝑆, then 𝑎𝑖 ̸ ↣ 𝑎𝑗 since 𝜎 = 𝜋 ↾ max(𝑖,𝑗)+1 is in 𝒯 ℱ , and thus In𝜎 is conflict-free. Next observe that for any 𝑛, either 𝑎𝑛 ∈ 𝑆 or there is some 𝑚 so that 𝑎𝑚 ∈ 𝑆 and 𝑎𝑚 ↣ 𝑎𝑛. In particular, if 𝜋(𝑛) = 0, then 𝑎𝑛 ∈ 𝑆 and otherwise 𝑎 𝜋(𝑛)−1 ∈ 𝑆 and 𝑎 𝜋(𝑛)−1 ↣ 𝑎𝑛.</p><p>Finally, note that both the map from 𝜎 to 𝑆 and from 𝑆 to 𝜎 are computable if ℱ is computable and are inverses of each other.</p><p>Corollary 5.8. For any computable AF ℱ𝑒 there exists a computable tree 𝒯 so that Spec ¬∅ stb (ℱ𝑒) = Spec(𝒯 ).</p><p>Proof. This follows directly from Theorem 5.7 along with the fact that ∅ is never a stable extension.</p><p>Corollary 5.9. For any computable AF ℱ𝑒 there exists a computable tree 𝒯 so that Spec ¬∅ infstb (ℱ𝑒) = Spec(𝒯 ).</p><p>Proof. We add layers of branching to the tree as in Corollary 5.4 so that, e.g., 𝜎(2𝑛) = 𝑚 means that 𝑚 is the 𝑛th least number so that 𝑎𝑛 ∈ 𝑆. This produces a tree ̂︂ 𝒯 ℱ so that the paths are in computable bijection with the infinite stable extensions of ℱ. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The complete case</head><p>Given an argumentation framework ℱ, we can similarly construct a tree 𝒯 ℱ so that paths through 𝒯 ℱ code complete extensions. In order to ensure that 𝑓ℱ (𝑆) ⊆ 𝑆, we will need the paths in 𝒯 ℱ to not only code sets 𝑆 but also their attacked sets 𝑆 + . Given an extension 𝑆, we will let 𝜋 ∈ 𝒯 ℱ encode 𝑆 and 𝑆 + as follows:</p><p>• 𝜋(2𝑛) = 0 if 𝑎𝑛 ∈ 𝑆 and otherwise 𝜋(2𝑛) = 𝑘 + 1 where 𝑘 is least so 𝑎 𝑘 / ∈ 𝑆 + and 𝑎 𝑘 ↣ 𝑎𝑛. • 𝜋(2𝑛 + 1) = 0 if 𝑎𝑛 / ∈ 𝑆 + and otherwise 𝜋(2𝑛 + 1) = 𝑘 + 1 where 𝑘 is least so 𝑎 𝑘 ∈ 𝑆 and 𝑎 𝑘 ↣ 𝑎𝑛.</p><p>Note that 𝜋(2𝑛) explains why 𝑎𝑛 is either in 𝑆 or it is not in 𝑓ℱ (𝑆), i.e., 𝑓ℱ (𝑆) ⊆ 𝑆, while 𝜋(2𝑛 + 1) simply verifies that the elements which 𝜋 says are in 𝑆 + are in fact in 𝑆 + .</p><p>Formally, we define 𝒯 ℱ as follows:</p><p>Definition 5.11. Any given string 𝜎 ∈ 𝜔 &lt;𝜔 defines four subsets of arguments in 𝐴ℱ :</p><formula xml:id="formula_23">• In𝜎 = {𝑎𝑖 : 𝜎(2𝑖) = 0} ∪ {𝑎 𝑘 : (∃𝑗)(𝜎(2𝑗 + 1) = 𝑘 + 1} • Out𝜎 = {𝑎𝑖 : 𝜎(2𝑖) ̸ = 0} ∪ {𝑎𝑖 : (∃𝑗)𝜎(2𝑗 + 1) &gt; 𝑖 + 1 ∧ 𝑎𝑖 ↣ 𝑎𝑗)} • InSplus 𝜎 = {𝑎𝑖 : (∃𝑗)(𝜎(2𝑗) &gt; 𝑖 + 1 ∧ 𝑎𝑖 ↣ 𝑎𝑗)} ∪ {𝑎𝑖 : 𝜎(2𝑖 + 1) ̸ = 0} • OutSplus 𝜎 = {𝑎𝑖 : (∃𝑗)𝜎(2𝑗) = 𝑖 + 1} ∪ {𝑎𝑖 : 𝜎(2𝑖 + 1) = 0}</formula><p>We define 𝒯 ℱ as the set of 𝜎 so that Proof. If 𝜎 ∈ {ad, stb, infad, infstb}, let 𝒯 be a tree so that Spec ¬∅ 𝜎 (ℱ𝑒) = Spec(𝒯 ). If 𝜎 ∈ {𝑐𝑜, infco}, let 𝒯 be a tree so that the set of Turing degrees of pairs (𝑆, 𝑆+) of 𝜎 extensions is exactly Spec(𝒯 ). Then 𝒯 is a computable tree with countably many paths. By a classic result of Kreisel [21, Theorem 3.9], 𝒯 has a hyperarithmetical path, which corresponds to a hyperarithmetical 𝑆 so that {𝑎𝑛 : 𝑛 ∈ 𝑆} is a 𝜎 extension of ℱ𝑒.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>In this paper, we initiated a systematic exploration of the complexity issues inherent to infinite argumentation frameworks. To pursue this direction, we employed computability-theoretic techniques which are ideally suited for assessing the complexity of infinite mathematical objects. Our focus was on the credulous and skeptical acceptance of arguments, as well as the existence and uniqueness of extensions, for admissible, complete, and stable semantics. We introduced and explored new semantics that are meaningful