Jennifer Chayes

Jennifer Chayes
  • University of California, Berkeley

About

149
Publications
25,324
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,802
Citations
Current institution
University of California, Berkeley

Publications

Publications (149)
Preprint
Full-text available
In drug discovery, molecular dynamics (MD) simulation for protein-ligand binding provides a powerful tool for predicting binding affinities, estimating transport properties, and exploring pocket sites. There has been a long history of improving the efficiency of MD simulations through better numerical methods and, more recently, by utilizing machin...
Preprint
Artificial intelligence models have shown great potential in structure-based drug design, generating ligands with high binding affinities. However, existing models have often overlooked a crucial physical constraint: atoms must maintain a minimum pairwise distance to avoid separation violation, a phenomenon governed by the balance of attractive and...
Preprint
Covalent organic frameworks (COFs) have emerged as promising atmospheric water harvesters, offering a potential solution to the pressing global issue of water scarcity, which threatens millions of lives worldwide. This study presents a series of 2D COFs, including HCOF-3, HCOF-2, and a newly developed structure named COF-309, designed for optimized...
Preprint
Artificial intelligence for scientific discovery has recently generated significant interest within the machine learning and scientific communities, particularly in the domains of chemistry, biology, and material discovery. For these scientific problems, molecules serve as the fundamental building blocks, and machine learning has emerged as a highl...
Preprint
Full-text available
On social networks, algorithmic personalization drives users into filter bubbles where they rarely see content that deviates from their interests. We present a model for content curation and personalization that avoids filter bubbles, along with algorithmic guarantees and nearly matching lower bounds. In our model, the platform interacts with $n$ u...
Article
Full-text available
For d≥2$$ d\ge 2 $$ and all q≥q0(d)$$ q\ge {q}_0(d) $$ we give an efficient algorithm to approximately sample from the q$$ q $$‐state ferromagnetic Potts and random cluster models on finite tori (ℤ/nℤ)d$$ {\left(\mathbb{Z}/ n\mathit{\mathbb{Z}}\right)}^d $$ for any inverse temperature β≥0$$ \beta \ge 0 $$. This shows that the physical phase transit...
Article
Full-text available
Climate change is one of the greatest challenges facing humanity, and we, as machine learning (ML) experts, may wonder how we can help. Here we describe how ML can be a powerful tool in reducing greenhouse gas emissions and helping society adapt to a changing climate. From smart grids to disaster management, we identify high impact problems where e...
Preprint
Full-text available
We initiate a study of large deviations for block model random graphs in the dense regime. Following Chatterjee-Varadhan(2011), we establish an LDP for dense block models, viewed as random graphons. As an application of our result, we study upper tail large deviations for homomorphism densities of regular graphs. We identify the existence of a "sym...
Article
This paper proposes a new optimization algorithm called Entropy-SGD for training deep neural networks that is motivated by the local geometry of the energy landscape. Local extrema with low generalization error have a large proportion of almost-zero eigenvalues in the Hessian with very few positive or negative eigenvalues. We leverage upon this obs...
Preprint
Full-text available
The long-term impact of algorithmic decision making is shaped by the dynamics between the deployed decision rule and individuals' response. Focusing on settings where each individual desires a positive classification---including many important applications such as hiring and school admissions, we study a dynamic learning setting where individuals i...
Preprint
Full-text available
For $d \ge 2$ and all $q\geq q_{0}(d)$ we give an efficient algorithm to approximately sample from the $q$-state ferromagnetic Potts and random cluster models on the torus $(\mathbb Z / n \mathbb Z )^d$ for any inverse temperature $\beta\geq 0$. This stands in contrast to Markov chain mixing time results: the Glauber dynamics mix slowly at and belo...
Preprint
Full-text available
Climate change is one of the greatest challenges facing humanity, and we, as machine learning experts, may wonder how we can help. Here we describe how machine learning can be a powerful tool in reducing greenhouse gas emissions and helping society adapt to a changing climate. From smart grids to disaster management, we identify high impact problem...
Preprint
Full-text available
We present a project that aims to generate images that depict accurate, vivid, and personalized outcomes of climate change using Cycle-Consistent Adversarial Networks (CycleGANs). By training our CycleGAN model on street-view images of houses before and after extreme weather events (e.g. floods, forest fires, etc.), we learn a mapping that can then...
Preprint
Full-text available
There is a growing body of work that proposes methods for mitigating bias in machine learning systems. These methods typically rely on access to protected attributes such as race, gender, or age. However, this raises two significant challenges: (1) protected attributes may not be available or it may not be legal to use them, and (2) it is often des...
