We explore the computational complexity of justification, stability and relevance in incomplete argumentation frameworks (IAFs). IAFs are abstract argumentation frameworks that encode qualitative uncertainty by distinguishing between certain and uncertain arguments and attacks. These IAFs can be completed by deciding for each uncertain argument or attack whether it is present or absent. Such a completion is an abstract argumentation framework, for which it can be decided which arguments are acceptable under a given semantics. The justification status of an argument in a completion then expresses whether the argument is accepted (in), not accepted because it is attacked by an accepted argument (out) or neither (undec). For a given IAF and certain argument, the justification status of that argument need not be the same in all completions. This is the issue of stability, where an argument is stable if its justification status is the same in all completions. For arguments that are not stable in an IAF, the relevance problem is of interest: which uncertain arguments or attacks should be investigated for the argument to become stable? In this paper, we define justification, stability and relevance for IAFs and provide a complexity analysis for these problems under grounded, complete, preferred and stable semantics.
A central concept in computational argumentation is that of argumentation frameworks (AFs), in which arguments and the attack relation between them are represented as a directed graph where nodes correspond to arguments and edges display the attack relation [10]. One of the assumptions in such Dung-style argumentation frameworks is that all arguments and attacks are known. However, in practice, argumentation is a dynamic process in which not all arguments and attacks may be known in advance. For example, not all the evidence on which arguments are based might already have been observed, making the presence of a specific argument uncertain [16]. AFs are not able to represent qualitative uncertainty on the existence of specific arguments and attacks. For this reason, incomplete argumentation frameworks (IAFs) have been designed [3,4,7,15]. IAFs are an extension to AFs in which not only certain arguments are specified, but also arguments and attacks for which it is uncertain whether they are present. By deciding for every uncertain argument and attack whether it is present or absent, it is possible to “complete” an IAF, turning it into an AF. Thus, an IAF represents a set of possible AFs, its completions.
Since every completion of an IAF is an AF, standard Dung semantics can be applied to determine the extensions of any completion [10]. Based on these extensions, one can determine the justification status of every argument in every completion of the IAF. The justification status is defined in terms of labels like in (expressing that the argument is in some, or all, extensions and therefore should be accepted), out (expressing that the argument is attacked by an in argument and therefore should be rejected) and undec (for all other arguments, which are undecided) [6]. Note that the notion of justification status is only defined on the AFs that make up the completions of an IAF, but not on the IAF itself.
Now suppose that we are interested in the justification status of a particular argument, but are faced with an IAF containing uncertainties concerning the presence of (other) arguments and attacks. Then it would be interesting to know whether it is required to resolve these uncertainties. In a situation where the argument we are interested in has the same justification status in each completion of the IAF, there is no need for further investigation into the uncertain arguments and attacks. Then we say that the argument is stable with respect to the IAF and justification status. The detection of such stability has practical applications, for instance as a termination criterion for argumentative dialogue agents: in the agent architecture for inquiry proposed in [16,17], stability detection prevents the agent from asking unnecessary questions. In addition, [15] proposes an application of stability detection in negotiating agents, to recognise situations in which an agent should stop negotiating and accept its opponent’s offer.
In the case that the argument of interest is not stable in the given IAF, we know that the agent should collect more information. However, not all information that is currently unknown can influence the justification status of the argument of interest. A natural question would therefore be: which uncertainties should we resolve in order to reach a point where the argument is stable? In other words: which uncertain arguments or attacks are still relevant for the justification status? Adding relevance to an inquiry or negotiation process ensures that the questions that are asked contribute to reaching stability.
The problem of detecting stability has been studied for structured (ASPIC+) approaches to argumentation in [16,17,23]. The algorithms proposed in this line of research have been implemented in an inquiry system for the intake of online trade fraud that has been used by hundreds of users every day since its launch in September 2019 [16]. For abstract approaches to argumentation, the problem of detecting stability was introduced in [15] and the subsequent problem of detecting relevance in incomplete (abstract) argumentation frameworks was introduced in our earlier work in [18]. Given the high potential for applications of stability and relevance in inquiry and negotiation, it would be useful to have efficient algorithms for solving these problems in abstract approaches to argumentation as well. In this paper we take a first step in the development of such algorithms, by investigating in which complexity class the problems of detecting stability and relevance are situated: insights in the complexity of the problems establish the possible efficiency of any algorithm to solve them.
The contribution of this paper, which expands on [18], is the extensive study of the complexity of justification, stability and relevance in the context of IAFs. Specifically, we present precise complexity results for each of these three problems under grounded, complete, stable and preferred semantics.1
In [18] we only discussed the complexity of relevance for in/out justification statuses under grounded semantics, whereas this paper is the first to also give complexity results for relevance for all justification statuses under all semantics (stable, complete, grounded, preferred).
Table 1 provides an overview of all these results. We further provide full proofs and illustrative examples for all the complexity results of justification, stability and relevance.
The paper is structured as follows. In Section 2, we provide the necessary preliminaries. In Section 3, we study the complexity of identifying the justification status of an argument. These results are used in Section 4 in our complexity analysis of the stability problem. We then introduce the relevance problem for IAFs in Section 5 and provide complexity results. Related work is discussed in Section 6; we conclude in Section 7.
Overview of all complexity results related to this paper. We considered four different semantics: stable (st), complete (cp), grounded (gr) or preferred (pr). The semantics and acceptance strategies are defined formally in Section 2.1. If a reference is specified, this complexity result is trivial from an earlier result in the literature. New results are printed bold; we refer to the corresponding proposition by “P” and the proposition number
In this section, we recall the most important notions from abstract argumentation and the associated semantics [10], as well as incomplete argumentation frameworks and their completions [3,4,7,15]. We also provide a brief introduction to the polynomial hierarchy, which is required for our complexity study.
Argumentation frameworks and semantics
An argumentation framework (AF) , as introduced in [10], consists of a finite set of arguments and a binary attack relation on them, where indicates that argument A attacks argument B. In this paper, we evaluate arguments using the semantics of [10].
(Extension-based semantics).
Let be an AF and . Then:
S is conflict-free iff for each ;
is acceptable with respect to S iff for each such that , there is a such that ;
S is an admissible set iff S is conflict free and implies that X is acceptable with respect to S;
S is a complete extension (cp) iff S is admissible and for each X: if is acceptable with respect to S then ;
S is a preferred extension (pr) iff it is a set inclusion maximal admissible set;
S is the grounded extension (gr) iff it is the set inclusion minimal complete extension; and
S is a stable extension (st) iff it is complete and attacks all the arguments in .
Fig. 1 shows an example of an argumentation framework where and . The grounded extension of AF is . This is also a complete extension. Additionally, there are two complete extensions that are also preferred and stable: and .
In order to decide if an argument should be accepted w.r.t. a given AF and semantics, one can choose between different strategies. We will refer to these as acceptability strategies, following [5, Definition 1]. Dependent on the strategy, the argument is accepted iff it occurs in one and/or all extensions.
(Acceptability strategies).
Let be an argumentation framework and σ some semantics in and let A be some argument in .
A is sceptically accepted w.r.t. σ semantics iff A belongs to each σ-extension of ;
A is credulously accepted w.r.t. σ semantics iff A belongs to some σ-extension of ; and
A is sceptically-existent accepted w.r.t. σ semantics iff has at least one σ-extension and A belongs to each σ-extension of .
We refer to sceptical, credulous and sceptical-existent as acceptability strategies.
Note that the sceptical-existent acceptability strategy only differs from the sceptical strategy for st semantics: for gr, cp and pr semantics, each AF has at least one extension, while it is possible for an AF to have no st extension.
In the AF illustrated in Fig. 1, only the argument A is sceptically accepted w.r.t. cp semantics. The arguments C, D and E are all credulously accepted. Argument B is not accepted for any acceptability strategy.
An example of an argumentation framework. Arguments are depicted as circles, whereas attacks are depicted as arrows.
Incomplete argumentation frameworks
Incomplete argumentation frameworks (IAFs) [3,4,15] are an extension to AFs, initially proposed as partial AFs in [7]. In an IAF, the set of arguments and attacks is split into two disjoint parts: a certain part ( and ) and an uncertain part ( and ). For the uncertain elements, it is not known whether they are part of the argumentation framework or not. They may be added in the future, for example because more information is acquired in an inquiry dialogue, or removed, for example because after investigation, this element turned out not to be present in the given setting.
(Incomplete argumentation framework).
An incomplete argumentation framework is a tuple , where , and:
is the set of certain arguments;
is the set of uncertain arguments;
is the certain attack relation; and
is the uncertain attack relation.
(IAF).
Fig. 2 shows an example of an incomplete argumentation framework where , , and . Arguments A and D are currently absent but may be added in the future. The attack from A to B is certainly present if A is present. Similarly, the attacks , and are certainly present if D is present. The attack from C to B, on the other hand, is uncertain: although the arguments B and C are certainly present, the attack itself is currently absent but may still be added.
An example of an incomplete argumentation framework. Certain arguments are depicted as circles with solid borders, whereas uncertain arguments are circles with dashed borders. Attacks are depicted as arrows, which have a solid line if they represent certain attacks and a dashed line if they represent uncertain attacks.