exclusively in the infinite setting, concerning the existence of infinite extensions that satisfy a given semantics 𝜎. The computational problems we examined were found to be maximally complex, properly belonging to the complexity classes of Σ 1 1 and Π 1 1 sets. A plethora of intriguing questions regarding the complexity of infinite AFs remains open. First, we shall fill the gaps that we left behind (such as proving the Π 1 1 -hardness for Skept ∞ co ). Next, we aim at investigating whether the computational problems considered in this paper become more tractable if we restrict to special classes of AFs, such as the finitary ones (i.e., those in which each argument receives finitely many attacks only <ref type="bibr" target="#b6">[7]</ref>). Finally, future research will extend our analysis to analogous problems associated with other key semantics for AFs, including grounded, preferred, and ideal semantics. Given that the definitions of these semantics are more intricate than those we examined here, we anticipate the need for additional techniques to thoroughly analyze them.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>We first consider 𝜎 ∈ {ad, stb, co}. To define Cred ∞ 𝜎 , we see from Definition 3.3: Cred ∞ 𝜎 := {⟨𝑒, 𝑛⟩ ∈ 𝜔 : (∃𝑆 ∈ 𝜎(ℱ𝑒)(𝑎𝑛 ∈ 𝑆))} uses a single existential quantifier over sets 𝑆. This is similarly true for the definitions of Exist ∞ 𝜎 and NE ∞ 𝜎 in Definition 3.3. Thus, it suffices to see that the condition 𝑆 ∈ 𝜎(ℱ𝑒) can be defined with only quantification over arguments, which are in bijection with 𝜔, not needing quantification over sets of arguments.</figDesc><table><row><cell>Proof.</cell></row><row><cell>. Π 1 1 sets are the complements</cell></row><row><cell>of Σ 1 1 sets.</cell></row><row><cell>Proposition 3.4. Cred ∞ 𝜎 , Exist ∞ 𝜎 , and NE ∞ 𝜎 are Σ 1 1 , for</cell></row><row><cell>𝜎 ∈ {ad, stb, co, infad, infstb, infco}.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>1  1hardness, we need to produce a computable function 𝑓 so that 𝑛 ∈ 𝑋 if and only if 𝑓 (𝑛) ∈ NE ∞ 𝜎 . We let 𝑓 (𝑛) be a computable index for ℱ 𝒯 𝑋 𝑛 . Then Lemma 4.1 shows that 𝑛 ∈ 𝑋 if and only if 𝒯 𝑋 𝑛 is ill-founded if and only if ℱ 𝒯 𝑋 𝑛 has a non-empty 𝜎 extension for each 𝜎 ∈ {ad, stb, co, infad, infstb, infco}. Example of our encoding of trees into AFs: the left-side represents the tree {𝜆, 0, 1, 10, 11}, the right-side is the resulting AF. When applied to trees 𝑇 of infinite height,[𝑇 ]  will be encoded into the stable, complete, and admissible extensions of ℱ 𝑇 . For the example shown in the figure, the only admissible extension of ℱ 𝒯 is the empty one, since [𝑇 ] = ∅.3.In the proof of 1. above, we reduced a given Σ 1 1 set 𝑋 to NE ∞ 𝜎 by sending 𝑛 to ℱ 𝒯 𝑋 𝑛 . Note that ℱ 𝒯 𝑋 𝑛 has a nonempty 𝜎 extension if and only if 𝑎 𝜆 is in some 𝜎 extension. Thus sending 𝑛 to ⟨𝑒, 𝑎 𝜆 ⟩ where 𝑒 is a computable index for ℱ 𝒯 𝑋 𝑛 shows that Cred ∞ 𝑎0⟩ ∈ Skept ∞ 𝜎 where 𝑒 is a computable index for 𝒢𝑛 := ℱ 𝒯 ′ 𝑛 if and only if 𝒯 ′ 𝑛 only has paths 𝜋 with 𝜋(0) = 0 if and only if 𝒯 ′ 𝑛 has only one path (see the definition of 𝒯 ′ 𝑛 in Remark 3.11) if and only if 𝑛 ∈ 𝑋. This shows the Π 1 1 -hardness of Skept ∞ 𝜎 .