<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Weak Assumption-Based Argumentation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lydia Blümel</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Artificial Intelligence Group, University of Hagen</institution>
          ,
          <addr-line>Universitätsstraße 11, 58097 Hagen</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Assumption-Based Argumentation (ABA) is a versatile non-monotonic reasoning formalism that derives arguments from a set of defeasible assumptions via some given inference rules. Like many other formal reasoning tools, ABA also allows the derivation of contradictions, giving rise to direct and indirect self-contradicting arguments. For Abstract Argumentation, a closely related formalism, semantics based on weak admissibility have been shown to solve this problem while otherwise behaving nicely. Instead of the classic defense by counter-attack, they use a recursive notion of admissibility to check the validity of each incoming attack. We explore how this approach can be realized in the more expressive ABA formalism. Our proposal is to use Abstract Bipolar SETAFs as an in-between to take advantage of the abstract intuition behind weak admissibility without a loss in expressiveness on the side of ABA.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Argumentation</kwd>
        <kwd>Knowledge Representation Languages</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Motivating Problem</title>
      <p>
        In both Structured and Abstract Argumentation, a key concept is the notion of admissibility. Loosely
speaking, admissibility formalizes that, in a given debate, an acceptable set  of arguments should
(i) not contain internal conflicts and (ii) be able to refute arguments raised against . However, as
pointed out in several works [
        <xref ref-type="bibr" rid="ref10 ref5 ref9">5, 9, 10</xref>
        ], this requirement is often too strong in real-world argumentation
scenarios, especially in the presence of paradoxical arguments as in the following example.
Example 2.1. Suppose our agent participates in a debate about climate change. The first argument
brought forward is that “Climate change is happening due to mankind emitting carbon dioxide.” (yielding
an assumption for climate change, ). Another argument confirms this, stating that “According to numerous
studies, climate change is happening.” (yielding an assumption in favor of studies, ). However, another
participant counters this by arguing that “I read on social media that everything written on the internet is
false.” (yielding an assumption in favor of distrusting information, ). If we distrust every information on
the internet, this together with the fact that the studies on climate change are available online constitutes
a collective attack from  and  towards : if both of these assumptions are accepted, we have to
disregard . On the other hand,  is a self-attacking argument, because if everything on the internet is
false, then also this same information found on social media. We obtain the following attack structure.
1–6
      </p>
      <p>Clearly, in this scenario we would like to disregard the self-attacking argument that represents distrusting
reasonable information. However, no commonly agreed semantics for ABAFs can handle this in a satisfactory
way.</p>
      <p>As we said in our introduction, ABA is a suitable formalism for modeling a variety of argumentation
scenarios like this example due to its simple structure but more than suficient expressiveness. Before
we go into further detail, we therefore give a short formal introduction to ABA. Based on a deductive
system (ℒ, ℛ), where ℒ is a set of sentences and ℛ a set of inference rules, an ABA framework (ABAF)
is a tuple  = (ℒ, ℛ, , ), where  is a set of assumptions from which we infer according to the
rules ℛ, and  :  → ℒ a contrary function we use to derive attacks on assumptions. In order to
conduct defeasible reasoning with an ABAF  = (ℒ, ℛ, , ) we consider arguments that can be built
by applying rules to assumptions. More precisely, we consider the fact, that some  ∈ ℒ can be derived
from a set of assumptions  ⊆  according to the rules ℛ an (ABA) argument, and denote this by
 ⊢ . Furthermore, if  is the contrary () of some assumption  ∈  we say the set  attacks any
set  ⊆  with  ∈ .A set of assumptions  is conflict-free if it does not attack itself; admissible if it
is conflict-free and defends itself, i. e. attacks all of its attackers. Consider the introductory example.
Example 2.2. We can model our introductory Example 2.1 with the ABAF  = {, , }, ℒ =
 ∪ { |  ∈ },
contraries () =  for each assumption and rules
ℛ = {( ← ), (  ← , )}.</p>
      <p>The assumption  is attacked by the set {, } and cannot be defended, because the only attacker
of that set is the assumption  itself.</p>
      <p>At first, we tried to use weak admissibility for AFs in ABA out of the box: the idea was to simply
evaluate the argumentation graph  corresponding to an ABAF . Given an ABAF  = (ℒ, ℛ, , ),
the corresponding argumentation graph is the tuple  = (, ) where  is the set of all ABA
arguments  ⊢  with  ∈ ℒ derived from a set of assumptions  ⊆  according to the rules ℛ and
attacks ( ⊢ ,  ⊢ ) if  is the contrary of some  ∈  . Now if an argument attacks itself in an
abstract argumentation framework, it can be ignored under weak admissibility and is neither accepted
nor relevant for the acceptance of other arguments. This direct approach, however, does not work as
we demonstrate next.