An incomplete argumentation framework can be completed by deciding for all uncertain arguments and attacks whether or not they are present, as defined below.
(Completions).
Given an IAF , a completion is any AF that satisfies and where the restriction of an attack to a set of arguments is defined as .
(Completions).
The incomplete argumentation framework from our previous example has eight completions. These are illustrated in Fig. 3.
The eight completions of our incomplete argumentation framework.
Since completions are abstract argumentation frameworks, we can use the semantics from Section 2.1 to evaluate arguments in the completions of an incomplete argumentation framework. This leads to two ways of defining acceptance for incomplete argumentation frameworks, proposed in [3, pages 6-7]: necessary and possible acceptance. Informally, some argument is necessarily accepted if it is accepted in each completion, whereas the argument is possibly accepted if this holds for some completion. The definitions below make a distinction between the different acceptability strategies.
Visualisation of the cp extensions of each of the eight completions of from Example 3, where the completion is repeated for each cp extension and argument that are present in that extension are coloured green.
(Necessary acceptance).
Given an incomplete argumentation framework , a certain argument , some semantics σ in and some acceptability strategy , A is necessarily α-σ accepted w.r.t. iff A is α-σ accepted in each completion of .
(Possible acceptance).
Given an incomplete argumentation framework , a certain argument , some semantics σ in and an acceptability strategy , A is possibly α-σ accepted w.r.t. iff A is α-σ accepted in some completion of .
(Necessary and possible acceptance).
Fig. 4 displays the cp extensions of each of the eight completions of from Example 4, where the completion is repeated for each cp extension. None of the certain arguments in is necessarily sceptically accepted w.r.t. cp semantics, because no argument is in all extensions of all completions. Note that A, although it is present in all extensions of all completions of in which it occurs, is not necessarily sceptically accepted w.r.t. cp semantics: A is not a certain argument in . The only argument that is necessarily credulously accepted w.r.t. cp semantics is E. B is possibly sceptically accepted w.r.t. cp semantics, because the argument is in each extension of the completion (as well as ). C and E are possibly sceptically accepted w.r.t. cp semantics as well, thanks to their presence in the only extension of . Finally, all certain arguments of (B, C and E) are possibly credulously accepted w.r.t. cp semantics.
The definitions of necessary and possible acceptance are particularly interesting for our work, as they are strongly related to the notion of stability, to be defined formally in Section 4. Before we do so, we first explain the polynomial hierarchy in the next section.
The polynomial hierarchy
In this section, we give a brief introduction to the polynomial hierarchy – for a more detailed explanation, we refer to [14]. This is required for the complexity study presented in this paper as the problems we study are situated on various levels in the polynomial hierarchy.
The polynomial hierarchy [19] is a hierarchy of complexity classes defined using oracle machines, i.e., Turing machines that are allowed to call a subroutine (oracle), deciding some fixed problem in constant time. For a class of decision problems and a class defined by resource bounds, denotes the class of problems decidable on a Turing machine with a resource bound given by and an oracle for a problem in . For example, problems in NP are decidable with a resource bound given by NP and an oracle for a problem in P, therefore .
Based on these notions, the sets and are defined as follows: , and . So problems in are decidable with a resource bound given NP and an oracle for a problem in . The polynomial hierarchy (PH) is then defined as the union of these complexity classes: . Finally, note that the definition over classes in the polynomial hierarchy imply a subset relation, illustrated in Fig. 5. By this relation, for each , each problem in is also in , as well as in .
A problem that is -complete is -SAT [22]; in this paper we will use the CNF formulation that is also used in, e.g. [3,4]. An instance of -SAT would be , where Φ is an input formula in CNF over the pairwise disjoint sets of propositional variables X and Y. Then the -SAT problem is to decide if there exists a truth value assignment to variables of X such that for each truth value assignment : , where is the truth value that Φ evaluates to when applying the assignment to X and to Y.
The relation between complexity classes in the polynomial hierarchy. The lines between classes denote a subset relationship: all problems in the class of the left side are also contained in the class on the right side.
Justification status
In this section, we define the notion of justification status and study the complexity of determining this status for a given argument. The justification status [6] is a notion of acceptance for arguments in abstract argumentation frameworks that is more fine-grained than only considering the presence or absence in extensions. Given an AF , an argument A and a semantics σ, A’s justification status can be determined by either considering all σ-extensions (sceptical and sceptical-existent) or at least one σ-extension of the AF (credulous). In this context, an argument can be in (part of all/some σ-extensions); out (attacked by all/some σ-extensions), or undec (otherwise).
(Argument justification status).
Let be an argumentation framework and σ some semantics in . Let A be some argument in .
The justification statuses for the in label are:
A is σ-sceptical-in iff A belongs to each σ-extension of ;
A is σ-credulous-in iff A belongs to some σ-extension of ; and
A is σ-sceptical-existent-in iff has a σ-extension and A belongs to each σ-extension of .
The justification statuses for the out label are:
A is σ-sceptical-out iff for each σ-extension S of , A is attacked by some argument in S;
A is σ-credulous-out iff for some σ-extension S of , A is attacked by some argument in S; and
A is σ-sceptical-existent-out iff has a σ-extension and for each σ-extension S of , A is attacked by some argument in S.
The justification statuses for the undec label are:
A is σ-sceptical-undec iff for each σ-extension S of , A is not in S and not attacked by any argument in S;
A is σ-credulous-undec iff for some σ-extension S of , A is not in S and not attacked by any argument in S; and
A is σ-sceptical-existent-undec iff has a σ-extension and for each σ-extension S of , A is not in S and not attacked by any argument in S.
The justification statuses that we consider in this paper are . In the remainder of this paper, we refer to in-, out or undec-justification in case the semantics and acceptability strategy is obvious or irrelevant.
(Argument justification status).
Consider the argumentation framework , as illustrated in Fig. 4. For , A is σ-sceptical-in, while B is σ-sceptical-out. For , the arguments C, D and E are σ-credulous-in, σ-credulous-out as well as σ-credulous-undec.
We formulate the identification of justification status as a decision problem j-justification (where ):
j-justification
Given:
An argumentation framework , a justification status j and an argument
Question:
Does A’s justification status in equal j?
The remainder of this section provides proofs for complexity results related to justification problems. Whereas the complexity of in-justification has been studied before (as acceptance problems, see [8–11]), this is not the case for out- and undec-justification. This is unfortunate, as detecting out- and undec-justification has interesting applications as well: since arguments that are undec are “more acceptable” than arguments that are out, these justification statuses provide a more fine-grained notion of acceptability than the distinction between accepted and not accepted. In addition, more insight in the complexity of detecting these justification statuses could for example be helpful in developing fast algorithms. Furthermore, we will use the complexities of out- and undec-justification later for finding the complexities of out- and undec-stability (Section 4) and out- and undec-relevance (Section 5). We will therefore provide complexity proofs for these types of justification under gr, cp, st and pr semantics. Our strategy in proving these complexities is to relate them to the complexities of in-justification and using existing results from the complexity of acceptance problems. Short proofs will be given directly after the lemmas and propositions, whereas we provide sketches for longer proofs; the full proofs can be found in Appendix A. We start with a lemma for justification that shows that in-justification and out-justification are in the same complexity class:
(Justification status in and out).
For any givenand, the complexity of σ-c-out-justificationequals the complexity of σ-c-in-justification.
Let be an AF and an argument. Now construct as (where ) and ; let . Then A is σ-c-out in iff B is σ-c-in in ; in addition, A is σ-c-in in iff B is σ-c-out in . □
Contrary to out-justification, undec-justification is not necessarily in the same complexity class as in-justification. However, under gr, cp and pr semantics, there is another relation, as we will show in Lemma 3.2
This relation does not exist for st semantics as arguments cannot be st-credulous-undec. We will prove the complexity of st-credulous-, st-sceptical-existent- and st-sceptical-justification later in this section.
Before we can do so, we prove relations between credulous-in- and sceptical-undec-justification, as well as between credulous-undec- and sceptical-in-justification, in the following lemma. The transformations used in this lemma are illustrated in Fig. 6.
Illustration of the argumentation frameworks that are used in transformations between justification problem instances used for proving Lemma 2. The figure illustrates three argumentation frameworks: (first column), (second column) and (third column). The dotted, rounded rectangles represent all arguments in except A. Each of the argumentation frameworks is displayed three times, corresponding to different extensions of : the first row, where A is coloured yellow, represents extensions that do not contain A or any attacker of A (“A is undec”). The second row, where A is green and with boldface font, represents extensions containing A (“A is in”). Finally, the third row, where A is red and with italic font, represents extensions containing some attacker of A (“A is out”). The colours and typesetting refer to the justification statuses of arguments, where green and boldface font stands for in; yellow and regular font for undec and red and italic font for out.
(Complementary relation in- and undec-justification).
For any given, for each argumentation theoryand argument, each of the following holds:
A is σ-credulous-inin AF iffis not σ-sceptical-undecin;
A is σ-sceptical-inin AF iffis not σ-credulous-undecin;
A is σ-credulous-undecin AF iffis not σ-sceptical-inin; and
A is σ-sceptical-undecin AF iffis not σ-credulous-inin.
