<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Argumentation⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>LarsBengel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>JulianSanderand MatthiaTshimm</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Artificial Intelligence Group, University of Hagen</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>1</volume>
      <fpage>1</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>argumentation, reasoning, preferred semantics, algorithms Formal argumentation is a research field within the area of knowledge representation and reasoning that ofers a great variety of formalis2m],sa[nd the(abstract) argumentation framework (AF) introduced by Dung [3] is a core area of research. In an argumentation framework, arguments are modelled as abstract entities and we consider directed attacks between them as the only relation. Reasoning in argumentation frameworks is via acceptability semantics, which are functions that return sets of arguments, calleedxtensions, considered jointly acceptable. A fundamental property of acceptable sets is admissibility, which requires that a set of arguments is conflict-free and also defends all of its members against attacks from the other arguments. For instapnrcefee,rtrehdeextensions are then simply defined as the⊆-maximal admissible set3s].[ One can then define diferent reasoning problems based on these semantic4s].[ One of the most prominent ones is the problemskeopftical reasoning wrt. some semantics, i. e., deciding whether a given argument is contained in every extension wrt. the given semantics. In general, most of these reasoning problems are non-tr4a]c.tEaspbelcei[ally because of that, algorithms to eficiently compute these problems are of great importance in order to apply argumentation in practice.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>ceur-ws.org</p>
      <p>In this work, we introduce a noSvaetl-based algorithm for solving the problem of skeptical reasoning
wrt. preferred semantics. This algorithm is built upon recent results on the characterisation of preferred
semantics as a vacuous-reduct semant1i4c]s. E[ssentially, our algorithm searches through complete
extensions and looks for one that disproves the skeptical acceptance of the query argument by being
incompatible with it. In contrast to existing work, the algorithm does not maximise each complete
extension and instead continues searching for new complete extensions containing unvisited arguments.
Our algorithm also employs efective preprocessing measures, outlined by Liao and[H15u]a,tnog
simplify computation. Thus, our algorithm is able to solve the problem of skeptical preferred reasoning
without having to actually compute the preferred extensions, similar to the approach of Thimm et al.
[9]. Moreover, we show that our algorithm is sound and complete and our experiments show that it
significantly outperforms current state-of-the-art solvers on most benchmarks.</p>
      <p>To summarise, the contribution of this work is twofold:
• We introduce a novel algorithm for skeptical reasoning wrt. preferred semantics and show that it
is sound and complete (Secti3o)n,
• We implement our algorithm and evaluate it against state-of-the-art argumentation solvers
(Section4).</p>
      <p>In Section2 we introduce the necessary background on abstract argumentation, i5nwSection
discuss related work and Sect6iocnoncludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Preliminaries</title>
      <p>We consider abstract argumentation as introduced by3D].uTnhge[central notion is tahbestract
argumentation framework (AF), which is a tupleF = (A, R)whereA is a finite set of arguments anRd
is the attack relatRion⊆ A × A. For any two argument,s ∈ A, we say tha t attacks  if ( ,  ) ∈ R,
sometimes also written aRs . For a set of argument⊆s A we denote withF| = (, R ∩ ( × ))
therestriction of F to . Furthermore, for a se⊆t A we define the set of arguments attacked by
(attacking) in F respectively as
 F+ = { ∈ A ∣ ∃ ∈  ∶  R },</p>
      <p>F− = { ∈ A ∣ ∃ ∈  ∶  R }.</p>
      <p>If  = {  } is a singleton set, we also w ri+te(respectively− ) for readability. Moreover, we say that</p>
      <p>F F
 is conflict-free if we have  ∩  F+ = ∅. The set defends an argument ∈ A if for all  ∈  − there is
F
some  ∈  such tha tR . Furthermor e, is calledadmissible if it is conflict-free and defends all ∈  ,
i. e., we have that∩  F+ = ∅ and F− ⊆  F+ . We denote withad(F) the admissible sets oFf.</p>
      <p>We can now impose further constraints on admissible sets to obtain diferent argumentation
semantics [16]. In particular, an admissible s⊆etA is called a
• complete (CO) extension if for every ∈ A, if  defends then ∈  ,
• preferred (PR) extension if there exists no admissib l′e with ⊊  ′,
• grounded (GR) extension if  is complete and there is no compl e′tewith ′ ⊊  .</p>
      <p>For a given argumentation framewFor=k (A, R) and a semantic s∈ { CO, PR, GR}, we denote
with( F) the set of -extensions oFf.</p>
      <p>Example 1. Consider the argumentation framewFordkepicted in Figur1e. The complete extensions
of F are{ }, { ,  ,  } and{ ,  ,  , ℎ}. Note that, for instan{ce,,} is admissible, but not complete since it
also defends. Furthermore{, ,  ,  } and{ ,  ,  , ℎ} are the preferred extensionsFo.fFinally{, } is the
minimal complete extension and thus the unique grounded extenFsi.on of







ℎ</p>
      <p>is contained in a l-lextensions oFf,</p>
      <sec id="sec-2-1">
        <title>The following example illustrates the above problems.</title>
        <p>Example 2. Consider again the argumentation framewFoirnkFigure1. For complete and preferred
semantics the argumen t, s,  ,  andℎ are credulously accepted, w hi, le, and are not credulously
accepted wrt. any semantics. For the grounded sem anistibcosth the only credulously and skeptically
accepted argument.</p>
        <p>For complete and preferred semant icis,also skeptically accepted. Interestingly,  wihsinleot
skeptically accepted wrt. complete semantics, it is however skeptically accepted wrt. preferred semantics,
since it is contained in both preferred extensions, cf. Exa1.mple</p>
        <p>The computational complexity of these problems has been well studied, we refer the interested reader
to [4] for an overview. The prevalent strategy to solve many of these problems is reducing them to
satisfiability problems (Sat) and using a dedicateSdat-solver for solving those, c5f,. 8[].</p>
        <p>In particular, we want to highlight two results which are of importance for our work. The problem
SE-GR is inP, i. e., computing the grounded extension of an AF can be done in polynomial time. Secondly,
the problem of skeptical reasoning wrt. preferred sem(aDnSt-iPcRs)is Π2-complete. Most importantly,
that means it cannot be solved by a siSnagtl-ecall and it is one of the more dificult decision problems
in abstract argumentation. In particular, the pDroSb-PlRemwill be the main focus of this work.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. The Vacuous Reduct-based Approach to Skeptical Preferred</title>
    </sec>
    <sec id="sec-4">
      <title>Reasoning</title>
      <p>In this section, we present our main contribution, a novel algorithm for skeptical reasoning wrt.
