Vol-3197/paper9
Jump to navigation
Jump to search
Paper
Paper | |
---|---|
edit | |
description | |
id | Vol-3197/paper9 |
wikidataid | Q117341796→Q117341796 |
title | Argumentation Frameworks Induced by Assumption-Based Argumentation: Relating Size and Complexity |
pdfUrl | https://ceur-ws.org/Vol-3197/paper9.pdf |
dblpUrl | https://dblp.org/rec/conf/nmr/Rapberger0W22 |
volume | Vol-3197→Vol-3197 |
session | → |
Argumentation Frameworks Induced by Assumption-Based Argumentation: Relating Size and Complexity
Argumentation Frameworks Induced by Assumption-Based Argumentation: Relating Size and Complexity Anna Rapberger1 , Markus Ulbricht2 and Johannes P. Wallner3 1 TU Wien, Institute of Logic and Computation 2 Leipzig University, Department of Computer Science 3 Graz University of Technology, Institute of Software Technology Abstract A key ingredient of computational argumentation in AI is the generation of arguments in favor or against claims under scrutiny. In this paper we look at the complexity of the argument generation procedure in the prominent structured formalism of assumption-based argumentation (ABA). We show several results connecting expressivity of ABA fragments and number of constructed arguments. First, for several NP-hard fragments of ABA, the number of generated arguments is not bounded polynomially. Even under equivalent rewritings of the given ABA framework there are situations where one cannot avoid an exponential blow-up. We establish a weaker notion of equivalence under which this blow-up can be avoided. As a general tool for analyzing ABA frameworks and resulting arguments and their conflicts, we extend results regarding dependency graphs of ABA frameworks, from which one can infer structural properties on the induced attacks among arguments. 1. Introduction assess the instantiated AF. Thus, many typical research questions can be answered out of the box after converting Computational models of argumentation are a central ap- the knowledge base. Moreover, since AFs are directed proach within non-monotonic reasoning [1] with a variety graphs, they are accessible and user-friendly; much infor- of applications [2] in, e.g., legal or medical reasoning. mation encoded in the knowledge base is made explicit Key to many approaches to computational argumentation and clear within the graphical framework. are formalisms in what is called structured argumenta- Let us consider the following situation. Suppose we tion which specify formal argumentative workflows, with plan to model the behavior of the propositional CNF- assumption-based argumentation (ABA) [3], ASPIC+ [4], formula 𝜑 = (𝑥1 ∨ ¬𝑥2 ) ∧ (¬𝑥1 ∨ 𝑥2 ) via an ABA defeasible logic programming (DeLP) [5], and deduc- knowledge base (see Section 2 for a formal introduction tive argumentation [6] among the prominent approaches to ABA). For this, we identify 𝜑 with the set {𝐶1 , 𝐶2 } in the field. Reasoning within these formalisms is of- of clauses 𝐶1 = {𝑥1 , ¬𝑥2 } and 𝐶2 = {¬𝑥1 , 𝑥2 }. A tentimes carried out by instantiating argument structures natural representation would make use of assumptions and conflicts among these arguments from (rule-based) corresponding to the four occurring literals, i.e. 𝒜 = knowledge bases in a principled manner. The resulting {𝑥1 , 𝑥2 , 𝑥′1 , 𝑥′2 }. Then, rules model satisfaction of the arguments and (directed) conflicts are referred to as ar- given clauses; we construct gumentation frameworks (AFs) [7]. Argumentation se- 𝑟 1 = 𝐶 1 ← 𝑥1 . 𝑟3 = 𝐶2 ← 𝑥′1 . mantics define argumentative acceptability on an AF s.t. conclusions can be drawn for the original knowledge base. 𝑟2 = 𝐶1 ← 𝑥′2 . 𝑟4 = 𝐶2 ← 𝑥2 . In the present paper, we will focus on ABA [8] which with the intuitive meaning that e.g. 𝐶1 can be derived if 𝑟1 is well studied and has applications in, e.g., decision mak- or 𝑟2 is applicable which in turn is the case if the assump- ing [9, 10, 11]. Argumentative reasoning can be carried tion 𝑥1 or the assumption ¬𝑥2 is set to true, respectively. out by instantiating arguments as derivations in the given Lastly, the rule “𝑟5 = 𝜑 ← 𝐶1 , 𝐶2 .” models that 𝜑 can rule base and attacks between arguments based on con- be derived if both 𝐶1 and 𝐶2 can. When constructing traries among the derivations. the argumentation framework corresponding to this ABA Constructing an AF corresponding to a given knowl- knowledge base, we would make the conditions under edge base has several advantages. From a technical point which 𝜑 can be derived (i.e. what satisfying assignments of view, there is an abundance of research concerned with to the formula exist) visible; indeed, among others, the AFs (see [1] for an overview) which can be applied to following arguments would be obtained: 𝜑 𝜑 𝜑 𝜑 NMR 2022: 20th InternationalWorkshop on Non-Monotonic Reason- ing, August 07–09, 2022, Haifa, Israel 𝐴1 : 𝑐1 𝑐2 𝐴3 : 𝑐1 𝑐2 𝐴2 : 𝑐1 𝑐2 𝐴4 : 𝑐1 𝑐2 © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 𝑥1 𝑥′1 𝑥′2 𝑥′1 𝑥1 𝑥2 𝑥′2 𝑥2 92 �We can now directly read off that e.g. {𝑥1 , 𝑥2 } (see 𝐴3 ) on ABA via using AFs, both the size of the resulting constitutes a satisfying assignment to 𝜑 since both 𝐶1 and AF and complexity of the resulting AF can pose barri- 𝐶2 (and thus 𝜑) can be derived. We can also see that ers to (automated) argumentative reasoning. On the one {𝑥1 , 𝑥′1 } would in principle infer 𝜑 as well, but this set hand size and complexity of AFs are direct challenges of literals does not correspond to a well-defined (partial) for solvers [15, 16]. On the other hand, a large number assignment; we can not set 𝑥1 to true and false simultane- of arguments in an AF can be a barrier to methods sup- ously. We thus see that constructing the arguments helps porting argumentative explanations on the AF, due to the visualizing the information encoded in the knowledge sheer number of arguments. Therefore, investigating for- base and makes certain relations explicit. Indeed, sim- mal foundations which provide guidance how to encode ply inspecting all arguments deriving 𝜑 suffices to decide information, depending on the intended behavior of the whether there is a satisfying assignment to our formula. induced AF, is a worthwhile endeavor. However, since checking satisfiability of a given CNF- The main contributions of the paper can be summarized formula is the prototypical NP-complete problem, we as follows. expect that this procedure must come with computational cost elsewhere. Indeed, many structured argumentation • We first deal with the case of infinite instantiated formalisms (including ABA) suffer from the drawback AFs and show that one can restrict attention to that the knowledge base gives rise to exponentially many finite cores. (or even an infinite amount of) arguments [12, 13, 14]. So, • We relate bounds on the given ABA instance to (i) in a nutshell, the instantiated AF makes information within size