Conference Paper
Full-text available
We present a large-scale study of gender bias in occupation classification, a task where the use of machine learning may lead to negative outcomes on peoples' lives. We analyze the potential allocation harms that can result from semantic representation bias. To do so, we study the impact on occupation classification of including explicit gender ind...
Conference Paper
Full-text available
In contexts such as college admissions, hiring, and image search, decision-makers often aspire to formulate selection criteria that yield both high-quality and diverse results. However, simultaneously optimizing for quality and diversity can be challenging, especially when the decision-maker does not know the true quality of any criterion and inste...
Preprint
We present a large-scale study of gender bias in occupation classification, a task where the use of machine learning may lead to negative outcomes on peoples' lives. We analyze the potential allocation harms that can result from semantic representation bias. To do so, we study the impact on occupation classification of including explicit gender ind...
Article
Machine learning (ML) techniques are enjoying rapidly increasing adoption. However, designing and implementing the systems that support ML models in real-world deployments remains a significant obstacle, in large part due to the radically different development and deployment profile of modern ML methods, and the range of practical concerns that com...
Article
Full-text available
Checkpoint inhibitor immunotherapies have had major success in treating patients with late-stage cancers, yet the minority of patients benefit. Mutation load and PD-L1 staining are leading biomarkers associated with response, but each is an imperfect predictor. A key challenge to predicting response is modeling the interaction between the tumor and...
Preprint
Full-text available
We consider the following fundamental question on $\epsilon$-differential privacy. Consider an arbitrary $\epsilon$-differentially private algorithm defined on a subset of the input space. Is it possible to extend it to an $\epsilon'$-differentially private algorithm on the whole input space for some $\epsilon'$ comparable with $\epsilon$? In this...
Preprint
Full-text available
Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms and impossibility results for fitting complex statistical models to network data subject to rigorous privacy guarantees. We consider the so-called node-differentially private algorithms, which compute information about a graph or network while provably...
Preprint
Full-text available
Checkpoint inhibitor immunotherapies have had major success in treating patients with late-stage cancers, yet the minority of patients benefit [1]. Mutation load and PD-L1 staining are leading biomarkers associated with response, but each is an imperfect predictor. A key challenge to predicting response is modeling the interaction between the tumor...
Article
Full-text available
The sparse matrix estimation problem consists of estimating the distribution of an $n\times n$ matrix $Y$, from a sparsely observed single instance of this matrix where the entries of $Y$ are independent random variables. This captures a wide array of problems; special instances include matrix completion in the context of recommendation systems, gr...
Preprint
We consider sparse matrix estimation where the goal is to estimate an $n\times n$ matrix from noisy observations of a small subset of its entries. We analyze the estimation error of the popularly utilized collaborative filtering algorithm for the sparse regime. Specifically, we propose a novel iterative variant of the algorithm, adapted to handle t...
Conference Paper
Many social and economic systems are naturally represented as networks, from off-line and on-line social networks, to bipartite networks, like Netflix and Amazon, between consumers and products. Graphons, developed as limits of graphs, form a natural, nonparametric method to describe and estimate large networks like Facebook and LinkedIn. Here we d...
Article
Full-text available
Significance Artificial neural networks are some of the most widely used tools in data science. Learning is, in principle, a hard problem in these systems, but in practice heuristic algorithms often find solutions with good generalization properties. We propose an explanation of this good performance in terms of a nonequilibrium statistical physics...
Conference Paper
There are numerous examples of sparse massive networks, in particular the Internet, WWW and online social networks. How do we model and learn these networks? In contrast to conventional learning problems, where we have many independent samples, it is often the case for these networks that we can get only one independent sample. How do we use a sing...
Preprint
In artificial neural networks, learning from data is a computationally demanding task in which a large number of connection weights are iteratively tuned through stochastic-gradient-based heuristic processes over a cost-function. It is not well understood how learning occurs in these systems, in particular how they avoid getting trapped in configur...
Article
Full-text available
Cataloging the neuronal cell types that comprise circuitry of individual brain regions is a major goal of modern neuroscience and the BRAIN initiative. Single-cell RNA sequencing can now be used to measure the gene expression profiles of individual neurons and to categorize neurons based on their gene expression profiles. However this modern tool i...
Conference Paper
Inspired by social choice theory in voting and other contexts, we provide the first axiomatic approach to community identification in a social network. We start from an abstract framework, called preference networks, which, for each member, gives their ranking of all the other members of the network. This complete-information preference model enabl...
