Abstract
Bipolar argumentation frameworks (BAFs) extend Dung’s argumentation frameworks to explicitly represent the notion of support between arguments, in addition to that of attack. BAFs can be profitably used to model disputes between two or more agents, with the aim of deciding the sets of arguments that should be accepted to support a point of view in a discussion. However, since new arguments, attacks, and supports are often introduced to take into account new available knowledge, BAFs as well as the set of accepted arguments (under a given semantics) change over the time.
In this paper we first tackle the problem of efficiently recomputing sets of accepted arguments of dynamic BAFs (under the preferred and stable semantics). Focusing on a deductive interpretation of the support relation, we introduce an incremental approach that, given an initial BAF, an initial extension for it, and an update, computes an extension of the updated BAF. This is achieved by introducing a meta-argumentation transformation according to which an initial BAF, as well as its extension and an update, are transformed into a plain argumentation framework (AF) with a suitable initial extension and update. Thanks to the use of the meta-argumentation intermediate level, our approach is able to incorporate existing AF-solvers and an incremental technique for plain AFs in order to compute an extension of the updated BAF. Moreover, our approach can be seamlessly applied to a more general form of BAFs, namely Extended Bipolar Argumentation Frameworks (EAFs), where defeasible supports and defeats are modelled by means of second-order attacks (i.e., attacks toward elements of the support or attack relation).
We experimentally validated our approach on both BAFs and EAFs. The experiments showed that, on average, our technique is almost 100 times faster than computing extensions of updated BAFs or EAFs from scratch.
Introduction
Argumentation has emerged as one of the central fields in Artificial Intelligence [12, 55]. In particular, Dung’s abstract argumentation framework [33] is a simple, yet powerful formalism for modelling disputes between two or more agents. The formal meaning of an argumentation framework is given in terms of argumentation semantics, which intuitively tell us the sets of arguments (called extensions) that should be accepted to support a point of view in a discussion.
Bipolar argumentation frameworks (BAFs) are an interesting extension of the Dung’s frameworks, which allow two kinds of interactions between arguments to be modeled: the attack relation (as in Dung’s argumentation frameworks) and the support relation. Several interpretations of the notion of support have been proposed in the literature [9, 60] (see [32] for a comprehensive survey). In this paper, we focus on deductive support [21, 60] which is intended to capture the following intuition: if argument a supports argument b then the acceptance of a implies the acceptance of b, and thus the non-acceptance of b implies the non-acceptance of a.
Although most research in argumentation focused on static frameworks (i.e., frameworks not changing over the time), argumentation frameworks (e.g. BAFs) are often used to model dynamic systems [14, 48]. In fact, usually a BAF represents a temporary situation, and new arguments, attacks, and supports can be added/retracted to take into account new available knowledge. For instance, for disputes among users of online social networks [7, 47], arguments, attacks, and supports are continuously added/retracted by users to express their point of view in response to the last move made by the adversaries (often disclosing as few arguments/attacks as possible).
However, the definition of evaluation algorithms for dynamic BAFs and the analysis of the computational complexity taking into account such dynamic aspects have been mostly neglected, whereas in these situations incremental computation techniques could greatly improve performance. Recently, focusing on Dung’s AFs, in [3] we have proposed a technique for incrementally computing extensions for dynamic AFs. That is, given an AF, an initial extension for it, and an update, we devised an efficient technique for computing an extension of the updated AF. In this paper, we show that the technique proposed in [3] can be profitably used to compute extensions of dynamic BAFs. Thus, here we address the following problem: given a BAF We identify early-termination conditions for checking whether a given extension for an initial BAF is still an extension for the updated BAF. When these conditions hold, we do not need to recompute an extension of the updated BAF. We build on the meta-argumentation approach proposed in [21] to define a reduction of the problem of determining an extension of an updated BAF to that of determining an extension of a corresponding updated Dung’s argumentation framework. We define an incremental algorithm for computing extensions of dynamic BAFs by leveraging on the incremental technique proposed in [3]. We show that our approach for BAFs, and in particular each of the steps 1)–3), can be seamlessly extended to deal with Extended Bipolar Argumentation Frameworks [21] (EAFs) which allow us to model defeasible support as well as attacks toward the attack relation [13, 51]. We performed an experimental analysis showing that our incremental approach for BAFs, as well as for EAFs, outperforms by two orders of magnitude the computation from scratch, where the fastest solvers from the last edition of the International Competition on Computational Models of Argumentation (ICCMA)
1
taking as input the Dung’s argumentation frameworks resulting from the transformation at step 2) are used.
