<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A QUBO Approach to Value-Sensitive Reasoning in Argumentation Frameworks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marco Baioletti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabio Rossi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Santini</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dipartimento di Matematica e Informatica, Università degli studi di Perugia</institution>
          ,
          <addr-line>Perugia</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>We propose a QUBO encoding for the Subjective Acceptance Problem (SBA) in Value-Based Argumentation Frameworks (VAFs), where argument acceptance depends on audience-specific value preferences. SBA, an NP-complete problem, decides whether an argument is accepted by at least one audience in the preferred extension. By translating SBA into the QUBO formalism (which is solvable with quantum annealing), we enable new computational approaches to value-sensitive reasoning. This is the first QUBO encoding of a preference-based problem in Argumentation, and we validate it through initial empirical testing.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Quadratic unconstrained binary optimization</kwd>
        <kwd>Value-based Argumentation</kwd>
        <kwd>Simulated Annealing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In many real-world debating and reasoning scenarios, simply identifying arguments is not suficient
because multiple arguments often conflict and support each other in complex ways, particularly in
moral and legal contexts [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. To address this, there has been growing interest in logics for defeasible
argumentation, which analyze how arguments can be defeated or defended.
      </p>
      <p>
        For example, Abstract Argumentation Frameworks (AF s) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] model conflicting arguments abstractly,
focusing solely on their attack relations. Arguments are seen as unstructured tokens of information,
and attacks symbolize a general directed conflict between two arguments: a may criticize b but not
vice-versa. For example, with a: “We should ban single-use plastics because they cause long-term
environmental damage”, and b: “Single-use plastics are convenient for consumers”, a attacks b because
it highlights serious harm (environmental damage) that outweighs the convenience benefit mentioned
by b. However, b does not attack a, as it only states a positive aspect without challenging or refuting
the environmental concern raised by a. Conversely, in “structured” argumentation (e.g., [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]), which falls
outside the direct scope of this paper, a formal language is used to represent knowledge and define how
arguments and counterarguments are constructed from that knowledge. Arguments are considered
structured because their premises and conclusions are explicitly stated, and the connection between
them is formally specified, often through logical entailment.
      </p>
      <p>
        In debates, arguments can conflict without necessarily defeating each other, as participants may
prioritize/prefer diferent underlying values. For instance, one person may argue for higher taxes to
promote equality, while another argues against it to reward enterprise; in this case, both people could
accept the merit of the other’s point but rank values diferently. For this reason, to model debates
efectively, it could be necessary to link arguments to the values they promote and to allow these values
to be ordered according to the audience’s preferences. Thus, the audience who attends the debate
becomes a crucial factor in evaluating the arguments presented. Value-based Argumentation Frameworks
(VAF s) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] are one of the first attempts to extend the traditional AFs of Dung [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] by incorporating
values into the structure of arguments. Values influence whether attacks between arguments succeed
or fail, depending on their relative importance. In VAFs, an “audience” is formally represented through
a preference ordering over these values; specifically, it is a total ordering (i.e., a complete, transitive,
antisymmetric, and connected ranking). Intuitively, an audience models a perspective or worldview,
that is, a particular way of ranking what is most important, such as diferent legal systems, ethical
viewpoints, or stakeholder interests.
      </p>
      <p>
        Quadratic Unconstrained Binary Optimization (QUBO) [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6, 7</xref>
        ], also known as Unconstrained Binary
Quadratic Programming (UBQP), is a combinatorial optimization problem with diferent applications
in various fields, including finance, economics, and machine learning. The goal is to find the optimal
combination of binary variables, each taking a value of 0 or 1, that minimizes (or maximizes) a quadratic
expression. This expression can be represented by a matrix that assigns weights to each variable
and each pair of variables, capturing both individual and pairwise interactions (i.e., constraints). The
term “quadratic” refers to the fact that the objective function includes terms that involve the product
of two variables. At the same time “unconstrained” means that there are no additional restrictions
on the variables beyond being binary. QUBO is NP-hard to solve, and various classical problems in
theoretical computer science, including maximum cut, graph coloring, and the partition problem, have
been formulated as QUBO embeddings. Moreover, QUBO is used in machine learning, particularly in
binary or combinatorial variants of problems. QUBO equivalents or approximations exist for tasks such
as feature selection, clustering, and inference in graphical models.
      </p>
      <p>
        The connection between QUBO problems and quantum annealing is fundamental. Quantum
annealers1 [8] are physical machines explicitly built to solve problems that can be expressed in QUBO (or its
equivalent, the Ising model [
        <xref ref-type="bibr" rid="ref5 ref7">5</xref>
        ]). In quantum annealing, the machine encodes the optimization problem
into a physical system, where the system’s energy corresponds to the value of the QUBO objective
function. The system is then allowed to settle into its lowest-energy (minimum) configuration, which
corresponds to the optimal solution to the original QUBO problem. This is enabled by the mathematical
equivalence between the QUBO model and the Ising model: in the latter model, the variables take values
of − 1 or +1 instead of 0 or 1, but a simple transformation allows the conversion between the two.