preferred semantics. We first outline in Sect3i.o1nthe underlying ideas of our algorithm, which are
based on a combination of results and characterisations from the literature. Afterwards we describe
theSat-encoding used by our approach (Secti3o.2n). Finally, we present our algorithm for skeptical
reasoning wrt. preferred semantics (Sec3t.3io) nand show that it is sound and complete in Sec3t.4i.on</p>
      <p>
        Our approach is built on the concepctoounfterexample guided abstraction refinement (CEGAR) [17].
This concept is widely used by argumentation sol8v,e9r]s a[nd has been pioneered by thCeEGARTIX
system [7] for the domain of abstract argumentation. Given an argumentation frFamaenwdoark
query argument, the general idea is to find complete extensions of sub-frameworFksaotftacking the
query argument. The general procedure of our algorithm consists of the following steps:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) Simplify the argumentation framework by removing irrelevant arguments and “resolving” the
grounded extension,
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) Iterate through complete extensions of the remaining argumentation framework in search of a
counterexample for the skeptical acceptance of the query,
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) Combine partial results of the previous steps to a proper counterexample.
      </p>
      <p>During each step, we actively check whether the query argument is attacked by the current (partial)
counterexample, which can allow us to terminate sooner.</p>
      <sec id="sec-4-1">
        <title>3.1. Theoretical Background</title>
        <p>Let us start with considering the relevant notions and results from the literature that our algorithm
built upon. LeFt = (A, R)be an arbitrary argumentation framework∈anAdis the query argument
in question.</p>
        <p>Simplifying the Argumentation Framework. The first step in our approach is simplifying the
problem instance, without afecting the result, to accelerate the subsequent problem solving process.
This kind of preprocessing is an important part of many problem solving paradigms, for instance
Sat-solving 1[8]. In the context of abstract argumentation, this can mean replacing parts of the
argumentation framework with simplified structu1r9e]so[r removing parts of the framework altoge1t5h]e.r [
In this work, we consider only the latter approach.</p>
        <p>
          The simplification performed by our algorithm consists essentially of two steps:
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) Restrict the argumentation framework to only those arguments relevant for. the query
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) Compute the grounded extensi oGnR of the restricted argumentation framework and remove all
arguments contained iGnR and those attacked bGyR.
        </p>
        <p>The first step is based on the principle Dofirectionality for argumentation semantics and has already
been outlined by Liao and Huan1g5][. For that, for some argumentation frameFwo=rk(A, R), we
ifrst define the set of unattacked sets of F.</p>
        <p>UA(F) = { ⊆ A ∣ ∄ ∈ (A ∖ ) ∶  ∈  F− }</p>
        <sec id="sec-4-1-1">
          <title>Based on that, thDeirectionality principle has been defined 2[0].</title>
          <p>Principle 1. Let be a semantics. We say thatsatisfies Directionality if and only if for all argumentation
frameworksF and every se t∈ UA(F) it holds th a(tF| ) = { ∩  ∣  ∈ ( F)}.</p>
          <p>Essentially, the above principle states that the computation of an extension for a ssehmouanldtics
only depend on its attackers (and in turn on their attackers and so on). As has been shown by Baroni
and Giacomin2[0], both the complete and preferred semantics saDtiirsefcytionality.</p>
          <p>Proposition 1. Complete and preferred semantics satisfy Directionali.ty</p>
          <p>Now we can determine an unattacke d∈setUA(F)that contains the query argum eanntd restrict
the argumentation framework to simplify the computation without afecting the acceptance status
of the query argument.</p>
          <p>A simple but efective way to achieve this is to consider the argumreelnevtasnt for  . For two
arguments,  ∈ A we say tha t is relevant for if there exists a directed path fr omto . We then
define the set of argumentrselevant for in F as follows.</p>
          <p>
            RelF ( ) = { } ∪ { ∈ A ∣  is relevant fo r}
(
            <xref ref-type="bibr" rid="ref1">1</xref>
            )
(
            <xref ref-type="bibr" rid="ref2">2</xref>
            )

F






ℎ
          </p>
          <p>Example 3. Consider again the argumentation framewFoirnkFigure1. We examine the argume nt.