We give the proof for the first item here. For full proofs of all items, we refer to Appendix A. Consider an arbitrary semantics , argumentation theory and argument . Construct ; for an illustration, see the first and second columns of Fig. 6.
⇒
Suppose that A is σ-credulous-in in : then there is some σ-extension S of containing A. Note that S also must be a σ-extension of : all arguments in attacking attackers of A are still in and is not a σ-extension as it is not conflict-free. Then there exists some σ-extension (i.e. S) of in which is attacked by S, so is not σ-sceptical-undec in .
⇐
Suppose that is not σ-sceptical-undec in ; then there exists some σ-extension S of such that either or some argument attacking is in S. Given that is self-attacking, , so is attacked by some argument in S, which can only be A. Furthermore note that S is also a σ-extension of , since the arguments that are acceptable w.r.t. S in are exactly the same as the arguments acceptable w.r.t. S in . To conclude, there exists some σ-extension (i.e. S) of in which , so A is σ-credulous-in in .
□
Lemma 2 is used in the following lemma to show that credulous-in-justification and sceptical-undec-justification are in complementary complexity classes, as well as credulous-undec-justification and sceptical-in-justification, under gr, cp and pr semantics.
(Complexities undec-justification).
For any given:
If the complexity of σ-credulous-in-justificationis, then the complexity of σ-sceptical-undec-justificationis co-; and
If the complexity of σ-sceptical-in-justificationis, then the complexity of σ-credulous-undec-justificationis co-.
We give a proof sketch for the first item here and refer to the full proofs for both items to Appendix A. The first item can be proved by two reductions:
Each instance of σ-credulous-in-justification can, in polynomial time, be converted to an instance of σ-sceptical-undec-justification where, by Lemma 2 item 1, is a positive instance iff is a negative instance.
Similarly, each instance of σ-sceptical-undec-justification can, in polynomial time, be converted to an instance of σ-credulous-in-justification where, by Lemma 2 item 4, is a positive instance iff is a negative instance.
□
Using Lemma 3, we can now directly derive justification statuses for undec-justification under cp, gr and pr semantics in Propositions 1, 2 and 3.
This follows directly from Lemma 3 in combination with P-completeness of cp-sceptical-in-justification, gr-sceptical-in-justification and gr-credulous-in-justification [10] and the fact that P = CoP. □
This follows directly from Lemma 3 and the fact that cp-credulous-in-justification and pr-credulous-in-justification are NP-complete [8,9]. □
pr-credulous-undec-justificationis-complete.
This follows directly from Lemma 3 and the fact that pr-sceptical-in-justification is -complete [11]. □
For st semantics, the situation is different, since for each st extension S, each argument is either in S or attacked by some argument in S. In the remainder of this section, we give the complexity results of undec-justification for st semantics.
In each st extension S, each argument is either in S or attacked by some argument in S. Consequently, each instance of st-credulous-undec-justification or st-sceptical-existent-undec-justification is False. □
In addition, an argument can only be st-sceptical-undec in a given argumentation framework AF if AF does not have any st extension.
st-sceptical-undec-justificationis CoNP-complete.
For each AF and argument , A is st-sceptical-undec in iff no stable extension exists for . The problem of deciding if a given AF has a stable extension is NP-complete [9], so the complementary problem of deciding if an AF has no stable extension is CoNP-complete. □
At this point, we have studied the complexity of the justification problem for , , and semantics, for sceptical and credulous (and sceptical-existent of st semantics) acceptance and labels in, out and undec. These results are summarised in Table 2. In the following sections, we will see that these definitions and complexity results can be used for defining and studying the complexity of the stability and relevance problems.
Overview of all complexity results related to justification. If a reference is specified, this complexity result is trivial from an earlier result in the literature. New results are printed bold; we refer to the corresponding proposition by “P” and the proposition number. Full proofs for each of the propositions are presented in the appendix. The complexities for in- and out-justification are the same; this follows from Lemma 1
Stability
In this section, we will formally define stability and study its complexity. Stability can be seen as a dynamic variant of justification, defined on incomplete argumentation frameworks: whereas the notion of justification only takes certain arguments and attacks into account, the notion of stability also considers arguments and attacks for which their presence is still uncertain. Whereas justification status is defined on arguments in an abstract argumentation framework, stability status is defined on certain arguments in an incomplete argumentation framework. Informally, a certain argument is stable if its justification is the same in all completions of the IAF. In the definition below, we define j-stability based on j-justification, where j can be any justification status considered in the previous section: .
(Stability on IAFs).
Given an IAF , a certain argument and some justification status j, A is stable-j w.r.t. iff A is j in each completion of .
(Stability).
We reconsider the incomplete argumentation framework from Example 3. The arguments in are B, C and E. Figure 7 illustrates the complete in/out/undec-labellings of each of the completions () of . For each of these eight AFs, each complete extension is represented by colouring the argument nodes: nodes corresponding to arguments in the extension are coloured green and with boldface font; arguments attacked by an argument in the extension are coloured red and with italic font; all other arguments are yellow and with regular font. Note that for each completion of , there is at least one complete extension containing E. In other words: E is stable-cp-credulous-in. Similarly, for each completion of , there is at least one preferred and stable extension containing E, so E is stable-pr-credulous-in and stable-st-credulous-in as well. Under grounded semantics, E is not stable-in, since there are completions (such as ) for which E is not in the grounded extension.
For each , there is no argument that is stable-σ-sceptical-in, -out or -undec. In practice, this means that a sceptical reasoner interested in one of the arguments in would require more information.
Visualisation of the complete in/out/undec-labellings of each of the eight unique completions of , where the argumentation framework is repeated for each cp extension. Arguments that are in that extension are coloured green and with boldface font; argument attacked by some argument in that extension are red and with italic font; and all other arguments are yellow and with regular font.
Finally recall that stability is not defined for A and D, since they are in rather than . So although the argument A is in each gr, cp, pr and st extension in each completion in which the argument exists, it is not stable-gr/cp/pr/st-sceptical/credulous-in because there are completions that do not contain A.3
One may also be interested in an alternative notion of stability for uncertain arguments, which we call existent-stability here: an uncertain argument is j-existent-stable w.r.t. some IAF if it has justification status j in all completions such that . Note that the set of completions of such that equals the set of completions of . Therefore, is j-existent-stable w.r.t. some iff A is j-stable w.r.t. . Analogously, is j-stable w.r.t. some iff B is j-existent-stable w.r.t. . This implies that the problem of deciding j-existent-stability is in the same complexity class as the problem of deciding j-stability.
Note that the notion of stability is strongly related to the notion of necessary acceptance, defined in Section 2. In fact, for any semantics σ, certain arguments are stable-σ-sceptical-in if and only if they are necessarily sceptically accepted (i.e. in each extension of each completion); similarly, certain arguments are stable-σ-credulous-in if and only if they are necessarily credulously accepted (i.e. in some extension of each completion). However, stability provides a more fine-grained notion of (non-)acceptance in IAFs than necessary acceptance. Using (out-)stability, it is, for example, also possible to express that, in any completion, some certain argument is attacked by an argument (not necessarily the same) in a σ-extension of that completion.
In the remainder of this section, we present our results on the complexity of the task of identifying a stability status. The following formulates this task as a decision problem.
j-stability
Given:
An incomplete argumentation framework , a justification status j and an argument
Question:
Does A’s stability status w.r.t. equal stable-j?
Next, we give complexity results for variants of the stability problem. We start with relating in-stability to necessary (sceptical and credulous) acceptance, as defined in Definition 5 (which was adapted from [3]).
For any givenand, the complexity of σ-c-in-stabilityequals the complexity of necessary c acceptance w.r.t. semantics σ.
This is trivial from Definition 8 of stability and Definition 5 of necessary acceptance. □
We continue with relating in- and out-stability. Similar to what we did for in- and out-justification in Lemma 1, we show that the complexity of in-stability is the same as the complexity of out-stability.
For any givenand, the complexity of σ-c-out-stabilityequals the complexity of σ-c-in-stability.
We prove this by a reduction from σ-c-out-stability to σ-c-in-stability and by a reduction in the other direction. Below, we give proof sketch; the full proof can be found in Appendix B.
For each instance of the σ-c-out-stability problem where and , one can construct , where . Then is a positive instance of σ-c-out-stability iff is a positive instance of σ-c-in-stability.
Similarly, each instance of the σ-c-in-stability problem, where and , can be transformed into where with . The instance is positive for σ-c-in-stability iff is a positive instance for σ-c-out-stability.
From these two reductions, it follows that σ-c-in-stability and σ-c-out-stability have the same complexity. □
Using Lemma 5, we can show that for any given and , we can derive the complexity of σ-c-out-stability directly from the complexity of σ-c-in-stability. In the following lemma, we relate undec-stability for specific semantics with possible sceptical and credulous acceptance (Definition 6). Similar to Lemma 2, we prove this for gr, cp and pr semantics but not for st semantics: the relation does not hold for st semantics because arguments cannot be st-credulous-undec.
