This research explores the relationship between the bounded in-degree and out-degree of an argumentation framework and the computational complexity of the problems of Credulous Acceptance (CredA) and Skeptical Acceptance (SkepA) under preferred extensions. Researchers have studied the complexity of these problems when the in-degree and out-degree of the arguments are restricted to . Despite this restriction, the computational complexities of CredA and SkepA persist. Based on these results, we presents new results that provide deeper insights into the impact of additional constraints on the argumentation framework. Specifically, we show that when “” or “” is restricted to , both problems CredA and SkepA can be solved in polynomial time. Subsequently, we impose additional constraints on the argumentation framework by analyzing the quantities “,” “,” and “.” For an argumentation framework and all arguments “” of , the parameter “” indicates the maximum number of attackers that any argument “” can have among all those that are not attacked by “” , “” indicates the maximum number of arguments that any argument “” attacks among all those that do not attack “”, and “” denotes the maximum number of arguments that any argument “” attacks among those that attack “”. Surprisingly, even when all these quantities are restricted to , the computational complexity of CredA persists. Furthermore, we explore the influence of symmetric attacks by fixing “” to zero, while setting “” and “” to . Remarkably, the complexity of CredA persists under this restriction as well.
Abstract argumentation frameworks1 are widely used in artificial intelligence,2,3 result applications in decision-making,4,5 multi-agent systems,6,7 and argumentation-based recommender and decision support systems.8–10 These frameworks provide a means to study and understand the interactions between arguments, enhancing our understanding of complex reasoning processes.
Informally, an abstract argumentation framework consists of a set of arguments and an attack relation between these arguments. Arguments represent individual points of view, claims, or statements, while attack relations capture the idea that one argument challenges or undermines another. This notion of attack allows for the exploration of conflicts and disagreements among arguments, simulating the process of critical discussion.
One of the key aspects of abstract argumentation involves the concept of the acceptability or justifiability of arguments. In these frameworks, determining whether a particular argument exists in any or all preferred extensions is crucial. Admissible sets represent conflict-free sets of arguments that counterattack all external attackers, while preferred extensions are maximal admissible sets based on set inclusion. Analyzing the acceptability status of arguments aids in identifying the most plausible and robust arguments within a given context.
To address this, two decision problems, Credulous Acceptance (CredA) and Skeptical Acceptance (SkepA), have been introduced. In the problem CredA the objective is to determine whether an argument is credulously accepted in an argumentation framework , that is, whether there exists at least one preferred extension of that contains . Similarly, in the problem SkepA, the objective is to determine whether an argument is skeptically accepted in , that is, whether every preferred extension of contains . Extensive research has been devoted to studying these problems and developing effective algorithms and approaches to address them.11–23 The complexity of these problems is known to be NP-complete for the CredA problem24 and -complete for the SkepA problem.12
However, there are specific classes of argumentation frameworks that allow efficient solving of the problems CredA and SkepA. Notable examples include the class of symmetric argumentation frameworks,25 argumentation frameworks without even length cycles,26 bipartite argumentation frameworks,15 and bounded treewidth argumentation frameworks.15 Recent advancements in this area have further explored tractable fragments and reasoning techniques. For instance, Thimm et al.27 proposed methods for skeptical reasoning with preferred semantics without computing preferred extensions. Additionally, Dvořák et al.28 analyzed the complexity of preferred semantics in argumentation frameworks with bounded cycle length, and Dvořák et al.29 explored tractable abstract argumentation via backdoor-treewidth.
An argumentation framework can be represented by a directed graph, where the arguments are depicted as nodes, and the attacks as arcs. In the context of the complexity of the CredA and SkepA problems, Dunne15 introduces the bounded degree class of abstract argumentation framework. In this class, each argument “” possesses an in-degree (the number of arguments that attack it) denoted by “” and an out-degree (the number of arguments it attacks) denoted by “.” Interestingly, the complexity of the problems CredA and SkepA persists even when considering argumentation frameworks where both the in-degree and out-degree are restricted to (i.e., ), as shown by Dunne.15 Thus, identifying the specific bounded-degree constraints under which this complexity reduces is essential. In addition, highlighting the variation in the complexity of these problems under different bounded-degree constraints is crucial for developing efficient algorithms. This understanding is not only academically interesting but also practically significant, as it can lead to the development of more effective computational tools. By proposing efficient algorithms tailored to specific bounded-degree constraints, we can expand the range of scenarios where these problems can be solved effectively, thus enhancing the practical applicability and performance of argumentation-based systems in real-world applications.
This paper aims to delve deeper into the relationship between degree bounds and the computational complexity of reasoning within abstract argumentation frameworks. A notable result from our own research highlights that when “” or “” is restricted to , the problems CredA and SkepA can be efficiently solved in polynomial time. Building upon this valuable insight, we further explore additional constraints on the argumentation framework. Consider an argumentation framework . We investigate the following quantities: “,” which represents the maximum number of attackers that any argument “” can have in among all those that are not attacked by “” in , while “” indicates the maximum number of arguments that any argument “” attacks in among all those that do not attack “” in . Finally, “” denotes the maximum number of arguments that any argument “” attacks in among those that attack “” in .
Through a comprehensive analysis, we have obtained some surprising results: even when all the quantities “,” “,” and “” are strictly constrained to 1, the computational complexity of CredA continues to endure. To extend our investigation, we also considered the influence of symmetric attacks by fixing “” to zero, while setting “” and “” to 2. Surprisingly, our results indicate that the complexity of CredA remains persistent under this specific variation. Clarifying the difference between symmetric attacks and symmetric argumentation frameworks is crucial. In a symmetric argumentation framework, the attack relation is symmetric, meaning if an argument “” attacks an argument “,” then “” must also attack “.” This property generally simplifies the computational complexity, as discussed in Coste-Marquis et al.25 However, our study’s constraints do not create a symmetric argumentation framework. Specifically, by setting “” to zero, we ensure no bidirectional (symmetric) attack between any pair of arguments.