Article
Full-text available
Advances in experimental techniques resulted in abundant genomic, transcriptomic, epigenomic, and proteomic data that have the potential to reveal critical drivers of human diseases. Complementary algorithmic developments enable researchers to map these data onto protein-protein interaction networks and infer which signaling pathways are perturbed...
Article
Full-text available
Dr Chayes' talk described how, to a discrete mathematician, 'all the world's a graph, and all the people and domains merely vertices'. A graph is represented as a set of vertices V and a set of edges E, so that, for instance, in the World Wide Web, V is the set of pages and E the directed hyperlinks; in a social network, V is the people and E the s...
Article
In this paper we introduce a new notion of convergence of sparse graphs which we call Large Deviations or LD-convergence and which is based on the theory of large deviations. The notion is introduced by "decorating" the nodes of the graph with random uniform i.i.d. weights and constructing random measures on $[0,1]$ and $[0,1]^2$ based on the decor...
Article
Full-text available
Abstract Signaling and regulatory networks are essential for cells to control processes such as growth, differentiation, and response to stimuli. Although many "omic" data sources are available to probe signaling pathways, these data are typically sparse and noisy. Thus, it has been difficult to use these data to discover the cause of the diseases...
Article
Full-text available
The theory of convergent graph sequences has been worked out in two extreme cases, dense graphs and bounded degree graphs. One can define convergence in terms of counting homomorphisms from fixed graphs into members of the sequence (left-convergence), or counting homomorphisms into fixed graphs (right-convergence). Under appropriate conditions, the...
Article
Full-text available
Diffusion is a fundamental graph process, underpinning such phenomena as epidemic disease contagion and the spread of innovation by word-of-mouth. We address the algorithmic problem of finding a set of k initial seed nodes in a network so that the expected size of the resulting cascade is maximized, under the standard independent cascade model of n...
Conference Paper
In a network, identifying all vertices whose PageRank is more than a given threshold value Δ is a basic problem that has arisen in Web and social network analyses. In this paper, we develop a nearly optimal, sublinear time, randomized algorithm for a close variant of this problem. When given a directed network G = (V,E), a threshold value Δ, and a...
Article
Full-text available
A fundamental problem arising in many applications in Web science and social network analysis is, given an arbitrary approximation factor $c>1$, to output a set $S$ of nodes that with high probability contains all nodes of PageRank at least $\Delta$, and no node of PageRank smaller than $\Delta/c$. We call this problem {\sc SignificantPageRanks}. W...
Article
Full-text available
A central problem in e-commerce is determining overlapping communities among individuals or objects in the absence of external identification or tagging. We address this problem by introducing a framework that captures the notion of communities or clusters determined by the relative affinities among their members. To this end we define what we call...
Article
We study the multiperiod pricing problem of a service firm with capacity levels that vary over time. Customers are heterogeneous in their arrival and departure periods as well as valuations, and are fully strategic with respect to their purchasing decisions. The firm's problem is to set a sequence of prices that maximizes its revenue while guarante...
Preprint
External information propagates in the cell mainly through signaling cascades and transcriptional activation, allowing it to react to a wide spectrum of environmental changes. High throughput experiments identify numerous molecular components of such cascades that may, however, interact through unknown partners. Some of them may be detected using d...
Article
Full-text available
External information propagates in the cell mainly through signaling cascades and transcriptional activation, allowing it to react to a wide spectrum of environmental changes. High-throughput experiments identify numerous molecular components of such cascades that may, however, interact through unknown partners. Some of them may be detected using d...
Article
The Folk Theorem for repeated games suggests that finding Nash equilibria in repeated games should be easier than in one-shot games. In contrast, we show that the problem of finding any Nash equilibrium for a three-player infinitely-repeated game is as hard as it is in two-player one-shot games. More specifically, for any two-player game, we give a...
Article
Full-text available
We propose a new class of game-theoretic models for network formation in which strategies are not directly related to edge choices, but instead correspond more generally to the exertion of social effort. The observed social network is thus a byproduct of an expressive strategic interaction, which can more naturally explain the emergence of complex...
Article
Full-text available
We consider a one-sided assignment market or exchange network with transferable utility and propose a model for the dynamics of bargaining in such a market. Our dynamical model is local, involving iterative updates of 'offers' based on estimated best alternative matches, in the spirit of pairwise Nash bargaining. We establish that when a balanced o...
Article
Bargaining networks model the behavior of a set of players that need to reach pairwise agreements for making profits. Nash bargaining solutions are special outcomes of such games that are both stable and balanced. Kleinberg and Tardos proved a sharp algorithmic characterization of such outcomes, but left open the problem of how the actual bargainin...