Example 2.3. Instantiating the ABAF from Example 2.2 as an AF yields the following argumentation
graph :</p>
      <p>{} ⊢ 
{, } ⊢ 
Instead of disregarding the self-attacking assumption , weak admissibility only allows us to disregard
the argument “() ←  ” which explicates that this assumption is self-attacking. Consequently, 
and  are accepted whereas  is not. This is surprisingly far away from what we want to achieve; after
all, weak admissibility handles (abstract) self-attackers quite well.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Progress to date</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] we propose to use SETAFs [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] as an alternative representation for ABAFs which have the
necessary expressiveness to properly identify self-attacks and odd cycles in an ABAF. A SETAF is a
tuple  = (, ), where  is a set of arguments and  is a set of collective attacks (, ℎ) from a
set of arguments  ⊆  to a single argument ℎ ∈ . Using the reduct notion for SETAFs from [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
we define weak admissibility on SETAFs by generalizing the definition for AFs in a natural way. By
this, we indirectly define weak admissibility for ABA. An ABAF is represented by a SETAF where the
assumptions are the set of arguments and an attack from a set of assumptions  to some assumption ℎ
is simply a collective attack between the respective arguments corresponding to these assumptions.
Now a set of assumptions is weakly admissible, if the corresponding set of arguments in the
SETAFrepresentation is weakly admissible. We can indeed successfully capture the motivating example
with this representation. However, SETAFs are only suficient as a representation for Flat ABAFs
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], i. e. ABAFs where assumptions cannot be derived by the rules. To overcome this limitation,
we further generalized the notion of weak admissibility to Bipolar SETAFs in this years paper [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
Bipolar SETAFs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] combine the ideas underlying argumentation frameworks with collective attacks
(SETAFs) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and bipolar argumentation frameworks (BAFs) [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15, 16, 17</xref>
        ]. Instead of only considering
an attack relation, there is also a notion of support. BSAFs can model collective attacks and supports.
Definition 3.1. A bipolar set-argumentation framework (BSAF) is a tuple F = (, , ), where  is a
ifnite set of arguments,  ⊆ 2  ×  is the attack relation and  ⊆ 2  ×  is the support relation.
      </p>
      <p>We restrict ourselves to finite BSAFs, those that have finitely many arguments.</p>
      <p>Definition 3.2. Given a BSAF F = (, , ) and a set  ⊆  of arguments. With</p>
      <p>F () :=  ∪ {ℎ ∈  | ∃ (, ℎ) ∈  :  ⊆ }
we call cl F () = ⋃︀≥1 F () the closure of ;  is closed if F () = .</p>
      <p>We denote by + the set of all arguments attacked by  and define ⊕ =  ∪ + . A set  ⊆ 
is conflict-free (  ∈ cf (F )) if it does not attack itself; defends  ∈  if for each closed set ′ ⊆ 
attacking ,  attacks ′;  defends ′ if  defends each  ∈ ′.</p>
      <p>A conflict-free set  is admissible ( ∈ adm(F )) if  is closed and defends itself.</p>
      <p>Due to space limitations we omit the introduction of the standard semantics. Before we can give the
definition of weakly admissible semantics for this framework, we first need a suitable notion of reduct.
Definition 3.3. Given a BSAF
( ,  ,  ), with</p>
      <p>F = (, , ) and  ⊆  , the -reduct of F is the BSAF F  =
 =  ∖ (cl ()⊕)</p>
      <p>Note that some design choices had to be made for handling collective attacks and supports.