Our research contributes valuable insights into the computational properties of argumentation frameworks and their implications for developing efficient algorithms and practical applications. The study highlights that regardless of the bounded degree, reasoning within abstract argumentation frameworks remains inherently complex. This understanding can offer potential optimization opportunities for future research and advance our understanding of the complexity of problems in abstract argumentation frameworks.
The remainder of this paper is organized as follows: Section 2 introduces the fundamental concepts necessary for this study. The main results are presented in Section 3. Finally, the conclusion of this paper is provided in Section 4.
Preliminaries
In this paper, all the objects under consideration are finite. Let be a set. We use to represent the powerset of , which is the set of all subsets of . For a subset of , the complement of with respect to is obtained by taking the elements in that are not in , that is, . Consider a set system over , where is a subset of . The complementary set of with respect to is denoted as and is defined as the set system consisting of the complements of all sets in . In other words, .
Abstract argumentation framework
An abstract argumentation framework, proposed by Dung,1 is a pair , where is a finite set of arguments and is a binary attack relation defined on . The attack relation represents conflicts between arguments, with meaning that argument attacks argument . This framework can be visualized as a directed graph, called an attack graph, with arguments as vertices and attacks as edges. For a set , the sub-argumentation framework of induced by is .
Figure 1 describes an argumentation framework , where and .
Attack graph of .
Given a set of arguments , the set represents the arguments attacked by , that is, the arguments for which there exists such that . Similarly, denotes the set of arguments attacking at least one argument in , that is, the arguments for which there exists such that . In case is a singleton , we write as a shortcut for . Finally, the union of and is denoted by .
In the context of the argumentation framework, an argument is acceptable with respect to a set of arguments if for every such that , there exists such that . A set is considered conflict-free if . The set of all conflict-free sets of is denoted by . Naive sets in the framework are the conflict-free subsets of that are maximal with respect to the set inclusion.30 An argument is said to be self-conflicting if , the set of all self-conflicting arguments of is denoted by .
Furthermore, a set is said to be self-defending if . The set of all self-defending sets of is denoted by . Dung1 introduces various extensions based on the concepts of conflict-free sets and acceptability. A conflict-free set is said to be admissible if it is self-defending. The set of all admissible sets of is denoted by . The admissible subsets of that are maximal with respect to the set inclusion are called preferred extensions. The set of all preferred extensions of is denoted by . We refer the reader to Baroni et al.31 and Dunne et al.32 for more discussion on other semantics.
Let be the argumentation framework depicted in Figure 1. The set of all conflict-free sets of is , , , , , . Notably, among these sets, , , and are the naive sets of . Shifting attention to the self-defending sets in , referred to as , this set includes the sets , , , and .
The intersection of self-defending and conflict-free sets of , known as the set of admissible sets (), yields , , , . It is noteworthy that among these sets and are the preferred extensions of .
We conclude this part by introducing some graph concepts. For two arguments and in , is considered a neighbor of in if . A path in is a sequence of edges directed in the same direction which joins a sequence of arguments . When holds, this sequence is referred to as a cycle. For a path in , we denote by the set of arguments contained in it. The length of is defined as the number of edges it has. An argument is considered connected to an argument in if there exists a directed path from to . Conversely, if no such directed path exists from to , then is said to be not connected to .
Closure systems and implicational systems
We use the terminology introduced in Grätzer33 and Wild.34 Consider a set system over . The notation represents the family with an ordering based on set inclusion. The system is a closure system over if belongs to , and the intersection of any two sets and in also belongs to . In other words, if is closed under intersection. The sets within are referred to as closed sets. Importantly, if is a closure system, then forms a lattice, as does .
An implication over is an expression of the form where and . In , is the premise and is the conclusion of the implication. Given an implicational system on a set and a subset , the -closure of , denoted as , represents the smallest set that contains and satisfies the following condition:
Computing -closure of can be achieved in polynomial time.35 The family is a closure system.
When an implicational system has the property that each implication in has a premise size of , that is, , it is referred to as a unit implicational system. In this case, the closure system associated with is closed under both union and intersection, resulting in a distributive lattice .34
Let us conclude this part with a significant result that establishes a connection between the extensions of an argumentation framework and the closed sets of an implicational system. It has been shown in Elaroussi et al.36 that the closed sets of an implicational system coincide with the self-defending sets of an argumentation framework.
Let be an argumentation framework, and let be its associated implicational system. Then .
We give the following example to illustrate the above theorem.
Consider the argumentation framework described by the Figure 1. The implicational system associated to is . For example, the implication is derived from the fact that attacks and . The closure system of is , , , , . Observe that .
We end these preliminaries by gathering some existing results that will be useful throughout the paper.
The unique preferred extension of an argument framework that does not contain any even length cycles, can be constructed in steps.
On the bounded degree of an argumentation framework
In this section, we will delve into an investigation of how the complexity of the CredA and SkepA problems is affected by the bounded degree of an argumentation framework. By analyzing the relationship between the degree of the argumentation framework and the complexity of CredA and SkepA problems, we can gain a deeper understanding of the computational aspects involved in accepting or rejecting arguments in the framework.
Formally, CredA and SkepA problems can be defined as follows.
CredA
Input: An argumentation framework and an argument
Question: Is contained in some ?
SkepA
Input: An argumentation framework and an argument
Question: Is contained in each ?
Since any admissible set is a subset of some preferred extensions, credulous acceptance of an argument is ensured by finding any admissible (not necessarily maximal) set containing .
Let be the argumentation framework described by Figure 1. Within this framework, the argument is skeptically accepted under preferred extensions, implying that it is also credulously accepted under these extensions. In contrast, arguments and are credulously accepted under preferred extensions but are not skeptically accepted under these extensions.
Now, we consider the argumentation frameworks defined by the property as follows.
Let be an argumentation framework. satisfies the property if
Note that and are bounded such that , with is the size of .