It is easy to observe thRaetl ( ) = { ,  ,  ,  ,  , ℎ,  }. Note that for bothand there exists no directed
path to thus they are not relevant f.oSrimilarly, we also havReelF ( ) = { ,  } andRelF ( ) = A1.
argumen t.</p>
          <p>For convenience, we explicitly define th atis always relevant for itself. Notably, this notion of
relevance has already been used1i5n],[but also recently been defined in the context of acceptance
explanations by Borg and Be2x1[]. It is then easy to see thRaetlF ( ) is an unattacked setFoffor any
Corollary 1. For all AFs F = (A, R) and arguments  ∈ A it holds that RelF ( ) ∈ UA(F).</p>
          <p>According to the directionality property, this allows us to restrict the input argumentation framewor
to just the arguments relevant for the qubeerfoyre performing further calculations. This does not
only allow us to ignore arguments that are only attacked by the query, but also enables us to disregard
unrelated components of the argumentation framework entirely.</p>
          <p>The second simplification we perform is explicitly computing the grounded extension of the AF, which
can be done in polynomial tim4e].[For that we utilise the simple iterative procedure for computing
the grounded extension that has been outline3d].bAys[we will show in the following paragraphs,
we can then remove the grounded extension and everything attacked by it from the argumentation
framework, to simplify the subsequently creSaatte-dencoding.</p>
          <p>Iterating Complete Extensions We are concerned with the problem of skeptical reasoning wrt.
preferred semantics. This, however, does not mean, that we have to explicitly compute preferred
extensions to solve this proble9m]. [Instead, we will primarily consider complete extensions.</p>
          <p>The main notion underlying our algorithm is-rtehdeuct introduced by Baumann et2a2l]. [
Definition 1. LetF = (A, R)be an AF and ⊆ A. We define the  -reduct of F as F = (A′, R′)with
A′ = A ∖ ( ∪  F+ ),</p>
          <p>R′ = R ∩ (A′ × A′).</p>
          <p>Essentially, the reduct allows us to remove the part ofFthtehaAtFis already “resolved” b.y
 -reduct oFf is the argumentation framewFor{k, , } depicted in Figur2e.</p>
          <p>Example 4. Consider again the argumentation framewFoirnkFigure1. Let = {  ,  ,  }, then the</p>
          <p>Based on this concept, the notionvaocfuous reduct semantics has been introduced14[].</p>
          <p>Definition 2. Let be a semantics anFd is an AF. We say thaFt is  -vacuous if ( F) ⊆ {∅}.
set ⊆ A is a  -extension if  is a -extension and it holds thFa tis  -vacuous.</p>
          <p>Definition 3.</p>
          <p>Let,  be argumentation semantics aFnd= (A, R) is an argumentation framework. A
non-empty -extension. We denote wit h(F) the set of a ll -extensions oFf.</p>
          <p>Intuitively, a s etis a  extension oFf if it is  -extension oFf and in the reducFt there exists no
Example 5. Consider again the argumentation framewFoirnkFigure1. Let us consider the vacuous
reduct semanticcsfad, i. e., the conflict-free sets such that the reduFct contains no non-empty
admissible set2s. Examine, for instance, the se1t= { ,  ,  }. Clearl y 1 is conflict-free inF. The reduct
F 1 is depicted in Figur2e. It is easy to verify th∅atis the only admissible setFof1, thus 1 is a
cfad-extension ofF. On the other hand, the conflict-free s{e,t ,  } is not acfad-extension, because
there is the admissible s{eℎt} in the reducFt { , , }.</p>
          <p>Of particular interest to us, is the fact that the preferred semantics can be characterised as a vacuous
reduct semantics, as shown b1y4,[23].</p>
          <p>Proposition 2. For any AF F = (A, R). It holds that</p>
          <p>PR(F) = adad(F) = COCO(F).</p>
          <p>We will utilise this in our algorithm for skeptical preferred reasoning to verify whether some complete
extension is preferred by checking whether the redFuctis CO-vacuous.</p>
          <p>Constructing the Counterexample In the course of executing the algorithm we construct diferent
complete extensions in diferent restrictions and reducts of the original argumentation framework.
What allows us to combine them to construct a proper counterexample for skeptical acceptance is the
concept ofModularisation of argumentation semantics introduced by Baumann2e4t].al. [
Principle 2. Let be a semantics. We say thatsatisfies Modularisation if and only if for all
argumentation frameworkFsit holds that, i1f ∈ ( F) and 2 ∈ ( F 1) then 1 ∪  2 ∈ ( F).</p>
          <p>As shown by Baumann et a[l2.4], Modularisation is satisfied by both complete and preferred semantics.