      </p>
      <p>This paper aims to propose and test a QUBO encoding of the Subjective Acceptance Problem (SBA)
defined in [ 9] to be NP-complete. Formally, given a VAF and an argument , SBA is a decision problem
that tests the existence of any audience such that  is included in the unique preferred extension
determined by that audience.2 Subjective acceptance captures the notion that an argument can be
persuasive or justifiable, but only to specific groups of people or under certain value assumptions.</p>
      <p>
        This paper continues the line of research initiated in [10, 11, 12, 13] by encoding and testing diferent
NP-Complete problems in Argumentation to a QUBO formulation. In this paper, we introduce and
encode problems related to preference-based AFs (i.e., VAFs) for the first time. As we have previously
discussed in this section, preferences (or values) are necessary to make reasoning in debates more
efective than using the original formulation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where all arguments have the same appeal to the
audience. The paper is structured as follows: after this introduction (Sect. 1), outlining the field of
research and its motivations, Sect. 2 presents the necessary preliminary notions related to VAFs and
QUBO. Then, Sect. 3 proposes a QUBO encoding of the problem, and Sect. 4 describes the tests performed
to validate such an encoding empirically. Finally, we end the paper with concluding thoughts and ideas
about future work in Sect. 5.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>
        This section provides the essential background required to understand the remainder of this work.
Section 2.1 introduces key concepts from Abstract Argumentation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], including AFs, their extension
to VAFs, and the SBA problem, which is NP-Complete. Section 2.2 ofers an overview of what QUBO
problems are and how to formalize them.
1For example, D-Wave quantum annealers: https://docs.dwavequantum.com/en/latest/quantum_research/quantum_
annealing_intro.html.
2An extension is a set of arguments that is considered collectively acceptable or defensible according to specific semantic
rules, see Sect. 2.
      </p>
      <p />
      <sec id="sec-2-1">
        <title>2.1. Problems in Abstract Argumentation Frameworks</title>
        <p>
          An Abstract Argumentation Framework (AF, for short) [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] is a tuple ℱ = (A, →) where A is a set of
arguments and → is a relation →⊆ A × A. For two arguments ,  ∈ A, the relation  →  means that
argument  attacks argument . An argument  ∈ A is defended by  ⊆ A (in ℱ ) if for each  ∈ A,
such that  → , there is some  ∈  such that  → . A set  ⊆ A is conflict-free (cf in ℱ ) if and
only if there is no ,  ∈  with  → .  is admissible (ad in ℱ ) if and only if it is conflict-free and
if each  ∈  is defended by . A directed graph can directly represent an AF: an example with five
arguments is given in Fig. 1: ℱ = ({, , , , }, { → ,  → ,  → ,  → ,  → }).
        </p>
        <p>
          The collective acceptability of arguments depends on the definition of diferent semantics [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Semantics
determine sets of jointly acceptable arguments, that is, sets of arguments called extensions, by mapping
each ℱ = (A, →) to a set  (ℱ ) ⊆ 2A, where 2A is the power-set of A, and  parametrically stands
for any of the considered semantics. Four semantics were proposed by Dung in his seminal paper [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]
(while some more have been defined in successive works [ 14]), namely the complete (co), preferred
(pr), stable (st), and grounded (gr) semantics. Given ℱ = (A, →) and a set  ⊆ A, we report the
definition of all these semantics:
•  ∈ co(ℱ ) if  is admissible in ℱ and if  ∈ A is defended by  in ℱ then  ∈ ,
•  ∈ pr(ℱ ) if  ∈ co(ℱ ) and there is no ′ ∈ co(ℱ ) s.t. ′ ⊃ ,
•  ∈ st(ℱ ) if  ∈ co(ℱ ) and + = A,
        </p>
        <p>ℱ
•  ∈ gr(ℱ ) if  ∈ co(ℱ ) and there is no ′ ∈ co(ℱ ) s.t. ′ ⊂ .</p>
        <p>
          For a more detailed view of these semantics, please refer to [14]. Note that the grounded semantics
always uniquely identify a single extension [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] (i.e., it is a single-status semantics). In contrast, the other
introduced semantics are multi-status, since several extensions may exist. The stable semantics is the
only case where st(ℱ ) might be empty (i.e., no stable extension exists), while at least one extension
always satisfies the other semantics. As an example, if we consider the framework ℱ in Fig. 1, we obtain
the following extensions:
• cf (ℱ ) = {∅, {}, {}, {}, {}, {}, {, }, {, }, {, }, {, }, {, }, {, }, {, , }};
• ad(ℱ ) = {∅, {}, {}, {}, {, }, {, }, {, }, {, , }};
• co(ℱ ) = {{}, {, }, {, , }};
• pr(ℱ ) = {{, }, {, , }};
• gr(ℱ ) = {{}}.