Plan of the paper. After reviewing basic concepts of Bipolar Argumentation Frameworks (BAFs) in Section 2, we discuss updates in Section 3. Then, we gradually introduce our approach by first addressing the case of BAFs (Section 4) and then extending the approach to Extended Bipolar Argumentation Frameworks (EAFs) in Section 5. Specifically, after formalizing the basic steps of our approach for BAFs in Section 4, we introduce early-termination conditions (Section 4.1) as well as the meta-argumentation framework (Section 4.2) enabling algorithm Incr-BAF given in Section 4.3. Then, we move to EAFs in Section 5 where, following the scheme given in Section 4, we discuss additional early-termination conditions (Section 5.1) and a revised meta-argumentation framework (Section 5.2) needed to formalize the incremental computation for EAFs—algorithm Incr-EAF is discussed in Section 5.3. The technique proposed is experimentally evaluated in Section 6. Finally, we discuss related work in Section 7, and draw conclusions and outline directions for future work in Section 8.
This paper extends [2] in the following respects. We revise and improve the incremental computation technique for BAFs proposed in [2] by introducing the notion of compact meta-AF (Section 4.2)—this yields a significant improvement in efficiency over the original approach as we discuss in Section 7. Moreover, we generalize the (revised) approach proposed for BAFs to deal with EAFs, and perform a thorough experimental analysis for both BAFs and EAFs using solvers and benchmarks from the last edition of the ICCMA argumentation competition.
Bipolar argumentation framework
We assume the existence of a set Arg of arguments. An abstract bipolar argumentation framework (BAF for short) [9] is a triple 〈A, Σ, Π〉, where (i) A ⊆ Arg is a (finite) set whose elements are referred to as arguments, (ii) Σ ⊆ A × A is a binary relation over A whose elements are called attacks, (iii) Π ⊆ A × A is a binary relation over A whose elements are called supports, and (iv) Σ∩ Π = ∅. Thus, a Dung’s argumentation framework (AF) [33] is a BAF of the form 〈A, Σ, ∅ 〉.
An argument is an abstract entity whose role is entirely determined by its relationships with other arguments. A BAF can be viewed as a directed graph where each node corresponds to an argument and each edge in the graph corresponds to either an attacks or a support. Given a BAF
A0 = {a, b, c, d, e, f} is the set of arguments; Σ0 = {(a, c) , (c, b) , (b, d) , (d, e) , (e, d) , (e, e) , (e, f)} is the set of attacks; Π0 = {(a, b)} is the set of supports;
The bipolar interaction graph
□

BAFs
Several interpretations of the notion of support have been proposed in the literature [32]. In this paper, we focus on deductive support [21] which is intended to capture the following intuition: if argument a supports argument b then the acceptance of a implies the acceptance of b, and thus the non-acceptance of b implies the non-acceptance of a. Given this interpretation of support, the coexistence of the support and attack relations in BAFs entails that new kinds of “implicit” attacks should be considered, as explained in what follows.
Given a BAF 〈A, Σ, Π〉, a supported attack for an argument b ∈ A by argument a1 ∈ A is a sequence a1Πa2Π … Πa n Σ b with n ≥ 1. Note that a direct attack a1Σ b is a supported attack. Thus a supported attack is a (possibly empty) chain of supports followed by an attack. Moreover, we say that there is a mediated attack for argument a1 by argument b if there is an attack bΣa n and a sequence of supports a1Πa2Π … Πa n with n ≥ 1. Thus, for a mediated attack the chain of supports ends in a n which is attacked by b. Supported and mediated attacks are illustrated in Fig. 2, where a chain consisting of only one support is considered. It is easy to see that the BAF of Example 1 contains a supported attack from argument a to d, and a mediated attack from argument c to a. 2

Supported and mediated attacks.