To illustrate Definition 1, consider the argumentation frameworks depicted in Figure 2. The left part of the figure (Figure 2(a)) shows an argumentation framework where each argument attacks at most two arguments and is attacked by at most two arguments, satisfying the property . The right part of Figure 2(b) shows an argumentation framework where argument attacks more than two arguments, thus not satisfying the property .
Example of an argumentation framework that satisfies the property and one that does not. (a) Satisfies . (b) Does not satisfy .
Given an argumentation framework that satisfies the property , Dunne15 has shown the following results.
Let be an argumentation framework. If satisfies the property then:
CredA is NP-complete.
SkepA is -complete.
According to Dunne,15 the problems CredA and SkepA are hard to solve even when the values of “” and “” are restricted to , that is, . This raises the question: what is the complexity of these problems when “” or “” is limited to ? In the subsequent analysis, we show that when “” or “” is restricted to , the problems CredA and SkepA become solvable efficiently.
Let us start by restricting to 1, implying that the argumentation framework satisfies the property . The framework depicted in Figure 3 satisfies the property .
Example of an argumentation framework satisfying the property . The associated implication system to this framework is , which is unit. This framework has two preferred extensions, namely and . All arguments are credulously accepted in this framework, but none are skeptically accepted.
In this case, the associated implicational system , to is unit. In Elaroussi et al.,37 particularly in the proof of Theorem 3, the authors propose a polynomial time algorithm to construct an argumentation framework such that . This result leads to the following theorem.
Let be an argumentation framework satisfying the property . Then, there exists a polynomial time algorithm to construct an argumentation framework such that .
From this, we state the following result.
Let be an argumentation framework. If satisfies the property , then:
CredA can be solved in polynomial time.
SkepA can be solved in polynomial time.
Given an argumentation framework that satisfies the property . According to Theorem 6, we can construct in polynomial time an argumentation framework such that . Through the transformation to , it becomes evident that an argument belongs to a preferred extension (credulously accepted) in if and only if it is not self-attacking in . Additionally, belongs to all preferred extensions (skeptically accepted) in if and only if it is not self-attacking in and none of its neighbors is credulously accepted, that is, they are self-attacking. We deduce the proof.
Now, let us restrict “” to , which means that the argumentation framework satisfies the property . The framework depicted in Figure 4 satisfies the property .
Example of an argumentation framework satisfying the property . The associated implication system to this framework is , which is not unit. This framework has a unique preferred extension, namely . Only the arguments , , , and are credulously accepted, and they are also skeptically accepted.
Prior to delving into our results, let us start with the following observation.
Let be an argumentation framework that satisfies the property . If is an isolated cycle of even length, then has exactly two preferred extensions.
Given that forms an even length cycle, we can arrange its arguments sequentially as , where is the size of the set of arguments . In this sequence, each argument attacks the next one, and attacks . Also, due to the fact that satisfies the property , each argument attacks at most one other argument. Consequently, there are no attacks between arguments outside of this sequential order . Now, let us consider two subsets of arguments:
The union of and covers all arguments in .
We will show that and are two preferred extensions of . Since there are no attacks between arguments outside of the sequential order , there are no attacks within or within . Moreover, these sets are maximally conflict-free, as adding any argument from the other set would unavoidably cause conflicts. Furthermore, each argument in and defends the others within its set against external attacks. In , for , each is only attacked by ; however, it is defended by , which attacks . Moreover, is only attacked by ; however, it is defended by . Similarly, in , for , each is only attacked by ; however, it is defended by against . Additionally, is only attacked by ; however, it is defended by . Consequently, both and meet the criteria for preferred extensions.
To show that and are the only preferred extensions, assume there exists another preferred extension such that and . Thus, must contain both an argument and with . Since , then to be self-defending, must be a subset of it. Thus, is not conflict-free, as would contain both and , with is a direct attacker of . This contradicts the assumption that is conflict-free. Therefore, any other subset containing arguments from both and cannot be a preferred extension. Consequently,
Let be an argumentation framework, and let be an argument in . We define as the set of all arguments that are connected to in . Formally, We recall that an argument is said to be connected to in if there exists a path from to . Let be a sub-argumentation framework of induced by the set , where Since , if satisfies the property , then also satisfies the property . We state the following results.
Let be an argumentation framework that satisfies the property , and let . Define and let be the sub-argumentation framework of induced by . Then has at most one cycle. Moreover, if such a cycle exists, then belongs to it.
The proof proceeds in two steps:
First, we show that every argument in belongs to at most one cycle. Let and suppose is a cycle in that contains . In a cycle, every argument attacks at least one other argument within the same cycle. Since satisfies property , then cannot attack another argument outside of . Therefore, each argument in belongs to at most one cycle.
Second, we show that if is a cycle in , then belongs to . Suppose, for contradiction, that does not belong to . By definition, each argument in is connected to in . Consequently, there exists an argument in that attacks an argument outside of , since is not in . This contradicts the fact that satisfies the property , which states that each argument can attack at most one other argument. Therefore, must belong to . We deduce the proof.
Let be an argumentation framework that satisfies the property , and let . Define and let be the sub-argumentation framework of induced by . Then, either or is acyclic.
By the construction of , each argument is connected to . Thus, each argument attacks at least one argument within . Given that satisfies the property , it follows that also satisfies the property . Therefore, no argument in except can attack arguments outside of . Formally, . Now, we show that is acyclic if . According to Lemma 2, can have at most one cycle that includes . Since and satisfies the property , it follows that . As a result, is acyclic. Hence, we have shown that either or is acyclic.
Let be an argumentation framework, and let . Define and let be a sub-argumentation framework of induced by . If is an admissible set of , then is an admissible set of .
Let be an admissible set of . By definition, , thus any attack between arguments of in is in . Hence, is conflict-free in . Moreover, in . By the construction of , no argument in is connected to and all arguments in are connected to . Thus, . Hence, , which means that is self-defending in . As a result, is an admissible set in .
Let be an argumentation framework, and let . Define and let be the sub-argumentation framework of induced by . If is a preferred extension of , then is a preferred extension of .
