<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Solving Weighted Argumentation Frameworks with Soft Constraints</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Stefano</forename><surname>Bistarelli</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Matematica e Informatica</orgName>
								<orgName type="institution">Università di Perugia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Istituto di Informatica e Telematica (CNR)</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniele</forename><surname>Pirolandi</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Matematica e Informatica</orgName>
								<orgName type="institution">Università di Perugia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Francesco</forename><surname>Santini</surname></persName>
							<email>francesco.santini@]iit.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="department">Istituto di Informatica e Telematica (CNR)</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">Dipartimento di Scienze</orgName>
								<orgName type="institution">Università &quot;G. d&apos;Annunzio&quot;</orgName>
								<address>
									<settlement>Pescara</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Solving Weighted Argumentation Frameworks with Soft Constraints</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2172418ECB899C9783CEB22C77C28BA5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T17:31+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We suggest soft constraints as a mean to parametrically represent and solve "weighted" Argumentation problems: different kinds of preference levels related to arguments, e.g. a score representing a "fuzziness", a "cost" or a probability level of each argument, can be represented by choosing different semiring algebraic structures. The novel idea is to provide a common computational and quantitative framework where the computation of the classical Dung's extensions, e.g. the admissible extension, has an associated score representing "how much good" the set is. Preference values associated to arguments are clearly more informative and can be used to prefer a given set of arguments over others with the same characteristics (e.g. admissibility). Moreover, we propose a mapping from weighted Argumentation Frameworks to Soft Constraint Satisfaction Problems (SCSPs); with this mapping we can compute Dung semantics (e.g. admissible and stable) by solving the related SCSP. To implement this mapping we use JaCoP, a Java constraint solver.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Interactions are a core part of all multi-party systems (e.g. multi-agent systems). Argumentation <ref type="bibr" target="#b11">[12]</ref> is based on the exchange and the evaluation of interacting arguments which may represent information of various kinds, especially beliefs or goals. Argumentation can be used for modeling some aspects of reasoning, decision making, and dialogue. For instance, when an agent has conflicting beliefs (viewed as arguments), a (nontrivial) set of plausible consequences can be derived through argumentation from the most acceptable arguments for the agent. Argumentation can be seen as the process emerging from exchanges of among agents to persuade each other and and bring about a change in intentions <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b18">19]</ref>. Argumentation has become an important subject of research in Artificial Intelligence and it is also of interest in several disciplines, such as Logic, Philosophy and Communication Theory <ref type="bibr" target="#b22">[23]</ref>.</p><p>Many theoretical and practical developments build on Dung's seminal theory of argumentation. A Dung Argumentation Framework (AF ) is a directed graph consisting of a set of arguments and a binary conflict based attack relation among them. The sets of arguments to be considered are then defined under different semantics, where the choice of semantics equates with varying degrees of scepticism or credulousness.</p><p>The other ingredient in our research is Constraint Programming <ref type="bibr" target="#b23">[24]</ref>, which is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. The idea of the semiring-based formalism <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5]</ref> was to further extend the classical constraint notion by adding the concept of a structure representing the levels of satisfiability of the constraints. Such a structure (see Sec. <ref type="bibr" target="#b2">3</ref> for further details) is a set with two operations: one + is used to generate an ordering over the preference levels, while × is used to combine these levels. Because of the properties required on such operations, this structure is similar to a semiring (see Sec. 3). Problems defined according to this semiring-based framework are called Soft Constraint Satisfaction Problems (SCSPs).</p><p>In this paper we show that different weighted AFs based on fuzziness, probability or a preference in general (and already studied in literature, e.g. in <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b2">3]</ref>), can be modeled and solved with the same soft constraint framework by only changing the related semiring in order to optimize the different criteria. Also classical AFs can be represented inside the soft framework by adopting the Boolean semiring. We provide a mapping from AFs to (S)CSPs in a way that the solution of the SCSP consists in the "best" desired extension, where "best" is computed by aggregating (with ×) the preference scores of all the chosen arguments, and comparing the final values (with +). The classical extensions of Dung can be found with our mapping, i.e. admissible, preferred, complete, stable and grounded ones. At last, we show an implementation of a CSP with JaCoP <ref type="bibr" target="#b21">[22]</ref>, a Java Constraint Programming solver.