</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>𝑐</cell></row><row><cell></cell><cell></cell><cell></cell><cell>10</cell><cell cols="2">11</cell><cell>𝑎 10</cell><cell>𝑏 10</cell><cell>𝑎 11</cell><cell>𝑏 11</cell></row><row><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>1</cell><cell></cell><cell>𝑎 0</cell><cell>𝑏 0</cell><cell>𝑎 1</cell><cell>𝑏 1</cell></row><row><cell></cell><cell></cell><cell></cell><cell>𝜆</cell><cell></cell><cell></cell><cell>𝑎 𝜆</cell><cell>𝑏 𝜆</cell></row><row><cell cols="7">Figure 1: 1 1 and</cell></row><row><cell>let (𝒯 𝜔∖𝑋 𝑛</cell><cell cols="6">)𝑛∈𝜔 be a tree-sequence for its complement.</cell></row><row><cell cols="5">Consider the sequence of AFs (ℱ 𝒯 𝜔∖𝑋 𝑛</cell><cell cols="2">)𝑛∈𝜔. Note that</cell></row><row><cell cols="7">∅ is an admissible extension in any AF and since every</cell></row><row><cell cols="3">argument in ℱ 𝒯 𝜔∖𝑋 𝑛</cell><cell cols="4">is attacked, ∅ is also a complete</cell></row><row><cell cols="4">extension. Thus, ℱ 𝒯 𝜔∖𝑋 𝑛</cell><cell cols="3">has a unique 𝜎 extension if</cell></row><row><cell cols="2">and only if 𝒯 𝜔∖𝑋 𝑛</cell><cell cols="5">is well founded if and only if 𝑛 ∈ 𝑋,</cell></row><row><cell cols="6">which shows that Uni ∞ ad and Uni ∞ co are Π 1 1 -hard.</cell></row><row><cell cols="7">For the other 𝜎, ∅ is not a 𝜎 extension. We use Theorem</cell></row><row><cell cols="7">3.10 to show Π 1 1 -hardness. Let 𝑋 be any Π 1 1 set. Then</cell></row><row><cell cols="7">we get from Remark 3.11 a sequence of trees 𝒯 ′ 𝑛 so that</cell></row><row><cell cols="7">0 ∞ ∈ [𝒯 ′ 𝑛 ] for each 𝑛, and {𝑛 : 𝒯 ′ 𝑛 has only one path}</cell></row><row><cell cols="7">is Π 1 1 -hard. It follows from Lemma 4.1 that this holds if and only if ℱ 𝒯 ′ 𝑛 has a unique 𝜎 extension, which shows</cell></row><row><cell cols="4">the Π 1 1 -hardness of Uni ∞ 𝜎 .</cell><cell></cell><cell></cell></row><row><cell cols="7">Theorem 4.4. For any 𝜎 ∈ {stb, infstb, infco, infad},</cell></row><row><cell cols="3">Skept ∞ 𝜎 is Π 1 1 -hard.</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="7">Proof. Let 𝑋 be a Π 1 1 set. Then we get from Remark 3.11</cell></row><row><cell cols="7">a sequence of trees 𝒯 ′ 𝑛 so that 0 ∞ ∈ [𝒯 ′ 𝑛 ] for each 𝑛, and {𝑛 : 𝒯 ′ 𝑛 has only one path} is Π 1 1 -hard. Then note that ⟨𝑒,</cell><cell>2. For each of these 𝜎, the empty set is not a 𝜎 ex-tension, so Exist ∞ 𝜎 = NE ∞ 𝜎 , which we showed above is Σ 1 1 -hard.</cell></row></table><note>𝜎 is Σ 1 1 -hard. Theorem 4.3. For 𝜎 ∈ {ad, stb, co, infad, infstb, infco}, Uni ∞ 𝜎 is Π 1 1 -hard.Proof. We first consider 𝜎 ∈ {ad, co}. Let 𝑋 ∈ Π</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>and 𝜎(𝑗) = 𝑘 + 1, then 𝑎 𝑘 ↣ 𝑎𝑗. Given a stable extension 𝑆 of ℱ, we define the corresponding path 𝜋 in 𝒯 ℱ as follows. For each 𝑛, let 𝜋(𝑛) be 0 if 𝑎𝑛 ∈ 𝑆 and let 𝜋(𝑛) be 𝑘 + 1 where 𝑘 is least so that 𝑎 𝑘 ∈ 𝑆 and 𝑎 𝑘 ↣ 𝑎𝑛 otherwise. It is straightforward to check that 𝜋 ∈ [𝒯 ℱ ].</figDesc><table><row><cell>Proof.</cell></row><row><cell>Theorem 5.7. Let ℱ be a (computable) argumentation</cell></row><row><cell>framework. Then the stable extensions of ℱ are in (com-</cell></row><row><cell>putable) bijection with the paths in 𝒯 ℱ .</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head></head><label></label><figDesc>As the paths through 𝒯 ℱ𝑒 are in bijection with the stable extensions, 𝑒 ∈ Uni ∞ stb if and only if 𝒯 ℱ𝑒 has a unique path. As the paths through ̂︀ 𝒯 ℱ (see Corollary 5.9) are in bijection with the infinite stable extensions in ℱ𝑒, we have 𝑒 ∈ Uni infstb if and only if ̂︀ 𝒯 ℱ𝑒 has a unique path. By Theorem 3.10, these are both Π 1 1 conditions.