Let be a preferred extension of . By definition, is conflict-free and self-defending in . This means there are no arguments such that . Since , there can be no arguments such that . Therefore, is conflict-free in . Next, we need to show that is self-defending in . For the sake of contradiction, suppose the contrary. Then, there exists an argument and an argument such that and . Since is self-defending in , there exists such that . Because and attacks , must be connected to , and therefore, . Thus, , contradicting the assumption that . Therefore, is self-defending in . Since is conflict-free and self-defending, it is an admissible set of .
To show that is a preferred extension of , suppose for contradiction that there is a preferred extension in such that . By Lemma 4, is also an admissible set in . Let . We will show that is an admissible set of . First, we show that is self-defending in . Since and is an admissible set in , is self-defending in . Next, we show that is conflict-free in . For the sake of contradiction, suppose the contrary. Since and is conflict-free in , is conflict-free in . We have is conflict-free in . Thus, there exist and such that or . Since and , it follows that . By Lemma 3, and is acyclic. According to Theorem 2, is the only preferred extension of . Since and , cannot be a subset of any admissible set in . We have , which contradicts the fact that is an admissible set in . Hence, is an admissible set in . We have and is an admissible set in . This contradicts the maximality of as a preferred extension of . Therefore, is a preferred extension of .
From the previous lemmas, in the following result, we show that the argument is credulously (respectively, skeptically) accepted in if and only if it is credulously (respectively, skeptically) accepted in .
Let be an argumentation framework, and let . Define and let be the sub-argumentation framework of induced by . Then, is credulously (respectively, skeptically) accepted in if and only if it is credulously (respectively, skeptically) accepted in .
We provide the proof for skeptical acceptance only. For credulous acceptance, the “if” part follows directly from Lemma 5 and the “only if” part follows directly from Lemma 4.
We proceed by contrapositive. Suppose that is not skeptically accepted in . This means there exists a preferred extension in such that . By Lemma 4, is an admissible set in . Therefore, there exists a preferred extension of such that . Let us show that . Suppose, for the sake of contradiction, that . By Lemma 5, is a preferred extension of . Since and , it follows that , which contradicts the fact that is a preferred extension of . Therefore, , which means that is not skeptically accepted in .
We proceed by contradiction. Suppose that is skeptically accepted in but not in . This means there exists a preferred extension in such that . By Lemma 5, is a preferred extension in . Since and , it follows that . This contradicts the assumption that is skeptically accepted in , i.e., should be in every preferred extension of .
Hence, is skeptically accepted in if and only if it is skeptically accepted in .
According to Theorem 8, the argument is credulously (respectively, skeptically) accepted in if and only if it is credulously (respectively, skeptically) accepted in the sub-argumentation framework . In what follows, we will show that if satisfies the property , then checking the skeptical and credulous acceptance of in can be done in polynomial time. To begin, the following lemma shows that has at most two preferred extensions.
Let be an argumentation framework that satisfies the property , and let . Define and let be the sub-argumentation framework of induced by . Then has at most two preferred extensions, which can be computed in polynomial time.
If does not contain an even length cycle, it has a unique preferred extension according to Theorem 3. Now, suppose contains an even length cycle. As shown in Lemma 1, has exactly one cycle, which we denote as . We split into two sub-argumentation frameworks: , containing all arguments except those in , and , containing only the arguments in . As a result, is acyclic and has only one preferred extension according to Theorem 3, which is also a stable extension according to Theorem 2. Let be the unique stable extension of . The framework is an even length cycle and by Lemma 1, has exactly two preferred extensions, denoted and . Since satisfies the property , does not have outgoing attacks, that is, . Next, we distinguish two cases regarding the intersection :
If , then and are conflict-free. Moreover, since is a stable extension, then . As a result, and are the only preferred extensions of .
If , we will show that that has a unique preferred extension. For the sake of contradiction, assume that two preferred extensions of exist: and . Then, there exist two arguments and such that or . Without loss of generality, assume that . Since has only one preferred extension, then and must be in . Let be a shortest path from to . Such a path must exist because we have assumed that . Since , cannot belong to any preferred extensions in . We have is a short path, so and . Then, if is odd-length, cannot belong to any preferred extensions in . If is even length, cannot belong to any preferred extensions in . Thus, either or cannot belong to any preferred extensions in , leading to a contradiction.
Therefore, has at most two preferred extensions.
Finally, let us show that computing the preferred extensions of can be done in polynomial time. For the acyclic sub-argumentation framework , computing its unique preferred extension is feasible in polynomial time (see Theorem 4). Regarding , which comprises arguments uniquely within the even length cycle , Lemma 1 shows that has exactly two preferred extensions. By partitioning into subsets and , covering odd and even positioned arguments, respectively, we obtain the two preferred extensions of . To compute the preferred extensions for , we consider two scenarios. If does not intersect with the arguments in , that is, , then we combine with and to form and , the two unique preferred extensions of . However, if accepts arguments from , indicating , has a unique preferred extension. Nonetheless, computing this extension remains viable in polynomial time. We start with , the unique preferred extension of , then iteratively add arguments from accepted by until saturation. This iterative process ensures efficient computation of the preferred extension of , considering the size of .
Given an argumentation framework that satisfies the property and an argument , we want to check whether is credulously or skeptically accepted in . Let be a sub-argumentation framework of induced by the set (the set of arguments connected to ). The construction of can be done in polynomial time. According to Theorem 8, the argument is credulously (respectively, skeptically) accepted in if and only if it is credulously (respectively, skeptically) accepted in . Moreover, Lemma 6 shows that has at most two preferred extensions, which can be computed in polynomial time. Therefore, we deduce the following result.
Let be an argumentation framework. If satisfies the property , then:
CredA can be solved in polynomial time.
SkepA can be solved in polynomial time.