        </p>
        <p>
          Value-based Argumentation Frameworks [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] enrich the expressiveness of AFs by incorporating
subjective values and audience-dependent evaluation, making them particularly suited for domains where
reasoning involves value conflicts rather than purely logical ones. They connect formal argumentation
with real-world debates, where the outcome is not determined solely by logic but also by which values
are most important to the people involved.
        </p>
        <p>
          Definition 2.1 (Value-based Argumentation Frameworks [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]). A Value-based Argumentation Framework
(VAF) is a triple ℱ = ((A, →), ,  ), where (A, →) is an AF,  = {1, . . . , } is a set of  values, and
 : A →  is a function that assigns a value to each argument. An audience ≤ for a VAF is a total
ordering over the set of values  . For values ,  ∈  , we say that  is preferred to  in the audience
≤ , denoted  ≤  , if  is ranked higher than  in the total ordering.
        </p>
        <p>In Fig. 2 we show an example of VAF ℱ = ((A, →), ,  ) obtained from the AF in Fig. 1, where
A = {, , , , }, →= {(, ), (, ), (, ), (, ), (, )},  = {1, 2, 3}, and  () = 1,  () = 2,
 () = 1,  () = 3,  () = 2.</p>
        <p>
          The introduction of audiences afects the classical notion of attacks given for AFs in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
Definition 2.2 (Attacks in VAFs [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]). Given a VAF, an argument  ∈ A successfully attacks an argument
 ∈ A with respect to an audience ≥ , if (, ) ∈→ and  () ̸&gt;  ().
        </p>
        <p>Therefore, an attack only “works” if the attacker’s value is not less preferred than the one being
attacked. Otherwise, the argument is no longer considered part of the underlying ℱ , and the definition
of the semantics presented before changes accordingly. For example, if we consider the VAF in Fig. 2
and the audience 1 ≥ 2 ≥ 3, the successful attacks are only {(, ), (, ), (, )}: {, } is now
considered conflict-free and {} is no longer admissible or complete, compared to Fig. 1, for example.</p>
        <p>The SBA problem [9] is a decision problem that answers the question of whether there is at least
one perspective or value system under which a given argument can be accepted as justified. This
has implications in real-world reasoning and decision-making, particularly in areas where people or
institutions have diferent values or priorities, as, ethical debates (e.g., euthanasia, privacy vs. security),
political discourse (e.g., freedom, equality, security), or in general systems where diferent agents have
individual preferences or objectives: SBA helps determine whether a proposal is acceptable to at least
one agentev en if it is not universally persuasive.</p>
        <p>Definition 2.3 (Subjective Acceptance (SBA) [9]). Given a VAF ℱ = ((A, →), ,  ) and an argument
 ∈ A in this framework, the SBA problem accepts the instance (ℱ, ) if there exists at least one
audience ≤ such that  ∈ ≤ , where ≤ is the preferred extension of ℱ (i.e., { } = pr(ℱ ).) relative
to the audience ≤ .</p>
        <p>In SBA, the preferred semantics is used because it identifies arguments that are defensible under
specific value orderings, allowing for multiple acceptable viewpoints that reflect the diversity of audience
preferences. Unlike stable semantics, it is not overly strict, and, unlike the grounded semantics, it is not
excessively skeptical, making it a balanced and suitable approach for capturing the notion of subjective
acceptability. Note that Def. 2.3 relies on the existence of a single preferred extension in (A, →) given
an audience ≤ because of Prop. 2.1.</p>
        <p>Proposition 2.1 (Unicity of preferred/stable [15]). Let ℱ = ((A, →), ,  ) be a VAF, and let ≤ be an
audience. We assume that every directed cycle in the argument graph (A, →) involves at least two
distinct values: i.e., there are no cycles consisting only of arguments associated with the same value
by  . There exists a unique non-empty preferred extension  ⊆ A (i.e., { } = pr(ℱ )) considering ≤ ,
that is, there exists only one ≤ . Moreover,  is also the only stable extension given ≤ : { } = st(ℱ ),
whose existence is thus guaranteed in this case.</p>
        <p>The SBA problem is shown to be NP-complete in [9], where the proof is obtained by means of a
reduction from a 3-SAT problem: the reduction constructs a VAF such that an argument is subjectively
acceptable if and only if the 3-CNF formula is satisfiable. 3</p>
        <p>The no-cycle condition on the values in Prop. 2.1 is not stringent because single-value cycles typically
represent paradoxes or irrational structures [15]. Such cycles rarely occur in practical reasoning, where
conflicts commonly arise between difering values, rather than within the same value. Figure 3 shows a
VAF that respects the no-cycle condition on the values, while Fig. 4 shows a VAF that does not respect
this condition.
