{"id":"https://openalex.org/W4407877691","doi":"https://doi.org/10.3233/978-1-60750-619-5-207","title":"Computation with varied-strength attacks in abstract argumentation frameworks","display_name":"Computation with varied-strength attacks in abstract argumentation frameworks","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W4407877691","doi":"https://doi.org/10.3233/978-1-60750-619-5-207"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-60750-619-5-207","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-60750-619-5-207","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116363623","display_name":"Dunne Paul E.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dunne Paul E.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116397562","display_name":"Mart iacute nez Diego C.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mart&iacute;nez Diego C.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116397563","display_name":"Garc iacute a Alejandro J.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Garc&iacute;a Alejandro J.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5116363606","display_name":"Simari Guillermo R.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Simari Guillermo R.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116363623"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42401666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9462000131607056,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/argumentation-theory","display_name":"Argumentation theory","score":0.8386531472206116},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6391186118125916},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5190525650978088},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3242897391319275},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1658865213394165},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.10919460654258728},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.09157121181488037}],"concepts":[{"id":"https://openalex.org/C65059942","wikidata":"https://www.wikidata.org/wiki/Q270105","display_name":"Argumentation theory","level":2,"score":0.8386531472206116},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6391186118125916},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5190525650978088},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3242897391319275},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1658865213394165},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.10919460654258728},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.09157121181488037}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-60750-619-5-207","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-60750-619-5-207","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4256185029","https://openalex.org/W2141332034","https://openalex.org/W4388437769","https://openalex.org/W2762454042","https://openalex.org/W2064153856","https://openalex.org/W2337488240","https://openalex.org/W52290235"],"abstract_inverted_index":{"In":[0,31],"abstract":[1],"frameworks":[2],"with":[3,13],"varied":[4],"strength":[5,27],"attacks":[6],"(AFV),":[7],"arguments":[8,24],"may":[9],"attack":[10],"each":[11],"other":[12],"different":[14],"strength.":[15],"An":[16],"admissible":[17,21,48],"scenario":[18],"is":[19],"an":[20,66],"set":[22],"of":[23,39,47,53,59,73],"fulfilling":[25],"certain":[26],"conditions":[28],"about":[29],"defences.":[30],"this":[32],"work":[33],"we":[34],"analyze":[35],"the":[36,45,51,57],"computational":[37],"complexity":[38],"some":[40],"decision":[41],"problems":[42,63],"related":[43],"to":[44,77],"quality":[46],"scenarios:":[49],"checking":[50],"property":[52,58],"being":[54,60],"top-admissible":[55],"and":[56,71],"equilibrated.":[61],"These":[62],"are":[64,75],"implying":[65],"exhaustive":[67],"comparison":[68],"between":[69],"scenarios,":[70],"both":[72],"them":[74],"shown":[76],"be":[78],"coNP-complete.":[79]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