As a result, we conclude that the computational complexity of both problems CredA and SkepA is influenced by the constraints on in-degree and out-degree. When the argumentation framework satisfies the property , both problems are hard to solve, as shown by Dunne.15 Conversely, when the argumentation framework satisfies the property or , it becomes solvable in polynomial time, as shown in Theorems 7 and 9, respectively. In the following sections, we delve deeper into how the bounded degree of an argumentation framework influences the complexity of the problems CredA and SkepA by considering additional constraints.
Deeper analysis of bounded degree classes of argumentation frameworks with extended parameters
To gain a deeper understanding of how the bounded degree of an argumentation framework affects the complexity of the problems CredA and SkepA, we will further investigate specific quantities in this section. We will focus on exploring the following quantities:
“” represents the maximum number of attackers that any argument can have in among all those that are not attacked by in ;
“” denotes the maximum number of arguments that any argument attacks in among all those that do not attack in ; and
“” indicates the maximum number of arguments that any argument attacks in among those that attack in .
By examining these quantities, we aim to gain insights into their impact on the complexity of the CredA and SkepA problems.
Formally, an argumentation framework is defined by the property as follows.
Let be an argumentation framework. satisfies the property if
Note that , , and are bounded such that , with is the size of .
In order to highlight the differences between the property (Definition 1) and the property (Definition 2), we present Figure 5. All argumentation frameworks depicted in Figure 5 satisfy the property . The property distinguishes between symmetric and non-symmetric attacks, unlike the property . From left to right: the argumentation framework depicted in Figure 5(a) satisfies the property ; the argumentation framework depicted in Figure 5(b) satisfies the property ; the argumentation framework depicted in Figure 5(c) satisfies the property .
Argumentation frameworks highlighting the differences between the property and the property .
Let us start with the existing results in the literature. According to Definition 2, an argumentation framework satisfies the property if and only if it is a symmetric argumentation framework. As shown by Coste-Marquis et al.,25 for a symmetric argumentation framework, both the CredA and SkepA problems can be solved in polynomial time. We have the following result.
Let be an argumentation framework. If satisfies the property , then:
CredA can be solved in polynomial time.
SkepA can be solved in polynomial time.
In what follows, we analyze the implications of restricting , , and to . Surprisingly, we find that, contrary to expectations, the computational complexity of CredA persists even under these restrictions.
Let us start with the following result.
Let be an argumentation framework. If satisfies the property then CredA is an NP-complete problem.
The proof is a reduction from 3-SAT. In 3-SAT, we are given a Boolean expression in conjunctive normal form.
Note that is the conjunction of clauses, where each clause is the disjunction of literals. This particular structure is known as 3-CNF in the literature. A literal represents either a Boolean variable or its negation . is satisfiable if the ’s can be assigned Boolean values so that is true. The 3-SAT problem is to determine whether is satisfiable. The complexity of a 3-SAT problem is known to be NP-complete.38 From a given Boolean expression , we construct an argumentation framework . The set of arguments consists of three source arguments , , and , a sink argument , an argument , and two arguments and for each literal in . Note that is considered as the first clause of , and as the last clause of . Formally, defined as follows:
An illustration of this construction is given in Figure 6.
Argumentation framework constructed from the Boolean expression in conjunctive normal form with .
The construction of is done in polynomial time in the size of . Moreover, each argument in this framework possesses, at most, one argument that attacks “” without being countered by “,” as well as at most one argument attacked by “” that does not attack “.” Consequently, the framework satisfies the property . We will now show that this statement: there exists an admissible set in includes the sink argument if and only if is satisfiable.
Let us first show the “if” part of the statement. Suppose that there exists an admissible set in such that . By the construction of , we have , and . Since is in and is a self-defending set, then it holds that . As a result, at least one argument among those corresponding to the literals in the last clause of is in . Furthermore, for each argument , there exists an argument such that and . Therefore, as is self-defending then for all . This ensures that for each clause of , there exists in an argument among those corresponding to the literals of this clause. As is conflict-free by definition, then the arguments corresponding to a variable and its negation cannot both belong to . Therefore, by selecting all literals for which there exists a to be true, the entire expression is evaluated as true.
Now, let us show the “only if” part of the statement. Suppose that the Boolean expression is satisfiable, meaning that there exists an assignment of Boolean values to the variables such that is true. Based on this assignment, we can select the corresponding arguments in for the literals that are true and add the sink argument and at least one of the source arguments , , or to construct a subset of denoted as . Since is satisfiable, then at least one literal in each clause is true. Therefore, for all it holds that , implying that and for all and . Furthermore, the assignment ensures that only one of a variable and its negation is true. Thus, does not contain both a variable and its negation for any clause, making it conflict-free. Therefore, satisfies the properties required for an admissible set in , and since is in , the existence of an admissible set including in is proved. This concludes the proof.
The idea of the proof of Theorem 11 comes from the proof of Lemma 2 in Gabow et al.39
Throughout the rest of this section, we will work with the argumentation framework obtained from -CNF through the procedure mentioned previously in the proof of Theorem 11. For the sake of brevity and clarity, we refer to this framework as .
We aim to transform the argumentation framework into a new framework that satisfies the property. This transformation involves reducing the number of symmetric attacks to at most one per argument. Additionally, we want to ensure that the existence of an admissible set containing the argument “” in is equivalent to the existence of an admissible set in , which also contains the argument “.”
To achieve this goal, we start by minimizing symmetric attacks between the arguments and for and , ensuring each has at most one symmetric attack with an argument from the set . In , for all and , we have and . Thus, for each self-defending set in , if , then (referred to as Condition A). To preserve the existence of an admissible set containing “” in the framework after the transformation, if and only if an admissible set that includes “” exists in , it is essential to maintain Condition A.
To preserve Condition A in the transformation, for each , we introduce new arguments , , , and . We replace the existing attacks between and with the following attacks: , , , , , , , , and . This transformation is illustrated in Figure 7, where the left side shows the attacks before the transformation and the right side shows the attacks after the transformation.
Transformation of attacks between arguments in . (a) Before transformation. (b) After transformation.