Given a BAF 〈A, Σ, Π 〉, we say that a set S ⊆ Aset-attacks an argument b ∈ A iff there exists a supported or mediated attack for b by an argument a ∈ S. We use S+ to denote the set of arguments set-attacked by S. Moreover, we say that a set S ⊆ Adefends an argument a ∈ A iff for each b ∈ A such that {b} set-attacks a, it is the case that S set-attacks b (i.e., b ∈ S+).
Given a BAF 〈A, Σ, Π 〉, a set S ⊆ A is conflict-free iff there are no arguments a, b ∈ S such that {a} set-attacks b. Moreover, a conflict-free set S ⊆ A is said to be admissible iff it defends all of its arguments.
Given a BAF 〈A, Σ, Π 〉, a preferred extension (
Given a BAF
Labelling and status of arguments
Following the approach of [12], where argumentation semantics have been characterized in terms of labelling, we define a labelling function for BAFs. A labelling for a BAF
Let in (L) = {a | a ∈ A ∧ L (a) = IN}, out (L) = {a | a ∈ A ∧ L (a) = OUT}, and un (L) = {a | a ∈ A ∧ L (a) = UNDEC}. In the following, we also use the triple 〈in (L) , out (L) , un (L) 〉 to represent the labelling L.
Given a BAF
Between preferred/stable extensions and complete labellings there is a bijective mapping defined as follows: for each extension E there is a unique labelling L = 〈E, E+, A \ (E ∪ E+) 〉 and for each labelling L there is a unique extension in (L). We say that L is the labelling corresponding to E. For instance, considering the BAF
In the following, we say that the status of an argumenta w.r.t. a labelling L (or its corresponding extension in (L)) is IN (resp., OUT, UNDEC) iff L (a) = IN (resp., L (a) = OUT, L (a) = UNDEC). We will avoid to mention explicitly the labelling (or the extension) whenever it is clear from the context.
Meta-argumentation framework
The semantics of BAFs can be also given in terms of meta-argumentation frameworks (i.e., Dung’s AFs) where additional (meta-)arguments and attacks are considered to model deductive support. The following construction, introduced in [21], will be used as the basis for defining the meta-argumentation framework of our incremental approach.
A
m
= A ∪ {Xa,b, Ya,b ∣ (a, b) ∈ Σ} ∪ {Za,b ∣ (a, b) ∈ Π} Σ
m
= {(a, Xa,b) , (Xa,b, Ya,b) , (Ya,b, b) ∣ (a, b) ∈ Σ} ∪ {(b, Za,b) , (Za,b, a) ∣ (a, b) ∈ Π}
The meaning of meta-arguments Xa,b, Ya,b and Za,b is as follows. Xa,b represents the fact that the corresponding attack (a, b) is “not active” in

Meta-AF
The following proposition characterizes the relationship between the extensions of a given BAF and the extensions of the corresponding meta-AF.
A stable extension for
An updateu for a BAF
We will use
Applying an update u to a BAF implies that its semantics (set of extensions or labellings) may change. Continuing with our running example, for the BAF
In the following, for the sake of the presentation, we consider only feasible updates which are defined as follows. Adding an argument as well as removing an attack/support are feasible updates. The deletion of an argument is feasible only if a is isolated, that is there is no argument b attacking/supporting a or being attacked/supported by a, where a is not necessarily distinct from b. The addition of an attack (resp., support) between a and b is feasible only if a and b are arguments of the initial BAF
Clearly, general updates can be simulated by a sequence of feasible updates. For instance, an isolated argument a can be deleted after deleting all attacks and supports involving a (by performing a sequence of feasible updates). Analogously, adding an attack (resp., a support) between an argument a in
Finally, observe that if a BAF
Computing extensions of updated BAFs
In this section, given a BAF
We start by presenting a baseline approach and then introduce our incremental technique.