</figDesc><table><row><cell>Corollary 5.10. Uni ∞ stb and Uni ∞ infstb are Π 1 1 .</cell></row><row><cell>Proof.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head></head><label></label><figDesc>Let 𝑆 be any complete extension. We can define 𝜋 from 𝑆 as described at the beginning of this section. It is straightforward to verify that each condition (1-7) of Definition 5.11 is satisfied by 𝜋 ↾𝑛 for each 𝑛.Given a path 𝜋 ∈ [𝒯 ℱ ], we can define sets 𝑆 = {𝑖 : 𝜋(2𝑖) = 0} and 𝑈 = {𝑖 : 𝜋(2𝑖 + 1) ̸ = 0}. We note that when 𝜎 ⪯ 𝜏 , In𝜎 ⊆ In𝜏 . It follows from this fact, as in the previous theorems, that 𝑆 = ⋃︀ 𝜎≺𝜋 In𝜎. Similarly, 𝑈 = ⋃︀ 𝜎≺𝜋 InSplus 𝜎 . Next we see that 𝑈 = 𝑆 + . If 𝑛 ∈ 𝑈 , then 𝜋(2𝑛+1) ̸ = 0 and by condition 5, we have 𝑎 𝜋(2𝑛+1)−1 attacks 𝑎𝑛. But then 𝑎 𝜋(2𝑛+1)−1 ∈ In 𝜋↾ 2𝑛+2 , so 𝑎 𝜋(2𝑛+1)−1 ∈ 𝑆. Thus 𝑈 ⊆ 𝑆 + . On the other hand if 𝑛 / ∈ 𝑈 , then condition 6 for all 𝜎 of length &gt; 2𝑛 + 1 ensures that there is no 𝑎𝑗 ∈ 𝑆 so 𝑎𝑗 ↣ 𝑎𝑛. Thus 𝑆 + ⊆ 𝑈 .Finally, we verify that 𝑆 is complete. 𝑆 is clearly conflict free by Condition 1. Condition 7 ensures that any 𝑎𝑚 ∈ 𝑆 is also in 𝑓ℱ (𝑆), since if 𝑛 / ∈ 𝑈 , then 𝑎𝑛 ̸ ↣ 𝑎𝑚. To see that 𝑓ℱ (𝑆) ⊆ 𝑆, note that any 𝑎𝑛 / ∈ 𝑆 has 𝜋(𝑛) ̸ = 0 and 𝑎 𝜋(𝑛)−1 / ∈ 𝑆 + and 𝑎 𝜋(𝑛)−1 ↣ 𝑎𝑛 by condition 4. Thus 𝑎𝑛 / ∈ 𝑓ℱ (𝑆). The map from paths 𝜋 ∈ [𝒯 ℱ ] to complete extensions 𝑆 ⊆ 𝐴ℱ is computable, but to compute 𝜋 ∈ 𝒯 ℱ we need both 𝑆 and 𝑆 + . Thus, we are able to say that for any computable AF ℱ𝑒, the set of Turing degrees of pairs (𝑆, 𝑆 + ) where 𝑆 is a complete extension is always Spec(𝒯 ) for a computable tree 𝒯 , but note that 𝑆 and 𝑆 + are not generally of the same Turing degree. Thus, we are currently unable to fully characterize Spec ¬∅ co or Spec ¬∅ infco . We can alter the tree 𝒯 ℱ𝑒 as in Corollary 5.4 to get a new tree ̂︀ 𝒯 so that the paths through ̂︀ 𝒯 are in bijection with the infinite complete extensions. Then 𝑒 ∈ Uni ∞ infco if and only if ̂︀ 𝒯 has a unique path. Theorem 3.10 shows that this is a Π 1 1 condition.</figDesc><table><row><cell>Remark 5.13. Corollary 5.14. Uni ∞ infco is Π 1 1 .</cell></row><row><cell>Proof.</cell></row></table><note>1. In𝜎 is conflict-free; 2. In𝜎 ∩ Out𝜎 = ∅; 3. InSplus 𝜎 ∩ OutSplus 𝜎 = ∅; 4. If 𝜎(2𝑗) = 𝑘 + 1, then 𝑎 𝑘 ↣ 𝑎𝑗; 5. If 𝜎(2𝑗 + 1) = 𝑘 + 1, then 𝑎 𝑘 ↣ 𝑎𝑗; 6. For 𝑗, 𝑘 &lt; |𝜎|, if 𝑎 𝑘 ∈ OutSplus 𝜎 and 𝑎𝑗 ∈ In𝜎 then 𝑎𝑗 ̸ ↣ 𝑎 𝑘 ; 7. For 𝑛, 𝑚 &lt; |𝜎|, if 𝑎𝑛 ∈ OutSplus 𝜎 and 𝑎𝑚 ∈ In𝜎, then 𝑎𝑛 ̸ ↣ 𝑎𝑚 (i.e., 𝜎 does not contradict 𝑆 ⊆ 𝑓ℱ (𝑆)). Theorem 5.12. The complete extensions of ℱ are in bijection with the set of paths [𝒯 ℱ ]. Proof. Corollary 5.15. Fix 𝜎 ∈ {ad, stb, co, infad, infstb, infco} and suppose that ℱ𝑒 has only countably many non-empty 𝜎 extensions. Then there is a hyperarithmetical set 𝑆 so that {𝑎𝑛 : 𝑛 ∈ 𝑆} is a 𝜎 extension of ℱ𝑒.</note></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Andrews was partially supported by NSF grant DMS-2348792. San Mauro is a member of INDAM-GNSAGA.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Automata for infinite argumentation structures</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cerutti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">203</biblScope>
