• Aucun résultat trouvé

Is Your Argument Still Skeptically Accepted?

N/A
N/A
Protected

Academic year: 2022

Partager "Is Your Argument Still Skeptically Accepted?"

Copied!
11
0
0

Texte intégral

(1)

Gianvincenzo Alfano, Sergio Greco, and Francesco Parisi

Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria, Italy

{g.alfano,greco,fparisi}@dimes.unical.it

Abstract. Though there has been an extensive body of work on efficiently solv- ing computational problems for static Dung’s argumentation frameworks (AFs), little work has been done for handling dynamic AFs and in particular for deciding the skeptical acceptance of a given argument. In this paper we discussSPA[6], an efficient algorithm for computing the skeptical preferred acceptance of an argu- ment (goal) in dynamic AFs.SPArelies on two main ideas:i) computing a small portion of the input AF, called “context-based” AF, which is sufficient to deter- mine the status of the goal in the updated AF, andii) incrementally computing the ideal extension to further restrict the context-based AF. We discuss experiments showing thatSPAsignificantly outperforms the computation from scratch, and that the overhead of incrementally maintaining the ideal extension pays off.

Keywords: Argumentation·Skeptical Acceptance·Preferred Semantics.

1 Introduction

Abstract argumentation has emerged as one of the major fields in Artificial Intelli- gence [17, 41]. In particular, abstract argumentation frameworks (AFs) [27] are a sim- ple, yet powerful formalism for modelling disputes between two or more agents. The formal meaning of an AF is given in terms of argumentation semantics, which intu- itively tell us the sets of arguments (calledextensions) that can collectively be used to support a point of view in a discussion.

Although the idea underlying AFs is very simple and intuitive, most of the argumen- tation semantics proposed so far suffer from a high computational complexity [30, 29, 36]. In particular, skeptical reasoning under the well-knownpreferredsemantics—one of the most popular semantics [22]—is in the second level of the polynomial hierarchy.

Efficient algorithms for AFs have been deeply investigated in the literature, as wit- nessed by the International Competition on Computational Models of Argumentation (ICCMA)1. One of the more challenging tasks of ICCMA is deciding the skeptical preferred acceptance of a given argument (goal).

However, ICCMA competition as well as most research have focused on ‘static’

frameworks, whereas in practice AFs are dynamic systems [16, 15, 31, 40, 25]. In fact, an AF often represents a temporary situation, as new arguments and attacks can be added/retracted to take into account new available knowledge. For instance, for dis- putes among users of online social networks [35], arguments/attacks are continuously

1http://argumentationcompetition.org

Copyright c2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).

(2)

added/retracted by users to express their point of view in response to the last moves made by the adversaries.

Recently, the definition of evaluation algorithms taking into account such dynamic aspects has received an increasing attention, as in these situations incremental computa- tion techniques could greatly improve performance [37, 14, 3, 19]. In this regard, a new track focusing on solvers processing dynamic AFs has been recently proposed for the upcoming edition of ICCMA competition [20].

In this paper, we discuss the recently proposed algorithm SPA [6] which incre- mentally solves the following computational task: Given an AFA0, a goal argument g whose skeptical preferred acceptance w.r.t. A0 is known, and an updateu, decide whethergis skeptical preferred accepted w.r.t. the updated AFu(A0), that is, decide if gbelongs to every preferred extension ofu(A0). Thus, we focus on how to efficiently and incrementally solve the ICCMA computational task DS-pr[42].

Contributions We presentSPA[6], an incremental algorithm for computing the Skep- tical Preferred Acceptance of a goal within a dynamic AF, with the following contribu- tions:

– Given an update and an argument, we identify a set of arguments, calledsupporting set, which contains all the arguments whose acceptance status may change after the update and propagate up to the goal argument.

– Given the supporting set, we define the concept ofcontext-based AF that allows us to compute the skeptical preferred acceptance of an argument by focusing on a smaller AF containing the supporting set as well as additional arguments and attacks representing auxiliary information on the external context.

– SPAenables the computation on context-based AFs by means of (non-incremental) state-of-the-art AF solvers. Our solution relies on incrementally maintaining the ideal extension of the given AF. However, to show the relevance of using the ideal extension, we also consider a simpler version of our algorithm (calledSPA-base) which does not consider the information provided by the ideal extension.