Consider a self-defending set in the framework constructed from using this transformation. After this transformation, for , we have and . Additionally, and . Therefore, if , then . Similarly, for , we have and , with , , and . So, if , then . For , we have and , with and . Thus, if , then . We deduce that if for . Thus, Condition A is preserved after the transformation.
Using this transformation, we construct a new argumentation framework from , where the number of symmetric attacks is reduced compared to . Formally, is defined as follows.
An illustration of this construction is given in Figure 8.
Argumentation framework constructed from the argumentation framework depicted in Figure 6 using formula (1).
The following theorem states that there exists an admissible set in contains “s” if and only if there exists one in contains “s.”
Consider be the argumentation framework constructed from the framework using formula (1). Then there exists an admissible set such that if and only if there exists an admissible set such that .
We show the forward implication. Let be an admissible set of and suppose that . Then for all it holds that . Consequently, this implies that in , we have and for all . Therefore, in the framework , the set is conflict-free. Let be a subset of constructed as follows:
We aim to show that is an admissible set in . We have then it follows that . We deduce that implies that is a conflict-free set in . Now, it remains to show that is self-defending in . To reach a contradiction, suppose that is not self-defending in . By the construction of , it holds that if and if for all . Since in , for all and , it follows that . Furthermore, by the construction of , if and since in , , it follows that when . Therefore, there must exist an such that with and , or . First, suppose that . Since in , and , it follows that . As , we can infer from the construction of that . As in , , which implies that . This contradicts the fact that is an admissible set containing in . Now, suppose that there exists an such that with and . In , we have . If , then . Thus, if , it follows that . In , and , so . This contradicts the fact that is an admissible set in . Now, suppose . In this case we have: ; ; and . Hence, . By the construction of , we have if and if . It follows that . As in , then . This contradicts the fact that is an admissible set containing in . Thus, in both cases, we arrive at a contradiction; we can conclude that must be self-defending in . Therefore, is an admissible set in containing .
Now, we show the reverse implication. Let be an admissible set of such that . Since , and , then . If , then as and , it follows that . Hence, . Additionally, in , for all and , we have and , , and . Thus, for all , . Similarly, for all and in , we have , , and . Therefore, we deduce that for all , . Furthermore, for all , so . As a result, the set
is self-defending in . Thus, is an admissible set in if it is conflict-free in . By the construction of , if and only if with and . Hence, is conflict-free in . We deduce that is an admissible set in that contains . The proof follows.
Consider , the argumentation framework constructed from using formula (1). This framework satisfies the property . Furthermore, all arguments in , except those in the set , have at most one symmetric attack.
In order to obtain an argumentation framework that satisfies the property , in the following step, we will remove all symmetric attacks between the arguments of the set . Let , with and , be an argument of . Suppose that the arguments with which has symmetric attacks, except those from the set , are given in the order: .
To maintain the existence of an admissible set that includes “” in if and only if there exists an admissible set that includes “” in the argumentation framework we wish to construct, it is essential to ensure that if , then . The idea here involves adding new arguments and replacing the attacks and with the attacks and for all . Additionally, we add the attacks and for all , for all , and . This transformation is illustrated in Figure 9, where Figure 9(a) shows the attacks before the transformation, and Figure 9(b) shows the attacks after the transformation.
Transformation to reduce symmetric attacks. (a) Before transformation. (b) After transformation.
Observe that in the constructed framework using this transformation, we have and for all . Consider an admissible set in the framework constructed from using this transformation. If belongs to , then . Since , then .
Using this transformation on , we are now ready to present our fundamental result, indicating that the computational complexity of the problem CredA persists within argumentation frameworks that satisfy the property .
Let be an argumentation framework. If satisfies the property then CredA is -complete.
Let be an argumentation framework constructed from the argumentation framework using formula (1). Define as an argumentation framework constructed constructed from with as follows.
First, we define the set as the set of arguments that both attack and are attacked by in , which we aim to remove their symmetric attacks with . Let with and be the first argument in for which is not empty. In other words, if there exists another argument with and for which is not empty, then and when .
Suppose that the elements of are ordered as follows: with is the size of . Consider the framework constructed from by introducing new arguments and . Formally is defined as follows:
An illustration of this construction is given in Figure 10. Let us define as the last argumentation framework that can be constructed using the above procedure. Specifically, is the framework where no with and has . An illustrative example of this case is provided in Figure 11. The construction of can be done in a polynomial time in the size of . Moreover, satisfies the property . Now, we aim to show this statement: There exists an admissible set that includes “” in if and only if there exists an admissible set in that includes “.”
Argumentation framework constructed from the argumentation framework depicted in Figure 8.
Transforming the argumentation presented in Figure 8 to satisfy the property by successfully applying the procedure described in the proof of Theorem 13.
First, we show the forward implication of the statement. We proceed by induction. Suppose that is an admissible set of , where . Let be the first argument in for which is not empty. Given that the construction of does not modify the attackers of arguments other than , it follows that remains an admissible set in if . Now, suppose that , and let be a subset of . We will show that is an admissible set of . By supposition is conflict-free in and , as , it holds that . Furthermore, following the construction of , we observe that , confirming that is conflict-free in . Now, it suffices to show that is a self-defending set of . By the construction of , we have . In , we have , and based on our supposition that is self-defending in with , it implies that , hence . Furthermore, in , we have , , and , leading to . As , we can deduce that is an admissible set in . Consequently, there exists an admissible set in such that if is an admissible set in .
Next, we show the reverse implication of the statement. We proceed by induction. Suppose that is an admissible set in , where . Let be the first argument in for which is not empty. As the construction of does not modify the attackers of arguments other than then it follows that is an admissible set of if . Suppose now that and let be a subset of . Let us now show that is an admissible set of . We analyze the specific construction of to deduce properties of . First, we notice that and . From this, we can conclude that . Furthermore, in , we have for every and for every . Consequently, we can deduce that . By supposition is conflict-free in and given that in , , we can deduce that . For the suck of simplicity, we define . By the construction of , we have , so we can deduce that is conflict-free in . It remains to show that is self-defending in . As the construction of does not modify the attackers of arguments other than and by supposition is self-defending in , then . Thus, is self-defending in if . We have , and . As, is self-defending in and then we can deduce that conforming that is an admissible set in . This concludes the proof.