</p><p>Clearly, the classical attack relationship is not enough informative to deal with problems where we however need to take a decision: suppose a judge must decide between the arguments of two parties, and often no conclusive demonstration of the rightness of one side is possible. The arguments will not have equal value for the judge and the case will be decided by the judge preferring one argument over the other <ref type="bibr" target="#b22">[23]</ref>. Moreover, having a quantitative framework permits us to quantify the aggregation of chosen arguments and to prefer a set of arguments over another. Examples in the real world are represented by scores given to comments in Youtube or news in Slashdot, or topics in Discussion Fora in general <ref type="bibr" target="#b17">[18]</ref>. As the set of arguments gets wider, the search of the best solutions becomes a demanding task, and constraint-based frameworks come with many and powerful solving techniques: notice that deciding if a set is a preferred extension is a CO-N P -complete problem <ref type="bibr" target="#b3">[4]</ref>. Moreover, preference score can be used to cut not promising solutions during the search and, however, to refine it by finding the only the best solutions. In this paper we start from qualitative argumentation <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b1">2]</ref> and we move towards a quantitative solution.</p><p>The remainder of this paper is organized as follows. In Sec. 2 we report the theory behind Dung Argumentation, while in Sec. 3 we summarize the background about soft constraints. Section 4 shows the basic idea of weighted AF based on semirings; in Sec. 5 we propose the mapping from AFs to SCSPs, the proofs of their solution equivalence and we show a practical encoding in JaCoP. A comparison with related work is given in Sec. 6. Finally, Sec. 7 presents our conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Dung Argumentation</head><p>In <ref type="bibr" target="#b11">[12]</ref>, the author has proposed an abstract framework for argumentation in which he focuses on the definition of the status of arguments. For that purpose, it can be assumed that a set of arguments is given, as well as the different conflicts among them. An argument is an abstract entity whose role is solely determined by its relations to other arguments. The "acceptability" of an argument <ref type="bibr" target="#b11">[12]</ref> depends on its membership to some sets, called extensions. These extensions characterize collective "acceptability". Let AF = A rgs , R , B ⊆ A rgs . The main characteristic properties are: In Fig. <ref type="figure" target="#fig_1">1</ref> we show an example of AF represented as an interaction graph: the nodes represent the arguments and the directed arrow from c to d represents the attack of c towards d, that is c R d. Dung <ref type="bibr" target="#b11">[12]</ref> gave several semantics to "acceptability". These various semantics produce none, one or several acceptable sets of arguments, called extensions. In Def. 2 we define the concepts of conflictfree and stable extensions: Definition 2. A set B ⊆ A rgs is conflict-free iff it does not exist two arguments a and b in B such that a attacks b. A conflict-free set B ⊆ A rgs is a stable extension iff for each argument which is not in B, there exists an argument in B that attacks it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1. An Argumentation Framework (AF) is a pair</head><p>The other semantics for "acceptability" rely upon the concept of defense: An admissible set of arguments according to Dung must be a conflict-free set which defends all its elements. Formally:</p><formula xml:id="formula_0">Definition 4. A conflict-free set B ⊆ A rgs is admissible iff each argument in B is defended by B.</formula><p>Besides the stable semantics, three semantics refining admissibility have been introduced by Dung <ref type="bibr">[</ref> A stable extension is also a preferred extension and a preferred extension is also a complete extension. Stable, preferred and complete semantics admit multiple extensions whereas the grounded semantics ascribes a single extension to a given argument system.</p><p>Notice that deciding if a set is a stable extension or an admissible set can be computed in polynomial time, but deciding if a set is a preferred extension is a CO-N P -complete problem <ref type="bibr" target="#b3">[4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Soft Constraints</head><p>A c-semiring <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5]</ref> S (or simply semiring in the following) is a tuple A, +, ×, 0, 1 where A is a set with two special elements (0, 1 ∈ A) and with two operations + and × that satisfy certain properties: + is defined over (possibly infinite) sets of elements of A and thus is commutative, associative, idempotent, it is closed and 0 is its unit element and 1 is its absorbing element; × is closed, associative, commutative, distributes over +, 1 is its unit element, and 0 is its absorbing element (for the exhaustive definition, please refer to <ref type="bibr" target="#b6">[7]</ref>). The + operation defines a partial order ≤ S over A such that a ≤ S b iff a + b = b; we say that a ≤ S b if b represents a value better than a. Other properties related to the two operations are that + and × are monotone on ≤ S , 0 is its minimum and 1 its maximum, A, ≤ S is a complete lattice and + is its lub. Finally, if × is idempotent, then + distributes over ×, A, ≤ S is a complete distributive lattice and × its glb.</p><p>A soft constraint <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5]</ref> may be seen as a constraint where each instantiation of its variables has an associated preference. Given S = A, +, ×, 0, 1 and an ordered set of variables V over a finite domain D, a soft constraint is a function which, given an assignment η : V → D of the variables, returns a value of the semiring. Using this notation C = η → A is the set of all possible constraints that can be built starting from S, D and V . Any function in C involves all the variables in V , but we impose that it depends on the assignment of only a finite subset of them. So, for instance, a binary constraint c x,y over variables x and y, is a function c x,y : V → D → A, but it depends only on the assignment of variables {x, y} ⊆ V (the support of the constraint, or scope). Note that cη[v := d 1 ] means cη where η is η modified with the assignment v := d 1 . Note also that cη is the application of a constraint function c :</p><formula xml:id="formula_1">V → D → A to a function η : V → D;</formula><p>what we obtain, is a semiring value cη = a. 0 and 1 respectively represent the constraint functions associating 0 and 1 to all assignments of domain values (i.e. the ā function returns the semiring value a).