– We report on experiments showing the effectiveness of our approach. We compare bothSPAandSPA-basewith the solver that won the ICCMA’17 competition for the computational task DS-pr. BothSPA andSPA-base significantly beat the computation from scratch, andSPAperforms better thanSPA-baseon average.

There has been an extensive body of work on managing changes in argumenta- tion [26]. Besides the above-cited works, other significant efforts coping with dynam- ics aspects of AFs include [13, 21, 23, 11, 18, 2, 4, 9, 8, 5]. Similarly toSPA, some ap- proaches focused on local computation in dynamic AFs [37, 14, 32, 34, 33, 3] but with the aim of recomputing extensions. However,SPAis the first approach addressing the problem of efficiently and incrementally computing skeptical acceptance for dynamic AFs.

(3)

b

c d

a

f e

g h i

j

k

l

b

c d

a

h

+(h,d)

(a) (b)

Fig. 1: (a) AFAF0, (b)CBAF(+(h,d),AF0,Eid,c)

2 Preliminaries

We assume the existence of a setArgofarguments. An(abstract) argumentation frame- work[27] (AF) is a pairhA,Σi, whereA⊆Argis a set ofarguments, andΣ⊆A×Ais a binary relation overAwhose elements are calledattacks.

Given an AFhA,Σiand argumentsa,b∈A, we say thata attacks biff(a,b)∈Σ, and that a setS⊆Aattacksbiff there isa∈Sattackingb. We useS+={b| ∃a∈S: (a,b)∈Σ}to denote the set of arguments attacked byS. Moreover, we say thatS⊆A defends aiff∀b∈Asuch thatb attacks a, there isc∈Ssuch thatc attacks b. A setS⊆A of arguments is said to be: (i)conflict-freeif there are noa,b∈Ssuch thata attacks b;

(ii)admissibleif it is conflict-free and it defends all its arguments.

An argumentation semantics specifies the criteria for identifying a set of arguments that can be considered “reasonable” together, calledextension. Apreferredextension of an AFA is a maximal (w.r.t.⊆) admissible set ofA. Theidealextension ofA is the biggest (w.r.t.⊆) admissible set ofA which is contained in every preferred extension of A. It is well-known that every AF admits exactly one ideal extension which is contained in the intersection of the preferred extensions, which are at least one [28].

Given an AFA =hA,Σiand an argumentg∈A, we say thatgisskeptically ac- ceptedw.r.t.A under the preferred semantics iff for each preferred extensionE ofA it holds thatg∈E. In the following, we useSAA(g)to denote theskeptical acceptance (eithertrueorfalse) ofgw.r.t. AFA.

Example 1. Figure 1(a) shows the graph of the AFAF0=hA00iwhereA0={a,b,c, . . . , l}andΣ0includes, among others, attacks(a,b),(b,a), and(c,d). The preferred ex- tensions of AF0 are Epr={a,d,f,h,j,l} andE0pr={b, d,f, h,k}, while the ideal extension ofAF0isEid={d,f,h}. Thus,SAAF0(d)istrue, and so is forSAAF0(f)and SAAF0(h), while for any other argumentx,SAAF0(x) =false.

Fact 1 LetA be an AF, E the ideal extension ofA, and g an argument ofA. If g∈E then SAA(g) =true. On the other hand, if g∈E+then SAA(g) =false.

Updates Performing an update on an AFA0 means modifying it into an AFA by adding or removing arguments or attacks. We use+(a,b), witha,b∈A0and(a,b)6∈Σ0, (resp.−(a,b), with(a,b)∈Σ0) to denote the addition (resp. deletion) of an attack(a,b),

(4)

andu(A0)to denote the application of updateu=±(a,b)to AFA0(where±means either+or−). Applying an updateuto an AFA0implies that the extensions prescribed by a given semantics, as well as the arguments that are skeptical accepted, may change.

Example 2. Continuing with our running example, letu= +(h,d). The ideal extension of u(AF0) is{f,h}, while the preferred extensions are{a,f,h,j,l} and{b,f,h,k}.

Thus, onlyfandhare skeptically accepted w.r.t.u(AF0).