3A 3CNF formula is a Boolean formula in conjunctive normal form where each clause contains exactly three literals.</p>
        <p>As an example, given the VAF ℱ in Fig. 2 and the argument , the SBA accepts the instance (ℱ, )
because there exists an audience, for example 1 ≥ 2 ≥ 3, for which the preferred/stable extension
is ≥ = {, , }, that is,  ∈ ≥ as requested by Def. 2.3. Note that with the VAF in Fig. 2, all the
arguments are subjectively acceptable:  is always acceptable with any audience,  is acceptable if
 () ≥  () ∧  () ≥  () (e.g., 2 ≥ 1),  is acceptable if  () ≥  () (e.g., 1 ≥ 3),  is acceptable if
 () ≥  () (e.g., 3 ≥ 1), and finally  is acceptable if  () ≥  () (e.g., 2 ≥ 3). Given the VAF ℱ
in Fig. 2 and the argument  instead, the SBA does not accept the instance (ℱ, ) as for any audience
≥ the attack (, ) is always successful since  () =  () = 1.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Quantum Annealing and QUBO</title>
        <p>Quantum Annealing is an approach [16] that uses a quantum computer to tackle optimization problems
by identifying the lowest energy state configuration. This technique relies on the Quantum Adiabatic
Theorem and leverages quantum tunneling to deliver optimal or nearly optimal solutions for discrete
optimization problems [16]. The process begins with an initial function , for which the solution
that minimizes the energy is easily determined. It gradually transitions to the final function  , which
corresponds to the function to be optimized. If the transition is slow enough, the Quantum Adiabatic
Theorem guarantees that the solution with the minimum energy adapts to the change of the objective
function.</p>
        <p>Quantum Annealing is implemented by contemporary architectures such as D-Wave, as highlighted
in Sect. 1. This company develops a line of quantum annealing devices that execute quantum annealing
algorithms. In particular, their most sophisticated machines can handle problems involving thousands
of variables.</p>
        <p>
          Quantum annealers can be “programmed” by encoding the problems as Quadratic Unconstrained
Binary Optimization [
          <xref ref-type="bibr" rid="ref6">6, 7</xref>
          ] (in short, QUBO) or as Ising models [17]. In this paper, we employ the QUBO
formalism. It is expressive enough to encode several optimization problems formulated in various
application domains [18]. QUBO has been extensively studied and is used to define and address a wide
range of optimization problems: for example, it encompasses SAT Problems, Constraint Satisfaction
Problems, Maximum Cut Problems, Graph Coloring Problems, Maximum Clique Problems, General 0/1
Programming Problems, and many more [7, 18]. Moreover, QUBO embeddings exist for Support Vector
Machines, Clustering algorithms, and Markov Random Fields [19].
        </p>
        <p>In a QUBO problem,  binary variables 1, . . . ,  and an  ×  upper-triangular matrix  are used
to formulate the task, which involves minimizing (or sometimes maximizing) the second-order function
 
 () = ∑︁ , + ∑︁ ,  .</p>
        <p>=1 &lt;</p>
        <p>The diagonal terms , are the linear coeficients, and the non-zero of-diagonal terms
quadratic coeficients. This can be expressed more concisely as
, are the
min
∈{0,1}
 .
where  denotes the transpose of the vector . The square matrix of coeficients can be organized in a
symmetric way, where for all ,  except  = , , is replaced by (, + ,)/2, or, as stated before,
in an upper-diagonal form where for all ,  s.t.  &gt; , , is replaced by , + , and then all ,
are replaced by 0 for  &lt; .</p>
        <p>To formulate a discrete constrained optimization problem into a QUBO, one must: i) determine a
binary representation of the potential solutions, and ii) define a penalization function to deter
nonfeasible solutions, specifically those that violate a constraint.</p>
        <p>Except for the 0/1 limitations on the decision variables, QUBO is an unconstrained model, where the
matrix  contains all problem data. Rather than applying constraints in the conventional sense, classical
constrained models can be successfully reformulated as QUBO models by inserting quadratic penalties
into the objective function. In constrained optimization problems, selecting a penalty that is too small
may lead to infeasible solutions. In contrast, employing a significant penalty to ensure constraints are
met can make it challenging for the optimization algorithm to find feasible solutions. This strategy
may also introduce challenges, such as sensitivity to penalty values, increased computational demands
during optimization, and instability in the iterative process of the solver. For this reason, a substantial
amount of literature has been produced to find good coeficients [ 20], or techniques to model classical
constraints into a function, e.g., a logical and constraint between 1 and 2 as a multiplication 1 · 2.</p>
        <p>The literature on precise approaches to QUBO on conventional computers includes various
algorithms [18], all of which converge to a globally optimal solution given suficient time and memory. Most
of these techniques use a standard branch-and-bound tree search, although alternative methods are also
available. For example, in [21], a QUBO solution is based on the inherent geometric properties of the
minimum circumscribed sphere that contains the ellipsoidal contour of the objective function, while in
[22], the authors adopt Lagrangean decompositions. The NP-hardness of QUBO and its various potential
applications have led to a significant number of research papers being published in recent years. These
documents outline a variety of heuristic methods designed to rapidly identify high-quality solutions
to medium- to large-scale problem cases. Although some of these techniques may be simple enough
to be regarded as heuristics, the most efective ones are metaheuristic processes. These involve more
complex compound strategies that outperform basic heuristics. For example, in addition to simulated
annealing [23], the work in [24] presents a guided tabu-search algorithm alternating between a basic
tabu-search procedure and a variable fix/free phase. In contrast, [ 25] presents a hybrid metaheuristic
approach that combines crossover and update operators with tabu search to evaluate the ofspring
solutions.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Encoding VAFs and Audiences in QUBO</title>
      <p>The encoding of Argumentation problems in QUBO uses a set of  binary variables 1, . . . ,  associated
with arguments {1, . . . , } in A. The variables 1, . . . ,  represent a subset  of A:  ∈ A if and
only if  = 1 [10]. Each semantics  will be associated with a quadratic penalty function  such
that  assumes its minimum value in the values (1, . . . , ) if and only if the corresponding set
 = { ∈ A :  = 1} is an extension valid for  .</p>
      <p>For the SBA problem, we also use 2 −  binary variables  , with ,  = 1, . . . , , with  ̸= , with
the meaning that  = 1 if and only if  is preferred to  in the audience ≤ . To enforce that the
variables  encode a total order, three quadratic terms are employed.</p>
      <p>The first term encodes that for each ,  = 1, . . . , , with  ̸= ,  is preferred to  or viceversa.