bounds and computability of the constructed the knowledge base explicit, but requires many arguments AF and (ii) complexity of reasoning. to do so. This gives rise to the following question: • We show that each ABA framework can be rewrit- ten in a way that reasoning in the induced AF is Is the argumentation framework induced tractable, while credulous acceptance of a target by an ABA knowledge base large in size, conclusion is preserved. but reasoning is easy? • We present, for a fairly large class of ABA frame- Although this idea is appealing in principle, the answer works, a general transformation procedure to ob- turns out to be negative in general: Even if we reduce our tain a translated ABA framework which is equiva- attention to the class of AFs induced by ABA knowledge lent under projection and has a polynomial-sized bases, reasoning is still intractable in general. Nonethe- AF. We present an impossibility result suggesting less, we expect an underlying trade-off between size and that the notion of equivalence cannot be strength- complexity which is worth to be investigated. As a high ened to full equivalence. level observation we expect an ideal ABA knowledge base • We extend the notion of dependency graphs on to ABA frameworks (see, e.g., Craven and Toni, 2016) to a general tool for investigating ABA • induce a large AF, but with reasoning being simple, frameworks able to check structural properties or inducing milder complexity, such as acyclic or • a concise AF, in which reasoning is potentially odd-cycle free AFs. hard. If the former is the case, then the instantiation proce- 2. Assumption-based dure can help displaying relationships encoded within the knowledge base, as it was the case for our CNF formula Argumentation 𝜑 from above. If on the other hand the latter case occurs, We recall preliminaries for assumption-based argumen- then the constructed AF is efficient and easy to capture tation (ABA) [8, 3] and argumentation frameworks visibly. In this paper, we will investigate this trade-off (AFs) [7]. and examine the relationship between size and complexity The first ingredient of ABA is that of a deductive system of the induced AF. Most notably, we will show that each (ℒ, ℛ), with ℒ a formal language and ℛ a set of inference ABA framework can be transferred in a way that either rules over ℒ. In this work we assume that ℒ is a set of reasoning becomes easy (Theorem 32) or the AF is of atoms. A rule 𝑟 ∈ ℛ is of the form 𝑠 ← 𝑎1 , . . . , 𝑎𝑛 polynomial size (Proposition 28), but reaching both goals with 𝑎𝑖 ∈ ℒ. A shorthand for the head of a rule 𝑟 is simultaneously is not possible in general (Theorem 32). defined by ℎ𝑒𝑎𝑑(𝑟) = {𝑠}, and for the (possibly empty) In doing so, our goal is also contributing to a general body via 𝑏𝑜𝑑𝑦(𝑟) = {𝑎1 , . . . , 𝑎𝑛 }. An ABA framework formal understanding under which conditions a knowl- contains a deductive system and specifies which atoms edge base induces large AFs and which techniques might are assumptions and what are contraries of assumptions. help avoiding this blow-up. For carrying out reasoning 93 �Definition 1. An ABA framework is a tuple 𝐷 = 𝐴 does not attack itself. Set 𝐴 defends assumption set (ℒ, ℛ, 𝒜, ), where (ℒ, ℛ) is a deductive system, 𝒜 ⊆ ℒ 𝐵 ⊆ 𝒜 in 𝐷 iff for all 𝐶 ⊆ 𝒜 that attack 𝐵 it holds that a non-empty set of assumptions, and a function map- 𝐴 attacks 𝐶. ping assumptions 𝑎 ∈ 𝒜 to atoms 𝑠 ∈ ℒ (the contrary function). In this paper, we focus on the central semantical con- cept of admissibility. In this work, we focus on ABA frameworks which are / 𝒜 Definition 4. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- (i) flat, i.e., for each rule 𝑟 ∈ ℛ it holds that ℎ𝑒𝑎𝑑(𝑟) ∈ (no assumptions can be derived), (ii) ℒ, ℛ, and 𝑏𝑜𝑑𝑦(𝑟) work. A set of assumptions 𝐴 ⊆ 𝒜 is admissible iff 𝐴 is for each 𝑟 ∈ 𝑅 is finite, and (iii) each rule in ℛ is stated conflict-free and 𝐴 defends itself. explicitly (given as input). We move on to tree-based arguments. Semantics of ABA frameworks can be defined on sub- sets of the assumptions or via translation to arguments Definition 5. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- and attacks. Below, we recall both notions. work, and (𝐴 ⊢ 𝑠) and (𝐵 ⊢ 𝑡) two tree-based argu- Arguments in an ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) ments based on 𝐷. Tree-based argument (𝐴 ⊢ 𝑠) attacks are based on proof trees (derivations). Due to our focus on (𝐵 ⊢ 𝑡) if there is an assumption 𝑏 ∈ 𝐵 s.t. 𝑏 = 𝑠. computational aspects, we will in later sections consider a different representation of arguments, hence we refer Collecting all tree-based arguments and attacks based to arguments based directly on proof trees as “tree-based on an ABA results in an argumentation framework corre- arguments”. Formally, a tree-based argument, denoted by sponding to the given ABA. 𝐴 ⊢ℛ 𝑠, with 𝐴 ⊆ 𝒜 and 𝑠 ∈ ℒ based on 𝐷 is defined Definition 6. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- as a finite labeled rooted tree s.t. the root is labeled with work. The pair (A, R) is called the argumentation frame- 𝑠, each leaf is labeled by an assumption 𝑎 ∈ 𝒜 or a work (AF) corresponding to 𝐷 if A is the set of all tree- dedicated symbol ⊤ ∈ / ℒ s.t. the set of all labels of leaves based arguments based on 𝐷, and R is the set of all is 𝐴, and each internal node is labeled with ℎ𝑒𝑎𝑑(𝑟) of a attacks based on 𝐷. rule 𝑟 ∈ ℛ s.t. the set of labels of children of this node is equal to 𝑏𝑜𝑑𝑦(𝑟) or ⊤ if the body is empty. Moreover, Below we recall the analogous notions of conflict- if 𝑎 ∈ 𝒜, then {𝑎} ⊢ℛ 𝑎 is also a tree-based argument freeness, defense and admissibility in AFs. (special case without using any derivation rules). In brief, a tree-based argument represents a derivation using rules Definition 7. Let 𝐷 be an ABA framework, 𝐹 = (A, R) in ℛ to derive 𝑠 starting from assumptions in 𝒜. We say the corresponding AF, and 𝐻 ⊆ A a set of tree-based that 𝑠 is the claim of the tree-based argument. We remark arguments of 𝐹 . The set 𝐻 is conflict-free (in 𝐹 ) if there that there can be multiple tree-based arguments with the are no arguments (𝐴 ⊢ 𝑠), (𝐵 ⊢ 𝑡) ∈ 𝐻 s.t. (𝐴 ⊢ same set of assumptions and claim. 𝑠) attacks (𝐵 ⊢ 𝑡). A conflict-free set 𝐻 defends an Given an ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ), deriv- argument (𝐴 ⊢ 𝑠) (in 𝐹 ) if for each argument (𝐵 ⊢ 𝑡) ∈ ability for a set of assumptions 𝐴 ⊆ 𝒜 is defined via A that attacks (𝐴 ⊢ 𝑠) it holds that there is an argument Th 𝐷 (𝐴) = {𝑠 | there is a tree-based argument 𝐴′ ⊢ℛ (𝐶 ⊢ 𝑢) ∈ 𝐻 s.t. (𝐶 ⊢ 𝑢) attacks (𝐵 ⊢ 𝑡). Moreover, 𝐻 𝑠, 𝐴′ ⊆ 𝐴}. That is, Th 𝐷 (𝐴) contains all atoms that is admissible (in 𝐹 ) if it is conflict-free and defends itself. can be derived (via tree-based arguments) using assump- Claims of tree-based arguments are collected via tions in 𝐴. We omit subscripts 𝐷 and ℛ if clear from the cl (𝐻) = {𝑠 | (𝐴 ⊢ 𝑠) ∈ 𝐻} for a set of tree- context. based arguments 𝐻, and assumptions via asms(𝐻) = We now recall conflicts, admissible sets, and subse- ⋃︀ (𝐴⊢𝑠)∈𝐻 𝐴. quently the corresponding definitions on tree-based argu- To clearly distinguish semantics, we say that 𝐴 ⊆ 𝒜 ments. is an admissible assumption set (or an adm-assumption Definition 2. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- set) and that a set of tree-based arguments 𝐸 is an admis- work, and 𝐴, 𝐵 ⊆ 𝒜 be two sets of assumptions. Assump- sible extension (or adm-extension for short). We refer tion set 𝐴 attacks assumption set 𝐵 in 𝐷 if 𝑏 ∈ Th(𝐴) to all adm-assumption sets of 𝐷 via adm(𝐷), and to for some 𝑏 ∈ 𝐵. all adm-extensions of an AF 𝐹 by adm(𝐹 ). There is a direct correspondence between semantics via assumption In words, an assumption set 𝐴 attacks assumption set sets and sets of tree-based arguments (see, e.g., Čyras 𝐵 if it is possible to derive from 𝐴 the contrary of some et al., 2018). assumption in 𝐵. Proposition 8. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- Definition 3. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- work and 𝐹 = (A, R) the corresponding AF. work. An assumption set 𝐴 ⊆ 𝒜 is conflict-free in 𝐷 iff 94 � • If 𝐸 ∈ adm(𝐷) then {(𝐴 ⊢ 𝑠) | 𝐴 ⊆ and 𝑏 = 𝑥. There are infinitely (countably) many tree- 𝐸, (𝐴 ⊢ 𝑠) is a tree-based argument in 𝐷} ∈ based arguments based on 𝐷 (via chaining rules arbitrary adm(𝐹 ), and many times), and argument {𝑎} ⊢ 𝑎 is attacked by all • if 𝐻 ∈ adm(𝐹 ) then asms(𝐻) ∈ adm(𝐷). tree-based arguments concluding 𝑦 (of which there are infinitely many). An important reasoning task on ABA and AFs is cred- ulous reasoning under admissibility. An atom 𝑠 is cred- This leads to the simple observation stated next. That ulously accepted under admissibility in an ABA 𝐷 iff there are countably many tree-based arguments can be there is an adm-assumption-set 𝐸 s.t. 𝑠 ∈ Th(𝐸). For a seen since one can write (for a given ABA) each argument given AF (A, R) and 𝛼 ∈ A, it holds that 𝛼 is credulously as a string over a restricted alphabet. accepted under admissibility in 𝐹 iff there is an adm- Observation 11. Given an ABA framework, the corre- extension 𝐻 containing 𝛼. We remark that credulous sponding AF can be (countably) infinite and non-finitary. acceptance of tree-based arguments in a given AF can be directly generalized to ask for acceptance of claims 𝑠 of Nevertheless, as one can see intuitively in the example, tree-based arguments, i.e., asking whether there is some AFs corresponding to an ABA framework can be “cut adm-extension containing some tree-based argument 𝛼 down” to a finite core by removing “duplicates” of ar- with claim 𝑠. guments. This observation is sometimes assumed to be Complexity results for reasoning in ABA and AFs were folklore in the research community and stated for other established (see, e.g., Dvořák and Dunne, 2018, for an forms of structured argumentation [12]. overview) when the corresponding structure is given (in Let us formalize how to obtain such a duplicate-free particular for AFs the full AF is given as input). For both core. Tree-based arguments in an ABA framework are assumption sets and extensions, credulous acceptance un- defined as proof trees, with each argument (𝐴 ⊢ 𝑠) based der admissibility is NP -complete. on a set of assumptions and a claim. While rules are driv- ing derivability, they are not important when evaluating Example 9. We formalize the introductory example. The arguments: conflicts between arguments are solely spec- ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) is given by ified via assumptions 𝐴 and claim 𝑠. A natural way to represent arguments is thus by using only 𝐴 and 𝑠. From ℒ = {𝑐1 , 𝑐2 , 𝜑} ∪ 𝒜, now on, we mean by arguments pairs (𝐴, 𝑠) but insist that 𝒜 = {𝑥1 , 𝑥′1 , 𝑥2 , 𝑥′2 } with 𝑥𝑖 = 𝑥′𝑖 , 𝑥′𝑖 = 𝑥𝑖 , there is a corresponding proof tree (𝐴 ⊢ 𝑠) in the given ABA framework. We call the resulting set of arguments moreover, the rules ℛ of the given ABA are the core of an ABA. 𝑐 1 ← 𝑥1 ; 𝑐1 ← 𝑥′2 ; 𝑐2 ← 𝑥′1 ; Definition 12. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be 𝑐2 ← 𝑥2 ; 𝜑 ← 𝑐1 , 𝑐2 . an ABA framework. Let A = {(𝐴, 𝑠) | there is a tree-based argument (𝐴 ⊢ 𝑠) in 𝐷}. An It holds that each 𝐴 ⊆ 𝒜 is admissible whenever argument (𝐴, 𝑠) attacks an argument (𝐵, 𝑡) (in 𝐷) if {𝑥𝑖 , 𝑥′𝑖 } ̸⊆ 𝐴 for 𝑖 ∈ {1, 2} (no “complementary lit- ∃𝑏 ∈ 𝐵 s.t. 𝑏 = 𝑠, with R being the set of all such attacks. erals”). Moreover, the literal 𝜑 is credulously accepted The AF 𝐹 = (A, R) is called the core of 𝐷. under admissibility, since, e.g. {𝑥1 , 𝑥2 } is admissible and Claims and assumptions of a set of arguments 𝐻 ⊆ 𝜑 ∈ Th({𝑥1 , 𝑥2 }). A are defined similarly as for tree-based arguments: ⋃︀(𝐻) = {𝑠 | (𝐴, 𝑠) ∈ 𝐻} and asms(𝐻) = cl 3. Infinite AFs, Cores, and (𝐴,𝑠)∈𝐻 𝐴. Given an ABA 𝐷 its corresponding AF 𝐹 and core 𝐹 ′ , in addition to the core being finite it follows Representation directly that In general it can be the case that an AF 𝐹 corresponding • for each tree-based argument (𝐴 ⊢ 𝑠) there is an to a given ABA 𝐷 is not finite. We first recall some basic argument (𝐴, 𝑠) and vice versa, and thus properties of such (possibly) infinite corresponding AFs. • 𝐹 has an admissible set of tree-based arguments We say that an AF 𝐹 = (A, R) is infinite if A is infinite. 𝐻 with cl (𝐻) = 𝑆 and asms(𝐻) = 𝐴 iff 𝐹 ′ has An AF 𝐹 is finitary [7] if it holds that each argument an admissible set of arguments 𝐻 ′ , cl (𝐻 ′ ) = 𝑆 𝛼 ∈ A is attacked by a finite number of arguments (but and asms(𝐻 ′ ) = 𝐴. the overall number of arguments may still be infinite). If one is not interested in the actual derivation of a claim, Example 10. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- representing an argument as a pair (𝐴, 𝑠) narrows down work with 𝒜 = {𝑎, 𝑏}, ℒ = {𝑥, 𝑦} ∪ 𝒜, four rules the argument to the information required in order to con- (𝑥 ← 𝑎), (𝑥 ← 𝑥), (𝑦 ← 𝑦), and (𝑦 ← 𝑏), and 𝑎 = 𝑦 struct the corresponding AF (the core) and perform the 95 �standard reasoning tasks. To some extent surprising per- 4.1. Bounds and Complexity of haps, we can find a complexity-theoretic result supporting Reasoning the intuition that the core is a more efficient representa- tion: while deciding whether a proof tree constitutes a First, we consider bounds on (i) the depth of chaining tree-based argument for a given ABA is immediate, it is rules and (ii) the size of bodies of rules. We show that NP -hard to decide whether a pair (𝐴, 𝑠) occurs in the restricting derivation-depth or rule-size does not yield core. milder complexity regarding credulous reasoning under admissibility. Proposition 13. It is NP-hard to decide whether there is Formally, an ABA 𝐷 is bounded by 𝑘-derivation-depth a proof tree from a given set of assumptions to a given if each proof tree of 𝐷 has height at most 𝑘 (i.e., the claim. longest path