As for the addition (resp. deletion) of a set ofisolatedarguments (i.e., arguments not adjacent to any other argument in the graph), it is easy to see that ifA is obtained from A0 through the addition (resp. deletion) of a setS of isolated arguments, then every argument inS is trivially skeptically accepted (resp., not accepted) w.r.t.A. Indeed, if E0 is an extension forA0, thenE =E0∪S (resp.E =E0\S) is an extension for A containing every (resp., none) argument inS. Of course, if arguments inS are not isolated, for addition we can first add isolated arguments and then add attacks involving these arguments, while for deletion we can first delete all attacks involving arguments inS. Thus we do not consider these kinds of updates in the following, and focus on the addition and deletions of attacks.

Notation for reachability and other useful concepts Given an AFA =hA,Σiand an argumentx, we useReachA(x)to denote the set of arguments that are reachable fromx in the AFA. Moreover, we useReach−1A (x)to denote the set of arguments from which xis reachable inA. For instance, for the AFAF0=hA00iof our running example (see Figure 1(a)), we have that ReachAF0(d) ={d,c,g,h,i}, andReach−1AF

0(h) =A0\ {i,j,k,l}. We writeReachA(x) =/0 andReach−1A (x) =/0 ifxis not inA.

We useH(A,u)to denote the larger AF betweenA andu(A), that is,H(A,u) is (i) the updated AF u(A)if u is an addition update (it includes the attack added throughu), (ii) the original AFA ifuis a deletion (the removed attack is still considered inH(A,u)). For instance, ifu= +(h,d)thenH(AF0,u) =hA00∪ {(h,d)}i, while H(AF0,u) =AF0for any deletion updateu.

We useΠ(S,A)to denote therestrictionof AFA =hA,Σito a subsetS⊆Aof its arguments [13], that isΠ(S,A) =hS, Σ∩(S×S)i. For instance, ifS={c,d}then Π(S,AF0) =h{c,d},{(c,d),(d,c)}i.

Finally, givenA1=hA11i andA2=hA22i, we denote as A1tA2=hA1∪ A21∪Σ2itheunionof the two AFs.

3 Supporting Set

In this section, we introduce the concept ofsupporting set which intuitively consists of the set of arguments that needs to be taken into account in order to determine the skeptical acceptance of an argument of interest after performing an update. We provide a parametric definition of supporting set that will enable the characterization of different portions of a given AF, calledcontext-based AFs, that will be used for two different purposes: (i) recompute the skeptical acceptance of a goal w.r.t. the updated AF, and (ii) recompute the ideal extension of the updated AF.

(5)

Before defining the supporting set, we introduce the auxiliary notion ofsteadiness of an argument. Given an AFA =hA,Σi, the ideal extensionE ofA, and an update u=±(a,b), we first defineE(u)as the subset ofE consisting of the arguments which are not reachable frombinA, i.e.,E(u) ={z|z∈E,z6∈ReachA(b)}. Intuitively, the acceptance status of the arguments inE(u)is not affected byuas they are not reach- able from it. Then, the set ofsteadyarguments foru=±(a,b)w.r.t.A is defined as StdA(u) = (E(u))+\{b}, i.e., the arguments attacked byE(u)inA and that will be still attacked byE(u)inu(A). Argumentbis not included inStdA(u)as it may be no longer attacked bya∈E(u)after performingu=−(a,b); however, it will be considered for positive updates in Definition 1. For the AFAF0of our example, whereEid={d,f,h}, ifu= +(h,d)thenEid(u) ={f}andStdAF0(u) ={e,g} ⊆Eid+={c,e,g,i}.

Definition 1 (Supporting set).LetA =hA,Σibe an AF, u=±(a,b)an update, E the ideal extension ofA, and g an argument in A. Let

– Sup0(u,A,E,g) =





/0 if u= +(a,b)∧b∈(E(u))+; /0 if b6∈Reach−1H(A,u)(g);

{b} otherwise.

– Supi+1(u,A,E,g)=Supi(u,A,E,g)∪ {y| ∃(x,y)∈Σs.t.x∈Supi(u,A,E,g)∧ y∈Reach−1H(A,u)(g)∧y6∈StdA(u)}.

Let n be the natural number such that Supn(u,A,E,g) =Supn+1(u,A,E,g). Thesup- porting setSup(u,A,E,g)is:

Sup(u,A,E,g) =Supn(u,A,E,g)∩Reach−1G (g) (1) where G=Π(Supn(u,A,E,g),H(A,u))is the restriction of H(A,u)to Supn(u,A,E,g).