</p><p>Given the set C, the combination function <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5]</ref>). Informally, performing the ⊗ or between two constraints means building a new constraint whose support involves all the variables of the original ones, and which associates with each tuple of domain values for such variables a semiring element which is obtained by multiplying the elements associated by the original constraints to the appropriate sub-tuples.</p><formula xml:id="formula_2">⊗ : C × C → C is defined as (c 1 ⊗ c 2 )η = c 1 η × c 2 η (see also</formula><p>Given a constraint c ∈ C and a variable v ∈ V , the projection <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref> </p><formula xml:id="formula_3">of c over V − {v}, written c ⇓ (V \{v}) is the constraint c such that c η = d∈D cη[v := d].</formula><p>Informally, projecting means eliminating some variables from the support.</p><p>A SCSP <ref type="bibr" target="#b4">[5]</ref> defined as P = C, con (C is the set of constraints and con ⊆ V , i.e. a subset the problem variables). A problem P is α-consistent if blevel(P ) = α <ref type="bibr" target="#b4">[5]</ref>; P is instead simply "consistent" iff there exists α &gt; S 0 such that P is αconsistent <ref type="bibr" target="#b4">[5]</ref>. P is inconsistent if it is not consistent. The best level of consistency notion defined as blevel(P ) = Sol(P ) ⇓ ∅ , where Sol(P ) = ( C) ⇓ con <ref type="bibr" target="#b4">[5]</ref>. A SCSP Example. Figure <ref type="figure">2</ref> shows a weighted CSP as a graph: the semiring used for this problem is the Weighted semiring, i.e. R + , min, +, ∞, 0 ( + is the arithmetic plus operation). Variables and constraints are represented respectively by nodes and by undirected arcs (unary for c 1 and c 3 , and binary for c 2 ), and semiring values are written to the right of each tuple. The variables of interest (that is the set con) are represented with a double circle (i.e. variable X). Here we assume that the domain of the variables contains only elements a and b.</p><p>For example, the solution of the weighted CSP of Fig. <ref type="figure">2</ref> associates a semiring element to every domain value of variable X. Such an element is obtained by first combining all the constraints together. For instance, for the tuple a, a (that is, X = Y = a), we have to compute the sum of 1 (which is the value assigned to X = a in constraint c 1 ), 5 (which is the value assigned to X = a, Y = a in c </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Weighted Argumentation</head><p>Weighted argumentation systems <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b12">13]</ref> extend Dung-style abstract argumentation systems by adding numeric weights to every node (or attack) in the attack graph, intuitively corresponding to the strength of the attack, or equivalently, how reluctant we would be to disregard it. To illustrate the need to extend the classical AF with preferences, we consider two individuals P and Q exchanging arguments A and B about the weather forecast (the example is taken from <ref type="bibr" target="#b22">[23]</ref>):</p><p>P: Today will be dry in London since BBC forecast sunshine = A Q: Today will be wet in London since CNN forecast rain = B</p><p>A and B claim contradictory conclusions and so attack each other. Under Dung's preferred semantics, there are two different admissible extensions represented by the sets {A} and {B}, but neither argument is sceptically justified. One solution is to provide some means for preferring one argument to another in order to find a more informative answer, for example, the most trustworthy extension. For example, one might reason that A is preferred to B because the BBC are deemed more trustworthy than CNN. Suppose to have a fuzzy trust score associated with each argument, as shown in Fig. <ref type="figure" target="#fig_2">3</ref>. This score, (between 0 and 1 that is between low and high trustworthiness) can be then used to prefer {A} with a score of 0.9 over {B} with a score of 0.7, i.e. forecast from BBC than from CCN.</p><p>BBC sunshine CNN rain 0.9 0.7 Fig. <ref type="figure" target="#fig_2">3</ref>. The CNN /BBC example with trust scores.</p><p>In some works <ref type="bibr" target="#b16">[17]</ref> the preference score is associated with the attack relationship instead of with the argument itself and, thus, it models the "strength" of the attack, e.g. a fuzzy attack. This model can be cast in ours by composing these strengths in a value representing the preference of the argument, as in Fig. <ref type="figure">4</ref>, where the trustworthiness of argument CNN-rain can be computed as the mathematical mean (or in general a function •, as defined also in <ref type="bibr" target="#b8">[9]</ref> for computing the trust of a group of individuals) of the values associated with the attack towards it, i.e. (0.9 + 0.5)\2 = 0.7. Computing a trust evaluation of a node by considering a function of the links ending in it is a well-known solution, e.g. the PageRank of Google <ref type="bibr" target="#b17">[18]</ref>. By composing attack and support values, it is also possible to quantitatively study bipolar argumentation frameworks <ref type="bibr" target="#b0">[1]</ref>.</p><p>BBC sunshine CNN rain 0.9 FOX sunshine 0.5 Fig. <ref type="figure">4</ref>. A fuzzy Argumentation Framework with fuzzy scores modeling the attack strength.</p><p>Notice that in <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b1">2]</ref> the preference among arguments is given in a qualitative way, that is argument a is better than argument b, which is better than argument c; in this section we study the problem from a quantitative point of view, with scores associated with arguments. We suggest the algebraic semiring structure (see Sec. 3) as a mean to parametrically represent and solve all the "weighted" AFs presented in literature (see Sec. 6), i.e. to represent the scores; in the following we provide some examples on how semirings fulfil these different tasks.</p><p>An argument can be seen as a chain of possible events that makes the hypothesis true. The credibility of a hypothesis can then be measured by the total probability that it is supported by arguments. The proper semiring to solve this problem consists in the Probabilistic semiring <ref type="bibr" target="#b4">[5]</ref>: [0..1], max, ×, 0, 1 , where the arithmetic multiplication (i.e. ×) is used to compose the probability values together.