This term is:</p>
      <p>The second term is used to encode the transitivity constraint:
−  = ∑︁( +  − 1)2.</p>
      <p≯=
 =</p>
      <p>∑︁
expresses the conjunction  = ( and ) of binary variables ,  as a quadratic function.</p>
      <p>We denote by  = −  +  +  the sum of these three quadratic terms. To encode the
constraint of a stable extension, we first need to express that the set is complete. Hence, we define a
penalty function  that enforces this property, which is the sum of 4 terms. The first term forces the
set  to be conflict-free :
where the binary variables , for , ,  = 1, . . . ,  are used to represent the product (or conjunction)
 · . Here and in other equations, we use sets of additional binary variables (and corresponding
penalty terms to avoid cubic terms, which are products of three variables).</p>
      <p>The third term has the purpose of encoding the constraint on :</p>
      <p>(, , ) =  +  +  +  − 2( + )
is used to express the constraint that the binary variable  is the disjunction  = ( or ) of the binary
variables ,  by means of a quadratic function, as shown in [26].</p>
      <p>Each product of the form   (), () must be replaced by a single binary variable , for  =
1, . . . ,  such that  → . The constraints  =   (), () for  = . . . ,  are enforced by the
penalization term
 =
∑︁  (,  ,  (), ()).</p>
      <p>→</p>
      <p>Each penalty function  requires max{ℎ − 2, 0} auxiliary variables   , where ℎ is the number
of possible attackers of , to represent the ⋁︀ operator as a composition of  functions. If ℎ ≤ 2,
no additional variable is required, as explained in [10]. On the other hand, if ℎ &gt; 2 and the possible
attackers of  are 1 , . . . , ℎ , then</p>
      <p>The value of  corresponds to the number of internal attacks in  that respect the audience ≤ ,
and its value is 0 if and only if  is conflict-free.</p>
      <p>The 2 binary variables  , for ,  = 1, . . . ,  are used to represent the product (or conjunction)
 = 1. Hence, an additional penalty function must be included:
cf =
∑︁   (), ().
→

 = ∑︁  ( , ,  ).</p>
      <p>,=1</p>
      <p>The constraints for modeling the notion of defense are more complex and require additional variables.
The first set contains the variables 1, . . . , , which denote the arguments that are successfully attacked
by :  = 1 if and only if some argument of  attacks  with respect to ≤ .</p>
      <p>For each argument , the penalty function  enforces the logical constraint
 =</p>
      <p>⋁︁   (), ().</p>
      <p>→
To express this constraint in QUBO, three “ingredients” are needed. The function
(3)
(4)
(5)
(6)
{}
{}
{}
{}
{}
{}
{ }
{ }
{ }</p>
      <p>Size


3
2 − 
∑∑∑︀︀︀===111 ℎℎℎ
∑∑︀︀==11 mmaaxx((ℎℎ −− 2, 0)
2, 0)
 = (, [1, ],  1 ) + ( 1 , [2, ],  2 ) + . . . + ( 
ℎ− 3, [ℎ− 2, ],</p>
      <p>ℎ− 2)+
( 
ℎ− 2, [ℎ− 1, ], [ℎ , ]), (7)</p>
      <p>The binary variables 1, . . . ,  denote the arguments that are defended by :  = 1 if and only if
 is defended (from all successful attacks) by some arguments of .</p>
      <p>The penalty function  forces  to be 1 if and only if  is defended by  respecting ≤ , i.e.,
 = ⋀︀
→</p>
      <p>( ∨ ¬ (), ()).