Finally, when g is not specified, the supporting set, denoted as Sup(u,A,E, ?), is defined as Sup(u,A,E,g)except that all the checks concerning Reach−1are omitted.

Intuitively,Sup(u,A,E,g)consists of the arguments whose status may change after performing an updateuand such that their change can imply a change of the status ofg.

More in detail,Sup(u,A,E,g)foru=±(a,b)andgconsists of the arguments that (i) can be reached frombwithout using any steady argumenty; and (ii) allow to reachgin H(A,u)by using only the arguments inSupn(u,A,E,g). In fact, Equation (1) entails that an argument ofSupn(u,A,E,g)will be inSup(u,A,E,g)only if it can reachgin the restriction ofH(A,u)toSupn(u,A,E,g)—the other arguments inSupn(u,A,E,g) are not needed to determine the acceptance status ofg, and thus they are pruned by Equation (1).

When no argumentgis specified, the setSup(u,A,E, ?)is built by ignoring condi- tion (ii) above. It is easy to see that, for any argumentg,Sup(u,A,E,g)⊆Sup(u,A,E,

?)⊆ReachA(b), wherebis the argument in the updateu=±(a,b). Moreover,Sup(u,A, E,g)may be empty even ifg∈ReachA(b). Finally, ifSup(u,A,E,g)6=/0 then the ar- guments of at least one path frombtogbelong toSup(u,A,E,g).

Example 3. For the goalc, we have thatSup0(u,AF0,Eid,c) ={d},Sup1(u,AF0,Eid,c) = {c,d}, andSup2(u,AF0,Eid,c) ={c,d}(the latter does not containgsinceg∈StdAF0(u)).

(6)

Thus,Sup(u,AF0,Eid,c) ={c,d}as bothcanddallow to reachcin the restriction of the updated AF to{c,d}. Analogously, we have thatSup(u,AF0,Eid, ?) ={c,d}.

Consider now the goalh. AgainSup0(u,AF0,Eid,h) ={d}, andSup1(u,AF0,Eid,h) = Sup2(u,AF0,Eid,h) ={c,d}. However,Sup(u,AF0,Eid,h) =/0 as{c,d}∩Reach−1G (h) =

/0, whereG=Π({c,d},u(AF0)). Finally, for the goala,Sup(u,AF0,Eid,a) =/0.

Theorem 1. LetA0=hA00ibe an AF, E0the ideal extension ofA0, u=±(a,b)an update,A =u(A0)the updated AF, and x an argument in A0. Therefore, if Sup(u,A0, E0,x) =/0then SAA(x) =SAA0(x).

Example 4. SinceSup(u,AF0,Eid,h) =/0 we can conclude thatSAu(AF0)(h) =SAAF0(h) = true. Similarly, sinceSup(u,AF0,Eid,a) =/0 thenSAu(AF0)(a) =SAAF0(a) =false.

4 Context-Based Argumentation Frameworks

The supporting set has been used so far to determine whether the status of the goal does not need to be recomputed. In this section, starting from the supporting set, we define a restriction of the AF which will be used to compute the status of the goal after an update.

Specifically, given the setSup(u,A,E,g)(resp.Sup(u,A,E, ?)), we define thecontext- based AF CBAF(u,A,E,g)(resp.CBAF(u,A,E, ?)). WhileCBAF(u,A,E, ?)will be used to incrementally compute the ideal extension of the updated AF (with the aim of checking if one of the conditions of Fact 1 holds),CBAF(u,A,E,g)will be used to compute the skeptical acceptanceSAu(A)(g)w.r.t. the updated AF.

Given an AFA =hA,Σi, its ideal extensionE, and a setS⊆A, we useNodes(A,S, E)to denote the set of the nodesx∈Asuch that there are a nodey∈Sand a path from xtoyinA such that all nodes in the path exceptydo not belong toE∪E+(i.e., they areundecided [12]). Analogously,Edges(A,S,E)is the set of edges(x,z)∈Σ such that there arey∈Sand a path fromxtoyinA containing(x,z)such that all nodes in the path exceptydo not belong toE∪E+. Essentially, ifSis the supporting set, to determine the status of nodes inSwe must also consider all nodes and attacks occurring in paths (of any length) ending inSwhose nodes outsideSare undecided.

Definition 2 (Context-Based AF).LetA =hA,Σibe an AF, u=±(a,b), E the ideal extension ofA, and x either an argument in A or the symbol?. Let S=Sup(u,A,E,x).