</p><p>The Fuzzy Argumentation <ref type="bibr" target="#b26">[27]</ref> approach enriches the expressive power of the classical argumentation model by allowing to represent the relative strength of the attack relationships between arguments, as well as the degree to which arguments are accepted. In this case, the Fuzzy semiring [0..1], min, max, 0, 1 can be used.</p><p>In addition, the Weighted semiring R + , min, +, 0, 1 , where + is the arithmetic plus, can model the (e.g. money) cost of the attack: for example, during an electoral campaign, a candidate could be interested in how many efforts or resources he should spend to counteract an argument of the opposing party.</p><p>At last, with the Boolean semiring {true, f alse}, ∨, ∧, f alse, true we can cast the classic AFs originally defined by Dung <ref type="bibr" target="#b11">[12]</ref> in the same semiring-based framework.</p><p>Moreover, notice that the cartesian product of two semirings is still a semiring <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b4">5]</ref>, and this can be fruitfully used to describe multi-criteria constraint satisfaction and optimization problems. For example, we can have both a probability and a fuzzy score given by a couple t, f ; we can optimize both costs at the same time.</p><p>We can extend the definitions provided in Sec. 3 in order to express all these weights of the attack relations with a semiring based environment. The following definitions model the semiring-based problem. Therefore, the weight function W associates each argument with a semiring value (s ∈ A) that represents the preference expressed for that argument in terms of cost, fuzziness and so on. For example, using the Fuzzy semiring [0..1], min, max, 0, 1 semiring for the problem represented in Fig. <ref type="figure" target="#fig_2">3</ref> allows us to state that the admissible extension {A} (with a score of 0.9) is better than the other admissible extension {B} (with a s.core of 0.7) since 0.9 &gt; 0.7. Therefore, with an AF S our goal is to find the extensions proposed by Dung (e.g. the admissible extensions), but with an associated preference value. Therefore, soft constraints can be used to solve these problems while considering also the best solution(s) (according to the notion of blevel, and to cut the solutions with a preference below a threshold α. Notice that e attacks itself, that is in contrast with itself, e.g. "We have sunshine and it's raining" (it may be possible).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Mapping AFs to SCSPs</head><p>Our second result is a mapping from AF (and AF S ) to (S)CSPs. Given an AF S = A rgs , R, W, S , we define a variable for each argument a i ∈ A rgs , i.e. V = {a 1 , a 2 , . . . , a n } and each of these argument can be taken or not, i.e. the domain of each variable is D = {1, 0}, and if it is taken, a cost in the semiring can be assigned, mapping the level of preference of this argument.</p><p>To represent the quantitative preference over arguments, in this mapping we need only unary soft constraints on each variable, while the other constraints Fig. <ref type="figure">5</ref>. An example of a weighted interaction graph. modeling, for example, the conflict-free relationship (see Sec. 2) are crisp even if represented in the soft framework. We plan to extend also these constraints to properly-said soft ones as suggested in Sec. 7. In the following explanation, notice that b attacks a meas that b is a parent of a in the interaction graph, and c attacks b attacks a means that c is a grandparent of a. To compute the (weighted) extensions of Dung we need to define specific sets of constraints:</p><p>1. Preference constraints. The weight function W (a i ) = s (s ∈ A) of an AF S can be modeled with the unary constraints c a i (a i = 1) = s, otherwise, when a i is assigned to 0), the argument is not taken in the considered extension an so its cost must not be computed. 2. Conflict-free constraints. Since we want to find the conflict-free sets, if R(a i , a j ) is in the graph we need to prevent the solution to include both a i and a j in the considered extension: c a i ,a j (a i = 1, a j = 1) = 0. For the other possible assignment of the variables ((a = 0, b = 1)(a = 1, b = 0) and (a = 0, b = 0)), c ai,aj = 1, since these assignments are permitted: in these cases we are choosing only one argument between the two (or none of the two) and thus, we have no conflict. 3. Admissible constraints. For the admissibility, we need that, if child argument a i has a parent node a f but a i has no grandparent node a g (parent of a f ), then we must avoid to take a i in the extension because it is attacked and cannot be defended by any ancestor: expressed with a unary constraint, c a i (a i = 1) = 0. Moreover, if a i has several grandparents a g1 , a g2 , . . . , a gk and only one parents a f (child of a g1 , a g2 , . . . , a gk ), we need to add a k + 1-ary constraint c ai,ag1,...,a gk (a i = 1, a g1 = 0, . . . , a gk = 0) = 0. The explanation is that at least a a grandparent must be taken in the admissible set, in order to defend a i from one of his parents a f . Notice that, if a node is not attacked (i.e. he has no parents), he can be taken or not in the admissible set. 4. Complete constraints. To compute a complete extension B, we need that each argument a i which is defended by B is in B (see Sec. 2). This can be enforced by imposing that for each a i taken in the extension, also all its a s1 , a s2 , . . . , a sk grandsons must be taken in the extension, i.e. c a i ,a s1 ,...,a sk (a i = 1, a s1 = 1, . . . , a sk = 1) = 1 and also if a i = 0 this constraint is satisfied; 0 otherwise. 5. Stable constraints. If we have a child node a i with multiple parents a f 1 , a f 2 , . . . , a f k , we need to add the constraint c a i ,a f 1 ,...,a f k (a i = 0, a f 1 = 0, . . . , a f k = 0) = 0. In words, if a node is not taken in the extension (i.e. a i = 0), then it must be attacked by at least one of the taken nodes, that is at least a parent of a i needs to be taken in the stable extension (that is, a f j = 1). Moreover, if a node a i has no parent in the graph, it has to be included in the stable extension (notice a i cannot be attacked by nodes inside the extension, since he has no parent). The corresponding unary constraint is c ai (a i = 0) = 0.