(Complexities undec-stability).
For any given:
If possible credulous acceptance w.r.t. σ semantics is in the complexity class, then σ-sceptical-undec-stabilityis in the complexity class co-; and
If possible sceptical acceptance w.r.t. σ semantics is in the complexity class, then σ-credulous-undec-stabilityis in the complexity class co-.
We only give a proof sketch for the first item here; full proofs of both items are in Appendix B. This proof consists of two reductions: we show that possible credulous acceptance w.r.t. σ semantics reduces to the complementary problem of σ-sceptical-undec-stability and the other way around. The proof strategy is similar to the proof of Lemma 2, illustrated in Fig. 6.
Let where and . Construct where and . Then is a positive instance of possible credulous acceptance w.r.t. σ semantics iff is a negative instance of σ-sceptical-undec-stability.
Let where and . Now let where and none of , B and C is in . is a positive instance of σ-sceptical-undec-stability iff is a negative instance of possible credulous acceptance w.r.t. σ semantics.
□
The results of Lemma 6 can be used to derive the complexity classes of undec-stability based on existing results for possible acceptance from [3] for cp, gr and pr semantics.
This follows directly from Lemma 6 and the fact that possible sceptical acceptance under gr and cp semantics and possible credulous acceptance under gr semantics are NP-complete [3]. □
This follows directly from Lemma 6 and the fact that possible credulous acceptance under cp and pr semantics are NP-complete [3]. □
pr-credulous-undec-stabilityis-complete.
This follows directly from Lemma 6 and the fact that possible sceptical acceptance under pr semantics is -complete [3]. □
Finally, we turn to st semantics. Our strategy for proving these complexities is similar to our approach for the st-undec-justification complexity proofs in the previous section.
st-sceptical-undec-stabilityis CoNP-complete.
The problem is in CoNP, as a negative instance can be verified in polynomial time given a certificate such that is a completion of , and S is a st extension of . If S is a st extension then each argument in , including A, is either in S or attacked by S; therefore A cannot be stable-st-sceptical-undec w.r.t. .
For hardness, we can reduce from the CoNP-complete problem st-sceptical-undec-justification: any instance of st-sceptical-undec-justification can be solved by solving st-sceptical-undec-stability for . Given that is the only completion of , is positive iff is positive. □
For each argumentation framework such that a st extension S exists, each argument in is either in S or attacked by an argument in S. Therefore, A cannot be st-credulous-undec or st-sceptical-existent-undec in . This applies for each AF, including all completions of each possible IAF, so each instance of st-credulous-undec-stability and st-sceptical-existent-undec-stability must be negative. □
To conclude this section, we have studied the complexity of the stability problem for gr, cp, pr and st semantics, for sceptical and credulous (and sceptical-existent for st semantics) acceptance and labels in, out and undec. For an overview of the results, we refer to Table 3. In the following section, we consider the problem of identifying relevance.
Overview of all complexity results related to stability. If a reference is specified, this complexity result is trivial from an earlier result in the literature. New results are printed bold; we refer to the corresponding proposition by “P” and the proposition number. Full proofs for each of the propositions are presented in Appendix B. The complexities for in- and out-stability are the same; this follows from Lemma 5
Relevance
For IAFs in which a given argument is not stable, a natural follow-up question would be: which uncertainties should be resolved in order to reach a point where the argument is stable? These uncertainties are relevant to investigate in the given IAF. In this section, we will define the problem of relevance and study its complexity. First, we give some intuition on the notion of relevance in the context of stability.
We return to the IAF from Example 3, which is shown in Fig. 8 (which is a repetition of Fig. 2). Suppose that we want to know how we can make the certain argument C stable-gr-sceptical-in. In order to do so, we should make sure that argument B is stable-gr-sceptical-out, which can only be the case if it is attacked by argument A. So in order to make sure that C is stable-gr-sceptical-in, we need to make sure that argument A is present. In addition, argument C is attacked by the uncertain argument D. If argument D turns out to be present, then C cannot be stable-gr-sceptical-in as there is no suitable argument to defend C from D under grounded semantics. Therefore it is relevant to make sure that argument D is absent. To conclude, the two relevant operations in this case are adding argument A and removing argument D. Note that there is still some uncertainty left in the resulting IAF: it is still unknown if the attack should be present or absent. However, adding or removing this attack does not influence the gr-sceptical-in-stability status of C. Therefore, these operations are not relevant.
The example showed that being certain about the existence of the attack does not contribute anything to the stability status of C in a situation where we already know that A is present and D is absent: both with and without , C is stable-gr-sceptical-in. In general, adding or removing an argument or attack is only relevant if there is a situation in which this argument or attack is really necessary to obtain stability. In order to define which uncertainties are relevant to be resolved for obtaining some stability status, we therefore need some notion of “partial” completions, in which only those uncertainties are resolved that are required for stability. A partial completion of an IAF is an IAF such that a (possibly empty) part of the uncertain elements of is resolved in , while another (possibly empty) part of the uncertain elements is still uncertain.4
Partial completions in this paper are a corrected version of specifications in [18].
Next, we formally define such partial completions.
(Partial completion).
Given an IAF , a partial completion is an IAF , where:
;
;
;
.
Note that, since is an IAF, it must still hold that ; ; and . We denote all possible partial completions for by .
In order to be able to apply the semantics of [10], which are defined on AFs, to IAFs, we define the certain projection of an IAF. This is an AF consisting of only the IAF’s certain arguments and the attacks between them.
(Certain projection).
Given an IAF , the certain projection is the argumentation framework .
(Partial completions and certain projections).
Returning to the IAF , given in Example 3 and illustrated in Fig. 8, the following IAFs are some (but not all) examples of partial completions in :
: all uncertain arguments and attacks have become certain.
: all uncertain arguments and attacks are removed, as well as all attacks that are not in the restriction of to .
: the argument A is moved from the uncertain to the certain part. The argument D and the attack are still uncertain.
Three partial completions of our incomplete argumentation framework and their certain projections.
The partial completions , and are illustrated on the left side of Fig. 9. The certain projection of is . For , the certain projection is . Finally, . These AFs are illustrated on the right side of Fig. 9.
Before proceeding to a formal definition of relevance that matches the intuitions in the example above, we define the notion of minimal stable partial completions. In this definition, j refers to the justification status: .
(Minimal stable-j partial completion).
Given an IAF , a certain argument and a justification status j, a minimal stable-j partial completion for A w.r.t. is a partial completion in such that A is stable-j in and there is no partial completion in such that A is stable-j in , and .
Intuitively, the minimal stable-j partial completion for A is a partial completion in which A is stable-j, while A would not be stable-j in any partial completion with more uncertain elements.
(Minimal stable-j partial completion).
Recall the IAF from Example 3. Suppose that we are interested to know if argument C is stable-gr-sceptical-in. has one minimal stable-gr-sceptical-in partial completion, which is . Given that contains the attack as its only uncertain element, has three partial completions, resulting in two unique certain projections. These are (depicted as in Fig. 7) and (depicted as in the same figure). Since and each have a grounded extension – in both cases – that contains C, C is stable-gr-sceptical-in in . In addition, note that is minimal in that C would not be stable-gr-sceptical-in in partial completions with more uncertain elements:
Suppose that the presence of argument A is unknown as in . Then and would be certain projections of partial completions of . Since C is not in the grounded extension of each of these AFs, C is not stable-gr-sceptical-in w.r.t. .
Alternatively, suppose that the absence of argument D is yet unknown, as in , defined earlier as . Then and would also be certain projections of partial completions of , where these AFs would not have C in their grounded extensions. Therefore, C is not stable-gr-sceptical-in w.r.t. .
This shows that is a minimal stable-gr-sceptical-in partial completion for C w.r.t. . Note that, although in this case there is a single minimal stable-gr-sceptical-in partial completion for C w.r.t. , in general there can be multiple minimal stable partial completions.
For example, there are three minimal stable-cp-credulous-undec partial completions for C w.r.t. :
(having and as certain projections of partial completions);
(for and ); and
(for and ).
Using the notion of minimal stable-j partial completions, we can now define j-relevance.
(j-relevance).
Given an IAF , an argument , an uncertain argument or attack and a justification status j,
Addition of U is j-relevant for A w.r.t. iff there is a minimal stable-j partial completion for A w.r.t. such that ; and
Removal of U is j-relevant for A w.r.t. iff there is a minimal stable-j partial completion for A w.r.t. such that .
In other words, addition of an uncertain element U is j-relevant if a minimal stable-j partial completion can be reached by moving U from the uncertain to the certain part of the IAF ; and removal of U is j-relevant if completely removing U from , possibly in combination with other actions, leads to a minimal stable-j partial completion.
Partial completion , which is the only minimal stable-gr-sceptical-in partial completion for C w.r.t. where and .
(j-relevance).
To illustrate j-relevance, we build on the minimal stable-j partial completions from Example 10. Recall that , illustrated in Fig. 10, is the only minimal stable-gr-sceptical-in partial completion for C w.r.t. where and . Given that A was an uncertain argument in and is a certain argument in (the minimal stable-gr-sceptical-in partial completion) , addition of A is gr-sceptical-in-relevant for C w.r.t. . Furthermore, as D was an uncertain argument in and is no longer present in , the removal of D is gr-sceptical-in-relevant for C w.r.t. .