This procedure can be made more efficient by using the following compact meta-AF, which is obtained from that of Definition 1 by avoiding to introduce meta-arguments Xa,b and Ya,b. However, these arguments will turn out to be useful for dealing with second-order attacks in Section 5.
A
m
= A ∪ {Za,b ∣ (a, b) ∈ Π} Σ
m
= Σ ∪ {(b, Za,b) , (Za,b, a) ∣ (a, b) ∈ Π}
The following proposition straightforwardly follows from Proposition 1.

Compact Meta-AF for the BAF of Example 1.
Our approach to recompute a preferred/stable extension E of an updated BAF Step 1: Checking for irrelevant updates. We identify conditions ensuring that a given extension E0 for the initial BAF Step 2: Build a suitable (compact) meta-AF. Given a triple Step 3: Incremental computation on the meta-AF. Given the AF
In the next sections we describe in detail these three steps.
Given a BAF
Cases for which
for u = +(a → b)
Cases for which
Cases for which
Cases for which
Cases for which
Table 1 and u = +(a → b); Table 2 and u = +(a ⇒ b); Table 3 and u = -(a → b); Table 4 and u = -(a ⇒ b);
then
Thus, if some of the conditions of Proposition 3 hold, then the given initial extension of the initial BAF is still an extension of the updated one, and thus Step 2) and Step 3) of the incremental approach can be skipped — the algorithm just returns the initial extension which is also an extension for the updated BAF. For instance, considering the BAF
Conditions similar to those of Proposition 3 were identified in [3] for updates for Dung’s AFs, that is, AFs where the support relation is not considered. However, those conditions could be used only at Step 3) when applying the technique of [3] to the meta-AF
The results of Proposition 3 follow from their counterparts for updates of Dung’s AFs given in [3]. In fact, since using Step 2—whose details are given in Section 4.2—an update u for BAF
Given the initial BAF
A
m
= A ∪ {Za,b ∣ (a, b) ∈ Π} ∪ {Ze,f ∣ u = +(e ⇒ f)} Σ
m
= Σ ∪ {(b, Za,b) , (Za,b, a) ∣ (a, b) ∈ Π} ∪ {(f, Ze,f) ∣ u = +(e ⇒ f)}
For instance, the meta-AF

Our definition of meta-argumentation framework builds on (the compact version of) that proposed in [21] and considers additional meta-arguments (e.g., Zf,b in Fig. 5) and attacks (e.g., (b, Zf,b) in Fig. 5) that will allow us to simulate addition updates to be performed on BAF
Basically, support updates for the given bipolar framework are translated in attacks updates on the corresponding meta-AF of Definition 2, while attacks updates can be directly performed on the meta-AF. For instance, given the BAF
The last ingredient we need before being ready to apply the incremental technique of [3] is the initial extension
∀Za,b ∈ A
m
:
For instance, with reference to Fig. 5, and the preferred extension E0 = {c, d, f} for the BAF
The following proposition characterizes the relationship between extensions of updated BAFs and extensions of updated meta-AFs.
Given a BAF
Algorithm 1 works as follows. It first checks if the initial extension E0 is still an extension of the updated BAF at Line 1, where
Function First, a sub-AF, called reduced AF, is identified on the basis of the set of arguments influenced by an update [44–46] and additional information provided by the initial extension. In our running example, given the meta-AF Second, a non-incremental algorithm (e.g., Arg- SemSAT [30] for Finally, the final extension E
m
of the whole (meta) AF is obtained by merging a portion of its initial extension with that computed for the reduced AF (i.e., E
r
= {Zf,b} in our example) by the external solver
Continuing with the example above, after calling
In the next section, we introduce a variant of Algorithm 1 taking as input an extended BAF where second-order attacks are considered.