</p><p>Notice that by using the Boolean semiring, also the class of preference constraints becomes crisp and we can consequently model classical Dung AFs, that is not weighted frameworks. The following proposition states the equivalence between solving an AF S and its related SCSP.</p><p>Proposition 1 (Solution equivalence). Given an AF S = A rgs , R, W, S and S = A, +, ×, 0, 1 , the solutions of the related SCSP obtained with the mapping corresponds to find over AF S the best(according to +) -conflict-fee extensions by using preference and conflict-free constraint classes.</p><p>-admissible extensions by using preference, conflict-free and admissible constraint classes. -complete extensions by using preference, conflict-free and admissible constraint classes. -stable extensions by using preference, conflict and stable constraint classes. By using the Boolean semiring the solutions of the (S)CSP respectively correspond to all the classical admissible, complete and stable extensions of Dung <ref type="bibr" target="#b11">[12]</ref>.</p><p>Moreover, to find the preferred extension (see Sec. 2) we simply need to find all the maximal (w.r.t. set inclusion) admissible extensions of A rgs , that is to find all the admissible sets (using the first three classes of constraints) and then returning only those subsets with the highest number of variables assigned to 1. Similar considerations hold for the grounded extension (see Sec. 2), that is we need to find all the complete extensions (the first four classes of constraints) and then to return only those subsets with the lowest number of variables assigned to 1 <ref type="foot" target="#foot_0">4</ref> .</p><p>As suggested in Sec. 4, an AF S can be represented as a weighted interaction graph as in Fig. <ref type="figure">5</ref>, where we instead suppose to use a Weighted semiring, i.e. R + , min, +, ∞, 0 , e.g. the argument a has received 7 negative comments. The goal in this case is to choose the extensions of Dung and to minimize the sum of the negative comments at the same time.</p><p>Notice that the presented soft constraint framework can be easily used to solve argumentation problems with additional constraints, as proposed in <ref type="bibr" target="#b10">[11]</ref> only for boolean constraints. We can find further requirements on the sets of arguments which are expected as extensions, like "extensions must contain argument a when they contain b" or "extensions must not contain one of c or d when they contain a but do not contain b".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Solving with JaCoP</head><p>The Java Constraint Programming solver <ref type="bibr" target="#b21">[22]</ref>, JaCoP in short, is a Java library, which provides Java user with Finite Domain Constraint Programming paradigm. It provides different type of constraints: most commonly used primitive constraints, such as arithmetical constraints, equalities and inequalities, logical, reified and conditional constraints, combinatorial (global) constraints. The last version of JaCoP proposes many features, such as pruning events, multiple constraint queues, special data structures to handle efficiently backtracking, iterative constraint processing, and many more <ref type="bibr" target="#b21">[22]</ref>. Moreover, it can run also large examples, e.g. ca. 180000 constraints.</p><p>// Defining the Variables of the SCSP v[0] = new BooleanVariable(store, "a"); v <ref type="bibr" target="#b0">[1]</ref> = new BooleanVariable(store, "b"); v <ref type="bibr" target="#b1">[2]</ref> = new BooleanVariable(store, "c"); v <ref type="bibr" target="#b2">[3]</ref> = new BooleanVariable(store, "d"); v <ref type="bibr" target="#b3">[4]</ref> = new BooleanVariable(store, "e");  In Fig. <ref type="figure" target="#fig_5">6</ref> we show the definition in JaCoP of all the conflict-free and stable constraints used to solve the AF S example in Fig. <ref type="figure">5</ref>. The full description of the code can be found in <ref type="bibr" target="#b7">[8]</ref>. Considering for example the first conflict-free constraint in Fig. <ref type="figure">5</ref>, v[0], v <ref type="bibr" target="#b0">[1]</ref>, means that the constraint is between a and b and (1, 1) that the the constraint is not satisfied if both variables are taken in the set.</p><p>Considering the example in Fig. <ref type="figure">5</ref> the admissible sets are: {a}, {c}, {d}, {a, c}, {a, d}. Dung's semantics induce the following acceptable sets: one stable extension {a, d}, two preferred extensions P E 1 = {a, c}, P E 2 = {a, d}, three complete extensions CE 1 = {a, c}, CE 2 = {a, d}, CE 3 = {a} and the grounded extension ≡ {a}. With our quantitative interpretation of AFs with preferences and considering the Fuzzy semiring R + , min, +, ∞, 0 , we can prefer P E 1 over P E 2 (W (a) +W (c)) = 13, W (a) +W (d) = 17 and CE 3 over CE 1 and CE 2 , since W (a) = 7. All these best solutions are obtained by using JaCoP.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Related Work</head><p>In <ref type="bibr" target="#b26">[27]</ref>, the authors have developed the notion of fuzzy unification and incorporated it into a novel fuzzy argumentation framework for extended logic programming: the attacks are associated to a fuzzy strength value, i.e. a V -attack. As well, a V -argument A is V -acceptable w.r.t. the set Args of V -arguments if each argument V -attacked A is V -attacked by an argument in Args.</p><p>In <ref type="bibr" target="#b2">[3]</ref>, AFs have been also extended to Value Based Argumentation Frameworks (VAF ) where V is a generic nonempty set of values and Val is a function which maps from elements of Args to elements of V .</p><p>The work in <ref type="bibr" target="#b1">[2]</ref> concerns the "acceptability" of arguments in preferencebased argumentation frameworks. Preferences are represented with a preordering relationships (partial or total) that resembles the ordering defined by the + operator of semirings (see Sec. 3).