Proposition 3. Complete and preferred semantics satisfy Modularisatio.n</p>
          <p>This concept will prove useful for our algorithm and allows us to combine partial results into a proper
counterexample for skeptical acceptance.</p>
          <p>Example 6. Consider again the argumentation framewFodrekpicted in Figur1e. We have the
complete extensio{n} and in the reducFt{ }, there is for instance the complete exten{s,io}nand, as
already seen in Exampl1e, the union{ } ∪ { ,  } is a complete extension Fof. Notably, this combined
set then also serves as a counterexample for skeptical acceptance of the arignuFm.ent</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Sat-Encoding for Complete Semantics</title>
        <p>Our algorithm for skeptical preferred reasoning, like most state-of-the-art approaches, utilises a
reduction toSat. In the following, we will briefly describe tShaet-encoding used for computing complete
extensions. The encodings are built on stanSdaatr-dencodings for AFs6[, 25], used in similar fashion
by many argumentation solve8r,s1[3].</p>
        <p>LetF = (A, R) be an argumentation framework. Let us first introduce basic notion. We consider
propositional logic and we model the acceptance (rejection) of an arg∈uAmewnrtt. to some extension
 ⊆ A with the propositional variaibnl e(out ). We will then define formulae over these atoms with
the usual connective¬s,: ∧, ∨. Let ∶ { in } ∈A ∪ {out } ∈A ↦ {True, False} be some interpretation
over the arguments Fof representing some extensio⊆n A. Then, if in is True in  , then ∈  ,
otherwis e ∉  . Analogously, iofut is True in  , then ∈  + , otherwis e ∉  + .</p>
        <p>F F</p>
        <p>Our encoding for complete semantics then consists of the following components. (E3q)umaotdioelns
basic conditions for acceptance: an argument cannot be accepted and rejected at the same time, if
an attack erof  is accepted, thenis rejected and ifis rejected, then one of its attackers must be
accepted. Recall that a complete extension is conflict-free, defends all its members and includes all</p>
        <sec id="sec-4-2-1">
          <title>2Note that thcefad-extensions have also been coinuenddisputed sets in [14].</title>
          <p>
            arguments that it defends. Conflict-Freeness is modelleΨd biyn Equation(
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) via the condition if
F
attacks then if is accepte d must not be accepted. Defense is modelled in Equa(5t)i,osntating that,
if an argument is accepted then every attac kmerust be rejected. Finally, completeness is described
in Equation6() via the condition ifis not accepted, then one of its attackers must not be rejected.
ΨF = ⋀ ((¬in ∨ ¬out ) ∧ ⋀ (out ∨ ¬in ) ∧(¬out ∨ ⋁ in ))
          </p>
          <p>∈A  ∈ −F  ∈ −F
ΨF = ΨF ∧ ⋀ ⋀ ¬in ∨ ¬in</p>
          <p>∈A  ∈ −F
ΨF = Ψ ∧ ⋀</p>
          <p>F</p>
          <p>⋀ ¬in ∨ out
 ∈A  ∈ −F
ΨCFO = ΨF ∧  ⋀∈A (in ∨  ⋁∈−F ¬out )
As has been shown in6[], every model oΨfCO corresponds to a complete extensioFn.oIfn particular,</p>
          <p>F
for some argumentation framewFor=k (A, R) and a model of ΨCO we define the corresponding
F
complete extensio n of F as follows:</p>
          <p>Beyond that, we also utilise the following clause inSeavte-crayll which ensures that the computed
complete extension is non-empty.</p>
          <p>= { ∈ A ∣ ( in ) = True}
ΨF = ⋁ in</p>
          <p>∈A
CF () =</p>
          <p>⋁ in
 ∈A∖</p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>3.3. Algorithm for Skeptical Reasoning wrt. Preferred Semantics</title>
        <p>First, we introduce some notatiGonro.unded(F) denotes the iterative algorithm computing the
grounded extension of Dun[3g]. We writeSat(Ψ)for a call to tShaet-solver that returTnrsue if Ψ is
satisfiable andFalse otherwise. Furthermore, we wrWitietness(Ψ)for a call to tShaet-solver that
returns the se t for some model of Ψ, if Ψ is satisfiable, otherwise it returFnaslse. We also utilise a
complement clausCeF () defined as
for some set of argument⊆s A. This clause, for each found complete extensi,oensures not only
that thSeat-solver does not find as a solution again, but also tha t ′anwyith ′ ⊆  is no valid
witness in any followinSgat-call.</p>
        <p>
          Our novel algorithm for deciding skeptical acceptance wrt. preferred semantics is shown in
Algorithm1. For the inputF = (A, R)and some ∈ A, the algorithm returYnes if  is skeptically accepted
wrt. preferred semanticsFi n,otherwise it returns a complete exte nsoiofnF that serves as a witness
for the non-acceptance o. fIn detail, the procedure of our algorithm works as follows:
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) RestrictF to the arguments relevant faonrd compute the grounded extensioGnR of F|RelF( )
(lines 1-2). If ∈  GR terminate witYhes, if  ∈  G+R,F terminate wit hGR as the witness for
non-acceptance. Otherwise move(tFo|RelF( )) GR (lines 3-7).
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) If (F|RelF( )) GR possesses no non-empty complete extensions at aGlRli,s a counterexample
(lines 9-10).
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) Compute a non-empty complete extensioonf F that does not contai(nline 12).
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) If no further complete extensioins found, terminate wiYthes (lines 13-14).
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) If  attacks, then GR ∪  is a counterexample for skeptical acceptan c(elionfes 15-16).
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) Otherwise, check if there is a non-empty complete extens′iionnthe reducFt  (lines 17-25).
a) If not, the n GR ∪  is a preferred extensionFofand thus a counterexample for the skeptical
acceptance o f (lines 18-19).
b) If there is a non-empty complete extens io′ nand  ′ attacks, then GR ∪  ∪  ′ is a
counterexample (lines 20-21).