			<biblScope unit="page" from="104" to="150" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial intelligence</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="321" to="357" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Defeasible logic programming: An argumentative approach, Theory and practice of logic programming</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Simari</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="95" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Self-stabilizing defeat status computation: dealing with conflict management in multi-agent systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Guida</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">165</biblScope>
			<biblScope unit="page" from="187" to="259" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Deflog: on the logical interpretation of prima facie justified assumptions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Verheij</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic and Computation</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="319" to="346" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Grounded semantics and infinitary argumentation frameworks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Oren</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 26th Benelux Conference on Artificial Intelligence, BNAIC</title>
				<meeting>the 26th Benelux Conference on Artificial Intelligence, BNAIC</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="25" to="32" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Infinite argumentation frameworks: On the existence and uniqueness of extensions</title>
		<author>
			<persName><forename type="first">R</forename><surname>Baumann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Spanring</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation: Essays Dedicated to Gerhard Brewka on the Occasion of his 60th Birthday</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="281" to="295" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Computing with infinite argumentation frameworks: The case of afras, in</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cerutti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theorie and Applications of Formal Argumentation: First International Workshop, TAFA 2011</title>
				<meeting><address><addrLine>Barcelona, Spain</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">July 16-17, 2011. 2012</date>
			<biblScope unit="page" from="197" to="214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Weighted argumentation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">FLAP</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="1589" to="1622" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Coherence in finite argument systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">141</biblScope>
			<biblScope unit="page" from="187" to="203" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The computational complexity of ideal semantics</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">173</biblScope>
			<biblScope unit="page" from="1559" to="1591" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Complexity of semi-stable and stage semantics in argumentation frameworks</title>