Article
We continue our analysis of the number partitioning problem with n weights chosen i.i.d. from some fixed probability distribution with density ρ. In Part I of this work, we established the so-called local REM conjecture of Bauke, Franz and Mertens. Namely, we showed that, as n → ∞, the suitably rescaled energy spectrum above some fixed scale α tend...
Article
The number partitioning problem is a classic problem of combinatorial optimization in which a set of $n$ numbers is partitioned into two subsets such that the sum of the numbers in one subset is as close as possible to the sum of the numbers in the other set. When the $n$ numbers are i.i.d. variables drawn from some distribution, the partitioning p...
Article
Full-text available
The minimum weight Steiner tree (MST) is an important combinatorial optimization problem over networks that has applications in a wide range of fields. Here we discuss a general technique to translate the imposed global connectivity constrain into many local ones that can be analyzed with cavity equation techniques. This approach leads to a new opt...
Preprint
The Minimum Weight Steiner Tree (MST) is an important combinatorial optimization problem over networks that has applications in a wide range of fields. Here we discuss a general technique to translate the imposed global connectivity constrain into many local ones that can be analyzed with cavity equation techniques. This approach leads to a new opt...
Article
Full-text available
We consider the general problem of finding the minimum weight b-matching on arbitrary graphs. We prove that, whenever the linear programing relaxation of the problem has no fractional solutions, then the cavity or belief propagation equations converge to the correct solution both for synchronous and asynchronous updating.
Article
Full-text available
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of their pages. Various link-based features of web pages have been introduced and have proven effective at identifying link spam. One particularly successful family of features...
Article
Full-text available
For a symmetric bounded measurable function W on [0, 1]2 and a simple graph F, the homomorphism density $$t(F,W) = \int _{[0,1]^{V (F)}} \prod_ {i j\in E(F)} W(x_i, x_j)dx .$$ can be thought of as a “moment” of W. We prove that every such function is determined by its moments up to a measure preserving transformation of the variables. The main moti...
Conference Paper
A well-known result in game theory known as "the Folk Theorem" suggests that finding Nash equilibria in repeated games should be easier than in one-shot games. In contrast, we show that the problem of finding any (approximate) Nash equilibrium for a three-player infinitely-repeated game is computationally intractable (even when all payoffs are in -...
Article
Full-text available
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the networks of interest, such as the Internet,the web graph, social networks or online communities. To this end, preferential attachment, in which the popularity (or relevance) of a...
Article
Full-text available
We consider the general problem of finding the minimum weight $\bm$-matching on arbitrary graphs. We prove that, whenever the linear programming (LP) relaxation of the problem has no fractional solutions, then the belief propagation (BP) algorithm converges to the correct solution. We also show that when the LP relaxation has a fractional solution...
Article
We present results of a rigorous analysis of the ±J Ising spin glass on the Bethe lattice with uncorrelated boundary conditions. We derive phase diagrams as functions of temperature vs. percentage of ferromagnetic bonds, and, when half of the bonds are ferromagnetic, temperature vs. external field. Critical exponents are also determined. Using bifu...
Article
Full-text available
We consider the problem of online keyword advertising auctions among multiple bidders with limited budgets, and propose a bidding heuristic to optimize the utility for bidders by equalizing the return-on-investment for each bidder across all keywords. We show that natural auction mechanisms combined with this heuristic can experience chaotic cyclin...
Article
Full-text available
In this paper we determine the percolation threshold for an arbitrary sequence of dense graphs $(G_n)$. Let $\lambda_n$ be the largest eigenvalue of the adjacency matrix of $G_n$, and let $G_n(p_n)$ be the random subgraph of $G_n$ obtained by keeping each edge independently with probability $p_n$. We show that the appearance of a giant component in...
Conference Paper
Full-text available
We establish the exact threshold for the reconstruction problem for a binary asymmetric channel on the b-ary tree, provided that the asymmetry is sufficiently small. This is the first exact reconstruction threshold obtained in roughly a decade. We discuss the implications of our result for Glauber dynamics, phylogenetic reconstruction, noisy commun...
Conference Paper
Full-text available
We define a distance of two graphs that reflects the closeness of both local and global properties. We also define convergence of a sequence of graphs, and show that a graph sequence is convergent if and only if it is Cauchy in this distance. Every convergent graph sequence has a limit in the form of a symmetric measurable function in two variables...