        </p>
        <p>c) Otherwise, add a complement clause ∪fo r ′ and continue wit(h2)(lines 22-25).</p>
        <sec id="sec-4-3-1">
          <title>Algorithm 1 Algorithm foDrS-PR.</title>
          <p>Input: F = (A, R),  ∈ A
Output:  ⊆ A, otherwiseYes
1: F ← F |RelF( )
2:  GR ← Grounded(F )
3: if  ∈  GR then
4: return Yes
5: if  ∈  G+R,F then
6: return  GR</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>3.4. Soundness and Completeness</title>
        <p>As the following result shows, our algorithm is indeed sound and complete. For so(mF e, i)n, pitut
returnsYes if and only if the query argume nits skeptically accepted wrt. preferred semantFic.s in
The full proof of Theore m1can be found in the extended version of this pa2p6e]r, a[vailable onli3n.e
Theorem 1. Algorithm 1 is sound and complete for the problem DS-PR.</p>
        <p>Note that the algorithm is still sound and complete if we use the eΨnacdofdoirnagdmissibility
F
instead of the encoding for complete semantics. This follows easily via Pro2p4o.sition
3https://doi.org/10.5281/zenodo.16022972
4Early experiments showed however that usΨinCOg is slightly faster in practice, see a2l5s]ofo[r a detailed performance</p>
        <p>F
analysis of diferent types of semantical encodings.</p>
        <p>
          In case the query argumentis not skeptically accepted wrt. preferred semantics, the algorithm
returns a witness that serves as a counterexample for the non-acce p t.aAnscaelorfeady mentioned
before, this output is not necessarily a preferred extension that does not contai n.tIhnestqeuaedr,y
Algorithm1 returns three diferent types of witnesses, depending on the situation:
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) an admissible set oFf attacking the query (lines 6, 16, 21),
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) the grounded extensionFof|RelF ( ) not containing the query (line 10),
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) a preferred extension Fof|RelF ( ) not containing the query (line 19).
        </p>
        <p>Importantly, as follows from the proof of Theo1r,etmhe witness produced by Algorit1hmis in any
case suficient to prove that the query is not skeptically accepted wrt. preferred semantics.
Corollary 2. Let F = (A, R) be an argumentation framework and  ∈ A and  ∉ ⋂∈ PR(F)  . Let  ⊆ A
be the output of Algorithm 1 for the input F = (A, R), ∈ A. Then, there exists a preferred extension
 ∈ PR(F ) with  ⊂  and  ∉  .</p>
        <p>The following section will show the feasibility of our approach in practice and that it significantly
outperforms state-of-the-art approaches in most cases.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Empirical Evaluation</title>
      <p>To evaluate the performance of our novel algorithm for skeptical preferred reasoning, we conducted an
evaluation and compared its runtime to that of current state-of-the-art argumentation solvers. In th
following, we will briefly describe the implementation of our algorithm as well as the experimental setup.
Finally, we will present the results of the evaluation and provide an ablationSsattu-dsoylwverrts..</p>
      <sec id="sec-5-1">
        <title>4.1. System Overview</title>
        <p>We implemented Algorith1min C++ as part of an argumentation solver which we craeldluecdto.
For all calls of the foSramt(⋅),Witness(⋅)reducto uses theSat-solverCaDiCal 2.1.3 [27]. The
computation oFf |RelF ( ) and the functioGnrounded(F ) are implemented directly in C++ via simple
iterative procedures. The implementation is open source and available o5n. GitHub</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Experimental Setup</title>
        <p>For the evaluation of our algorithm, we consider the benchmark datasIenttesronfattihoenal Competition
on Computational Models of Argumentation (ICCMA). We consider the decision probleDmS-PR and
make use of the appropriate datasets from all competitioInCsC,iM.eA.,’15 toICCMA’23 [28, 29, 30, 13].</p>
        <p>Table1 summarises some key statistics for the considered benchmark sets. Note ItChCaMt Ath’2e1
dataset is comprised of particularly large instances compared to all other benchmark sets.</p>
        <p>To evaluate the performance of our algorithm for skeptical preferred reasoning, we consider the
runtime per instance and compare it to that of current state-of-the-art argumentation solvers. Beside ou
solverreducto (version 2.13), we consider all competitors from the IlCaCteMsAt’23 for the evaluation:
 -toksia [8]: written inC++, uses an iterativSeat-basedCEGAR approach [7]. Available are two
versions, one withGlucose [31] and one withCryptoMiniSat [32] as theSat-solver.</p>
        <p>Fudge [9]: written inC++, Sat-based approach witChaDiCal [27] as theSat-solver that solves the
problem by computing admissible sets attacking admissible sets that contain the query argument.
Crustabri [33]: written in Rust, iteratSiavte-based approach witChaDiCal [27] as theSat-solver.