Intuitively, an attack/support is removed in the reduct, whenever one attacking/supporting assumption
is attacked by the set  in question, otherwise it is restricted to the assumptions remaining in the
reduct. Furthermore, we add self-attacks in the reduct for sets of assumptions that support an argument
attacked by . The -reduct for BSAFs gives us the tools to generalize weak admissibility. Note that the
definition is recursive, but well-defined as in each recursion step the reduct contains fewer arguments
and we deal only with finite BSAFs.</p>
      <p>Definition 3.4. Let F = (, , ) be a BSAF,  ⊆  a set of arguments, and F  = (, , ) its
-reduct. Then  is called weakly admissible in F ( ∈ admw(F )) if
1.  ∈ cf (F ),  closed and
2. for each (, ℎ) ∈  with ℎ ∈ , and  ∩ + = ∅ it holds ∄′ ∈ admw(F ) s.t.  ∩  ⊆  ′.</p>
      <p>When applying this definition to our introductory example, we can now ignore the joint attack
involving the self-attacker and accept the argument that climate change is happening.
Example 3.5. Recall our introductory Example 2.1 about climate change. The instantiated BSAF  is
given as follows.
• there exists ( ′, ) ∈  and ℎ ∈/  ′.</p>
      <p>• there exists ( ′, ) ∈ .</p>
      <p>We have adm() = {∅, {}, {}, {, }}.</p>
      <p>
        So our motivating example is indeed handled as desired now. To demonstrate that weak admissibility
behaves well in general, let us consider the paradoxical rule principle from [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. As the name indicates,
the principle involves attacks and supports in the ABAF that we deem paradoxical. We introduce the
concept (in terms of BSAFs as they resemble ABA attacks and supports) below.
      </p>
      <p>Definition 3.6. Given a BSAF F = (, , ). An attack  = (, ℎ) ∈  is paradoxical if  ̸= ∅ and
for every  ∈  there is a  ′ ⊆ ,  ′ ̸= ∅ s.t.</p>
      <p>A support  = (, ℎ) ∈  is paradoxical if  ̸= ∅ and for every  ∈  there is a  ′ ⊆ ,  ′ ̸= ∅ s.t.</p>
      <p>We want weak admissibility to be stable under removal of paradoxical rules, thus the principle states
the following requirement.
(PRS) Paradoxical Attacks/Supports: Removing a paradoxical attack  or support  does not
alter the models of F , i. e. admw(F ) = admw(F ′) where F ′ = (,  ∖ {}, ) (resp. F ′ =
(, ,  ∖ {})).</p>
      <p>Proposition 3.7. The weakly admissible semantics for ABA satisfies the Principle of Paradoxical
Attacks/Supports.</p>
      <p>
        With this result from [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we have shown that weak admissibility under the BSAF-instantiation
captures self-conflicting sets of assumptions in general ABA in a natural way.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Future Work</title>
      <p>
        Successfully formulating weak admissibility for general ABA provides valuable insights towards a
native reduct notion for ABA and an ABA-semantics satisfying long-standing rationality postulates
like non-interference [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Another natural next step would be to introduce weak admissibility to other
structured argumentation formalism, e. g. ASPIC [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Since reasoning with weak admissibility comes
with a high computational complexity [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] the practical feasibility of using weak admissibility for
reasoning with ABA should be checked. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] we investigate a class of semantics that approximate
the weakly preferred semantics in the abstract setting. As these semantics are also based on the notion
of reduct they could be utilized to make weak admissibility realistic for applications which use ABA as
a reasoning tool [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>The research reported here was partially supported by the Deutsche Forschungsgemeinschaft (grant
550735820).
1–6</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kowalski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>An abstract, argumentation-theoretic approach to default reasoning, Artif</article-title>
          . Intell.
          <volume>93</volume>
          (
          <year>1997</year>
          )
          <fpage>63</fpage>
          -
          <lpage>101</lpage>
          . URL: http://dx.doi.org/10.1016/S0004-
          <volume>3702</volume>
          (
          <issue>97</issue>
          )
          <fpage>00015</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1016/S0004-
          <volume>3702</volume>
          (
          <issue>97</issue>
          )
          <fpage>00015</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>X.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <article-title>A temporal planning example with assumption-based argumentation</article-title>
          ,
          <source>in: Proc. PRIMA</source>
          <year>2018</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>362</fpage>
          -
          <lpage>370</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Cyras</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karamlou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>Assumption-based argumentation with preferences and goals for patient-centric reasoning with interacting clinical guidelines</article-title>
          ,
          <source>Argument Comput</source>
          .