Considering the justification status cp-credulous-undec, there are three minimal stable-cp-credulous-undec partial completions for C (see Example 10). The cp-credulous-undec-relevant operations are:
Addition of A;
Addition of D;
Addition of ; and
Removal of A.
Note that this example shows the possibility that both the addition and removal of some uncertain argument or attack are relevant. This example also demonstrates that performing a relevant action does not necessarily lead to a stable situation, but may be just the first step in becoming stable. For instance, the addition of A to does not yet result in an IAF that is stable-cp-credulous-undec as this IAF still has at least one completion (to be precise, the completions and in Fig. 7) in which C is not cp-credulous-undec. In order to become stable, an additional relevant action (in this case, the addition of D) is required.
Like for justification and stability status, we formulate the identification of j-relevance as a decision problem:
j-relevance of action a
Given:
An incomplete argumentation framework , a justification status j, an action , an argument and an uncertain argument or attack .
Question:
Is a of U j-relevant for A w.r.t. ?
In the remainder of this section, we study the complexity of relevance for complete, grounded, preferred and stable semantics. This work builds on initial research in [18], where we proved the complexity of in-relevance under grounded semantics. In order to prove complexity of j-relevance for each justification status j, we first give proofs for the upper bounds, that is: the membership in a given complexity class, in Section 5.1. Subsequently, we provide lower bounds, that is: hardness results, for relevance under grounded, complete and preferred semantics in Section 5.2. Finally, we prove the remaining hardness results for stable semantics in Section 5.3.
Upper bounds
First, we will prove a general upper bound on j-relevance. In order to do so, we first prove Lemma 7. This lemma shows that the relevance of adding an uncertain argument can be validated by checking the justification status of the certain projections of two particular future partial completions.
Given an IAF, a certain argumentand a justification status j:
For each, addition of U is j-relevant for A w.r.t.iff there exists somesuch that A is not j in the certain projection of, while A is j in the certain projection of.
For each, addition of U is j-relevant for A w.r.t.iff there exists somesuch that A is not j in the certain projection of, while A is j in the certain projection of.
For each, removal of U is j-relevant for A w.r.t.iff there exists somesuch that A is j in the certain projection of, while A is not j in the certain projection of.
For each, removal of U is j-relevant for A w.r.t.iff there exists somesuch that A is j in the certain projection of, while A is not j in the certain projection of.
Let be an incomplete argumentation framework, a certain argument and j a justification status. We prove both directions of the first item here. For proofs for the other items, we refer to Appendix C.
⇒
See Fig. 11 for an illustration of the steps in this proof.
Suppose that addition of is j-relevant for A w.r.t. .
Then by Definition 12 there is a minimal stable-j partial completion for A w.r.t. such that .
Now construct the IAF from by moving U from the certain to the uncertain part: .
Given that was minimal and , A cannot be stable-j w.r.t. . So there must be some in such that A’s justification status in the certain projection of is not j – note that this means that U is not in (since A was stable-j in ).
Then A’s justification status in the certain projection of is not j (because this is the same as the certain projection of , i.e. ).
Next, construct from by moving U from the uncertain part to the certain part. Since is in and A is stable-j in , A must be j in the certain projection of .
⇐
Suppose that there exists some such that A is not j in and A is j in . Given that has only one completion (i.e., its certain projection), A must be stable-j w.r.t. . Consequently, there must be some minimal stable-j partial completion for A w.r.t. such that . Note that : otherwise would also be in , which contradicts the assumption that A is not j in . To conclude, addition of U is j-relevant for A w.r.t. .
□
Illustration of the steps in the proof of Lemma 7 item 1 (from left to right). The IAFs used in the proof are depicted as rectangles; grey arrows between these rectangles represent partial completions – note that not all partial completions of all IAFs are shown in the figure, but only those that we refer to in the proof. Rectangles corresponding to and are coloured blue, as these are the partial completions of for which Lemma 7 shows some properties.
In the following proposition, we use the results from Lemma 7 to prove a general upper bound on the complexity of j-relevance.
(Upper bound j-relevance).
Given an IAF, a certain argument, an uncertain argument or attackand a justification status j, if the problem of deciding j’s justification status in a given completion ofis in the complexity class, then the problem of deciding if addition or removal of U is j-relevant for A w.r.t.is in the complexity class.
In order to validate that a given is j-relevant for a given , a suitable polynomial-sized certificate would be some as specified in Lemma 7 (so ). The following procedure can be used to validate that U is j-relevant for A w.r.t. :
Check in polynomial time if and store the result in ;
Call the oracle for finding justification status j to check if A is j w.r.t. and store the result in ;
Let if and otherwise. Then call the oracle to check if A is j w.r.t. and store the result in .
Then by Lemma 7, addition of U is j-relevant for A w.r.t. iff . Removal of U is j-relevant for A w.r.t. iff . Checking that (for addition) or iff (for removal) can be done in polynomial time. To conclude, the problem of deciding if addition or removal of U is j-relevant for A w.r.t. is in . □
Proposition 11 gives a general upper bound that can be exploited to obtain an upper bound for j-relevance for all justification statuses for which we know the complexity of j-justification. For example, given that -credulous-in-justification is in NP, both the addition and the removal variants of -credulous-in-relevance must be in , so in . For justification statuses for which the justification problem is in P, like gr-credulous-in, the relevance problem is in . If the justification problem is on the second level of the polynomial hierarchy, like pr-sceptical-out-justification, then the relevance variant is in . Having proved the upper bounds for all variants of the relevance problem, we turn to the lower bounds in the following two sections.
Lower bounds for grounded, complete and preferred semantics
In order to prove lower bounds for relevance under gr, cp and pr semantics, we give reductions from the complementary problem of stability, to which we will refer as the instability problem.5
More formally, for every IAF , justification status j and certain argument , the instance is negative for j-stability iff it is positive for j-instability. In the following lemma, we provide some relations between instability and relevance that will turn out to be useful for reductions from instability to relevance for specific justification statuses.
Illustration of the IAFs that are used to show Lemma 8 item 1. The IAFs given on the left are (upper) and (lower). The rounded rectangle with dotted borders represents the original IAF (without A and in- and outgoing attacks). The grey arrows point to certain projections , and of partial completions. For each of these AFs, the possible justification statuses are colour-coded: green arguments with boldface font are in, yellow arguments are undec and red arguments with italic font are out. Note that, for a given justification status of A, there is only one possible justification status for each of the additional arguments in .
(Reduction instability to relevance).
Given an incomplete argumentation framework, a certain argument, semanticsand:
Constructandas follows (see Fig.
12
), where,, U andare not in:
;
;
; and
.
The following three items are equivalent:
A is not stable-σ-c-inw.r.t.; and
addition of U is σ-c-in-relevant forw.r.t.; and
removal ofis σ-c-in-relevant forw.r.t..
Letandwhere U andare not in. The following three items are equivalent:
A is not stable-σ-c-outw.r.t.; and
addition of U is σ-c-out-relevant for A w.r.t.; and
removal ofis σ-c-out-relevant for A w.r.t..
Constructandas follows, where,, U andare not in:
;
;
; and
.
The following three items are equivalent:
A is not stable-σ-c-undecw.r.t.; and
addition of U is σ-c-undec-relevant forw.r.t.; and
removal ofis σ-c-undec-relevant forw.r.t..
We only prove the first item here, related to in justification statuses. For the other items, see Appendix C. Let and let (see Fig. 12).
(a) ⇒ (b) and (c)
If A is not stable-σ-c-in w.r.t. (a) then by Definition 8 of stability there is some completion of in which A is not σ-c-in. Next, we construct three argumentation frameworks based on , containing the argument , and discuss its status.
First, construct . Given that is attacked by , which is only attacked by A in , cannot be σ-c-in in .
Next, construct . is σ-c-in in , since the unattacked argument U attacks the only attacker of (i.e. ).
Let . Given that A is not σ-c-in in , A cannot be σ-c-in in either. Since the argument in is attacked by , which is only attacked by A, cannot be σ-c-in in .
Now item (b) (addition of U is σ-c-in-relevant for w.r.t. ) follows from Lemma 7, the fact that the IAF is in and the status of in and .
Similarly, item (c) (removal of is σ-c-in-relevant for w.r.t. ) follows from Lemma 7, the fact that the IAF is in and the status of in and .
(b) ⇒ (a)
If addition of U is σ-c-in-relevant for w.r.t. then there is some in such that is notσ-c-in in . Then A cannot be σ-c-in in either (since A attacks , which is the only attacker of ). Now construct where and . Since A is not σ-c-in in , it cannot be σ-c-in in . Given that is a completion of , A cannot be stable-σ-c-in w.r.t. .
(c) ⇒ (a)
If removal of is σ-c-in-relevant for w.r.t. then by Lemma 7, there is some in such that is notσ-c-in in the certain projection of – without loss of generality, let this certain projection be . Now construct where and ; since is not σ-c-in in , it cannot be that A is σ-c-in in . Given that is a completion of , A cannot be stable-σ-c-in w.r.t. .