The context-based AF ofA w.r.t. u and x isCBAF(u,A,E,x) =Π(Sup(u,A,E,x), u(A))tT1tT2where:

– T1 is the union of the AFsh{c,d},{(c,d)}i s.t. (c,d)is an attack of u(A)and c6∈Sup(u,A,E,x), c∈E, and d∈Sup(u,A,E,x);

– T2=hNodes(u(A),S,E),Edges(u(A),S,E)i.

Example 5. ForAF0, whereEid={d,f,h}, andu= +(h,d), we have seen in Example 3 thatSup(u,AF0,Eid,c) ={c,d}. ThusCBAF(u,AF0,Eid,c) =h{c,d},{(c,d),(d,c)}it T1tT2where:T1=h{h,d},{(h,d)}isinceh∈Eiddoes not belong toSup(u,AF0,Eid,c) while d∈Sup(u,AF0,Eid,c); andT2=h{a,b,c},{(a,b), (b,a),(a,c),(b,c)}i since there are paths starting from the undecided argumentsaandb({a,b} 6⊆(Eid∪Eid+)) and ending inc∈Sup(u,AF0,Eid,c). Thus,CBAF(u,AF0,Eid,c)is the AF shown in Figure 1(b). Also,CBAF(u,AF0,Eid, ?) =CBAF(u,AF0,Eid,c).

(7)

Algorithm 1SPA(A0,g,SAA0(g),u,E0) Input: AFA0=hA00i,

argumentg∈A0,

skeptical acceptanceSAA0(g)ofgw.r.t.A0, updateu=±(a,b),

ideal extensionE0ofA0.

Output: skeptical acceptanceSAu(A0)(g)ofgw.r.t.u(A0), ideal extensionEofu(A0).

1: LetS?=Sup(u,A0,E0, ?) 2: LetAid=CBAF(u,A0,E0, ?) 3: LetE= (E0\S?)∪ID-Solver(Aid) 4: ifg∈Ethen

5: return htrue,Ei 6: ifg∈E+then 7: return hfalse,Ei 8: LetSg=Sup(u,A0,E0,g) 9: ifSgis emptythen 10: return hSAA0(g),Ei 11: LetAsa=CBAF(u,A0,E0,g) 12: return hSA-Solver(Asa,g),Ei

Theorem 2. LetA0=hA00ibe an AF, E0the ideal extension ofA0, u=±(a,b)an update,A =u(A0)the updated AF, and x an argument in A0. Thus, if Sup(u,A0,E0,x)6=

/0then x is skeptically accepted w.r.t.A iff it is skeptically accepted w.r.t. the context- based AFCBAF(u,A0,E0,x).

Example 6. Continuing from Example 5, we can conclude that argumentcis not skep- tically accepted w.r.t. the updated AFu(AF0)because it is not skeptically accepted w.r.t.

the context-based AFCBAF(u,AF0,Eid,c)of Figure 1(b) whose preferred extensions are{a,h}and{b,h}(onlyhis sceptically accepted w.r.t. the context-based AF).

Theorem 3. LetA0=hA00ibe an AF, E0the ideal extension ofA0, u=±(a,b)an update, andA =u(A0)the updated AF. Then, the ideal extension E ofA is such that E= (E0\Sup(u,A0,E0, ?))∪E0, where E0is the ideal extension of the context-based AFCBAF(u,A0,E0, ?).

Example 7. Continuing from Example 5, the ideal extension{f,h}ofu(AF0)is equal to({d,f,h} \ {c,d})∪ {h}where{h}is the ideal extension ofCBAF(u,AF0,Eid, ?).

5 Incremental Computation

The results of Theorems 1 and 2, along with those of Theorem 3 and Fact 1, allow us to defineSPA(see Algorithm 1) to decide the skeptical acceptance of a goalgw.r.t. an AFA0updated byu=±(a,b). AlgorithmSPAworks as follows. First, the supporting setS?=Sup(u,A0,E0, ?)is computed at Line 1, and using Theorem 3 the ideal exten- sionE of the updated AF is computed by invoking an external solverID-Solver(Aid),

(8)

●●

●●●●

●●● ●

10−1 100 101 102 103 104 105 106 107

102 103 104 105 N. of Attacks

SPA SPA−base

● ●●

●●

●●

●●

●●

●●●●●●●●●

●●

●●●

● ●

● ●

● ●

●●

●●

●●

●●●

●●● ●

10−1 100 101 102 103 104 105 106 107

102 103 104 105 106 N. of Attacks

SPA SPA−base

Fig. 2: Improvement ofSPAandSPA-baseoverArgSemSATonA2 (LHS) andA3 (RHS)

computing the ideal extension of the context-based AF CBAF(u,A0,E0, ?)(Line 3).