          <volume>12</volume>
          (
          <year>2021</year>
          )
          <fpage>149</fpage>
          -
          <lpage>189</lpage>
          . URL: https://doi.org/10.3233/AAC-200523. doi:
          <volume>10</volume>
          .3233/AAC-200523.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>Argumentative causal discovery</article-title>
          , in: P. Marquis,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          , M. Pagnucco (Eds.),
          <source>Proceedings of the 21st International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR 2024, Hanoi,
          <source>Vietnam. November 2-8</source>
          ,
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https: //doi.org/10.24963/kr.2024/88. doi:
          <volume>10</volume>
          .24963/KR.
          <year>2024</year>
          /88.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0004</fpage>
          -
          <lpage>3702</lpage>
          (
          <issue>94</issue>
          )
          <fpage>00041</fpage>
          -
          <lpage>X</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          , G. Brewka,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Ulbricht, Revisiting the foundations of abstract argumentation - semantics based on weak admissibility and weak defense</article-title>
          ,
          <source>in: Proc. AAAI</source>
          <year>2020</year>
          , AAAI Press,
          <year>2020</year>
          , pp.
          <fpage>2742</fpage>
          -
          <lpage>2749</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Blümel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Weak admissibility for ABA via abstract set-attacks</article-title>
          , in: P. Marquis,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          , M. Pagnucco (Eds.),
          <source>Proceedings of the 21st International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR 2024, Hanoi,
          <source>Vietnam. November 2-8</source>
          ,
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https://doi.org/10.24963/kr.2024/17. doi:
          <volume>10</volume>
          .24963/KR.
          <year>2024</year>
          /17.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Berthold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Blümel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <article-title>On strong and weak admissibility in non-flat assumpionbased argumentation</article-title>
          ,
          <source>in: Proceedings of the 22nd International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR 2024, Melbourne,
          <source>Australia. November 11-17</source>
          ,
          <year>2025</year>
          ,
          <year>2025</year>
          . URL: tobepublished.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Dondio</surname>
          </string-name>
          , L. Longo,
          <article-title>Beyond reasonable doubt: A proposal for undecidedness blocking in abstract argumentation</article-title>
          ,
          <source>Intelligenza Artificiale</source>
          <volume>13</volume>
          (
          <year>2019</year>
          )
          <fpage>123</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baumann</surname>
          </string-name>
          , G. Brewka,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Shedding new light on the foundations of abstract argumentation: Modularization and weak admissibility</article-title>
          ,
          <source>Artif. Intell</source>
          .
          <volume>310</volume>
          (
          <year>2022</year>
          )
          <article-title>103742</article-title>
          . URL: https://doi.org/10.1016/j.artint.
          <year>2022</year>
          .
          <volume>103742</volume>
          . doi:
          <volume>10</volume>
          .1016/J.ARTINT.
          <year>2022</year>
          .
          <volume>103742</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <article-title>A generalization of Dung's abstract framework for argumentation: Arguing with sets of attacking arguments</article-title>
          ,
          <source>in: Proc. ArgMAS</source>
          <year>2006</year>
          , volume
          <volume>4766</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2006</year>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvořák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Principles and their computational consequences for argumentation frameworks with collective attacks</article-title>
          ,
          <source>J. Artif. Intell. Res</source>
          .
          <volume>79</volume>
          (
          <year>2024</year>
          )
          <fpage>69</fpage>
          -
          <lpage>136</lpage>
          . URL: https://doi.org/10.1613/jair.1.14879. doi:
          <volume>10</volume>
          .1613/JAIR.1.14879.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>König</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Just a matter of perspective</article-title>
          ,
          <source>in: Proc. COMMA</source>
          <year>2022</year>
          , volume
          <volume>353</volume>
          <source>of Frontiers in Artificial Intelligence and Applications</source>
          , IOS Press,
          <year>2022</year>
          , pp.
          <fpage>212</fpage>
          -
          <lpage>223</lpage>
          . URL: https://doi.org/10.3233/FAIA220154. doi:
          <volume>10</volume>
          .3233/FAIA220154.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Berthold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <article-title>Capturing non-flat assumption-based argumentation with bipolar setafs</article-title>
          , in: P. Marquis,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          , M. Pagnucco (Eds.),
          <source>Proceedings of the 21st International Conference on Principles of Knowledge Representation and Reasoning</source>
          , KR 2024, Hanoi,
          <source>Vietnam. November 2-8</source>
          ,
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https://doi.org/10.24963/kr.2024/12. doi:
          <volume>10</volume>
          .24963/KR.