by the binary variable  , for  = 1, . . . ,  such that  → .</p>
      <p>In fact,  is defended if for each possible attacker  , either  is attacked by  or the attack is not
successful, i.e.,  (), () = 0. In addition, in this case, each term ( ∨ ¬ (), ()) must be replaced
The constraints   = ( ∨ ¬ (), ()), for  = 1, . . . , , are enforced by the penalization term
  =
∑︁ ( ,  , 1 −  (), ())
→
express the ⋀︀ operator as a composition of the   function.</p>
      <p>Each penalty function  requires max{ℎ − 2, 0} auxiliary variables   , for  = 1, . . . , ℎ − 2 to
When ℎ &gt; 2 the penalty function is
 =  (,  [1, ],  1) +  ( 1,  [2, ],  2) + . . . +  ( 
ℎ− 3,  [ℎ− 2, ],</p>
      <p>ℎ− 2)+
 (</p>
      <p>ℎ− 2,  [ℎ− 1, ],  [ℎ , ]) (8)

=1

=1 →
To encode that  is a complete extension, the constraint  =  must hold for  = 1, . . . , .
Hence, the penalty function for complete sets is
 =  +  +  + ∑︁( + ) + ∑︁ ∑︁ ( +  ) + ∑︁((1 − ) + (1 − ))


=1
where ℎ = max ℎ.</p>
      <p>The sets of binary variables appearing in  are listed in Tab. 3. The number of these variables is
 = 2+2 −  +3 +3 ∑︀
=1 ℎ +2 ∑︀</p>
      <p>=1 max(ℎ − 2, 0), which can be simplified as  = (ℎ+3),</p>
      <p>Finally, the encoding of the stable semantics is obtained by adding an additional term to  which
forces all arguments not belonging to  to be attacked by :

=1
 =  + ∑︁(1 − )(1 − )</p>
      <p>It is straightforward to prove that the minimum value of  is 0 if and only if the corresponding 
is a stable extension. Hence, this encoding can be used to determine whether a stable extension exists.</p>
      <p>Solving the SBA problem for a given argument  is suficient to minimize
 after setting  = 1. If
the minimum is 0, then  is accepted; the values of variables  indicate the stable/preferred extension,
and the values of  reveal the order relation ≤ .
(9)

20
25
30
35</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <p>As a proof of concept, we have conducted a preliminary series of experiments using the Simulated
Annealing (SA) [27] algorithm present in the Ocean SDK4 package. As noted in Sect. 2.2, the Hamiltonian
presented in Sect. 3 can be minimized using methods other than SA; however, in the future, we would
like to test the implementation on actual quantum annealers (Sect. 5).</p>
      <p>To achieve this aim, we have generated four sets of 50 random directed graphs, each with  =
20, 25, 30, 35 nodes/arguments, for a total of 200 graphs. For every graph, representing a diferent VAF,
we used the Erdős-Rényi random generator [28], and we used an edge/attack probability of  = 0.09. In
each VAF, we have randomly assigned a value  () to all arguments among the ⌊/2⌋ possible values
1, . . . , ⌊/2⌋. In this way, the average number of arguments that share the same value is two. Then, we
have tested whether, in all the cycles of the graph, the arguments are assigned to at least two diferent
values, as required by Prop. 2.1. In the negative case, we generate another argument-value assignment
 until the VAF satisfies the condition.</p>
      <p>For each VAF, we have tested the acceptance of each argument by running the SA on 1000 reads
of the corresponding QUBO model. We denote by  the minimum value of the energy (i.e., the
objective function) obtained in all reads for a given VAF and a given argument .</p>
      <p>The aggregate results are shown in Tab. 1, where  is the number of arguments,  is the possible
number of not accepted arguments, #AFs denotes the number of AFs of  arguments in which the
number of not accepted arguments is , min  and max  are respectively the minimum value
of  and the maximum value of  computed for all not accepted arguments.</p>
      <p>The results can be summarized as follows. For  = 20, in 19 VAFs all the arguments are accepted, in
4Ocean SDK: https://docs.dwavequantum.com/en/latest/ocean/index.html.
16 VAFs only one argument is not accepted, in 14 VAFs two arguments are not accepted, and in one
VAF three arguments are not accepted. It is interesting to see that the  = 1 in the AFs when the
argument is not accepted.</p>
      <p>For  = 25, again in 19 VAFs all arguments are accepted. In the remaining 24 VAFs, the number
of arguments not accepted ranges from 1 to 4. Also, in these cases,  = 1 when the argument is
not accepted. The same value for the minimum energy was found in an AF with  = 8 and in an AF
with  = 7 (the latter data does not appear in Tab. 1). The situation is diferent for the remaining