□
Using Lemma 8 and the complexity results for stability from Section 4, we obtain lower bounds for both the addition and removal variants of relevance under complete, grounded and preferred semantics. For some variants of the relevance problem, combining the upper bounds identified in Section 5.1 with these lower bounds already yields tight complexity results. We present these results in Propositions 12, 13 and 14. The “easiest” of these problems are NP-complete, as we show in Proposition 12.
The following problems are NP-complete:
cp-credulous-undec-relevance;
cp-sceptical-in-relevance;
cp-sceptical-out-relevance;
gr-credulous-in-relevance;
gr-credulous-out-relevance;
gr-credulous-undec-relevance;
gr-sceptical-in-relevance;
gr-sceptical-out-relevance; and
gr-sceptical-undec-relevance.
For each of these problems, membership in NP follows from membership in P of the corresponding justification problems [10], listed in Table 1, and Proposition 11 (since ).
For NP-hardness, we can give a reduction from the complementary of the corresponding stability problem, using Lemma 8. Here we only consider item 1; the other items are proved in Appendix C. By Proposition 6, cp-credulous-undec-stability is CoNP-complete, which means that the complementary problem cp-credulous-undec-instability is NP-complete. By Lemma 8 item 3, each instance of cp-credulous-undec-instability can be transformed into an instance such that I is a positive instance of cp-credulous-undec-instability iff is a positive instance of cp-credulous-undec-relevance. □
For each of the four justification statuses j for which we discuss relevance in Proposition 13, the j-stability problem is -complete, hence j-instability must be -complete and j-relevance (both addition and removal) must be -hard. In combination with the upper bound identified in Section 5.1, this implies that the corresponding relevance problems are -complete.
The following problems are-complete:
cp-credulous-in-relevance;
cp-credulous-out-relevance;
pr-credulous-in-relevance; and
pr-credulous-out-relevance.
For each of these problems, membership in follows from NP-completeness of the corresponding justification problems [8,9] in combination with Proposition 11. For -hardness, we can give a reduction from the corresponding instability problem, using Lemma 8.
Since cp-credulous-in-stability is -complete (by Lemma 4 and [3, Theorem 24]), the complementary problem (cp-credulous-in-instability) is -complete. By Lemma 8 item 1, each instance of cp-credulous-in-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of cp-credulous-in-instability iff is a positive instance of cp-credulous-in-relevance.
cp-credulous-out-stability is -complete (by Lemma 4 and [3, Theorem 24] in combination with Lemma 5), which means that cp-credulous-in-instability is -complete. By Lemma 8 item 2, each instance of cp-credulous-out-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of cp-credulous-out-instability iff is a positive instance of cp-credulous-out-relevance.
Since pr-credulous-in-stability is -complete (by Lemma 4 and [3, Theorem 24]), the complementary problem (pr-credulous-in-instability) is -complete. By Lemma 8 item 1, each instance of pr-credulous-in-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of pr-credulous-in-instability iff is a positive instance of pr-credulous-in-relevance.
pr-credulous-out-stability is -complete (by Lemma 4 and [3, Theorem 24] in combination with Lemma 5), which means that pr-credulous-in-instability is -complete. By Lemma 8 item 2, each instance of pr-credulous-out-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of pr-credulous-out-instability iff is a positive instance of pr-credulous-out-relevance.
□
Similarly, in Proposition 14 we show that pr-credulous-undec-relevance must be -complete, as pr-credulous-undec-instability is -hard and pr-credulous-undec-justification is on the second level of the polynomial hierarchy.
pr-credulous-undec-relevanceis-complete.
Membership in follows from -completeness of the corresponding justification problem (Proposition 3) in combination with Proposition 11.
For -hardness, we reduce from pr-credulous-undec-instability, which is -complete since the co-problem pr-credulous-undec-stability is -complete (Proposition 8). By Lemma 8 item 3, each instance of pr-credulous-undec-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of pr-credulous-undec-instability iff is a positive instance of pr-credulous-undec-relevance. □
For some other variants of the relevance problem, the strategy used in Propositions 12, 13 and 14 does not yield tight complexity results. For instance, for cp-sceptical-undec-relevance, using this strategy we could only derive that the problem is in (because cp-sceptical-undec-justification is CoNP-complete by Proposition 2) and that it is NP-hard (because cp-sceptical-undec-stability is CoNP-complete by Proposition 7). For these variants, we use another approach, based on an alternative reduction: for the sceptical in- and out-relevance variants, we reduce from credulous undec-instability; for the sceptical undec-relevance variants, we reduce from credulous in-instability. We will use these reductions to prove the remaining complexities for relevance under complete, grounded and preferred semantics in Propositions 15 and 16. In order to use these reductions, we need the following lemma:
(Reduction co-inverted-stability to relevance).
Given an incomplete argumentation framework, a certain argument, semantics:
Constructandas follows, where, U andare fresh arguments not in:
;
;
; and
.
The following items are equivalent:
A is not stable-σ-credulous-inw.r.t.; and
addition ofis σ-sceptical-undec-relevant forw.r.t.; and
removal of U is σ-sceptical-undec-relevant forw.r.t..
Constructandas follows, where,,,, U andare fresh arguments not in:
;
;
; and
.
The following items are equivalent:
A is not stable-σ-credulous-undecw.r.t.; and
addition ofis σ-sceptical-in-relevant forw.r.t.; and
removal of U is σ-sceptical-in-relevant forw.r.t.; and
addition ofis σ-sceptical-out-relevant forw.r.t.; and
removal of U is σ-sceptical-out-relevant forw.r.t..
The proof for this lemma, given in Appendix C, is structured in the same way as the proof for Lemma 8. □
In the following two propositions, we will use Lemma 9 to prove the remaining complexities for relevance under cp and pr semantics. First, we prove that cp-sceptical-undec-relevance and pr-sceptical-undec-relevance are -complete.
Membership in follows from CoNP-completeness of the corresponding justification problems (Proposition 2) in combination with Proposition 11.
For -hardness and , we reduce from σ-credulous-in-instability, which is -complete since the co-problem σ-credulous-in-stability is -complete (Lemma 4 and the results for necessary credulous acceptance from [3, Theorem 24]). By Lemma 9 item 1, each instance of σ-credulous-in-instability can be transformed into an instance (for addition) or (for removal) such that I is a positive instance of σ-credulous-undec-instability iff is a positive instance of σ-sceptical-undec-relevance. □
In Proposition 16 we use Lemma 9 to show that pr-sceptical-in- and -out-relevance are -hard. Together with upper bounds from Section 5.1, this implies that pr-sceptical-in- and -out-relevance are -complete.
Membership in follows from -completeness of the corresponding justification problems ([11] and Lemma 1) in combination with Proposition 11.
For -hardness, we reduce from pr-credulous-undec-instability, which is -complete since the co-problem pr-credulous-undec-stability is -complete (by Proposition 8 and Lemma 5). By Lemma 9 item 2, each instance of pr-credulous-undec-instability can be transformed into:
an instance such that I is a positive instance of pr-credulous-undec-instability iff is a positive instance of pr-sceptical-in-relevance (for addition); or
an instance such that I is a positive instance of pr-credulous-undec-instability iff is a positive instance of pr-sceptical-in-relevance (for removal); or
an instance such that I is a positive instance of pr-credulous-undec-instability iff is a positive instance of pr-sceptical-out-relevance (for addition); or
an instance such that I is a positive instance of pr-credulous-undec-instability iff is a positive instance of pr-sceptical-out-relevance (for removal).
□
At this point, we have proven all complexity results for relevance under complete, grounded and preferred semantics as summarised in Table 4.
Lower bounds for stable semantics
In this section, we will consider the relevance problems under st semantics. We will prove that the in and out variants of these problems are -complete in Proposition 17. For the hardness-proof in this proposition, we require two transformations from -SAT instances into IAFs. Recall from Section 2.3 that the -SAT problem is to decide if there is some truth value assignment to variables of X such that for each truth value assignment : where Φ is a formula in CNF. The transformations are given in the following definition:
(Transformations).
Let be an instance of -SAT and let and for each clause in Φ, where are the literals over that occur in clause . We define two transformations for this instance. Let:
;
;
.
A first transformation into an IAF can be constructed as: , where χ is a fresh uncertain argument not in . A second transformation is where χ and are not in .
An example of transformation is illustrated in Fig. 13 for the instance where the formula , and . Figure 14 shows transformation for the same -SAT instance .
Visualisation of the IAF created for the clauses and using transformation of Definition 13.
Visualisation of the IAF created for the clauses and using transformation of Definition 13.
In the following lemma, we use the transformations and to identify equivalences between instances of -SAT and relevance.