Then, using Fact 1, ifgbelongs toE, thengis skeptically accepted and the algorithm returns true along with the ideal extension of the updated AF (Line 5). Similarly, if g belongs to the set of arguments attacked by an argument inE, theng is not skep- tically accepted and the algorithm returnsfalsealong withE (Line 7). Otherwise, the setSg=Sup(u,A0,E0,g)is built (it can be efficiently done by starting fromS?), and it is checked if it is empty. If this is the case, using Theorem 1, we can conclude that the acceptance status ofgdoes not change after the update (Line 10). Otherwise, the context-based AF is built at Line 11 and, using Theorem 2, the skeptical acceptance of gis recomputed by invoking an external solverSA-Solver(Asa,g) which tells us ifgis skeptically accepted w.r.t. the context-based AFCBAF(u,A0,E0,g)(Line 12).

SPA-base: A version ofSPAnot using the ideal extension SPA-baseis obtained fromSPAby skipping lines 1–7 of Algorithm 1 and assumingE0=/0 at lines 8 and 11 to computeSgandAsarespectively. Also, no ideal extension is returned (i.e.,E=⊥).

Notice that, similarly toSPA-base,SPAdoes not use the information provided by the initial ideal extension whenE0=/0, though SPAalways incrementally computes the ideal extension of the updated AF.

6 Experimental Results

We have implemented a C++ prototype and compared our incremental technique with ArgSemSAT[24], the solver that won the last ICCMA competition for the task DS-pr of determining the skeptical preferred acceptance.

As for the datasets, we used benchmarks from the DS-prtrack of ICCMA’17, that is, the datasetA2 consisting of 50 AFs with a number of arguments|A| ∈[61,20K]and a number of attacks|Σ| ∈[97,358K], and the datasetA3 consisting of 100 AFs with

|A| ∈[39,100K]and|Σ| ∈[72,1.26M]. For each AFA0in the dataset, we randomly selected an updateu and an argumentg. Then, we computedSAu(A0)(g)by using 1) SPA, that is Algorithm 1 whereID-Solverispyglaf [10] andSA-SolverisArgSemSAT; 2)SPA-basewhere onlyArgSemSATis used; and 3)ArgSemSAT(from scratch).

(9)

For AFA0, updateu, and argumentg, lettAandtBbe the amount of time required bySPAandSPA-base, respectively, to computeSAu(A0)(g). LettSbe the time required byArgSemSAT to computeSAu(A0)(g)from scratch. Then, theimprovementsofSPA andSPA-baseoverArgSemSAT are defined as ttS

A and ttS

B, respectively. Thus, an im- provement equal toxmeans that the incremental computation isxtimes faster than the computation from scratch.

Figure 2 reports the improvement (log scale) ofSPAandSPA-baseoverArgSem- SAT on datasetsA2 (left-hand side) and A3 (right-hand side) for single updates ver- sus the size of the AFs, i.e., the number of attacks (solid lines are obtained by linear regression). BothSPAandSPA-basesignificantly outperform the computation from scratch, though the improvement decreases as the number of attacks increases—this be- havior is in line with that of algorithms for computing argumentation semantics in the static setting [38, 39, 7, 1] and it is further analyzed in [6] where additional experiments consideringsets of updatesperformed simultaneously are presented.

Considering the averages of the improvements,SPAandSPA-baseturn out to be 5 and 4 orders of magnitude faster thanArgSemSAT, respectively. However, as this can be skewed by extremely large values of improvements (e.g. 106), we also considered the medians of improvements forSPA(32 onA2, 134 onA3) andSPA-base(27 on A2, 40 onA3) (see dashed line in Figure 2), which confirm the significance of the gain in efficiency. In brief, bothSPAandSPA-basegenerally outperform the computation from scratch, andSPAis generally faster thanSPA-baseexcept for a few AFs whose initial ideal extension is empty—future work will focus on devising heuristics to take advantages of both algorithms.