</p><p>Probabilistic Argumentation <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b19">20]</ref>. This theory is an alternative approach for non-monotonic reasoning under uncertainty. It allows to judge open questions (hypotheses) about the unknown or future world in the light of the given knowledge. From a qualitative point of view, the problem is to derive arguments in favor and against the hypothesis of interest.</p><p>In <ref type="bibr" target="#b22">[23]</ref> the author has extended Dung's theory of argumentation to integrate metalevel argumentation about preferences. Dung's level of abstraction is preserved, so that arguments expressing preferences are distinguished by being the source of a second attack relation that abstractly characterizes application of preferences by attacking attacks between the arguments that are the subject of the preference claims.</p><p>A close work is represented by <ref type="bibr" target="#b13">[14]</ref>: there the authors introduce and investigate a natural extension of Dungs well known model of argument systems in which attacks are associated with a weight, indicating the relative strength of the attack. A key concept in that framework is the notion of an inconsistency budget, which characterizes how much inconsistency we are prepared to tolerate:</p><p>given an inconsistency budget β, we would be prepared to disregard attacks up to a total cost of β.</p><p>Comparison. The framework proposed in this paper is able to solve all the above reported AFs (including the classical Dung framework <ref type="bibr" target="#b11">[12]</ref>), both from the qualitative and (main novelty) quantitative point of view. Since in this paper we mainly propose a solving framework, we compare it with other related works.</p><p>In <ref type="bibr" target="#b13">[14]</ref> weights are associated with attacks instead of arguments, as in our proposal. Moreover, no solving mechanism is proposed to solve the problems presented in the paper, even if their solution is proved to be difficult in the paper (e.g. NP-Complete). Moreover, in <ref type="bibr" target="#b13">[14]</ref> the combination of the weights and the preference of the solution correspond to our Weighted semiring, while other possibilities are not considered.</p><p>In <ref type="bibr" target="#b18">[19]</ref> crisp constraint have been used to model argumentation as constraint propagation in Distributed Constraint Satisfaction Problem (DSCP ). Different agents represent the distributed points in the problem. The paper shows the appropriateness of constraints in solving large-scale argumentation systems. However, it seems to only solve classical problems, (i.e. no qualitative or quantitative extensions).</p><p>The are some frameworks based on Logic Programming-like languages. For example, the system ASPARTIX <ref type="bibr" target="#b14">[15]</ref> is a tool for computing acceptable extensions for a broad range of formalizations of Dung's argumentation framework and generalizations thereof, e.g. value-based AFs <ref type="bibr" target="#b2">[3]</ref> or preference-based <ref type="bibr" target="#b1">[2]</ref>. AS-PARTIX relies on a fixed disjunctive datalog program which takes an instance of an argumentation framework as input, and uses the answer-set solver DLV for computing the type of extension specified by the user. However, ASPARTIX does not solve any quantitative argumentation case, as well as other Answer Set Programming systems <ref type="bibr" target="#b24">[25]</ref>.</p><p>In <ref type="bibr" target="#b9">[10]</ref> the authors solve over-constrained weighted AF problems, where weights are associated with arcs and represent the cost of the attack between two arguments. to relax the notion of conflict-free extensions to α-conflict-free ones (and also for hte other extensions of Dung), in order to include in the same set also attacking arguments, whose attack costs are not worse than a threshold α.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions and Future Work</head><p>In the paper we have revised the notions provided by Dung <ref type="bibr" target="#b11">[12]</ref> in order to associate the argument preference with a weight (taken from a semiring structure) that represents the "goodness" of the argument in terms of cost, fuzziness, probability or else. Further on, we have suggested the Dung's semantics in their soft version. Moreover, we have presented a mapping from SCSPs to AFs and solved the obtained SCSP with JaCoP, a Java Constraint Programming solver, thus finding the solution of the related AF. We have proposed an unifying computational framework with strong mathematical foundations and solving techniques, where by only parametrically changing the semiring we can deal with different weighted (or not) AFs. By having a uniform framework, it may be possible to see more clearly the relationships between different proposals. It may also offer the possibility to identify new results concerning classes of these proposals.</p><p>The user only needs to state the problem, while the underlying machinery is able to efficiently satisfy the constraints. Constraint solving techniques prove to be able to deal with large scale problems <ref type="bibr" target="#b18">[19]</ref>, even if the treated problems are difficult: for example, deciding if a set is a preferred extension is a CO-N P -complete problem <ref type="bibr" target="#b3">[4]</ref>. Practical applications may consist, for example, in automatically study Discussion Fora where arguments are rated by users.</p><p>In the future, we would like to cluster arguments according to their (for example) coherence, still using soft constraints as the framework to obtain the solution. This can be useful to check the discrepancies/likeness during a negotiation process, inside different interviews to the same political candidate or during discussions in general. As an example, "We do not want immigrants with the right to vote" is clearly closer to "Immigration must be stopped", than to "We need a multicultural and open society in order to enrich the life of everyone and boost our economy", and should belong to the same cluster.</p><p>At last, we want to generate a small-world network, for example with the Java Universal Network/Graph Framework (JUNG) <ref type="bibr" target="#b25">[26]</ref> in order to test automatically give an interaction graph as input and test the related performance.