from assumptions to claim is at most 𝑘). A rule of the form 𝑠 ← 𝑏1 , . . . , 𝑏𝑛 is bounded by 𝑘 if 𝑛 ≤ 𝑘; Proof. Let 𝜑 = 𝑐1 ∧· · ·∧𝑐𝑚 be a Boolean formula in con- an ABA 𝐷 is rule-size bounded by 𝑘 if each rule in 𝐷 is junctive normal form over vocabulary 𝑋 = {𝑥1 , . . . , 𝑥𝑛 } bounded by 𝑘. with 𝐶 = {𝑐1 , . . . , 𝑐𝑚 } the set of clauses. We construct In order to show that bounding derivation-depth is in- an ABA framework 𝐷 with 𝒜 = 𝐶, atoms 𝐶 together tractable, we reduce the Boolean Satisfiability Problem with literals over 𝑋 and {𝑑𝑥1 , . . . , 𝑑𝑥𝑛 }, and the follow- via the following reduction: ing rules (note that “¬𝑥” is a symbol in ABA and has no meaning attached to the negation sign): Reduction 14. Let 𝜑 = 𝑐1 ∧ · · · ∧ 𝑐𝑚 be a Boolean for- mula in conjunctive normal form (CNF) over clauses 𝐶 = 𝑥 ← {𝑐 ∈ 𝐶|𝑥 ∈ 𝑐}, and {𝑐1 , . . . , 𝑐𝑚 } and Boolean variables 𝑋 = {𝑥1 , . . . , 𝑥𝑛 }. ¬𝑥 ← {𝑐 ∈ 𝐶|¬𝑥 ∈ 𝑐} for each 𝑥 ∈ 𝑋 Define 𝑋 ′ = {𝑥′ | 𝑥 ∈ 𝑋}. Construct 𝐷 = (ℒ, ℛ, 𝒜, ) 𝑑𝑥 ← 𝑥 and 𝑑𝑥 ← ¬𝑥 for each 𝑥 ∈ 𝑋 by 𝑓 ← 𝑑 𝑥1 , . . . , 𝑑 𝑥𝑛 • ℒ = 𝑋 ∪ 𝑋 ′ ∪ 𝐶 ∪ {𝜑}, Contraries are assigned to literals not appearing in any • 𝒜 = 𝑋 ∪ 𝑋 ′, rules (for the task of argument construction, contraries are • 𝑥 = 𝑥′ and 𝑥′ = 𝑥 for each 𝑥 ∈ 𝑋, and not relevant). It can be shown that (𝐶, 𝑓 ) is an argument • let the set of rules be composed of 𝜑 ← of the resulting ABA framework iff 𝜑 is satisfiable. 𝑐1 , . . . , 𝑐𝑚 , and 𝑐𝑖 ← 𝑧 with 𝑧 = 𝑥 and 𝑥 ∈ 𝑐𝑖 or 𝑧 = 𝑥′ and ¬𝑥 ∈ 𝑐𝑖 . We want to emphasize that this result does not imply that it is harder to compute the core compared to a corre- The resulting ABA framework is bounded by 2- sponding AF, since one can directly extract the core from derivation-depth as each proof tree has height at most the corresponding AF. Rather, Proposition 13 formalizes 2. We observe that the presented reduction formalizes our that skipping computation of the proof trees in order to introductory example: construct the core is a hard task in general. From now on, we restrict our attention to cores, and Example 15. Given the CNF-formula 𝜑 = (𝑥1 ∨ ¬𝑥2 ) ∧ assume that, for a given ABA, we operate exclusively on (¬𝑥1 ∨𝑥2 ) from the introduction. Following Reduction 14, a core, unless explicitly mentioned otherwise. we obtain an ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) which contains the assumptions 𝒜 = {𝑥1 , 𝑥2 , 𝑥′1 , 𝑥′2 } and the rules 𝜙 ← 𝑐1 , 𝑐2 and 4. Bounds on Assumption-based • 𝑐1 ← 𝑥1 , 𝑐1 ← 𝑥′2 (since 𝑥1 , ¬𝑥2 ∈ 𝑐1 ) as well Frameworks as • 𝑐2 ← 𝑥′1 , 𝑐2 ← 𝑥2 (since 𝑥′1 , 𝑥2 ∈ 𝑐2 ) In this section we study the impact of bounding certain parts of the input ABA on the complexity of reasoning Moreover, the ABA framework assigns symmetric con- and size of cores (and corresponding AFs in cases). We traries, i.e., 𝑥𝑖 = 𝑥′𝑖 and 𝑥′𝑖 = 𝑥𝑖 for 𝑖 ∈ {1, 2}. The consider bounds on derivation-depth and bodies of rules. resulting framework indeed coincides with the introduc- When investigating size of cores, we make use of the tory example (cf. Example 9). following definition. Given an ABA 𝐷 the size of 𝐷 (|𝐷|) is the length of a (direct) string representation of 𝐷. Let It can be shown that the special atom 𝜑 is credulously 𝒟 be a set of ABA frameworks. We say that the cores of accepted under admissible semantics in the ABA frame- 𝒟 are polynomially bounded if there is a polynomial 𝑝 s.t. work iff the formula 𝜑 is satisfiable. 𝑝(|𝐷|) ≥ |A| for all 𝐷 ∈ 𝒟 with 𝐹 = (A, R) the core of Observe that tree-based arguments in the correspond- 𝐷. We will see below that the cores of the set of all ABA ing AF in Reduction 14 have derivation-depth of at most frameworks are not polynomially bounded. 2. We obtain that credulous reasoning is NP -complete 96 � 𝜑 𝜑 𝜑 𝜑 Proposition 18. Credulous reasoning under admissibility 𝑐1 𝑐2 𝑐1 𝑐2 𝑐1 𝑐2 𝑐1 𝑐2 is decidable in polynomial time in cores of symmetric ABAs. 𝑥1 𝑥′1 𝑥′2 𝑥′1 𝑥1 𝑥2 𝑥′2 𝑥2 4.2. Size of the Constructed AF 𝑥1 𝑥′1 𝑥2 𝑥′2 From identifying arguments as pairs of assumption sets 𝑐2 𝑐1 𝑐1 𝑐2 and claims we directly obtain that the number of argu- 𝑥′1 𝑥1 𝑥 ′ 𝑥2 ments in cores is bounded by 2|𝒜| · |ℒ ∖ 𝒜| + |𝒜| for 2 each ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ). We establish a Figure 1: AF instantiation of the ABA framework from bound on the number of tree-based arguments that consid- Example 15 for the formula 𝜑 = (𝑥1 ∨ ¬𝑥2 ) ∧ (¬𝑥1 ∨ 𝑥2 ) ers derivation-depth and rule-size and show that bound- (cf. Reduction 14). ing both derivation-depth and rule-size yields ABAs with polynomially bounded cores. The number of tree-based arguments that can be con- even when restricting ABA frameworks to be bounded by structed from a given ABA framework 𝐷 depends on the 𝑘-derivation-depth for some constant 𝑘 ≥ 2. Moreover, number of rules, derivation-depth, rule-size, and number in general Reduction 14 yields cores which are not poly- of rules with same heads, as follows. nomially bounded by the given ABA framework: for a Theorem 19. For each 𝑚-derivation-depth and 𝑘-rule- formula 𝜙 with 𝑚 clauses and 𝑘 variables per clause, we 𝑚 size bounded ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) with construct up to 𝑘 many arguments with conclusion 𝜙. |{𝑟 ∈ ℛ | ℎ𝑒𝑎𝑑(𝑟) = 𝑠}| ≤ 𝑙 for all 𝑠 ∈ ℒ, there are at Figure 1 depicts the core (equivalent to the corresponding most∑︀𝑙𝑝 · |ℒ ∖ 𝒜| + |𝒜| many tree-based arguments with AF) of the constructed ABA framework from Example 15. 𝑚−1 𝑖 𝑝 = 𝑖=0 𝑘 . Here, we have 22 many arguments with conclusion 𝜙. A slight adaption of the reduction shows that credu- Proof. To prove the statement, we show that the number lous reasoning under admissibility remains NP -complete, of all possible trees constructible from 𝐷 is bounded by when bounding instead the body-size of the rules by 2. 𝑛 · 𝑙𝑝 with 𝑝 = 𝑚−1 𝑘𝑖 and 𝑛 = |ℒ ∖ 𝒜|. Here, we ∑︀ 𝑖=0 Theorem 16. Credulous reasoning under admissibility do not require that the leaves of the trees are labelled as remains NP-hard even if restricted to derivation-depth assumptions. Observe that the set of all tree-based argu- bounded or rule-size bounded ABA frameworks. ments is a subset of the number of all trees constructible from 𝐷. A closer inspection of the ABAs constructed from Re- For each literal 𝑠 ∈ ℒ ∖ 𝒜 which appears as head of duction 14 points to another class of ABA frameworks a rule in 𝐷, there are at most 𝑙 · 𝑥𝑘 many trees where with notable properties. In this reduction, we construct 𝑥 is the maximum number of trees with head 𝑐 for a ABA frameworks with a symmetric contrary function, i.e., literal 𝑐 ∈ 𝑏𝑜𝑑𝑦(𝑟) for some rule 𝑟 with ℎ𝑒𝑎𝑑(𝑠). Indeed, 𝑎 = 𝑏 iff 𝑏 = 𝑎 for all 𝑎, 𝑏 ∈ 𝒜. We call these ABA there are at most 𝑙 rules with head 𝑠, all bounded by 𝑘. We frameworks symmetric. First, observe that credulous rea- express this correspondence via the function 𝑓 (𝑥) = 𝑙·𝑥𝑘 . soning in this framework is NP -hard (following directly The total number of trees with root 𝑠 constructible from from Theorem 16). 