To further understand the relationship between the computational complexity of the problem CredA and symmetric attacks, we set “” to zero and “” and “” to . Surprisingly, our results show that the complexity of CredA persists under this variation as well.
Consider , the framework constructed in the proof of Theorem 13. We aim to construct an argumentation framework from that satisfies the property while preserving the existence of an admissible set in such that if and only if there exists an admissible set that includes in the constructed framework.
Consider two arguments and , with and in . Suppose that there is a symmetric attack between them, that is, and . Therefore, if is an admissible set in such that , then . We want to remove the symmetric attack between any pair of arguments and while preserving the property that if one argument belongs to an admissible set, the other cannot. The basic idea is transforming the symmetric attack between any pair of arguments into a cycle of length six. To achieve this transformation, we add new arguments , , , and . We replace the attacks and with the attacks , , , , , and .
An illustration of this transformation is given in Figure 12. In Figure 12(a), we see a pair of arguments with a symmetric attack. Figure 12(b) shows the transformation of the symmetric attack into a cycle of length six.
Transformation of symmetric attacks into a cycle of length six. (a) Before transformation. (b) After transformation.
In the transformed framework depicted in Figure 12(b), , and . Thus, if is an admissible set in the framework constructed using this transformation and , then . Since attacks , it follows that . Moreover, , so . Given that is a subset of , it follows that is a subset of . Thus, belongs to an admissible set in the constructed framework using this transformation if it belongs to an admissible set in .
By applying this transformation to , we show in the following theorem that the computational complexity of the problem CredA persists even within argumentation frameworks that satisfy the property .
Let be an argumentation framework. If satisfies the property then CredA is NP-complete.
Consider be the framework constructed in the proof of Theorem 13. Let be an argumentation framework constructed from using the following formula:
Figure 13 provides an illustration of this construction.
Transforming the argumentation presented in Figure 11 to satisfy the property by applying formula (2).
We show this statement: there exists an admissible set such that if and only if there exists an admissible set such that .
First, we show the “if” part of the statement. Let be an admissible set of with . We define the set . Considering is an element of , it is apparent that is also an element of . Now, we aim to show that is admissible of . Let with and . In , there exists a unique argument with and such that . Since is conflict-free in , then . It follows that . Since in , and given that is conflict-free in , we deduce that is conflict-free in . Now, it remains to show that is self-defending in . For the suck of simplicity, we define . By the construction of , we have . Thus, is self-defending in if for all the following condition holds:
Let such that and suppose that . By the construction of , we have . Thus, if . In , we have and , then . As a result, is self-defending in implying that is admissible set in .
Now, we proceed to show the “only if” part of the statement. Let be an admissible set of . We define , given that is an element of , it is apparent that is also an element of . We will show that is an admissible set of . For the sake of contradiction, suppose the contrary, that is, is not admissible in . It follows by definition that is not self-defending or not conflict-free in . First, suppose that is not self-defending. Since and . We deduce that there exists with and such that . Let with and such that . Not that exists and unique in . Since it follows that or equivalently . Given that is self-defending in by assumption, and in , , we conclude that . In , we have , and as, then we obtain a contradiction with the fact that is a self-defending set in . We deduce that is a self-defending set in . Therefore, is not conflict-free in . We have . By supposition, is conflict-free in , then there exists such that . By the construction of , there exists such that . Moreover, . Since is self-defending in and then . Thus and as then we obtain a contradiction with the fact that is conflict-free in . In both cases, we obtain a contradiction. Therefore, is an admissible set of . This concludes the proof.
Note that the argumentation frameworks satisfying the property and are a subclass of the argumentation frameworks satisfying the property and , respectively. Therefore, both CredA and SkepA problems can be solved in polynomial time for this class of argumentation frameworks (Table 1).
Complexity results for problems CredA and SkepA under various bounded-degree constraints.
We conclude this section by providing the following table that summarizes key studies, highlighting the relationship between specific bounded-degree constraints satisfied by an argumentation framework and the corresponding complexity of CredA and SkepA.
Conclusion
This paper has presented a comprehensive exploration of the relationship between bounded in-degree and out-degree in abstract argumentation frameworks and the computational complexity of the CredA and SkepA decision problems under preferred extensions. Our research builds upon the existing literature, showing that even when in-degree and out-degree are strictly limited to , the computational complexities of CredA and SkepA persist.
Building upon these established results, we have unveiled new insights into the impact of additional constraints on the argumentation framework. Notably, we have shown when either “” or “” is restricted to , the problems CredA and SkepA can be efficiently solved in polynomial time. Furthermore, a comprehensive analysis of additional constraints explored the quantities “,” “,” and “,” representing distinct attack relationships between arguments. Surprisingly, even when all these quantities are strictly limited to , the computational complexity of CredA still persists. Additionally, we investigated the influence of symmetric attacks by fixing “c” to zero and setting “” and “” to , yet the complexity of CredA endured under this variation as well.
Overall, the results suggest that, within the context of CredA and SkepA problems, the structural constraints imposed by the bounded degrees do not significantly affect the computational requirements. This means the importance of further exploring other aspects of argumentation frameworks to uncover additional facets of their computational characteristics.
Footnotes
ORCID iD
Mohammed Elaroussi
Funding
The authors received no financial support for the research, authorship, and/or publication of this article.
Declaration of conflicting interests
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
References
1.
DungPM. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif Intell1995; 77: 321–357.
2.
Bench-CaponTPrakkenHSartorG. Argumentation in legal reasoning. In: Simari G and Rahwan I (eds) Argumentation in artificial intelligence. Boston, MA: Springer, 2009, pp.363–382.
3.
RahwanISimariGR. Argumentation in artificial intelligence, vol. 47, Heidelberg: Springer, 2009.
4.