Dealing with second order attacks
In this section, we show how to extend our technique to consider second-order attacks [21] for BAFs, that is, (i) attacks from an argument to another attack, and (ii) attacks from an argument to a support. This allows the representation of both attacks towards the attack relation [13, 51] and a kind of defeasible support where the support itself can be attacked. 4
In the following, after presenting the formal definition of BAFs extended with second-order attacks, as well as the formalization of updates for the extended framework, analogously to what done in Section 4.2 we first identify (additional) early termination conditions for checking whether a second-order update is irrelevant. Then, we build on the definition of meta-AF introduced in [21] for encoding second-order attacks, extend it to deal with updates for such kind of BAFs, and finally discuss how to modify Algorithm 1 to enable the computation of extensions of extended BAFs.
An Extended Bipolar Argumentation Framework (EAF for short) [21] is a quadruple 〈A, Σ, Π, Δ〉, where 〈A, Σ, Π〉 is a BAF and Δ is a binary relation over A × (Σ ∪ Π) whose elements are called second-order attacks.
In the following, a second-order attack from an argument a to an attack (b, c) will be denoted as (a↠(b → c)), while an attack from an argument a to a support (b, c) will be denoted as (a↠(b ⇒ c)).

EAF
The semantics of an EAF can be given by means of the following meta-AF, which extends that in Definition 1 by taking into account second order attacks [21].
Σ m = {(a, Xa,b) , (Xa,b, Ya,b) , (Ya,b, b) ∣ (a, b) ∈ Σ} ∪ {(b, Za,b) , (Za,b, a) ∣ (a, b) ∈ Π} ∪ {(a, Xa,(b,c)) , (Xa,(b,c), Ya,(b,c)) , (Ya,(b,c), Yb,c) ∣ (a, (b, c)) ∈ Δ, (b, c) ∈ Σ} ∪ {(a, Xa,(b,c)) , (Xa,(b,c), Ya,(b,c)) , (Ya,(b,c), Zb,c) ∣ (a, (b, c)) ∈ Δ, (b, c) ∈ Π}
Thus, an attack of the form (a↠(b → c)) is encoded as an attack towards the meta-argument Yb,c (that represents the fact that (b, c) is “active”), while an attack of the form (a↠(b ⇒ c)) is encoded as an attack toward the meta-argument Zb,c. The meta-AF for the EAF of Example 5 is shown in Fig. 7.

Meta-AF for the EAF of Example 5.
Analogously to what stated in Proposition 1, extensions for an EAF
A stable extension for the meta-AF is {c, d, f, Xa,c, Yc,b, Za,b, Xb,d, Yd,eXe,e, Xe,d, Xe,f, Xa,(b,d)}. It corresponds to the extension {c, d, f} for the EAF. □
In addition to the kinds of updates introduced in Section 3, for EAFs we also consider additions and deletions of second-order attacks. Specifically, the addition (resp., deletion) of a second-order attack from an argument a to an attack (b, c) will be denoted as +(a↠(b → c)) (resp., -(a↠(b → c))). Similarly, if (b, c) is a support, then the update will be denoted as +(a↠(b ⇒ c)) (resp., -(a↠(b ⇒ c))).
We use
The following proposition identifies cases for which a given initial extension of an EAF is preserved after performing an update. It is worth noting that conditions a)–d) identified in Proposition 3 for BAFs still hold for EAFs. The other conditions e)–h) are added to deal with irrelevant second-order updates.
Table 1 and u = +(a → b); Table 2 and u = +(a ⇒ b); Table 3 and u = -(a → b); Table 4 and u = -(a ⇒ b); Table 5 and u = +(a↠(b → c)); Table 6 and u = +(a↠(b ⇒ c)); Table 7 and u = -(a↠(b → c)); Table 8 and u = -(a↠(b ⇒ c));
then
Cases for which
for u = +(a↠(b → c))
Cases for which
Cases for which
Cases for which
Cases for which
As done in Algorithm 1 for BAFs, the conditions of Proposition 5 can be used to recognize that an initial extension for an EAF
To deal with second-order updates we need to extend the meta-AF of Definition 3, as well as the notions of update and initial labelling for the meta-AF of Definitions 4 and 5, respectively.