𝐷 after 𝑚 steps is thus given by 𝑓 𝑚 (1). We show that ∑︀𝑚−1 𝑖 𝑓 𝑚 (1) = 𝑙 𝑖=0 𝑘 via induction over 𝑚. Corollary 17. Credulous reasoning under admissibility For 𝑚 = 1, we have 𝑓 (1) = 𝑙. is NP -hard for symmetric ABA frameworks. Now assume the statement holds true for rule depth On the other hand, we observe that the computational 𝑚 − 1. hardness in symmetric ABAs stems entirely from the con- struction of arguments: indeed, constructing the cores 𝑓 𝑚 (1) = 𝑙 · (𝑓 𝑚−1 (1))𝑘 ∑︀𝑚−2 𝑖 results in AFs with |𝒜|/2 many even cycles of length 2 (a = 𝑙 · (𝑙 𝑖=0 𝑘 )𝑘 cycle for every assumption and its negation) satisfying ∑︀𝑚−2 𝑖 that all arguments with claim 𝑠 ∈/ 𝒜 have only incoming = 𝑙 · 𝑙𝑘( 𝑖=0 𝑘 ) attacks. For an example we refer to Figure 1. Credulous ∑︀𝑚−1 𝑖 reasoning under admissibility in such AFs is decidable = 𝑙 𝑖=0 𝑘 . in time polynomial in the number of arguments, since it We thus obtain that the number of all possible trees suffices to check if there exists an argument having the constructible from 𝐷 is bounded by 𝑙𝑝 · 𝑛 with 𝑝 = queried claim that is not attacked by both arguments in a ∑︀𝑚−1 𝑖 𝑖=0 𝑘 . 2-cycle. 97 � Intuitively, exponentiality of the number of tree-based new argument. Therefore, after at most |A| + 1 iterations arguments stems from 𝑝, and thus from derivation-depth we are done. Each iteration visits |ℛ| rules. Consider one and rule-size. Moreover, it is clear that the result extends particular rule 𝑟. For each body literal, we need to search to the number of arguments in the cores of derivation- through at most |A| arguments. Since |𝑏𝑜𝑑𝑦(𝑟)| ≤ 𝑘, depth and rule-size bounded ABA frameworks. Bounding this is in 𝒪(|A|𝑘 ). In order to decide whether or not the both parameters thus yields polynomially bounded cores. induced argument 𝐴 ⊢ ℎ𝑒𝑎𝑑(𝑟) needs to be added, we again search through the at most |A| already constructed Corollary 20. The cores of the set of ABA frameworks arguments and compare. In summary, we visit rules at which are both derivation-depth and rule-size bounded by most (|A| + 1) · |ℛ| times and thereby, we can perform some constant 𝑘 are polynomially bounded. the necessary computations in time in 1𝒪(|A|𝑘+1 ). Bounding derivation-depth or rule-size individually, The preceding result together with Corollary 20 yields however, does not yield cores that are polynomially a procedure to obtain a polynomially bounded core in bounded. polynomial time for rule-size bounded and derivation- Proposition 21. The cores of ABA frameworks which depth bounded ABA frameworks. are derivation-depth bounded by some constant 𝑘 are not Corollary 23. The cores of the set of rule-size and polynomially bounded. Likewise, the cores of rule-size derivation-depth bounded ABA frameworks can be com- bounded ABA frameworks are not polynomially bounded. puted in polynomial time in size of the given ABA frame- work. 4.3. Computation of the Core We remark that it is currently not known whether the As the reader might have noticed, having polynomially condition of rule-size boundedness in Theorem 22 can bounded cores does not (directly) imply the existence of be dropped; we conjecture that the condition is required. a polynomial-time algorithm that can actually obtain the In any case, Theorem 22 also yields the result that enu- core in question. We show that for ABA frameworks merating arguments in the core of a rule-size bounded which are rule-size bounded an algorithm can be ob- ABA framework has incremental polynomial time com- tained that enumerates arguments in polynomial-time re- plexity [19], i.e., one can in polynomial time w.r.t. the garding size of input and number of arguments. This given ABA and partially enumerated arguments find a can be achieved by a direct algorithm: for each rule fresh argument or conclude that all arguments were enu- 𝑟 with 𝑏𝑜𝑑𝑦(𝑟) = {𝑠1 , . . . , 𝑠𝑛 } and already computed merated. (tree-based) arguments {𝛼1 , . . . , 𝛼𝑚 } loop through each 𝑛-sized subset 𝑋 of {𝛼1 , . . . , 𝛼𝑚 } and check whether cl (𝑋) = 𝑏𝑜𝑑𝑦(𝑟). If so, attach it to a potential new argu- 5. Transformations and ment concluding ℎ𝑒𝑎𝑑(𝑟). If this argument is fresh, add Complexity Trade-offs it to the output. If 𝑛 ≤ 𝑘 for a constant 𝑘, this search is bounded polynomially by the given ABA and size of core. We saw that ABA frameworks may yield a core not poly- Theorem 22. The cores of ABA frameworks whose rule- nomially bounded, but with polynomial-time reasoning size is bounded by a constant can be constructed in poly- (under the credulous view and admissibility), e.g., when nomial time w.r.t. the size of the given ABA and core. looking at Reduction 14. In this section we look at possi- bility results and an impossibility result of transforming Proof. Consider the following brute-force procedure. a given ABA to another ABA framework whose core is polynomially bounded or allows for polynomial-time rea- • loop through each rule 𝑟 ∈ ℛ as long as new soning. arguments are added. – given 𝑏𝑜𝑑𝑦(𝑟) = {𝑎1 , . . . , 𝑎𝑡 }, for each 5.1. Tractable Reasoning in Core subset 𝑥1 , . . . , 𝑥𝑡 of the already con- structed arguments s.t. cl (𝑥𝑖 ) = 𝑎𝑖 Recall that one of our main goals was to formalize the idea that one could construct ABA frameworks in a way * if the corresponding argument 𝐴 ⊢ ℎ𝑒𝑎𝑑(𝑟) is not yet constructed, add it that the induced AF might be large, but yields tractable to the list; reasoning in return. As we already mentioned, the ABA framework constructed in the motivating example corre- * otherwise break; sponds to applying Reduction 14. Our intuition is that the By definition, this algorithm constructs the correct argu- ABA frameworks constructed according to this reduction ments in 𝐹 . The outer loop over each rule can be left indeed yield AFs with tractable reasoning (though in the once there was one iteration which did not induce any potential exponential size of the AF). This intuition can 98 �be confirmed as follows: First, observe hat Reduction 14 The transformation is defined as follows. Intuitively, for yields symmetric ABA frameworks (by definition). Thus each conclusion 𝑠 derivable from a given ABA framework by Proposition 18 stating that reasoning in symmetric AFs 𝐷, we introduce fresh assumptions 𝑠𝑑 (’𝑠 is derivable’) is indeed tractable, we obtain the desired outcome. and 𝑠𝑛𝑑 (’𝑠 is not derivable’) that simulate derivations. However, this only states that a certain class of ABA The resulting ABA framework 𝐷′ contains only rules frameworks possesses this property. We would like to go with assumptions in the body, each of which gives rise one step further and transform an arbitrary given ABA to exactly one tree-based argument. Since no rule in 𝐷′ framework s.t. the corresponding AF behaves this way. It contains non-assumptions, each proof tree is of height 1. turns out that this can be achieved indeed, at least if we Definition 26. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be a non-circular restrict our attention to some target conclusion, say 𝑥 ∈ ℒ. ABA framework such that each 𝑠 ∈ ℒ is in Th 𝐷 (𝒜). We The underlying idea is surprisingly simple: Suppose we define 𝐷′ = (ℒ′ , ℛ′ , 𝒜′ , ′ ) as the AF-sensitive ABA want to transform the ABA framework 𝐷. Since the SAT framework of 𝐷 as follows. For each 𝑠 ∈ ℒ ∖ 𝒜 problem is NP-complete, we can in polynomial time con- struct a formula 𝜑 which is satisfiable iff 𝑥 is credulously • let 𝑠𝑑 and 𝑠𝑛𝑑 be two fresh assumptions, with accepted in 𝐷. Now, our Reduction 14 translates 𝜑 into • 𝑠𝑑 = 𝑠𝑛𝑑 and 𝑠𝑛𝑑 = 𝑠 in ′ . an ABA framework with the behavior we wish to obtain. All these steps can be performed in polynomial time. ThisLet 𝒜′ = 𝒜 ∪ {𝑠𝑑 , 𝑠𝑛𝑑 | 𝑠 ∈ ℒ ∖ 𝒜} and ℒ′ = ℒ ∪ 𝒜′ . yields the following main theorem. Contraries in 𝐷′ are defined as for 𝐷, except for the new assumptions as above. For each rule 𝑟 ∈ ℛ, let 𝑟′ Theorem 24. For each ABA framework 𝐷 = being 𝑟 except that if 𝑏𝑜𝑑𝑦(𝑟) contains a non-assumption (ℒ, ℛ, 𝒜, ) and 𝑥 ∈ ℒ one can construct an ABA frame- 𝑠, replace 𝑠 by 𝑠𝑑 . Finally, set ℛ′ = {𝑟′ | 𝑟 ∈ ℛ}. work 𝐷′ in polynomial time s.t. Let us consider an example. • under admissibility, 𝑥 is credulously accepted in 𝐷 iff 𝑥 is credulously accepted in 𝐷′ , Example 27. Consider an ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) with assumptions 𝒜 = {𝑎, 𝑏}, rules ℛ: • reasoning in the corresponding AF 𝐹 is tractable in the size of 𝐹 . 𝑟1 : 𝑝 ← 𝑞; 𝑟2 : 𝑞 ← 𝑎; 𝑟3 : 𝑠 ← 𝑏; We want to mention however that this procedure as and contraries 𝑎 = 𝑟 and 𝑏 = 𝑝. In 𝐷, both {𝑎} and {𝑏} given above is rather theoretical. We believe that finding are admissible as they symmetrically attack each other. a constructive proof for this result is an exciting future Following Definition 26, we obtain the corresponding work direction. ABA 𝐷′ = (ℒ′ , ℛ′ , 𝒜′ , ′ ) with assumptions 𝑎, 𝑏, and additional assumptions 𝑝𝑑 , 𝑝𝑛𝑑 , 𝑞𝑑 , 𝑞𝑛𝑑 , 𝑠𝑑 , 𝑠𝑛𝑑 ; and 5.2. Obtaining a Polynomial Core rules ℛ′ : Now we turn our attention to the opposite direction: We 𝑟1′ : 𝑝 ← 𝑞𝑑 ; 𝑟2′ : 𝑞 ← 𝑎; 𝑟3′ : 𝑠 ← 𝑏. present a general polynomial-time procedure which under mild conditions transforms a given ABA framework 𝐷 s.t. The assumption 𝑞𝑑 is defended by each assumption set (i) the translated framework is equivalent under projection that derives 𝑞 (since 𝑞𝑑 is attacked by 𝑞𝑛𝑑 which is in to 𝐷 and (ii) the core of the translated ABA framework turn attacked by all assumption sets that derive 𝑞). Conse- is polynomially bounded. That is, this time we do not try quently, {𝑞𝑑 , 𝑎} is admissible since it derives 𝑞 and 𝑝 and to obtain an AF with tractable reasoning, but we wish to thus defeats the attackers 𝑏 and 𝑞𝑛𝑑 . Likewise, {𝑏, 𝑞𝑛𝑑 } prevent the exponential blow-up which might be caused is admissible in 𝐷′ as it defends itself against the attack from the instantiation procedure. from 𝑞𝑑 and 𝑎. We take the definition of circular tree-based arguments As we have seen in the above example, restricting the (proof trees) from Craven and Toni (2016). outcome to the initial set of assumptions yields the original extensions. This is not a coincidence, as we show next: Definition 25. A tree-based argument is circular if there admissible assumption sets and derivations are preserved is a path from a leaf to the root which contains two dis- when projecting to 𝒜 of the original ABA framework. tinct vertices with the same label. An ABA framework is circular if there is a circular tree-based argument for this Proposition 28. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be a non-circular framework. ABA framework such that each 𝑠 ∈ ℒ is in Th 𝐷 (𝒜) and 𝐷′ the AF-sensitive ABA framework of 𝐷. It holds that We remark that ABA frameworks obtained from Re- duction 14 are non-circular and all atoms are derivable • if 𝐸 ∈ adm(𝐷), then there is an 𝐸 ′ ∈ adm(𝐷′ ) (independently of whether the underlying formula is satis- with 𝐸 = 𝐸 ′ ∩𝒜 and Th ℛ (𝐸) = Th ℛ′ (𝐸 ′ )∩ℒ, fiable). and 99 � 𝜑 • if 𝐸 ∈ adm(𝐷), then there is an 𝐸 ′ ∈ adm(𝐷′ ) (𝑐1 )𝑑 (𝑐2 )𝑑 with 𝐸 = 𝐸 ′ ∩𝒜 and Th ℛ (𝐸) = Th ℛ′ (𝐸 ′ )∩ℒ, • if 𝐸 ′ ∈ adm(𝐷′ ), then 𝐸 ′ ∩ 𝒜 ∈ adm(𝐷) and Th ℛ (𝐸) ⊇ Th ℛ′ (𝐸 ′ ) ∩ ℒ, and (𝑐1 )𝑑 (𝑐1 )𝑛𝑑 (𝑐2 )𝑛𝑑 (𝑐2 )𝑑 • the size of the AF corresponding to 𝐷′ is bounded by 𝑝(|𝐷′ |). 𝑐2 𝑐1 𝑐1 𝑐2 5.3. Trade-Off: Size and Complexity 𝑥′1 𝑥1 𝑥′2 𝑥2 In Section 5.1 the central idea was to start off with Reduc- 𝑥1 𝑥′1 𝑥2 𝑥′2 tion 14 modeling a CNF-formula. We could try to do the same here and then apply Theorem 31 in order to avoid Figure 2: Constructed ABA framework from Example 15 the exponential blow-up in size of the AF. However, if we when applying the construction from Definition 26. could proceed like this with one-to-one correspondence of the semantics, we would end up solving an NP-hard problem in polynomial time. Therefore, the condition of • if 𝐸 ∈ adm(𝐷 ), then 𝐸 = 𝐸 ∩ 𝒜 ∈ adm(𝐷) equivalence under projection in Theorem 31 seems neces- ′ ′ ′ and Th ℛ (𝐸) ⊇ Th ℛ′ (𝐸 ′ ) ∩ ℒ. sary. We present an impossibility result stating that one cannot transform a given ABA framework to an equiva- We note that Th ℛ (𝐸) and Th ℛ′ (𝐸 ′ )∩ℒ are not equal lent one with polynomially bounded cores and bounded but in subset-relation in the second bullet since deriva- rule-size, at least under standard complexity-theoretic as- tions are potentially cut off in the construction of an AF- sumptions. sensitive ABA framework. Consider the ABA frameworks 𝐷 and 𝐷′ in Example 27. In 𝐷, the assumption 𝑎 derives Theorem 32. Assuming 𝑃 ̸= NP , there is no constant 𝑘 𝑝 and 𝑞 while in 𝐷′ , the assumption 𝑎 derives only 𝑞. Thus and polynomial-time algorithm which translates a given Th ℛ ({𝑎}) = {𝑎, 𝑝, 𝑞} ⊇ {𝑎, 𝑞} = Th ℛ′ ({𝑎})(∩ℒ). ABA framework 𝐷 to another ABA framework 𝐷′ s.t. From the construction of AF-sensitive frameworks, it • adm(𝐷) = adm(𝐷′ ), follows that the cores are polynomially bounded. Indeed, • Th ℛ (𝐸) = Th ℛ′ (𝐸) for 𝐸 ∈ adm(𝐷), since each assumption as well as each rule corresponds to precisely one tree-based argument, we obtain that the • 𝐷′ has rule-size bounded by 𝑘, and ′ ′ corresponding AF has at most |𝒜 |+|ℛ | many arguments • the cores of the set of ABA frameworks 𝒟′ trans- in the core. lated by the algorithm are bounded polynomially. Proposition 29. Let 𝒟 be the set of all non-circular ABA Proof. Suppose that such an algorithm 𝑇 exists. Let frameworks with all atoms derivable, and 𝒟′ the set of 𝜑 = 𝑐1 ∧ · · · ∧ 𝑐𝑚 be a Boolean formula in CNF over AF-sensitive ABA frameworks from 𝒟. It holds that the clauses 𝐶 = {𝑐1 , . . . , 𝑐𝑚 } and Boolean variables 𝑋 = cores of 𝒟′ are polynomially bounded. {𝑥1 , . . . , 𝑥𝑛 }. Let 𝐷 be the ABA framework obtained from Reduction 14, and let 𝐷′ = 𝑇 (𝐷) be the outcome Example 30. Let us consider again our ABA framework of the algorithm. Note that 𝐷′ can be constructed in time from Example 15. Applying the above construction, we polynomial w.r.t. size of 𝜑. By Reduction 14 and second obtain an ABA 𝐷′ with additional assumptions (𝑐1 )𝑑 , item, it holds that 𝜑 is satisfiable iff there is an admissible (𝑐1 )𝑛𝑑 , (𝑐2 )𝑑 , (𝑐2 )𝑛𝑑 ; moreover, we replace rule 𝜙 ← assumption set 𝐴 with 𝜑 ∈ Th ℛ′ (𝐴). 