5 VAFs with  = 25. In fact, we have found that in these VAFs,  is 2 for at least one argument.
Currently, we do not know whether 2 is the correct value of the objective function when the argument
is not accepted. Hence, we cannot determine whether the value 2 indicates that either the argument is
unacceptable or the SA was unable to find a lower-energy solution.</p>
      <p>For  = 30, apparently, in no  are all arguments accepted. We have found 2 VAFs with one
argument not accepted and 3 VAFs with 3 arguments not accepted. In these cases, the minimum energy
is 1. In all the other AFs, the number of arguments not accepted is unclear. In particular, in 36 VAFs, no
argument was accepted, which is highly unlikely. In these combinations, the minimum energy ranges
from 5 to 212. Moreover, in 20 VAFs, we have  &gt; 90 for all arguments, which is a very large value
and a strong indication that the SA has not been able to optimize the objective function. Finally, all
experiments with  = 35 have a unique outcome: in each AF, none of the arguments are accepted. This
outcome is likely due to the non-optimal solutions found by the SA.</p>
      <p>A partial justification can be given by looking at Tab. 2, in which the number of variables  appearing
in the corresponding QUBO models is reported for each value of . It is evident that the average value
of  nearly doubles when  increases from 25 to 30. The SA is likely trapped in a local minimum when
 exceeds 2000.</p>
      <p>In fact, a significant correlation between  and the average value of  can be observed in Fig. 6.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This paper elaborates on the research initiated in [10, 11, 12, 13] and introduces the first QUBO encoding
for a preference-based problem in Argumentation, explicitly addressing the Subjective Acceptance
problem in Value-based Argumentation Frameworks. By translating the NP-complete SBA problem into
the QUBO formalism, we enable novel computational approaches to energy-minimization reasoning,
particularly allowing the use of quantum annealers to solve the problem.</p>
      <p>The encoding involves defining binary variables for arguments and value preferences and constructing
quadratic penalty functions to enforce various constraints, such as conflict-freeness and defense.</p>
      <p>Future research will focus on several directions. First, we plan to explore the scalability of this
QUBO encoding for larger and more complex VAFs, investigating its performance on current and future
quantum annealing hardware. The experimental results presented in this article are preliminary, and
further investigation is necessary in the following steps of this work. For example, we will check the
correctness of the solutions we find against the outputs provided by ASPARTIX [29],5 which consists of
a set of AF/VAF encodings to be solved by Answer-set Programming (ASP) solvers.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>M. Baioletti has been partially supported by: European Union - NextGenerationEU, Mission 4,
Component 2, under the Italian Ministry of University and Research (MUR) National Innovation Ecosystem
grant ECS00000041 - VITALITY - CUP J97G22000170005.</p>
      <p>F. Santini has been partially supported by: European Union - Next Generation EU PNRR MUR PRIN
Project J53D23007220006 EPICA: “Empowering Public Interest Communication with Argumentation”,
MUR PNRR project SERICS (PE00000014 AQuSDIT: CUP_H73C22000880001), funded by the
European Union – Next Generation EU; University of Perugia - Fondo Ricerca di Ateneo (2022) – Project
RATIONALISTS, WP4.1 on “AI Data Management and Data Science”.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used Grammarly to perform grammar and spelling
checks and to reword. After using this tool, the authors reviewed and edited the content as needed and
take full responsibility for the publication’s content.
[7] F. W. Glover, G. A. Kochenberger, Y. Du, Quantum bridge analytics I: a tutorial on formulating
and using QUBO models, 4OR 17 (2019) 335–371.
[8] A. Rajak, S. Suzuki, A. Dutta, B. K. Chakrabarti, Quantum annealing: An overview, Philosophical</p>
      <p>Transactions of the Royal Society A 381 (2023) 20210417.
[9] P. E. Dunne, T. J. M. Bench-Capon, Complexity in value-based argument systems, in: Logics in
Artificial Intelligence, 9th European Conference, JELIA, volume 3229 of LNCS, Springer, 2004, pp.
360–371.
[10] M. Baioletti, F. Santini, Abstract argumentation goes quantum: An encoding to QUBO problems,
in: PRICAI 2022: Trends in Artificial Intelligence - 19th Pacific Rim International Conference on
Artificial Intelligence, volume 13629 of LNCS, Springer, 2022, pp. 46–60.
[11] M. Baioletti, F. Santini, On using QUBO to enforce extensions in abstract argumentation (short
paper), in: Proceedings of the International Workshop on AI for Quantum and Quantum for AI
(AIQxQIA 2023), volume 3586 of CEUR Workshop Proceedings, CEUR-WS.org, 2023.
[12] M. Baioletti, F. Rossi, F. Santini, Enumerating extensions in abstract argumentation by using
QUBO, in: Proceedings of the International Workshop on AI for Quantum and Quantum for AI
(AIQxQIA 2024), volume 3913 of CEUR Workshop Proceedings, CEUR-WS.org, 2024.
[13] M. Baioletti, F. Santini, An encoding of argumentation problems using quadratic unconstrained
binary optimization, Quantum Mach. Intell. 6 (2024) 51.
[14] P. Baroni, M. Caminada, M. Giacomin, An introduction to argumentation semantics, The
Knowledge Engineering Review 26 (2011) 365–410.
