{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T07:15:19Z","timestamp":1726298119751},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319171296"},{"type":"electronic","value":"9783319171302"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17130-2_26","type":"book-chapter","created":{"date-parts":[[2015,4,15]],"date-time":"2015-04-15T06:20:11Z","timestamp":1429078811000},"page":"379-387","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Strategic Argumentation Under Grounded Semantics is NP-Complete"],"prefix":"10.1007","author":[{"given":"Guido","family":"Governatori","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"Maher","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Olivieri","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Rotolo","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Scannnapieco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,16]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-24674-9_33","volume-title":"Methods and Applications of Artificial Intelligence","author":"G Antoniou","year":"2004","unstructured":"Antoniou, G.: A discussion of some intuitions of defeasible reasoning. In: Vouros, G.A., Panayiotopoulos, T. (eds.) SETN 2004. LNCS (LNAI), vol. 3025, pp. 311\u2013320. Springer, Heidelberg (2004)"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/371316.371517","volume":"2","author":"G Antoniou","year":"2001","unstructured":"Antoniou, G., Billington, D., Governatori, G., Maher, M.J.: Representation results for defeasible logic. ACM Trans. Comput. Log. 2(2), 255\u2013286 (2001)","journal-title":"ACM Trans. Comput. Log."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-0-387-98197-0_2","volume-title":"Argumentation in Artificial Intelligence","author":"P Baroni","year":"2009","unstructured":"Baroni, P., Giacomin, M.: Semantics of abstract argument systems. In: Simari, G., Rahwan, I. (eds.) Argumentation in Artificial Intelligence, pp. 25\u201344. Springer, Heidelberg (2009)"},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"PM Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321\u2013358 (1995)","journal-title":"Artif. Intell."},{"issue":"5","key":"26_CR5","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1093\/logcom\/14.5.675","volume":"14","author":"G Governatori","year":"2004","unstructured":"Governatori, G., Maher, M.J., Antoniou, G., Billington, D.: Argumentation semantics for defeasible logic. J. Log. Comput. 14(5), 675\u2013702 (2004)","journal-title":"J. Log. Comput."},{"key":"26_CR6","unstructured":"Governatori, G., Olivieri, F., Scannapieco, S., Rotolo, A., Cristani, M.: Strategic argumentation is NP-complete. In: Proceedings of the ECAI 2014, IOS Press (2014)"},{"issue":"4\u20135","key":"26_CR7","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1017\/S1471068412000294","volume":"12","author":"MJ Maher","year":"2012","unstructured":"Maher, M.J.: Relative expressiveness of defeasible logics. Theor. Pract. Log. Program. 12(4\u20135), 793\u2013810 (2012)","journal-title":"Theor. Pract. Log. Program."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1017\/S1471068413000367","volume":"13","author":"MJ Maher","year":"2013","unstructured":"Maher, M.J.: Relative expressiveness of defeasible logics II. Theor. Pract. Log. Program. 13, 579\u2013592 (2013)","journal-title":"Theor. Pract. Log. Program."},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-319-13560-1_42","volume-title":"PRICAI 2014: Trends in Artificial Intelligence","author":"MJ Maher","year":"2014","unstructured":"Maher, M.J.: Complexity of exploiting privacy violations in strategic argumentation. In: Pham, D.-N., Park, S.-B. (eds.) PRICAI 2014. LNCS, vol. 8862, pp. 523\u2013535. Springer, Heidelberg (2014)"},{"key":"26_CR10","unstructured":"Okuno, K., Takahashi, K.: Argumentation system with changes of an agent\u2019s knowledge base. In: IJCAI 2009, pp. 226\u2013232 (2009)"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/19462160903564592","volume":"1","author":"H Prakken","year":"2010","unstructured":"Prakken, H.: An abstract framework for argumentation with structured arguments. Argum. Comput. 1(2), 93\u2013124 (2010)","journal-title":"Argum. Comput."},{"key":"26_CR12","unstructured":"Satoh, K., Takahashi, K.: A semantics of argumentation under incomplete information. In: Proceedings of Jurisn 2011 (2011)"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2012.09.010","volume":"195","author":"F Toni","year":"2013","unstructured":"Toni, F.: A generalised framework for dispute derivations in assumption-based argumentation. Artif. Intell. 195, 1\u201343 (2013)","journal-title":"Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17130-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:46:01Z","timestamp":1675262761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17130-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319171296","9783319171302"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17130-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}