
always, irrespective of the audience). On the other
hand, an argument A ∈ Args is subjectively acceptable
if and only if for some value order A is in some pre-
ferred extension (i.e. accepted for some audience). In
the case of A ∈ Args attacks B ∈ Args, A is OBA while
B is SBA.
3 AVERAGE-CASE METHODS
As in any intractable problem, there are classes of
VAFs that could be solved in linear time. The follow-
ing proposition identifies VAFs which allow for lin-
ear time reasoning, in particular, proposition 1 states
that problem instances with unrestricted number of ar-
guments sharing the same value are solvable trivially
with only one property: none of the attacks involves
arguments sharing the same value.
Proposition 1. Let (Args, R, V, val) be a VAF. Then
unattacked arguments are OBA while the attacked
ones are SBA if ∀(A,B) ∈ R(val(A) 6= val(B)).
Proof. For those unattacked arguments the status of
OBA is obvious. By contradiction we can prove that
the remaining attacked arguments are SBA. Assume
that not all of the attacked arguments are SBA, then
one or more are either indefensible or OBA. OBA ar-
guments are attacked by indefensible arguments, and
the indefensible arguments are attacked by similar
value arguments. Contradiction! n
The naive approach needs to check all value or-
ders (i.e. permutations of values in V ) to determine
the acceptability of an argument. Thus, the status of
an argument will be computed in time proportional to
|V |! even if it works on a VAF with linear reasoning.
This motivates us to look for a different approach that
checks the minimum required value orders to find the
acceptance status which results in algorithms with an
improved average-case run-time complexity.
The idea of our algorithm is based on the notion
that an argument’s status is decided according to its
attackers’ statuses, this notion has been used in other
aspects of AFs (see (Modgil and Caminada, 2009) for
an overview). In deed, our algorithm searches the tree
induced by the argument in question s.t. the argument
is the root and its children are its attacker arguments
and the children of these are their attackers and so
on, provided that values are not repeated in a single
branch unless the repetition happens in a row. We call
such tree the dispute tree.
Definition 1. Let (Args, R, V, val) be a VAF. Then
T
A
is the dispute tree induced by A ∈ Args iff A is the
root and ∀B,C ∈ Args : B is a child of C iff ((B,C) ∈
R∧(val(B) does not appear on the directed path from
C to A ∨val(B) = val(C))).
Example 1. Consider the VAF in fig. 1 (a) (through-
out the paper we use the argument-value syntax for
nodes’ labels). The dispute tree T
B
is depicted in fig.
1 (b). Note that we do not consider attacks with re-
peated values unless they are in a row, for instance,
in T
B
the attack from A against C is dropped since A
has the same value of B. The dropped attack is cer-
tainly unsuccessful if V 2 is preferred to V 1, and it is
unreachable if V 1 is preferred to V 2.
The new approach works on the dispute tree of
arguments, it decides the status of an argument col-
lectively based on its statuses under the superiority of
each value in the dispute tree. Before presenting the
strict methods it might be helpful to discuss an exam-
ple just to capture the general idea.
Example 2. Consider the VAF in fig. 1 (a). To decide
the status of B, our algorithm decides its status as SBA
since it is survived if V 1 is most preferred (see fig. 1
(c)) and defeated when V 2 is most preferred (see fig.
1 (d)). In other words, B is accepted for all audiences
who prefer V 1 but rejected by audiences who prefer
V 2. In total, its status is SBA.
Every time a value is considered as most preferred
the dispute tree changes accordingly, we refer to the
new resulted tree as the pruned dispute tree under the
superiority of some value.
Definition 2. Let (Args, R, V, val) be a VAF, A ∈
Args, v ∈ V and T ⊆ T
A
. Then the pruned dispute
tree T
v
is defined as {(B,C) ∈ T | val(B) = val(C) ∨
val(C) 6= v}
Example 3. Let T be the tree T
B
in fig. 1 (b) and
v = V 2. Then T
v
= {(C,B),(D,B), (E, D),(C,E)}.
One more helpful term we have to define is related
to the recursive nature of the new approach. The new
method decides an argument’s status on the basis of
its attackers’ statuses, and therefore, the status of an
attacker is computed in the space of the dispute sub-
tree that is branched from that attacker.
Definition 3. Let (Args, R, V, val) be a VAF and
T ⊆ T
A
. Then the subtree T (B) is defined as {(C, D) ∈
T | D = B ∨ there is a directed path in T from D to B}.
Example 4. Let T be the tree T
v
from example 3. Then
T (D) = {(E,D),(C,E)}.
The methods that decide the acceptability status
for arguments in a VAF are presented in algorithms
1 and 2. Algorithm 1 decides the status of A ∈ Args
while algorithm 2 decides the status of A under the su-
periority of some value. With reference to algorithms
1 and 2, status
A
and status
0
A
stand for the current pro-
visional status of A and the status of A under the su-
periority of some value respectively.
ICAART 2012 - International Conference on Agents and Artificial Intelligence
226