[15] T. J. Bench-Capon, Agreeing to difer: modelling persuasive dialogue between parties with diferent
values, Informal Logic 22 (2002) 231–246.
[16] S. E. Venegas-Andraca, W. Cruz-Santos, C. McGeoch, M. Lanzagorta, A cross-disciplinary
introduction to quantum annealing-based algorithms, Contemporary Physics 59 (2018) 174–197.
[17] A. Lucas, Ising formulations of many np problems, Frontiers in Physics 2 (2014).
[18] G. A. Kochenberger, J. Hao, F. W. Glover, M. W. Lewis, Z. Lü, H. Wang, Y. Wang, The unconstrained
binary quadratic programming problem: a survey, J. Comb. Optim. 28 (2014) 58–81.
[19] S. Mücke, N. Piatkowski, K. Morik, Learning bit by bit: Extracting the essence of machine learning,
in: R. Jäschke, M. Weidlich (Eds.), Proceedings of the Conference on "Lernen, Wissen, Daten,
Analysen", volume 2454 of CEUR Workshop Proceedings, CEUR-WS.org, Berlin, Germany, 2019, pp.
144–155.
[20] A. Verma, M. W. Lewis, Penalty and partitioning techniques to improve performance of QUBO
solvers, Discret. Optim. 44 (2022) 100594.
[21] D. Li, X. Sun, C. Liu, An exact solution method for unconstrained quadratic 0-1 programming: a
geometric approach, J. Glob. Optim. 52 (2012) 797–829.
[22] G. R. Mauri, L. A. N. Lorena, Improving a lagrangian decomposition for the unconstrained binary
quadratic programming problem, Comput. Oper. Res. 39 (2012) 1577–1581.
[23] T. M. Alkhamis, M. Hasan, M. A. Ahmed, Simulated annealing for the unconstrained quadratic
pseudo-boolean function, Eur. J. Oper. Res. 108 (1998) 641–652.
[24] J. Wang, Y. Zhou, J. Yin, Combining tabu hopfield network and estimation of distribution for
unconstrained binary quadratic programming problem, Expert Syst. Appl. 38 (2011) 14870–14881.
[25] Z. Lü, F. W. Glover, J. Hao, A hybrid metaheuristic approach to solving the UBQP problem, Eur. J.</p>
      <p>Oper. Res. 207 (2010) 1254–1262.
[26] I. Rosenberg, Reduction of bivalent maximization to the quadratic case, Cahiers du Centre d’Etudes
de Recherche Opérationnelle 17 (1975) 71–74.
[27] S. Kirkpatrick, C. D. Gelatt Jr, M. P. Vecchi, Optimization by simulated annealing, science 220
(1983) 671–680.
[28] P. Erdős, A. Rényi, On the evolution of random graphs, Bull. Inst. Internat. Statist 38 (1961)
343–347.
[29] U. Egly, S. A. Gaggl, S. Woltran, Answer-set programming encodings for argumentation
frameworks, Argument Comput. 1 (2010) 147–177.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Walton</surname>
          </string-name>
          , Fundamentals of critical argumentation, Cambridge University Press,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Dung</surname>
          </string-name>
          ,
          <article-title>On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>77</volume>
          (
          <year>1995</year>
          )
          <fpage>321</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Besnard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>García</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hunter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Modgil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Prakken</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Simari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Toni</surname>
          </string-name>
          , Introduction to structured argumentation,
          <source>Argument Comput. 5</source>
          (
          <issue>2014</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . URL: https://doi.org/10.1080/19462166.
          <year>2013</year>
          .
          <volume>869764</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T. J. M.</given-names>
            <surname>Bench-Capon</surname>
          </string-name>
          ,
          <article-title>Value-based argumentation frameworks</article-title>
          , in: S.
          <string-name>
            <surname>Benferhat</surname>
          </string-name>
          , E. Giunchiglia (Eds.),
          <source>9th International Workshop on Non-Monotonic Reasoning (NMR</source>
          <year>2002</year>
          ),
          <source>April 19-21</source>
          , Toulouse, France, Proceedings,
          <year>2002</year>
          , pp.
          <fpage>443</fpage>
          -
          <lpage>454</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Glover</surname>
          </string-name>
          , G. Kochenberger,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <article-title>A tutorial on formulating and using QUBO models</article-title>
          ,
          <year>2019</year>
          . URL: https://arxiv.org/abs/
          <year>1811</year>
          .11538. arXiv:
          <year>1811</year>
          .11538.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hammer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rudeanu</surname>
          </string-name>
          ,
          <article-title>Boolean methods in operations research and related areas, ökonometrie und unternehmensforschung/econometrics</article-title>
          and operations research, Springer, Berlin
          <volume>1007</volume>
          (
          <year>1968</year>
          )
          <fpage>978</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>5ASPARTIX for Value-based Argumentation Frameworks (VAFs</article-title>
          ): https://www.dbai.tuwien.ac.at/research/argumentation/ aspartix/vaf.html.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>