PORTSAT [34]: written in Rust, enumerates preferred extensions with the help of a portfolio of
diferent Sat-solvers.</p>
        <p>The experimental evaluation has been conducted witphrotbho2e benchmarking suite for
argumentation solvers3[5]. All experiments where executed on a machine running Ub2u0n.0t4uwith an Intel
Xeon E53.4 GHz CPU and192 GB of RAM. We used a per-instance time-out12o0f0 seconds.</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. Results</title>
        <p>The results of our experiments are summarised in T2a.bFloer each benchmark set, we also consider
thevirtual best solver (VBS), which is computed by taking the best runtime for each instance from
all competing solvers. Solvers are ranked in increasing order according to the number of unsolved
instances and in case of ties by total runtime.</p>
        <p>In generalr, educto solves the most instances out of all the considered solversICfoCrMtAh’e15,
ICCMA’17, ICCMA’19 andICCMA’23 benchmark sets. On all of these datarseedtuscto also has the
best PAR2 score and contributes the most instances to the VBS, i. e., it has the fastest runtime of any
solver on the most instances. The total runtime is also generally the lowesICt,CoMnAly’1f7oris it
higher than that o-ftoksia (Glucose) andCrustabri.</p>
        <p>This is simply due to the fact thraetducto solves significantly more instances of the dataset.
Especially on the easier benchmark sIeCtCsMA’15 andICCMA’19, where most solvers are able to
solve all instances, the total runtime and PAR2 srceodruecotfo is significantly lower than that of all
competitors.</p>
        <p>Only on theICCMA’21 dataset ,-toksia (Glucose) solves more instances thraenducto and is also
faster on almost all instances.ICTCheMA’21 dataset generally consists of only very large instances,
compared to the other benchmark sets (cf. T1a)b.lIen addition to that, for all of the instances the
simplification steps employed by our approach are not applicable, i. e., the AFs have the empty set as the
grounded extension and all arguments in the AF are relevant for the query argument. We presume this
is the reason for the worse performancreeodfucto, in combination with a less eficienStat-encoding
compared t o-toksia. Notably, all other solvers, apart  fr-toomksia (Glucose), includin g -toksia
(CMSat), still perform significantly worse thraenducto on theICCMA’21 dataset.</p>
        <p>Let us take a closer look at the most rIeCcCenMtA’23 dataset. The simplification steps outlined
in Section3.1 allow us to reduce the s|iAze| of an instance b5y8.2% on average. More specifically,
restricting the AF to the arguments relevant for the query removes on38a.2v%eroafgtehe arguments,
and “resolving” the grounded extension removes an3o1t.h7%erof the remaining arguments. Figu3are
visualises the performance of each solver onICtChMeA’23 dataset. In particular, it shows the number
of solved instances of each solver given the per-instance runtime. As one rceadnusceteo, performs
significantly better than all other solvers on this dataset. Moreove3rb, gFivgeusrae direct comparison
of reducto and -toksia (Glucose), the two best ranked solvers, onItChCeMA’23 dataset. Markers
above the diagonal line are instances wrheedruecto is faster and below-toksia is faster. As we can
see, the performance of both solvers is within one order of magnitude of each other for the majority of
(c) Results forICCMA’19 (326 instances).</p>
        <p>(d) Results forICCMA’17 (350 instances).</p>
        <p>PAR2 #VBS</p>
        <p>Solver</p>
        <p>RT</p>
        <p>PAR2 #VBS
instances. However,educto is clearly faster for almost all instances. That is also consistent with the
fact tharteducto contributes the most instances to the VBS for all datasetI CsCexMcAep’2t1.</p>
      </sec>
      <sec id="sec-5-4">
        <title>4.4. Ablation study wrt.Sat-Solvers</title>
        <p>To evaluate the impact of the utilSiasetd-solver we conducted a small ablation study oICnCtMheA’23
benchmark set. BesideCsaDiCal 2.1.3 [27], we also considered thSeat-solversGlucose 4.2.1 [31],
CryptoMiniSat (CMSat) 5.11.21 [32] andMergeSat 4.0 [36]. In Table3 we summarise the results
forreducto based on the diferentSat-solvers on thIeCCMA’23 dataset. As we can seCe,aDiCal
significantly outperforms the othSeart-solvers. While thCeMSat andMergeSat versions ofreducto
perform quite similarly, tGhleucose version clearly performs worse than the others. This is in contrast
to -toksia, whereGlucose performs clearly better tChaMnSat on all benchmarks. Interestingly, all
versions contribute a significant amount of instances to the VBS, hoCwaeDvieCral contributes the
most. It should also be noted that all versiroendsuocfto are faster than all other solvers, cf. 2Taa.ble</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Discussion</title>
      <p>The problem of skeptical reasoning wrt. preferred semantics is a focal point of argumentation research,
and there exist many diferent approaches in the literature to tackle it. Like our approach, many of
them are based onCEGAR [17]. The  -toksia solver 8[] uses the same approach as CEGARTIX7][,
without shortcuts. Given an argumentation framFewaonrdk some argumen t, it searches for a
complete extensio nof F that does not conta.inIt then iteratively maxim isetso try and obtain a
preferred extensio n′ with ′ ⊇  and ∉  ′. If no such ′ exists, a complement clause is added to
theSat-encoding and the search for complete extensions withcountinues. Simplifications are not
applied in the latest version.</p>
      <p>While our approach is fairly similar, there are some important diferences. First of all, we employ
simplifications, as outlined in Secti3o.1n. We also utilise shortcuts by checking whether the query
argumen t is attacked by some found non-empty complete exte ns,isoinmilar to CEGARTIX. We also
additionally use a clause to ensure non-emptiness, which is not used in other approaches. However, the
key diference is that for each found complete extensi,owne only check once whether there is a larger
complete extension (by searching for a non-empty complete extension in theFre).dMucetaning, we
efectively search through diferent complete extensions that each contain at least one never before
visited argument, instead of trying to maximise each one. Thus, we narrow down the search field with
each iteration but grant more freedom for the complete extensions to be computed.</p>
      <p>A quite diferent approach is employed by thFuedge solver 9[]. It uses a conflict-driven approach
and directly searches for admissible sets that attack admissible set that contain the query argument
As already mentioned before, this is diferent to our approach, since we do not actively search for
acceptable sets that attack the query, but rather check if that is the case during the search.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusion</title>
      <p>In this work, we considered the problem of skeptical reasoning wrt. preferred semantics, i. e., deciding
whether every preferred extension of an argumentation framework contains some specific argument.