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>A rgs , R of a set A rgs of arguments and a binary relation R on A rgs called the attack relation. ∀a i , a j ∈ A, a i R a j means that a i attacks a j . An AF may be represented by a directed graph (the interaction graph) whose nodes are arguments and edges represent the attack relation. A set of arguments B attacks an argument a if a is attacked by an argument of B. A set of arguments B attacks a set of arguments C if there is an argument b ∈ B which attacks an argument c ∈ C.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An example of Dung Argumentation Framework; e.g. c attacks d.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Definition 3 .</head><label>3</label><figDesc>An argument b is defended by a set B ⊆ A rgs (or B defends b) iff for any argument a ∈ A rgs , if a attacks b then B attacks a.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>2 Fig. 2 .</head><label>22</label><figDesc>Fig. 2. A soft CSP based on a Weighted semiring.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>2 ) and 5 (which is the value for Y = a in c 3 ). Hence, the resulting value for this tuple is 11. We can do the same work for tuple a, b → 7, b, a → 16 and b, b → 16. The obtained tuples are then projected over variable x, obtaining the solution a → 7 and b → 16. The blevel for the example in Fig. 2 is 7 (related to the solution X = a, Y = b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Definition 6 .</head><label>6</label><figDesc>A semiring-based Argumentation Framework (AF S ) is a quadruple A rgs , R, W, S of a semiring S = A, +, ×, 0, 1 , a set A rgs of arguments, the attack binary relation R on A rgs , and a unary function W : A rgs −→ A called the weight function. ∀a ∈ A rgs , W (a) = s means that a has a preference level s ∈ A.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Example 1 .</head><label>1</label><figDesc>Concerning the interaction graph in Fig. 5, it represents the Weighted AF S W = (A rgs , R) with S = R + , min, +, ∞, 0 and A rgs = {a, b, c, d, e}, R(a, b) = 0.7, R(c, b) = 0.8, R(c, d) = 0.9, R(d, c) = 0.8, R(d, e) = 0.5, R(e, e) = 0.6 and W (a) = 7, W (b) = 20, W (c) = 6, W (d) = 10, W (e) = 12.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. The constraint in JaCoP for the mapping of Fig. 5.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_0">Different interpretations of grounded/preferred extensions can be given by considering their cost instead of their the cardinality.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>We would like to thank Massimiliano Giacomin for the important suggestions.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">On bipolarity in argumentation frameworks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>-C. Lagasquie-Schiex</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Livet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Intell. Syst</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1062" to="1093" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Inferring from inconsistency in preference-based argumentation frameworks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Amgoud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Cayrol</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Autom. Reasoning</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="125" to="169" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Persuasion in practical argument using value-based argumentation frameworks</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">J M</forename><surname>Bench-Capon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Log. Comput</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="429" to="448" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Checking the acceptability of a set of arguments</title>
		<author>
			<persName><forename type="first">P</forename><surname>Besnard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Doutre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Non-Monotonic Reasoning</title>
				<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="59" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Semirings for Soft Constraint Solving and Programming</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<date type="published" when="2004">2962. 2004</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Soft concurrent constraint programming</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rossi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Comput. Logic</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="563" to="589" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Semiring-based Constraint Solving and Optimization</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rossi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="201" to="236" />
			<date type="published" when="1997-03">March 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Solving weighted argumentation frameworks with soft constraints</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pirolandi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
		<idno>Number R-2009-003</idno>
		<ptr target="http://www.sci.unich.it/~tecrep/2009/R-2009-003.pdf" />
		<imprint>
			<date type="published" when="2009-12">December 2009</date>
			<pubPlace>Pescara</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Dipartimento di Scienze, Università G. d&apos;Annunzio</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Propagating multitrust within trust networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ACM Symposium on Applied Computing</title>
				<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="1990" to="1994" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A common computational framework for semiringbased argumentation systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Conference on Artificial Intelligence (ECAI10)</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Constrained argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Coste-Marquis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Devred</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Marquis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Knowledge Representation and Reasoning (KR)</title>