BlackEHunterA. An inquiry dialogue system. Auton Agent Multi Agent Syst2009; 19: 173–209.
5.
FerrettiETamargoLHGarcíaAJ, et al. An approach to decision making based on dynamic argumentation systems. Artif Intell2017; 242: 107–131.
6.
AtkinsonKCeruttiFMcBurneyP, et al. Special issue on argumentation in multi-agent systems. Argum Comput2016; 7: 109–112.
7.
ThimmM. Strategic argumentation in multi-agent systems. KI-Künstl Intell2014; 28: 159–168.
8.
BriguezCEBudanMCDeagustiniCA, et al. Argument-based mixed recommenders and their application to movie suggestion. Expert Syst Appl2014; 41: 6467–6482.
9.
GómezSAGoronAGrozaA, et al. Assuring safety in air traffic control systems with argumentation and model checking. Expert Syst Appl2016; 44: 367–385.
10.
ChesñevarCMaguitmanAGGonzálezMP. Empowering recommendation technologies through argumentation. Argum Artif Intell2009; 403–422.
11.
DoutreSMenginJ. Preferred extensions of argumentation frameworks: query, answering, and computation. In: Goré R, Leitsch A and Nipkow T (eds) Automated reasoning. IJCAR 2001, Lecture notes in computer science, vol. 2083. Berlin: Springer, 2001, pp.272–288.
12.
DunnePEBench-CaponTJ. Coherence in finite argument systems. Artif Intell2002; 141: 187–203.
13.
CayrolCDoutreSMenginJ. On decision problems related to the preferred semantics for argumentation frameworks. J Log Comput2003; 13: 377–403.
14.
DoutreSMenginJ. On sceptical versus credulous acceptance for abstract argument systems. In: 9th European conference on logics in artificial intelligence, JELIA 2004. Berlin: Springer, 2004, pp.462–473.
15.
DunnePE. Computational properties of argument systems satisfying graph-theoretic constraints. Artif Intell2007; 171: 701–729.
DvořákWJärvisaloMWallnerJP, et al. Complexity-sensitive decision procedures for abstract argumentation. Artif Intell2014; 206: 53–78.
18.
NofalSAtkinsonKDunnePE. Algorithms for decision problems in argument systems under preferred semantics. Artif Intell2014; 207: 23–51.
19.
DvorákWDunnePE. Computational problems in formal argumentation and their complexity. J Appl Logics-Ifcolog J Logics Appl2017; 4: 2557–2622.
20.
BaumeisterDNeugebauerDRotheJ. Credulous and skeptical acceptance in incomplete argumentation frameworks. In: 9th international conference on computational models of arguments. Frontiers in Artificial Intelligence and Applications, IOS Press, 2018, pp.181–192.
21.
FazzingaBFlescaSFurfaroF. Credulous and skeptical acceptability in probabilistic abstract argumentation: Complexity results. Intell Artif2018; 12: 181–191.
22.
CeruttiFThimmMVallatiM. An experimental analysis on the similarity of argumentation semantics. Argum Comput2020; 11: 269–304.
23.
BesnardPDoutreSDuchatelleT, et al. Explaining semantics and extension membership in abstract argumentation. Intell Syst Appl2022; 16: 200118.
24.
DimopoulosYTorresA. Graph theoretical structures in logic programs and default theories. Theor Comput Sci1996; 170: 209–244.
25.
Coste-MarquisSDevredCMarquisP. Symmetric argumentation frameworks. In: Godo L (ed.), Proceedings of the 8th European conference on symbolic and quantitative approaches to reasoning with uncertainty, ECSQARU 2005, in Lecture Notes in Computer Science, vol. 3571. Springer, 2005, pp.317–328.
26.
DunnePEBench-CaponTJ. Complexity and combinatorial properties of argument systems. University of Liverpool, Department of Computer Science (ULCS), Technical report, 2001.
27.
ThimmMCeruttiFVallatiM, et al. Skeptical reasoning with preferred semantics in abstract argumentation without computing preferred extensions. In: Proceedings of the thirtieth international joint conference on artificial intelligence, IJCAI 2021. ijcai.org, 2021, pp.2069–2075.
28.
DvořákWKönigMWoltranS. On the complexity of preferred semantics in argumentation frameworks with bounded cycle length. In: Proceedings of the seventeenth international conference on principles of knowledge representation and reasoning, KR 2021, 2021, pp.671–675.
29.
DvořákWHecherMKönigM, et al. Tractable abstract argumentation via backdoor-treewidth. In: Proceedings of the AAAI conference on artificial intelligence. AAAI Press, 2022, pp.5608–5615.
30.
BondarenkoADungPMKowalskiRA, et al. An abstract, argumentation-theoretic approach to default reasoning. Artif Intell1997; 93: 63–101.
31.
BaroniPCaminadaMGiacominM. An introduction to argumentation semantics. Knowl Eng Rev2011; 26: 365–410.
32.
DunnePEDvořákWLinsbichlerT, et al. Characteristics of multiple viewpoints in abstract argumentation. Artif Intell2015; 228: 153–178.
WildM. The joy of implications, aka pure Horn formulas: mainly a survey. Theor Comput Sci2017; 658: 264–292.
35.
WildM. Computations with finite closure systems and implications. In: Proceedings of the first annual international conference on computing and combinatorics, LNCS, vol. 959. Springer, 1995, pp.111–120.
36.
ElaroussiMNourineLRadjefMS. Lattice point of view for argumentation framework. Ann Math Artif Intell2023; 91: 691–711.
37.
ElaroussiMNourineLRadjefMS, et al. On the preferred extensions of argumentation frameworks: Bijections with naive sets. Inf Process Lett2023; 181: 106354.
38.
CookSA. The complexity of theorem-proving procedures. In: Proceedings of the third annual ACM symposium on theory of computing. New York: ACM Press, 1971, pp.151–158.
39.
GabowHNMaheshwariSNOsterweilLJ. On two problems in the generation of program test paths. IEEE Trans Softw Eng1976: 227–231.