𝑐1 , 𝑐2 with the rule 𝜙 ← (𝑐1 )𝑑 , (𝑐2 )𝑑 . The resulting AF Each admissible assumption-set 𝐵 in 𝐷 satisfies 𝐵 ⊆ is given in Figure 2. 𝑋 ∪ {𝑥′ | 𝑥 ∈ 𝑋}, moreover, 𝐵 does not contain both 𝑥 and 𝑥′ for any 𝑥 ∈ 𝑋 Also note that each conflict-free We can now gather our results to infer our desired theo- assumption-set is admissible since Reduction 14 yields a rem. Due to Proposition 29 the AF-sensitive ABA frame- symmetric ABA framework. work induces an AF with polynomial size and Proposi- By the first item, 𝐷′ has the same admissible assump- tion 28 ensures that applying this constructions preserves tion sets as 𝐷′ . It holds that there is an argument (𝐵, 𝜑) in admissible reasoning under projection. Combining these 𝐷′ and 𝐵 does not contain both 𝑥 and 𝑥′ for any 𝑥 ∈ 𝑋 insights yields the following central result. iff 𝜑 is credulously accepted under admissible semantics in 𝐷′ iff 𝜑 is credulously accepted under admissible se- Theorem 31. There is some polynomial 𝑝 such that each mantics in 𝐷 iff 𝜑 is satisfiable. Thus, if one finds an non-circular ABA framework 𝐷 = (ℒ, ℛ, 𝒜, ) with argument (𝐵, 𝜑) for 𝐷′ without “complementary literals” ℒ ⊆ Th 𝐷 (𝒜) can be transformed in polynomial time (i.e., without any 𝑥 ∈ 𝑋 s.t. both 𝑥 and 𝑥′ are in 𝐵) we into an ABA framework 𝐷′ where 100 �conclude that 𝜑 is satisfiable, and if 𝜑 is unsatisfiable no Proof. Suppose there is a cycle in 𝐹 . Then there is also a such argument in 𝐷′ exists. cycle 𝑥1 , . . . , 𝑥𝑛 in 𝐹 where cl (𝑥𝑖 ) ̸= cl (𝑥𝑗 ) for 𝑖 ̸= 𝑗 By Theorem 22 and due to the third item, one can enu- which can be seen as follows. If cl (𝑥𝑖 ) = cl (𝑥𝑗 ), then merate all arguments of 𝐷′ in polynomial time. Overall, (supposing 𝑖 < 𝑗) there is an attack from 𝑥𝑖 to 𝑥𝑗+1 we can search the space of all arguments in 𝐷′ in time and we can simply remove the sub-sequence consisting polynomial to size of 𝜑, implying that we can decide of 𝑥𝑖+1 , . . . 𝑥𝑗 . This procedure can be iterated until we satisfiability of 𝜑 in polynomial time, a contradiction to obtain the sub-sequence with the two required properties. 𝑃 ̸= NP . We now prove the two statements. i) By iteratively applying Lemma 35 we find a cycle in G𝐷 . ii) By utilizing cl (𝑥𝑖 ) ̸= cl (𝑥𝑗 ) for 𝑖 ̸= 𝑗, Lemma 35 even guarantees 6. Dependency Graphs on ABA that the length is preserved which yields an odd cycle in G𝐷 if 𝑥1 , . . . , 𝑥𝑛 is odd. We look at dependencies induced by the rules of a given ABA framework, inspired by dependency graphs in logic The above proposition does not hold for even cycles. programming, and related but different to the dependency As a counter-example consider the even-cycle free de- graph notion existing for ABA [17]. pendency graph of Example 34. In contrast, the core 𝐹 Definition 33. The dependency graph G𝐷 = (𝑉, 𝐸, 𝑙) possesses an even cycle. Vice versa, given a cycle in the for a given ABA 𝐷 = (ℒ, ℛ, 𝒜, ) is an edge-labelled dependency graph, we can construct a cycle of the same graph with length in 𝐹 . • 𝑉 = ℒ is the set of vertices, Proposition 37. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- • edge 𝑒 = (𝑠, 𝑡) ∈ 𝐸 iff i) there is some rule work such that each 𝑠 ∈ ℒ is in Th(𝒜), 𝐹 be the core 𝑟 ∈ ℛ with 𝑠 ∈ 𝑏𝑜𝑑𝑦(𝑟) and ℎ𝑒𝑎𝑑(𝑟) = {𝑡}, in and G𝐷 the dependency graph. If 𝑝1 , . . . , 𝑝𝑛 is a cycle this case 𝑙(𝑒) = +; or ii) 𝑡 ∈ 𝒜 and 𝑡 = 𝑠, in this in G𝐷 , then there is a cycle of the same length in 𝐹 . case, 𝑙(𝑒) = −. Proof. For 2 ≤ 𝑖 ≤ 𝑛 let 𝑝𝑖 be an assumption. By con- In brief, vertices represent atoms, and positive edges struction of G𝐷 , 𝑝𝑖−1 = 𝑝𝑖 . Since 𝐷 is trim, there is connect body elements and heads of rules, while negative an argument 𝑥1 with conclusion cl (𝑥1 ) = 𝑝𝑖−1 . Now edges correspond to contraries. let 𝑗 be minimal s.t. 𝑖 < 𝑗 and 𝑝𝑗 is an assumption. Again since 𝐷 is trim, there is also an argument 𝑥2 with Example 34. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- cl (𝑥2 ) = 𝑝𝑗−1 = 𝑝𝑗 . Observe that 𝑥2 is attacked by work with 𝒜 = {𝑎, 𝑏, 𝑐, 𝑑, 𝑒}, distinct contraries 𝑥 = 𝑥 ¯ arguments with conclusion 𝑝𝑖−1 . Thus, we have an at- for each 𝑥 ∈ 𝒜 and the following rules: tack from 𝑥1 to , 𝑥2 in 𝐹 . In G𝐷 , the length of the path ¯←𝑎 𝑑 ¯𝑏 ← 𝑎 ¯𝑐 ← 𝑏 𝑝𝑖−1 , . . . 𝑝𝑗−1 equals one since by choice of 𝑗 we have {𝑝𝑖−1 , . . . 𝑝𝑗−1 }∩𝒜 = {𝑝𝑖 }. If we continue analogously ¯←𝑐 𝑎 ¯𝑒 ← 𝑑 ¯←𝑒 𝑎 we find a cycle in 𝐹 having the same length as our cycle Then the dependency graph G𝐷 is given as follows. 𝑝1 , . . . , 𝑝 𝑛 . − + + − The dependency graph can be utilized to obtain approx- 𝑑 ¯ 𝑑 𝑎 ¯𝑏 𝑏 imations for several bounds we considered throughout this + − + paper. ¯𝑒 𝑒 𝑎 ¯ 𝑐 ¯𝑐 − + + − Proposition 38. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA frame- work and G𝐷 = (𝑉, 𝐸, 𝑙) the dependency graph. i) For A path (cycle) in G𝐷 is defined as usual; the length of the rule size 𝑘 of 𝐷 we have 𝑘 ≤ max𝑒∈𝑉 |{𝑒′ ∈ 𝑉 | a path (cycle) is the number of edges labeled “−”. The (𝑒′ , 𝑒) ∈ 𝐸}|. ii) If G𝐷 is acyclic, then the derivation- relation between paths in G𝐷 and the core 𝐹 of 𝐷 is very depth of 𝐷 is bounded by the size of the longest path close as formalized in the following lemma. (counting “+” labels) in G𝐷 . Lemma 35. Let 𝐷 be an ABA framework with core 𝐹 = Finally, we get a tighter approximation for the size of (A, R) and dependency graph G𝐷 . If (𝛼, 𝛽) ∈ R, then the core than our previously established term 2|𝒜| ·|ℒ∖𝒜|. there is a path of length one from cl (𝛼) to cl (𝛽) in G𝐷 . Proposition 39. Let 𝐷 = (ℒ, ℛ, 𝒜, ) be an ABA The observation can be extended to the following result. framework, 𝐹 = (A, R) be the core and G𝐷 the de- Proposition 36. Let 𝐷 be an ABA framework with core pendency graph. For each 𝑠 ∈ ℒ let 𝑝(𝑠) = {𝑎 ∈ 𝐹 and dependency graph G𝐷 . i) If G𝐷 is acyclic, then so 𝒜 ∑︀ | 𝑎 has|𝑝(𝑠)| a path in G𝐷 to 𝑠}. Then |A| ≤ |𝒜| + is 𝐹 . ii) If G𝐷 is odd-cycle free, then so is 𝐹 . 𝑠∈ℒ∖𝐴 2 . 