Letbe an instance of-SAT and letandfor each clausein ϕ, whereare the literals overthat occur in clause. Now letand let, using the transformationsandspecified in Definition
13
. The following items are equivalent:
is a positive instance of-SAT;
Removal of χ isst-sceptical-in-relevant forw.r.t.;
Addition of χ isst-credulous-in-relevant for ϕ w.r.t.;
Addition ofisst-sceptical-in-relevant forw.r.t.;
Removal ofisst-credulous-in-relevant for ϕ w.r.t.;
Removal of χ isst-sceptical-out-relevant for ϕ w.r.t.;
Addition of χ isst-credulous-out-relevant forw.r.t.;
Addition ofisst-sceptical-out-relevant for ϕ w.r.t.; and
Removal ofisst-credulous-out-relevant forw.r.t..
We introduce an auxiliary statement, for which we prove that it equals all of the items above:
There is some such that is st-sceptical-in in its certain projection (where , and are chosen as in Definition 13).
Using this additional item, we prove these items separately. For brevity, we only show the equivalence between items 0 and 1 and 0 and 2 here; for full proofs for all equivalences, we refer to Appendix C.
(0) ⇒ (1)
Suppose that there is some such that is st-sceptical-in in the certain projection of . Let be an assignment to variables in X such that it assigns True to all such that and False otherwise. Let be an arbitrary assignment to all variables in Y. Given that is st-sceptical-in in , for each st extension S of , at least one of the arguments must have been in S, so there is at least one clause in the formula Φ for which none of the variables was assigned True by and . Since we chose arbitrarily, we have that is a positive instance of -SAT.
(1) ⇒ (0)
Let be a positive instance of -SAT. Then there is some assignment to all variables of X such that for each assignment to the variables of Y, is False. Let . Construct and let be its certain projection. Note that . Given that all arguments in G are unattacked, each extension of contains all arguments in G. Furthermore, for each argument , each st extension of contains either x (if x is assigned True by ) or (if x is assigned False by ). Additionally, for each argument , each extension of contains either y or . Given that for each assignment to the variables of Y, is False, it must be that for each st extension S of this AF, at least one of the clause arguments is in S, so is attacked by an argument in S; therefore . Thus, is st-sceptical-in in .
(0) ⇒ (2)
Suppose that there is some in such that is st-sceptical-in in its certain projection . This implies that for it also holds that is st-sceptical-in in its certain projection . Note that . Now consider and its certain projection . In , the argument is attacked by the unattacked argument χ, so is not st-sceptical-in in . Then by Lemma 7 item 3, removal of χ is st-sceptical-in-relevant for w.r.t. .
(2) ⇒ (0)
If removal of χ is st-sceptical-in-relevant for w.r.t. then by Lemma 7 item 3 there is some in (where , so ) such that is st-sceptical-in in .
□
The equivalences proven in Lemma 10 are exploited in Proposition 17 to show -completeness of some of the relevance instances under st semantics.
The following problems are-complete:
st-credulous-in-relevance;
st-sceptical-in-relevance;
st-credulous-out-relevance; and
st-sceptical-out-relevance.
From Proposition 11 and [8,9] it follows that these problems are in .
st-credulous-in-relevance is -hard because -SAT can be reduced to this problem:
For the addition variant, convert a given -SAT instance to the IAF and check that addition of χ is st-credulous-in-relevant for ϕ w.r.t. ; this is the case iff is a positive -SAT instance (by the equality between item 1 and item 3 of Lemma 10).
For the removal variant, convert a given -SAT instance to the IAF and check that removal of is st-credulous-in-relevant for ϕ w.r.t. ; this is the case iff is a positive -SAT instance (by the equality between item 1 and item 5 of Lemma 10).
st-sceptical-in-relevance is -hard because -SAT can be reduced to this problem: for addition, convert a given -SAT instance to the IAF and check that addition of is st-sceptical-in-relevant for w.r.t. ; this is the case iff is a positive -SAT instance (by the equality between item 1 and item 4 of Lemma 10). For removal, the proof is similar but we use the equality between item 1 and item 2.
st-credulous-out-relevance is -hard because -SAT can be reduced to this problem: for addition, convert a given -SAT instance to the IAF and check that addition of χ is st-credulous-out-relevant for w.r.t. ; this is the case iff is a positive -SAT instance (by the equality between item 1 and item 7 of Lemma 10). For removal, the proof is similar but we use the equality between item 1 and item 9.
st-sceptical-out-relevance is -hard because -SAT can be reduced to this problem: for addition, convert a given -SAT instance to the IAF and check that addition of is st-credulous-in-relevant for ϕ w.r.t. ; this is the case iff is a positive -SAT instance (by the equality between item 1 and item 8 of Lemma 10). For removal, the proof is similar but we use the equality between item 1 and item 6.
□
The problems st-credulous-undec-relevance and st-sceptical-existent-undec-relevance are easy, as we show in Proposition 18, because these problems only have negative instances.
For each argumentation framework such that a st extension S exists, each argument in is either in S or attacked by an argument in S. Therefore, A cannot be st-credulous-undec or st-sceptical-existent-undec in . This applies for each AF, including all certain projections of all partial completions of each possible IAF, so each instance of st-credulous-undec-relevance and st-sceptical-existent-undec-relevance must be negative. □
Next, we consider the st-sceptical-undec-relevance problem.
st-sceptical-undec-relevanceis-complete.
First, we will show that st-sceptical-undec-relevance is in . By Proposition 5, st-sceptical-undec-justification is CoNP-complete. By Proposition 11, this implies that st-sceptical-undec-relevance is in .
For the hardness proof, we use an existing result on the problem of necessary nonempty existence under st semantics from [21], which is defined as follows: given an IAF , does each completion of have a nonempty st extension? It is shown in [21, Theorem 21] that this problem is -hard.
Let be an arbitrary instance of the necessary nonempty existence problem under st semantics. If then is a negative instance, because there is a completion of where , which means that has no nonempty st extension. Alternatively, assume that contains at least one argument and let A be an arbitrary argument in . Then we transform into an instance of the argument removal variant of the st-sceptical-undec-relevance problem, where:
U is a fresh uncertain argument, not occurring in ; and
.
Then is a positive instance of necessary nonempty existence under st semantics iff is a negative instance of st-sceptical-undec-relevance – we prove this in Appendix C. This appendix also contains proofs for the argument addition, attack addition and attack removal variants of the st-sceptical-undec-relevance problem.
Given that the necessary nonempty existence problem under st semantics is -hard, the complementary problem of st-sceptical-undec-relevance must be -hard. Together with the membership result from the beginning of this proof, this implies that st-sceptical-undec-relevance is -complete. □
The final variants of the relevance problem are st-sceptical-existent-in-relevance and st-sceptical-existent-out-relevance. These are on the second level of the polynomial hierarchy, as we prove in Proposition 20.
Membership in directly follows from the complexity of st-sceptical-existent-in- and -out-justification and Proposition 11, in the following way: st-sceptical-existent-in-justification is DP-complete by [12, page 92]. By Lemma 1, st-sceptical-existent-out-justification is DP-complete as well. Then by Proposition 11 the problems of st-sceptical-existent-in-relevance and st-sceptical-existent-out-relevance are in ; note that as any DP query can be answered by two (adaptive) SAT queries.
In order to prove -hardness, we reduce from possible sceptical-existent acceptance under st semantics (Definition 6), which was proven to be -hard in [3, Theorem 25]. Let be an arbitrary instance of possible sceptical-existent acceptance under st semantics where . We transform this into an instance of st-sceptical-existent-in-relevance where U is a fresh uncertain argument that is not in and . Then is a positive instance of possible sceptical-existent acceptance under st semantics iff is a positive instance of st-sceptical-existent-in-relevance; this is proven in Appendix C.
For st-sceptical-existent-out-relevance, we transform an arbitrary instance of possible sceptical-existent acceptance under st semantics to an instance of st-sceptical-existent-out-relevance, where U is a fresh uncertain argument that is not in , B is a fresh argument that is not in and . Then is a positive instance of possible sceptical-existent acceptance under st semantics iff is a positive instance of st-sceptical-existent-out-relevance. □
This proposition completes our study on complexity for j-relevance for all justification statuses j within the scope of this paper. These results, proven in Propositions 12–20, can be found in Table 4.
Overview of all complexity results related to relevance. We refer to the corresponding proposition by “P” and the proposition number. Full proofs for each of the propositions are presented in the appendix
Related work
The computational complexity of various problems defined on argumentation frameworks is well-studied; see [14] for an overview. Most studies only identify accepted arguments and do not distinguish other justification statuses. Notable exceptions are [13] and [2], but neither of these works give complexity results for separate statuses, as we do. In [13], the complexity of justification is studied for the eight justification statuses proposed in [25]. These are related to, but not the same as the justification statuses that we study: in their work, every subset of is a justification status, which should be interpreted as “there is at least one extension where the argument has this label”. Accordingly, the justification status w.r.t. some semantics σ from [25] corresponds to our σ-sceptical-in justification status; their corresponds to our σ-sceptical-out and their corresponds to our σ-sceptical-undec justification status. There is however no direct mapping between the other statuses. As an additional difference, the authors of [13] give an aggregated result for all statuses, whereas we prove the complexity for each justification status separately. [2] consider the same three justification statuses as we do, but give complexity results for an aggregation of these statuses: they introduce the notions of determinism, totality and functionality and provide complexity results for determining these for a given argument. They define an argument as deterministic if has the same label (in, out or undec) in all extensions. An argument is total if it is in or out in all extensions; arguments are functional if they are both deterministic and total.