          <year>2024</year>
          /12.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lagasquie-Schiex</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments in bipolar argumentation frameworks</article-title>
          , in: L.
          <string-name>
            <surname>Godo</surname>
          </string-name>
          (Ed.),
          <article-title>Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 8th European Conference</article-title>
          ,
          <string-name>
            <surname>ECSQARU</surname>
          </string-name>
          <year>2005</year>
          ,
          <article-title>Proceedings</article-title>
          , volume
          <volume>3571</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2005</year>
          , pp.
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          . URL: https://doi.org/10.1007/11518655_33. doi:
          <volume>10</volume>
          .1007/11518655\_
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Amgoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cayrol</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C. Lagasquie</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Livet</surname>
          </string-name>
          ,
          <article-title>On bipolarity in argumentation frameworks</article-title>
          ,
          <source>International Journal of Intelligent Systems</source>
          <volume>23</volume>
          (
          <year>2008</year>
          )
          <fpage>1</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Potyka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rapberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          ,
          <article-title>Non-flat ABA is an instance of bipolar argumentation</article-title>
          , in: M. J.
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>J. G.</given-names>
          </string-name>
          <string-name>
            <surname>Dy</surname>
          </string-name>
          , S. Natarajan (Eds.),
          <source>Thirty-Eighth AAAI Conference on Artificial Intelligence</source>
          ,
          <source>AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27</source>
          ,
          <year>2024</year>
          , Vancouver, Canada, AAAI Press,
          <year>2024</year>
          , pp.
          <fpage>10723</fpage>
          -
          <lpage>10731</lpage>
          . URL: https://doi.org/10.1609/aaai.v38i9.28944. doi:
          <volume>10</volume>
          .1609/AAAI.V38I9.28944.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Borg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Straßer</surname>
          </string-name>
          ,
          <article-title>Relevance in structured argumentation</article-title>
          , in: J.
          <string-name>
            <surname>Lang</surname>
          </string-name>
          (Ed.),
          <source>Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI 2018, July 13-19</source>
          ,
          <year>2018</year>
          , Stockholm, Sweden, ijcai.org,
          <year>2018</year>
          , pp.
          <fpage>1753</fpage>
          -
          <lpage>1759</lpage>
          . URL: https://doi.org/10.24963/ijcai.
          <year>2018</year>
          / 242. doi:
          <volume>10</volume>
          .24963/IJCAI.
          <year>2018</year>
          /242.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <article-title>The aspic+ framework for structured argumentation: a tutorial</article-title>
          ,
          <source>Argument &amp; Computation</source>
          <volume>5</volume>
          (
          <year>2014</year>
          )
          <fpage>31</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W.</given-names>
            <surname>Dvorák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ulbricht</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Woltran</surname>
          </string-name>
          ,
          <article-title>Recursion in abstract argumentation is hard - on the complexity of semantics based on weak admissibility</article-title>
          ,
          <source>in: Thirty-Fifth AAAI Conference on Artificial Intelligence</source>
          ,
          <source>AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI</source>
          <year>2021</year>
          ,
          <source>The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI</source>
          <year>2021</year>
          ,
          <string-name>
            <given-names>Virtual</given-names>
            <surname>Event</surname>
          </string-name>
          ,
          <source>February 2-9</source>
          ,
          <year>2021</year>
          , AAAI Press,
          <year>2021</year>
          , pp.
          <fpage>6288</fpage>
          -
          <lpage>6295</lpage>
          . URL: https://doi.org/10.1609/aaai.v35i7.16781. doi:
          <volume>10</volume>
          .1609/AAAI.V35I7.16781.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Blümel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thimm</surname>
          </string-name>
          ,
          <article-title>Approximating weakly preferred semantics in abstract argumentation through vacuous reduct semantics</article-title>
          , in: P. Marquis,
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Son</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Kern-Isberner</surname>
          </string-name>
          (Eds.),
          <source>Proc. KR</source>
          <year>2023</year>
          ,
          <year>2023</year>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>