		<author>
			<persName><forename type="first">W</forename><surname>Dvořák</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<biblScope unit="page" from="425" to="430" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Handbook of computability and complexity in analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Brattka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hertling</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">V</forename><surname>Velupillai</surname></persName>
		</author>
		<title level="m">Computable foundations for economics</title>
				<imprint>
			<publisher>Routledge</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Formal language theory: refining the chomsky hierarchy</title>
		<author>
			<persName><forename type="first">G</forename><surname>Jäger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rogers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Philosophical Transactions of the Royal Society B: Biological Sciences</title>
		<imprint>
			<biblScope unit="volume">367</biblScope>
			<biblScope unit="page" from="1956" to="1970" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Semantics of abstract argument systems</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baroni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Giacomin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argumentation in artificial intelligence</title>
		<imprint>
			<biblScope unit="page" from="25" to="44" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Complexity of abstract argumentation</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wooldridge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Argumentation in artificial intelligence</title>
		<imprint>
			<biblScope unit="page" from="85" to="104" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Theory of recursive functions and effective computability</title>
		<author>
			<persName><forename type="first">H</forename><surname>Rogers</surname><genName>Jr</genName></persName>
		</author>
		<imprint>
			<date type="published" when="1987">1987</date>
			<publisher>MIT press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Arithmetical predicates and function quantifiers</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Kleene</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Transactions of the American Mathematical Society</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="312" to="340" />
			<date type="published" when="1955">1955</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Kechris</surname></persName>
		</author>
		<title level="m">Classical descriptive set theory</title>
				<imprint>
			<publisher>Springer Science &amp; Business Media</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">156</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Π 0 1 Classes in Computability Theory</title>
		<author>
			<persName><forename type="first">D</forename><surname>Cenzer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studies in Logic and the Foundations of Mathematics</title>
		<imprint>
			<biblScope unit="volume">140</biblScope>
			<biblScope unit="page" from="37" to="85" />
			<date type="published" when="1999">1999</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