References

1. Alfano, G.: An efficient algorithm for computing the set of semi-stable extensions. In: FQAS.

pp. 139–151 (2019)

2. Alfano, G., Greco, S., Parisi, F.: Computing stable and preferred extensions of dynamic bipo- lar argumentation frameworks. In:AI3, co-located with AI*IA. pp. 28–42 (2017)

3. Alfano, G., Greco, S., Parisi, F.: Efficient computation of extensions for dynamic abstract argumentation frameworks: An incremental approach. In: IJCAI. pp. 49–55 (2017) 4. Alfano, G., Greco, S., Parisi, F.: Computing extensions of dynamic abstract argumentation

frameworks with second-order attacks. In: IDEAS. pp. 183–192 (2018)

5. Alfano, G., Greco, S., Parisi, F.: A meta-argumentation approach for the efficient computa- tion of stable and preferred extensions in dynamic bipolar argumentation frameworks. Intel- ligenza Artificiale12(2), 193–211 (2018)

6. Alfano, G., Greco, S., Parisi, F.: An efficient algorithm for skeptical preferred acceptance in dynamic argumentation frameworks. In: IJCAI. p. To appear (2019)

7. Alfano, G., Greco, S., Parisi, F.: On scaling the enumeration of the preferred extensions of abstract argumentation frameworks. In: SAC. pp. 1147–1153 (2019)

8. Alfano, G., Greco, S., Parisi, F., Simari, G.I., Simari, G.R.: An incremental approach to structured argumentation over dynamic knowledge bases. In: KR 2018. pp. 78–87 (2018) 9. Alfano, G., Greco, S., Parisi, F., Simari, G.I., Simari, G.R.: Incremental computation of war-

ranted arguments in dynamic defeasible argumentation: The rule addition case. In: SAC. pp.

911–917 (2018)

10. Alviano, M.: The pyglaf argumentation reasoner. In: ICLP. pp. 2:1–2:3 (2017)

(10)

11. Amgoud, L., Vesic, S.: Revising option status in argument-based decision systems. J. Log.

Comput.22(5), 1019–1058 (2012)

12. Baroni, P., Caminada, M., Giacomin, M.: An introduction to argumentation semantics. The Knowledge Engineering Review26(4), 365–410 (2011)

13. Baroni, P., Giacomin, M., Guida, G.: SCC-recursiveness: a general schema for argumentation semantics. Artif. Intell.168(1-2), 162–210 (2005)

14. Baroni, P., Giacomin, M., Liao, B.: On topology-related properties of abstract argumentation semantics. A correction and extension to dynamics of argumentation systems: A division- based method. Artif. Intell.212, 104–115 (2014)

15. Baumann, R.: Splitting an argumentation framework. In: LPNMR. pp. 40–53 (2011) 16. Baumann, R., Brewka, G.: Expanding argumentation frameworks: Enforcing and monotonic-

ity results. In: COMMA. pp. 75–86 (2010)

17. Bench-Capon, T.J.M., Dunne, P.E.: Argumentation in AI. Artif. Intell.171(10–15), 619 – 641 (2007)

18. Bisquert, P., Cayrol, C., de Saint-Cyr, F.D., Lagasquie-Schiex, M.: Characterizing change in abstract argumentation systems. In: Trends in Belief Revision and Argumentation Dynamics, vol. 48, pp. 75–102 (2013)

19. Bistarelli, S., Faloci, F., Santini, F., Taticchi, C.: Studying dynamics in argumentation with Rob. In: COMMA. pp. 451–452 (2018)

20. Bistarelli, S., Kotthoff, L., Santini, F., Taticchi, C.: Containerisation and dynamic frameworks in ICCMA’19. In: SAFA Workshop co-located with COMMA. pp. 4–9 (2018)

21. Boella, G., Kaci, S., van der Torre, L.W.N.: Dynamics in argumentation with single ex- tensions: Abstraction principles and the grounded extension. In: ECSQARU. pp. 107–118 (2009)

22. Caminada, M.W.A., Dvor´ak, W., Vesic, S.: Preferred semantics as socratic discussion. J. Log.

Comput.26(4), 1257–1292 (2016)

23. Cayrol, C., de Saint-Cyr, F.D., Lagasquie-Schiex, M.: Revision of an argumentation system.

In: KR. pp. 124–134 (2008)