We introduced a novel algorithm that first simplifies the problem instance and subsequently searches
through non-empty complete extensions of the simplified argumentation framework. Instead of
maximising these extensions, our approach checks whether they directly attack the query argument and
continues searching for extensions that contain unvisited arguments. We implemented this approach in
the solverreducto. As our experimental results show, the combination of these simplifications and the
search procedure allowresducto to outperform current state-of-the-art solvers on most benchmarks.</p>
      <p>Regarding future work, we intent to further refine the undeSralyti-nengcoding, cf. the work
of [25]. Furthermore, the simplification steps ofer an interesting point for further research. First of all,
there are other possibilities for more sophisticated preproc1e9s]sitnhgat[ could be of use. Moreover,
preprocessing is not used at all by many of the existing solvers and thus it would be interesting to study
its efectiveness in the context of the other algorithms for skeptical preferred reasoning.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>The research reported here was partially supported by the Deutsche Forschungsgemeinschaft (grant
550735820).</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <sec id="sec-9-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[16] P. Baroni, D. Gabbay, M. Giacomin, L. van der Torre (Eds.), Handbook of Formal Argumentation,</p>
        <p>College Publications, 2018.
[17] E. M. Clarke, O. Grumberg, S. Jha, Y. Lu, H. Veith, Counterexample-guided abstraction refinement
for symbolic model checking, J. ACM 50 (2003) 752–794.
[18] A. Biere, M. Järvisalo, B. Kiesl, Preprocessing in SAT solving, in: A. Biere, M. Heule, H. van
Maaren, T. Walsh (Eds.), Handbook of Satisfiability - Second Edition, volume 3F3ro6notifers in
Artificial Intelligence and Applications , IOS Press, 2021, pp. 391–435.
[19] W. Dvorák, M. Järvisalo, T. Linsbichler, A. Niskanen, S. Woltran, Preprocessing
argumentation frameworks via replacement patterns, in: Logics in Artificial Intelligence - 16th European
Conference, JELIA 2019, Proceedings, volume 11468LoNfCS, Springer, 2019, pp. 116–132.
[20] P. Baroni, M. Giacomin, On principle-based evaluation of extension-based argumentation
semantics, Artificial Intelligence 171 (2007) 675–700.
[21] A. Borg, F. Bex, Minimality, necessity and suficiency for argumentation and explanation, Int. J.</p>
        <p>Approx. Reason. 168 (2024) 109143.
[22] R. Baumann, G. Brewka, M. Ulbricht, Revisiting the foundations of abstract argumentation
semantics based on weak admissibility and weak defense, in: The Thirty-Fourth AAAI Conference
on Artificial Intelligence, AAAI 2020, AAAI Press, 2020, pp. 2742–2749.
[23] L. Blümel, M. Thimm, Revisiting vacuous reduct semantics for abstract argumentation, in: ECAI
2024 - 27th European Conference on Artificial Intelligence, IOS Press, 2024, pp. 3517–3524.
[24] R. Baumann, G. Brewka, M. Ulbricht, Shedding new light on the foundations of abstract
argumentation: Modularization and weak admissibility, Artificial Intelligence 310 (2022) 103742.
[25] F. Cerutti, M. Giacomin, M. Vallati, How we designed winning algorithms for abstract
argumentation and which insight we attained, Artificial Intelligence 276 (2019) 1–40.
[26] L. Bengel, J. Sander, M. Thimm, A Reduct-based Approach to Skeptical Preferred Reasoning in</p>
        <p>Abstract Argumentation (Extended Version), Zenodo, 2025.
[27] A. Biere, T. Faller, K. Fazekas, M. Fleury, N. Froleyks, F. Pollitt, Cadical 2.0, in: A. Gurfinkel,
V. Ganesh (Eds.), Computer Aided Verification - 36th International Conference, CAV 2024, volume
14681 of Lecture Notes in Computer Science, Springer, 2024, pp. 133–152.
[28] M. Thimm, S. Villata, The first international competition on computational models of
argumentation: Results and analysis, Artificial Intelligence 252 (2017) 267–294.
[29] S. A. Gaggl, T. Linsbichler, M. Maratea, S. Woltran, Design and results of the second international
competition on computational models of argumentation, Artificial Intelligence 279 (2020).
[30] S. Bistarelli, L. Kotthof, J.-M. Lagniez, E. Lonca, J.-G. Mailly, J. Rossit, F. Santini, C. Taticchi, The
third and fourth international competitions on computational models of argumentation: Design,
results and analysis, Argument &amp; Computation 0 (2024) 1–73.