				<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="112" to="122" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="321" to="357" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Inconsistency tolerance in weighted argument systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hunter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcburney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wooldridge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conf. on Autonomous Agents and Multiagent Systems</title>
				<imprint>
			<publisher>IFAAMS</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="851" to="858" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Inconsistency tolerance in weighted argument systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Dunne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hunter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcburney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wooldridge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAMAS &apos;09: Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems</title>
				<imprint>
			<publisher>International Foundation for Autonomous Agents and Multiagent Systems</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="851" to="858" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">ASPARTIX: Implementing argumentation frameworks using answer-set programming</title>
		<author>
			<persName><forename type="first">U</forename><surname>Egly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Alice</forename><surname>Gaggl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Logic Programming (ICLP)</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="734" to="738" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Probabilistic argumentation</title>
		<author>
			<persName><forename type="first">R</forename><surname>Haenni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Applied Logic</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="155" to="176" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Fuzzy argumentation frameworks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Janssen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">De</forename><surname>Cock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Vermeir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Processing and Management of Uncertainty in Knowledge-based Systems</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="513" to="520" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A survey of trust and reputation systems for online service provision</title>
		<author>
			<persName><forename type="first">Audun</forename><surname>Jøsang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roslan</forename><surname>Ismail</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Colin</forename><surname>Boyd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decis. Support Syst</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="618" to="644" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Argumentation as distributed constraint satisfaction: applications and results</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kulkarni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference on Autonomous agents (AGENTS)</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="324" to="331" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Probabilistic argumentation systems a new way to combine logic with probability</title>
		<author>
			<persName><forename type="first">Jürg</forename><surname>Kohlas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Applied Logic</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="225" to="253" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Reaching agreements through argumentation: a logical model and implementation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kraus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sycara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Evenchik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">104</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="1" to="69" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Jacop -java constraint programming solver</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kuchcinski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Szymanek</surname></persName>
		</author>
		<ptr target="http://jacop.osolpro.com/" />
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Reasoning about preferences in argumentation frameworks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Modgil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">173</biblScope>
			<biblScope unit="issue">9-10</biblScope>
			<biblScope unit="page" from="901" to="934" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Networks of constraints: Fundamental properties and applications to picture processing</title>
		<author>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Sci</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="95" to="132" />
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Possibilistic-based argumentation: An answer set programming approach</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Nieves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Cortés</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Osorio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mexican International Conference on Computer Science(ENC)</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="249" to="260" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">The JUNG (Java Universal Network/Graph) framework</title>
		<author>
			<persName><forename type="first">J</forename><surname>O'madadhain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fisher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>White</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Boey</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>UC Irvine</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical report</note>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Fuzzy argumentation for negotiating agents</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schroeder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schweimeier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AAMAS</title>
				<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="942" to="943" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