We start by introducing the (compact) meta-AF for dealing with updates in EAFs—it will be used in our variant of Algorithm 1 at Line 3, in place of the meta-AF of Definition 3.
u = ± (e → f) u = ± (e ⇒ f) u = ± (e↠(g → h)) u = ± (e↠(g ⇒ h)).
Then, the (compact) meta-AF for
Besides the meta-arguments Za,b of Definition 3, and the attacks involving those arguments, the above meta-AF contains meta-arguments Xc,d, Yc,d for encoding second order attacks in Δ toward attacks (c, d) ∈ Σ. In fact, an attack e↠(a ⇒ b) in Δ toward a support is encoded as an attack from e toward Za,b in the meta-AF, while e↠(c → d) in Δ is encoded as an attack from e toward Yc,d in the meta-AF (which contains also the attacks (c, Xc,d) , (Xc,d, Yc,d) , (Yc,d, d)). Moreover, meta-arguments Ze,f and Xg,h, Yg,h, are added to the meta-AF for encoding, respectively, the addition of a second order attack toward a support (e, f) ∈ Π or toward an attack (g, h) ∈ Σ. In the latter case, meta-arguments Xg,h and Yg,h along with the set of attacks {(g, Xg,h) , (Xg,h, Yg,h) , (Yg,h, h)} are used to simulate the attack g → h which is attacked by e in the EAF. This enables the definition of simple attacks updates (cf. Definition 8) to simulate second-order attacks updates.

Compact Meta-AF for the EAF
The following definition extends Definitions 4 to the case of EAFs and second order updates.
For instance, continuing with Example 7, given the EAF
Finally, given an initial extension for an EAF and an update, we define the initial labelling for the corresponding meta-AF as follows.
∀ Xa,b ∈ A
m
:
∀ Ya,b ∈ A
m
: ∀ Za,b ∈ A
m
:
For instance, given the initial preferred extension E0 = {a, b, d, f} for the EAF
We are now ready to define the incremental algorithm for EAFs that we call Incr-EAF. In fact, we just need to slightly modify Algorithm 1 as follows.
Incr-EAF takes as input an EAF use Proposition 5 instead of Proposition 3 at Line 1 of Algorithm 1 where function checkProp is called. compute the (meta) AF
It is worth noting that if the input EAF of Incr-EAF is a BAF, and the update does not concern second-order attacks, then Incr-EAF coincides with Incr-BAF given in Algorithm 1. In fact, in this case, Proposition 5 collapses to Proposition 3 as no second order updates are considered, and the meta-AF of Definition 7, as well as update u m of Definition 8 and the initial labelling of Definition 9, coincide with their counterparts for BAFs introduced in Definitions 3, 4, and 5, respectively.
Empirical evaluation
We implemented a C++ prototype and, for each semantics
where
Dataset. We generated a set of BAFs and a set of EAFs by starting from AFs used as benchmarks at ICCMA’17 [1] for the tracks SE- B1 consists of AFs with a number of arguments |A| ∈ [2, 50K] and a number of attacks |Σ| ∈ [1, 1.6M]. B2 consists of AFs with |A| ∈ [35, 200K] and |Σ| ∈ [73, 4M].
Given the AFs in these datasets, we generated BAFs and EAFs by transforming attacks into supports and then adding second-order attacks as follows.
Given a percentage p of supports, and a percentage s ≤ p of second order attacks (i.e., attacks to attacks and attacks to supports), for each AF
In the following, we use
Methodology. For each semantics +(a → b), with a, b ∈ A0 and (a, b) ∉ Σ0; +(a ⇒ b), with a, b ∈ A0 and (a, b) ∉ Π0; -(a → b), with (a, b) ∈ Σ0; -(a ⇒ b), with (a, b) ∈ Π0; +(a↠(b → c)), with a ∈ A0, (b, c) ∈ Σ0, and (a, (b, c)) ∉ Δ0; +(a↠(b ⇒ c)), with a ∈ A0, (b, c) ∈ Π0, and (a, (b, c)) ∉ Δ0; -(a↠(b → c)), with (a, (b, c)) ∈ Δ0; -(a↠(b ⇒ c)), with (a, (b, c)) ∈ Δ0.