[31] G. Audemard, L. Simon, On the glucose SAT solver, Int. J. Artif. Intell. Tools 27 (2018)
1840001:1–1840001:25.
[32] M. Soos, K. Nohl, C. Castelluccia, Extending SAT solvers to cryptographic problems, in: Theory
and Applications of Satisfiability Testing - SAT 2009, 12th International Conference, SAT 2009,
Proceedings, volume 5584 oLfecture Notes in Computer Science, Springer, 2009, pp. 244–257.
[33] J. Lagniez, E. Lonca, J. Mailly, A sat-based approach for argumentation dynamics, in: Proceedings
of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS
2024, ACM, 2024, pp. 2351–2353.
[34] S. Declercq, Q. J. Capellini, C. Yang, J. Delobelle, J.-G. Mailly, Portsat: A portfolio of sat solvers for
abstract argumentation, ICCMA 2023 (2023) 32.
[35] J. Klein, M. Thimm, probo2: A benchmark framework for argumentation solvers, in: Computational
Models of Argument - Proceedings of COMMA 2022, volume 35F3roonftiers in Artificial Intelligence
and Applications, IOS Press, 2022, pp. 363–364.
[36] N. Manthey, The mergesat solver, in: Theory and Applications of Satisfiability Testing - SAT 2021
- 24th International Conference, Proceedings, volume 12L8N31CoS,f Springer, 2021, pp. 387–398.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bengel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sander</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <article-title>A reduct-based approach to skeptical preferred reasoning in abstract argumentation</article-title>
          ,
          <source>in: Proceedings of the 22th International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>KR</source>
          <year>2025</year>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Brewka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Polberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Generalizations of dung frameworks and their role in formal argumentation</article-title>
          ,
          <source>IEEE Intelligent Systems</source>
          <volume>29</volume>
          (
          <year>2014</year>
          )
          <fpage>30</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Computational problems in formal argumentation and their complexity</article-title>
          ,
          <source>Handbook of Formal Argumentation</source>
          <volume>1</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <article-title>Foundations of implementations for formal argumentation</article-title>
          ,
          <source>Handbook of Formal Argumentation</source>
          <volume>1</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Doutre</surname>
          </string-name>
          ,
          <article-title>Checking the acceptability of a set of arguments</article-title>
          ,
          <source>in: 10th International Workshop on Non-Monotonic Reasoning (NMR</source>
          <year>2004</year>
          ),
          <year>2004</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Cegartix: A sat-based argumentation system</article-title>
          ,
          <source>in: Pragmatics of SAT Workshop (POS)</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Järvisalo, mu-toksia: An eficient abstract argumentation reasoner</article-title>
          , in: D.
          <string-name>
            <surname>Calvanese</surname>
          </string-name>
          , E. Erdem, M. Thielscher (Eds.),
          <source>Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning</source>
          ,
          <source>KR</source>
          <year>2020</year>
          ,
          <year>2020</year>
          , pp.
          <fpage>800</fpage>
          -
          <lpage>804</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cerutti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vallati</surname>
          </string-name>
          ,
          <article-title>Skeptical reasoning with preferred semantics in abstract argumentation without computing preferred extensions</article-title>
          , in: Z.
          <string-name>
            <surname>Zhou</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI</source>
          <year>2021</year>
          ,
          <article-title>ijcai</article-title>
          .org,
          <year>2021</year>
          , pp.
          <fpage>2069</fpage>
          -
          <lpage>2075</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Gaggl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Wallner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>The ASPARTIX system suite</article-title>
          ,
          <source>in: Computational Models of Argument - Proceedings of COMMA</source>
          <year>2020</year>
          , volume
          <volume>F3r2o6notifers</volume>
          <source>in Artificial Intelligence and Applications</source>
          , IOS Press,
          <year>2020</year>
          , pp.
          <fpage>461</fpage>
          -
          <lpage>462</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nofal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <article-title>Algorithms for decision problems in argument systems under preferred semantics</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>207</volume>
          (
          <year>2014</year>
          )
          <fpage>23</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. W. A.</given-names>
            <surname>Caminada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Gabbay</surname>
          </string-name>
          ,
          <article-title>A logical account of formal argumentation</article-title>
          ,
          <source>Stud Logica</source>
          <volume>93</volume>
          (
          <year>2009</year>
          )
          <fpage>109</fpage>
          -
          <lpage>145</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Järvisalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lehtonen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Niskanen</surname>
          </string-name>
          ,
          <year>Iccma 2023</year>
          :
          <article-title>5th international competition on computational models of argumentation</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>342</volume>
          (
          <year>2025</year>
          )
          <fpage>104311</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <article-title>On undisputed sets in abstract argumentation</article-title>
          ,
          <source>in: Thirty-Seventh AAAI Conference on Artificial Intelligence</source>
          ,
          <source>AAAI</source>
          <year>2023</year>
          , AAAI Press,
          <year>2023</year>
          , pp.
          <fpage>6550</fpage>
          -
          <lpage>6557</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Liao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Partial semantics of argumentation: basic properties and empirical</article-title>
          ,
          <source>Journal of Logic and Computation</source>
          <volume>23</volume>
          (
          <year>2013</year>
          )
          <fpage>541</fpage>
          -
          <lpage>562</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>