24. Cerutti, F., Giacomin, M., Vallati, M.: ArgSemSAT: Solving argumentation problems using SAT. In: COMMA. pp. 455–456 (2014)

25. Charwat, G., Dvor´ak, W., Gaggl, S.A., Wallner, J.P., Woltran, S.: Methods for solving rea- soning problems in abstract argumentation - A survey. Artif. Intell.220, 28–63 (2015) 26. Doutre, S., Mailly, J.: Constraints and changes: A survey of abstract argumentation dynam-

ics. Argument & Computation9(3), 223–248 (2018)

27. Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell.77(2), 321–358 (1995) 28. Dung, P.M., Mancarella, P., Toni, F.: Computing ideal sceptical argumentation. Artif. Intell.

171(10-15), 642–674 (2007)

29. Dunne, P.E.: The computational complexity of ideal semantics. Artif. Intell.173(18), 1559–

1591 (2009)

30. Dunne, P.E., Wooldridge, M.: Complexity of abstract argumentation. In: Argumentation in AI, pp. 85–104 (2009)

31. Falappa, M.A., Garcia, A.J., Kern-Isberner, G., Simari, G.R.: On the evolving relation be- tween belief revision and argumentation. The Knowledge Engineering Review26(1), 35–43 (2011)

32. Greco, S., Parisi, F.: Efficient computation of deterministic extensions for dynamic abstract argumentation frameworks. In: ECAI. pp. 1668–1669 (2016)

33. Greco, S., Parisi, F.: Incremental computation of deterministic extensions for dynamic argu- mentation frameworks. In: JELIA. pp. 288–304 (2016)

(11)

34. Greco, S., Parisi, F.: Incremental computation of grounded semantics for dynamic abstract argumentation frameworks. In: COREDEMA ECAI Workshop, Revised Selected Papers. pp.

66–81 (2016)

35. K¨okciyan, N., Yaglikci, N., Yolum, P.: An argumentation approach for resolving privacy disputes in online social networks. ACM Trans. Internet Techn.17(3), 1–22 (2017) 36. Kr¨oll, M., Pichler, R., Woltran, S.: On the complexity of enumerating the extensions of ab-

stract argumentation frameworks. In: IJCAI. pp. 1145–1152 (2017)

37. Liao, B.S., Jin, L., Koons, R.C.: Dynamics of argumentation systems: A division-based method. Artif. Intell.175(11), 1790–1814 (2011)

38. Liao, B.: Toward incremental computation of argumentation semantics: A decomposition- based approach. Ann. Math. Artif. Intell.67(3-4), 319–358 (2013)

39. Liao, B., Huang, H.: Partial semantics of argumentation: basic properties and empirical re- sults. J. Log. Comput.23(3), 541–562 (2013)

40. Oikarinen, E., Woltran, S.: Characterizing strong equivalence for argumentation frameworks.

Artif. Intell.175(14-15), 1985–2009 (2011)

41. Rahwan, I., Simari, G.R.: Argumentation in AI. Springer Publishing Company, Incorporated, 1st edn. (2009)

42. Thimm, M., Villata, S.: The first international competition on computational models of ar- gumentation: Results and analysis. Artif. Intell.252, 267–294 (2017)

Références

Documents relatifs

Assuming h is ideal the security of this hash function can be directly related to the problem underlying the security of Ajtai's one-way function [Aj, GGH] so that it is

UN CONCENTRÉ D’ÉFFICACITÉ ISSU DE LA NATURE Le Spa du Pashmina by L’OCCITANE propose un large choix de soins visage et corps, de massages qui s’appuient sur

If an abstract graph G admits an edge-inserting com- binatorial decomposition, then the reconstruction of the graph from the atomic decomposition produces a set of equations and

In this paper, we will see that a surjective linear local automorphism θ of a von Neumann algebra N is a Jordan isomorphism. In case N is properly infinite, θ is an automorphism. On

When naively applying the scheme depicted in Fig. 2, it became apparent that it is critical to determine the exact value of τ ALD , because the slightest error on the length of the

In the oxygen pulse, typical combustion reaction products are observed. Horizontal slices of spectra during the oxygen plasma pulse are shown in Fig. We can clearly

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Keywords — Image analysis applications; Symmetric Co- occurrence matrix (GLCM); Parallel computation; Haralick’s texture feature; Hardware Implementation; FPGA; Vivado