Next, we computed an
All experiments have been carried out on an Intel Core i7-3770K CPU 3.5GHz with 12GB RAM running Ubuntu 14.04.
Results. Figures 9 and 10 report the average run times (log scale) of the incremental computation (Incr-EAF) and the computation from scratch over the datasets

Run times (ms) of ICCMA’17 solvers and Incr-EAF over dataset

Run times (ms) of ICCMA’17 solvers and Incr-EAF over dataset
From these results, we can draw the following conclusions: The incremental algorithm outperforms the competitors that compute extensions from scratch. In fact, on average, our technique is two orders of magnitude faster then the computation from scratch. In particular, the time saved by the incremental computation is higher for the dataset The improvements obtained for BAFs slightly decrease when increasing the percentage p of supports (see Figures 9-10 (a-b) and (c-d)). This is due to the fact that the size of the reduced-AF identified by
Beside the impact of the number of arguments in the EAFs on the performance, we have investigated how the number of relationships between arguments (i.e., attacks and supports) impact on the running times. We found that our algorithm behaves similar to the case that the number of arguments was varied: the shape of the charts (not reported for the sake of brevity) is similar, modulo a constant factor which depends on the average in/out degree of the nodes (i.e., arguments) in the considered dataset. In brief, the average improvement achieved w.r.t the computation from scratch was confirmed also by this analysis.
A comprehensive introduction to (static) abstract argumentation frameworks (AFs) can be found in [12], while [32] provides a survey of bipolar argumentation frameworks (BAFs). Although the idea underlying AFs is simple and intuitive, most of the semantics proposed so far suffer from a high computational complexity [34–37, 39–42]. Complexity bounds and evaluation algorithms for AFs have been deeply studied in the literature, but most of this research focused on static frameworks, whereas, in practice, AFs (as well as BAFs) are not static systems [14, 48].
There have been significant efforts coping with dynamics aspects of Dung’s abstract argumentation frameworks, as discussed in what follows. [22, 23] have investigated the principles according to which a grounded extension of a Dung’s abstract argumentation frameworks does not change when the set of arguments/attacks are changed. [24, 25] have addressed the problem of revising the set of extensions of an argumentation framework, and studied how the extensions can evolve when a new argument is considered. They focus on adding one argument interacting with one initial argument (i.e. an argument which is not attacked by any other argument). [20] have studied the evolution of the set of extensions after performing a change operation (addition/removal of arguments/interaction). Dynamic argumentation has been applied to decision-making of an autonomous agent by [10], where it is studied how the acceptability of arguments evolves when a new argument is added to the decision system. The division-based method, proposed by [48] and then refined by [14], divides the updated framework into two parts: affected and unaffected, where only the status of affected arguments is recomputed after updates.
Leveraging on the results introduced in [48, 50] investigated the efficient evaluation of the justification status of a subset of arguments in an AF (instead of the whole set of arguments), and proposed an approach based on answer-set programming for local computation. In [49], an AF is decomposed into a set of strongly connected components, yielding sub-AFs located in layers, which are then used for incrementally computing the semantics of the given AF by proceeding layer by layer. Recently, [61] introduced a matrix representation of argumentation frameworks and proposed a matrix reduction that, when applied to dynamic argumentation frameworks, resembles the division-based method in [48].
Other relevant works on dynamic aspects of Dung’s argumentation frameworks include the following. [15] have proposed an approach exploiting the concept of splitting of logic programs to deal with dynamic argumentation. The technique considers weak expansions of the initial AF, where added arguments never attack previous ones. [18] have investigated whether and how it is possible to modify a given AF so that a desired set of arguments becomes an extension, whereas [54] have studied equivalence between two AFs when further information (another AF) is added to both AFs. [16] have focused on expansions where new arguments and attacks may be added but the attacks among the old arguments remain unchanged, while [17] have characterized update and deletion equivalence, where adding/deleting arguments/attacks is allowed (deletions were not considered by [16, 54]).