101 �7. Discussion Acknowledgments The computation of a corresponding AF, and different We thank the anonymous reviewers of this paper for their forms of representing arguments together with optimiza- helpful comments. This research was funded in whole, or tions for structured argumentation have been consid- in part, by the Austrian Science Fund (FWF) W1255-N23, ered before, e.g., for ABA [17, 20, 13], and for other by the Vienna Science and Technology Fund (WWTF) forms of structured argumentation [12, 21]. Moreover, through project ICT19-065, and by the German Federal complexity of ABA was investigated in several direc- Ministry of Education and Research (BMBF, 01/S18026A- tions [22, 23, 24, 25], potentially exponential AFs arising F) by funding the competence center for Big Data and AI from structured argumentation and their issues was dis- “ScaDS.AI” Dresden/Leipzig. cussed, e.g., by Strass et al. (2019), and infinite arguments for ABA were investigated [27]. In contrast to these works, we relate features of the given ABA instance to the size References of the resulting arguments and complexity of reasoning. [1] P. Baroni, D. Gabbay, M. Giacomin, L. van der We focused on arguments as pair structures (assumptions Torre (Eds.), Handbook of Formal Argumentation, and claim). College Publications, 2018. Considering variants for representing arguments is an [2] K. Atkinson, P. Baroni, M. Giacomin, A. Hunter, appealing avenue for future work, but it seems that differ- H. Prakken, C. Reed, G. R. Simari, M. Thimm, ent representations arrive at other computational barriers. S. Villata, Towards artificial argumentation, AI For instance, Lehtonen et al. (2017) showed #P-hardness Magazine 38 (2017) 25–36. under subtractive reductions for counting the number of [3] A. Bondarenko, P. M. Dung, R. A. Kowalski, F. Toni, argument structures for a representation incorporating a An abstract, argumentation-theoretic approach to form of minimality on the assumption sets. When requir- default reasoning, Artif. Intell. 93 (1997) 63–101. ing a core to contain only arguments with subset-minimal [4] S. Modgil, H. Prakken, A general account of argu- assumption sets one can show hardness for argument con- mentation with preferences, Artif. Intell. 195 (2013) struction, e.g., it is NP -hard to decide whether there is a 361–397. subset-minimal argument not yet constructed. [5] A. J. García, G. R. Simari, Defeasible logic pro- Our results on trade-offs regarding size and complex- gramming: An argumentative approach, Theory ity of reasoning suggest that it might be worthwhile to Pract. Log. Program. 4 (2004) 95–138. pre-process ABA frameworks in a suitable way before [6] P. Besnard, A. Hunter, Elements of Argumentation, utilizing AF solvers; also, one may model problems in MIT Press, 2008. ABA such that the corresponding AF is either small in [7] P. M. Dung, On the acceptability of arguments and size or the reasoning in the AF is tractable, depending on its fundamental role in nonmonotonic reasoning, the intention. logic programming and n-person games, Artif. Intell. The most interesting future work directions we identify 77 (1995) 321–358. are as follows. First, the results which make use of the [8] K. Čyras, X. Fan, C. Schulz, F. Toni, Assumption- actual semantics are only phrased for admissible sets yet. based argumentation: Disputes, explanations, pref- In particular generalizing Theorem 31 to the other clas- erences, in: P. Baroni, D. Gabbay, M. Giacomin, sical Dung semantics would contribute to our research. L. van der Torre (Eds.), Handbook of Formal Argu- Moreover, Theorem 24 is not constructive and one needs mentation, College Publications, 2018, pp. 365–408. to fix a given atom in advance. Finding an analogous [9] R. Craven, F. Toni, C. Cadar, A. Hadad, construction which preserves the semantics, similar in M. Williams, Efficient argumentation for medical spirit to Theorem 31, would be a great generalization. Fur- decision-making, in: Proc. KR, AAAI Press, 2012, thermore, it would be interesting to investigate to which pp. 598–602. extent a pre-processing as suggested by Theorem 31 can [10] K. Čyras, T. Oliveira, A. Karamlou, F. Toni, help boosting the performance of ABA solvers. As a final Assumption-based argumentation with preferences remark we want to mention that many other structured for- and goals for patient-centric reasoning with inter- malisms are similar in their spirit, i.e. induce a potentially acting clinical guidelines, Argument Comput. 12 infinite AF which makes information encoded within the (2021) 149–189. knowledge base explicit. One could therefore examine [11] X. Fan, F. Toni, A. Mocanu, M. Williams, Dialog- whether our results translate to other formalisms as well. ical two-agent decision making with assumption- based argumentation, in: Proc. AAMAS, IFAA- MAS/ACM, 2014, pp. 533–540. [12] L. Amgoud, P. Besnard, S. Vesic, Equivalence in 102 � logic-based argumentation, J. Appl. Non Class. Log- interface, Int. J. Approx. Reason. 112 (2019) 55–84. ics 24 (2014) 181–208. [27] P. M. Thang, P. M. Dung, J. Pooksook, Infinite argu- [13] T. Lehtonen, J. P. Wallner, M. Järvisalo, From struc- ments and semantics of dialectical proof procedures, tured to abstract argumentation: Assumption-based Argument Comput. (2021). In-press. acceptance via AF reasoning, in: Proc. ECSQARU, volume 10369 of LNCS, Springer, 2017, pp. 57–68. [14] B. Yun, N. Oren, M. Croitoru, Efficient con- struction of structured argumentation systems, in: Proc. COMMA, volume 326 of FAIA, IOS Press, 2020, pp. 411–418. [15] M. Thimm, S. Villata, The first international com- petition on computational models of argumentation: Results and analysis, Artif. Intell. 252 (2017) 267– 294. [16] S. A. Gaggl, T. Linsbichler, M. Maratea, S. Woltran, Design and results of the second international com- petition on computational models of argumentation, Artif. Intell. 279 (2020). [17] R. Craven, F. Toni, Argument graphs and assumption-based argumentation, Artif. Intell. 233 (2016) 1–59. [18] W. Dvořák, P. E. Dunne, Computational problems in formal argumentation and their complexity, in: P. Baroni, D. Gabbay, M. Giacomin, L. van der Torre (Eds.), Handbook of Formal Argumentation, College Publications, 2018. [19] D. S. Johnson, C. H. Papadimitriou, M. Yannakakis, On generating all maximal independent sets, Inf. Process. Lett. 27 (1988) 119–123. [20] Z. Bao, K. Čyras, F. Toni, ABAplus: Attack reversal in abstract and structured argumentation with pref- erences, in: Proc. PRIMA, volume 10621 of LNCS, Springer, 2017, pp. 420–437. [21] B. Yun, S. Vesic, M. Croitoru, Toward a more effi- cient generation of structured argumentation graphs, in: Proc. COMMA, volume 305 of FAIA, IOS Press, 2018, pp. 205–212. [22] Y. Dimopoulos, B. Nebel, F. Toni, On the computa- tional complexity of assumption-based argumenta- tion for default reasoning, Artif. Intell. 141 (2002) 57–78. [23] K. Čyras, Q. Heinrich, F. Toni, Computational com- plexity of flat and generic assumption-based argu- mentation, with and without probabilities, Artif. Intell. 293 (2021) 103449. [24] T. Lehtonen, J. P. Wallner, M. Järvisalo, Declarative algorithms and complexity results for assumption- based argumentation, J. Artif. Intell. Res. 71 (2021) 265–318. [25] A. Karamlou, K. Čyras, F. Toni, Complexity re- sults and algorithms for bipolar argumentation, in: Proc. AAMAS, IFAAMAS, 2019, pp. 1713–1721. [26] H. Strass, A. Wyner, M. Diller, EMIL: Extract- ing meaning from inconsistent language: Towards argumentation using a controlled natural language 103 