Complexity studies on problems defined on IAFs emerged more recently. For example, variants of the verification problem on IAFs are studied in [4]. The problems of stability and relevance differ from the verification problem as they are defined on arguments rather than sets of arguments. More related is [3]: the authors study potential and necessary credulous and sceptical acceptance in IAFs, where necessary sceptical acceptance of a given argument A, for example, means that in each partial completion’s certain projection, each extension (under a given semantics) contains A. The notions of necessary credulous and sceptical acceptance are very similar to specific stability problems: in fact, we used results regarding their complexity for proving the complexity of stable-in statuses. Finally, the notion of stability, which was originally defined on structured argumentation frameworks in [23], is transposed to the context of IAFs in [15] and preliminary complexity results for stability under four semantics are provided. In our work, we define a more fine-grained notion of stability and provide more precise complexity characterisations.
Our notion of relevance has not been introduced or studied before the early version of this work in [18]. Relevance is related to the notion of influenced sets in e.g. [1], which intuitively are sets of arguments whose justification status may change after an update. However, this notion is less strict than relevance: there are situations in which some argument A would be in the influenced set of adding an uncertain attack , while addition of is not relevant for A. Other work related to relevance is [20] on the notion of independence in abstract argumentation. Building on the graph-theoretical criterion of d-separation, the authors introduce independence between argument sets, where the evaluation of one set of arguments can be independent of the evaluation of another set of arguments if the status of a third set of arguments is already known. This seems to be related to our notion of relevance, which also can be seen as a kind of dependence, but in contrast to (ir)relevance, their notion of independence is conditional. Finally, our notion of relevance is related to work on repairing abstract argumentation frameworks [24]. An AF can be repaired if it is possible to remove (a subset-minimal set of) arguments such that some argument becomes accepted. It is therefore related to our notion of in-relevance, but a difference is that relevance is defined on incomplete argumentation frameworks rather than normal AFs, and therefore puts a constraint on the arguments that can be removed.
Conclusion
We have studied the complexity of detecting stability and relevance in incomplete argumentation frameworks. First, we redefined stability [15–17,23] on IAFs. Our definition is a more fine-grained notion than the existing definition on IAFs [15], since it distinguishes between in, out and undec justification statuses. This distinction is appropriate in, for example, applications in inquiry [17,23], where a dialogue discussing a given argument should be terminated if more information cannot change the argument’s (exact) justification status.
As second main contribution of this paper, we performed a complexity analysis for the relevance problem on incomplete argumentation frameworks. Relevance was introduced before for incomplete argumentation frameworks in an early version of this work in [18], but that paper did not contain a full complexity analysis for all relevance statuses considered in this paper. In contrast to the earlier version, we provide complexity results for complete, preferred and stable semantics and study not only in-, but also out- and undec-relevance. Returning to the application in inquiry [16,17], the identification of relevant elements can be used to select the next question, reaching a stable situation in an efficient way.
It is unlikely that the stability and relevance problem itself can be solved efficiently for all inputs: our complexity analysis revealed that the nontrivial variants of the relevance and stability problems have a complexity ranging from the first to the third level of the polynomial hierarchy (cf. Table 1). Interestingly, even within the same semantics, there are differences in the complexity of undec-stability problems and the corresponding in-stability problems – we consider this to be an additional reason to study a fine-grained notion of stability and relevance.
In order to apply these theoretical concepts in practice, we plan to develop algorithms for evaluating or estimating stability and relevance in future work. In addition, we will study stability and relevance in structured argumentation frameworks, such as a dynamic version of ASPIC+, for various semantics.
Footnotes
Proofs justification status
Proofs stability
Proofs relevance
References
1.
G.Alfano, S.Greco, F.Parisi, G.I.Simari and G.R.Simari, On the incremental computation of semantics in dynamic argumentation, Journal of Applied Logics8(6) (2021), 1749–1792. doi:10.1109/MIS.2021.3077292.
2.
G.Alfano, S.Greco, F.Parisi and I.Trubitsyna, Incomplete argumentation frameworks: Properties and complexity, in: Proceedings of the AAAI Conference on Artificial Intelligence, 2022, pp. 5451–5460. doi:10.1609/aaai.v36i5.20483.
3.
D.Baumeister, M.Järvisalo, D.Neugebauer, A.Niskanen and J.Rothe, Acceptance in incomplete argumentation frameworks, Artificial Intelligence295 (2021), 103470. doi:10.1016/j.artint.2021.103470.
4.
D.Baumeister, D.Neugebauer, J.Rothe and H.Schadrack, Verification in incomplete argumentation frameworks, Artificial Intelligence264 (2018), 1–26. doi:10.1016/j.artint.2018.08.001.
5.
A.Borg and F.Bex, A basic framework for explanations in argumentation, IEEE Intelligent Systems36(2) (2021), 25–35. doi:10.1109/MIS.2021.3053102.
6.
M.Caminada, On the issue of reinstatement in argumentation, in: European Workshop on Logics in Artificial Intelligence, Springer, 2006, pp. 111–123. doi:10.1007/11853886_11.
7.
C.Cayrol, C.Devred and M.-C.Lagasquie-Schiex, Handling ignorance in argumentation: Semantics of partial argumentation frameworks, in: European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, 2007, pp. 259–270. doi:10.1007/978-3-540-75256-1_25.
8.
S.Coste-Marquis, C.Devred and P.Marquis, Symmetric argumentation frameworks, in: European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, 2005, pp. 317–328. doi:10.1007/11518655_28.
9.
Y.Dimopoulos and A.Torres, Graph theoretical structures in logic programs and default theories, Theoretical Computer Science170(1–2) (1996), 209–244. doi:10.1016/S0304-3975(96)80707-9.
10.
P.M.Dung, On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games, Artificial Intelligence77 (1995), 321–357. doi:10.1016/0004-3702(94)00041-X.
11.
P.E.Dunne and T.J.Bench-Capon, Coherence in finite argument systems, Artificial Intelligence141(1–2) (2002), 187–203. doi:10.1016/S0004-3702(02)00261-8.
12.
P.E.Dunne and M.Wooldridge, Complexity of abstract argumentation, in: Argumentation in Artificial Intelligence, Springer, 2009, pp. 85–104. doi:10.1007/978-0-387-98197-0_5.
13.
W.Dvořák, On the complexity of computing the justification status of an argument, in: International Workshop on Theorie and Applications of Formal Argumentation, Springer, 2012, pp. 32–49. doi:10.1007/978-3-642-29184-5_3.
14.
W.Dvorák and P.E.Dunne, Computational problems in formal argumentation and their complexity, in: Handbook of Formal Argumentation, 2018, pp. 631–687. ISBN 978-1-84890-275-6.
15.
J.-G.Mailly and J.Rossit, Stability in abstract argumentation, in: NMR 2020 Workshop Notes, 2020, pp. 93–99.
16.
D.Odekerken, F.Bex, A.Borg and B.Testerink, Approximating stability for applied argument-based inquiry, Intelligent Systems with Applications16 (2022), 200110. doi:10.1016/j.iswa.2022.200110.
17.
D.Odekerken, A.Borg and F.Bex, Estimating stability for efficient argument-based inquiry, in: Computational Models of Argument, Proceedings of COMMA 2020, 2020, pp. 307–318. doi:10.3233/FAIA200514.
18.
D.Odekerken, A.Borg and F.Bex, Stability and relevance in incomplete argumentation frameworks, in: Computational Models of Argument, Proceedings of COMMA 2022, 2022, pp. 272–283. doi:10.3233/FAIA220159.
19.
C.Papadimitriou, Computational Complexity, Addison-Wesley, 1994. ISBN 0470864125.
20.
T.Rienstra, M.Thimm, K.Kersting and X.Shao, Independence and D-separation in abstract argumentation, in: Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning, Vol. 17, 2020, pp. 713–722. doi:10.24963/kr.2020/73.
21.
K.Skiba, D.Neugebauer and J.Rothe, Complexity of nonempty existence problems in incomplete argumentation frameworks, IEEE Intelligent Systems36(2) (2020), 13–24. doi:10.1109/MIS.2020.3046782.
22.
L.Stockmeyer, The polynomial-time hierarchy, Theoretical Computer Science3(1) (1976), 1–22. doi:10.1016/0304-3975(76)90061-X.
23.
B.Testerink, D.Odekerken and F.Bex, A method for efficient argument-based inquiry, in: Proceedings of the 13th International Conference on Flexible Query Answering Systems, Springer International Publishing, 2019, pp. 114–125. doi:10.1007/978-3-030-27629-4_13.
24.
M.Ulbricht and R.Baumann, If nothing is accepted–repairing argumentation frameworks, Journal of Artificial Intelligence Research66 (2019), 1099–1145. doi:10.1613/jair.1.11791.
25.
Y.Wu and M.Caminada, A labelling-based justification status of arguments, Studies in Logic3(4) (2010), 12–29.