Bipolarity in argumentation is discussed in [9], where a survey of the use of bipolarity is given, as well as a formal definition of BAF that extends the Dung’s concept of argumentation framework by including supports is provided. In [8], a bipolar scale is used for distinguishing arguments in favour or against a decision in the context of multiple criteria decision making. Differently from BAFs where arguments support/attack other arguments, in [8] arguments are instead intended to be in favour or against goals (i.e., decisions). As discussed in [32], different interpretations of the concept of support have been proposed. The acceptability of arguments in the presence of the support relation was first investigated in [26]. Then, to handle bipolarity in argumentation, [27, 28] proposed an approach based on using the concept of coalition of arguments, where arguments are grouped together, and defeats occur between coalitions. However, when considering a deductive interpretation of support [21, 60], as we did in this paper, coalitions may lead to counterintuitive results [32], though they are useful in contexts where support is interpreted differently. Changes in bipolar argumentation frameworks have been studied in [29], where it is shown how the addition of one argument together with one support involving it (and without any attack) impacts the extensions of the updated BAF.
The problem of efficiently and incrementally computing extensions of dynamic BAFs has been first addressed in [2]. Here we extended that paper from two standpoints. First, we provided a more efficient approach for BAFs by leveraging on the notion of compact meta-AF introduced in Section 4.2, where only needed meta-arguments/attacks are included in the meta-argumentation level (the meta-AF used in [2] has the form of that presented in Section 4.2 where meta-arguments of the type Xa,b and Ya,b, as well as the chains of attacks between them, are included). We experimentally found that, on average, using the compact version of the meta-AF yields an improvement of about 305% over using the original approach proposed in [2]. Second, we generalized the approach proposed for BAFs to the case of EAFs, which allow us to deal with attacks towards the attack relation [4, 51] and defeasible support [21], and experimentally evaluated the overall approach using up-to-date solvers and benchmarks from the ICCMA’17 argumentation competition.
Conclusion and future work
We introduced a technique for the incremental computation of extensions of dynamic EAFs, i.e., BAFs (possibly) incorporating second-order attacks. Following the meta-argumentation approach [32], according to which EAFs are translated into semantically equivalent AFs, we introduced a translation where updates and initial extensions of EAFs are taken into account. Then, we exploited the incremental algorithm recently proposed in [3] and computed extensions of the meta-AFs, from which the updated extensions of EAFs are obtained. Our experiments showed that the incremental technique outperforms the computation from scratch by two orders of magnitude, on average.
Although in this paper we focused on updates consisting of adding/removing one attack/support, our technique can be extended to deal with sets of updates performed simultaneously. Indeed, the construction described in [45] for reducing the application of a set of updates to the application of a single attack update can be easily extended to deal with multiple updates for EAFs. The implementation of such kind of updates for EAFs is left for future work.
We also plan to extend our technique to deal with other interpretations of support, particularly the approach in [27, 28] where meta-AFs are also adopted to cope with bipolarity in argumentation.
Finally, we envisage the use of our incremental approach in the context of structured argumentation [11, 56]. A first step in this direction has been taken in [5, 6] where the analysis of the part of DeLP-programs [43]—from which structured arguments are derived—that changes after an update is performed by exploiting the notion of reachability for (hyper-)graphs representing the programs.
Footnotes
2
Another kind of implicit attack which we do not consider in this paper because of the deductive interpretation of support is the secondary attack [28], which occurs when in a BAF there is a sequence bΣa1Πa2Π … Πa
n
with n ≥ 1. Considering supported and secondary attacks leads to an alternative interpretation of support [28]. However, when considering a deductive interpretation of support, secondary attacks may lead to counterintuitive results [
], though they are useful in contexts where support is interpreted differently.
3
Observe that for the stable semantics, the set of extensions