Article
Full-text available
We establish the exact threshold for the reconstruction problem for a binary asymmetric channel on the b-ary tree, provided that the asymmetry is sufficiently small. This is the first exact reconstruction threshold obtained in roughly a decade. We discuss the implications of our result for Glauber dynamics, phylogenetic reconstruction, and so-calle...
Chapter
Full-text available
Counting homomorphisms between graphs (often with weights) comes up in a wide variety of areas, including extremal graph theory, properties of graph products, partition functions in statistical physics and property testing of large graphs. In this paper we survey recent developments in the study of homomorphism numbers, including the characterizati...
Article
Available from http://www.aps.org/meet/MAR04/baps/abs/S2860004.html
Article
We present here the complete version of results announced several years ago in [J. T. Chayes, A. L. Puha and T. Sweet, IAS-Park City Math. Ser. 6, 49–166 (1999; Zbl 0932.60005) and J. T. Chayes, Doc. Math., J. DMV, Extra Volume ICM Berlim 1998, Vol. III, 113–122 (1998; Zbl 0905.60074)]. We address the question of finite-size scaling in percolation...
Conference Paper
Phase transitions are familiar phenomena in physical systems. But they also occur in many probabilistic and combinatorial models, including random versions of some classic problems in theoretical computer science. In this talk, I will discuss phase transitions in several systems, including the random graph — a simple probabilistic model which under...
Article
Full-text available
We introduce a mean-field model of lattice trees based on embeddings into ℤd of abstract trees having a critical Poisson offspring distribution. This model provides a combinatorial interpretation for the self-consistent mean-field model introduced previously by Derbez and Slade [9], and provides an alternative approach to work of Aldous. The scalin...
Article
We consider a model of nonintersecting flux lines in a rectangular region on the lattice \mathbbZ\mathbb{Z} d , where each flux line is a non-isotropic self-avoiding random walk constrained to begin and end on the boundary of the region. The thermodynamic limit is reached through an increasing sequence of such regions. We prove the existence of...
Article
Full-text available
. We consider a model of self-avoiding walks on the lattice Z d with di#erent weights for steps in each of the 2d lattice directions. We find that the directiondependent mass for the two-point function of this model has three phases: mass positive in all directions; mass identically -#; and masses of di#erent signs in di#erent directions. The final...
Preprint
We introduce a mean-field model of lattice trees based on embeddings into $\Z^d$ of abstract trees having a critical Poisson offspring distribution. This model provides a combinatorial interpretation for the self-consistent mean-field model introduced previously by Derbez and Slade, and provides an alternate approach to work of Aldous. The scaling...
Article
. We present a variant of Reimer's proof of the van den BergKesten conjecture. 1. Introduction. In this note, in honor of Harry Kesten's 66 2 3 th birthday, we give an expository treatment of a result that is near and dear to his heart, namely the van den Berg - Kesten (BK) inequality. Specifically, we give a variant of Reimer's proof of the BK ine...
Article
. This work is a detailed study of the phase transition in percolation, in particular of the question of finite-size scaling: Namely, how does the critical transition behavior emerge from the behavior of large, finite systems? Our results rigorously locate the proper window in which to do critical computation and establish features of the phase tra...
Article
The authors consider Mandelbrot's fractal percolation process, characterised by a density parameter p in (0,1) and an integer subdivision index N>1. For each N, the process is known to have a percolation transition at density pc(N) in (0,1). They prove that lim Pc(N)=Pc where pc is the threshold value of the ordinary square lattice site percolation...
Article
For the site dilution model on the hypercubic lattice Zd, d>or=2, the authors examine the density of states for the tight-binding Hamiltonian projected onto the infinite cluster. It is shown that, with probability one, the corresponding integrated density of states is discontinuous on a set of energies which is dense in the band. This result is pro...
Article
We consider a model of oriented, non-intersecting flux lines on the lattice Zd, where each flux line is assigned a Boltzmann factor omega per unit length and a fugacity y. We prove the existence of free energy, both for y>0 and for y=-1, and show that it is independent of y for y>0. Using upper and lower bounds in terms of exactly solvable models,...
Article
The authors examine the phase structure of self-avoiding walks, the Ising magnet and bond percolation defined on subsets of Zd, d>or=2, which have the geometry of wedges. They prove that if the cross sectional area of the wedge diverges with its width, then the high temperature critical point of any of these models defined on the wedge coincides wi...
Article
The authors consider inhomogeneous percolation models with density pc+f(x) and examine the forms of f(x) which produce incipient structures. Taking f(x) approximately= mod x mod - lambda and assuming the existence of a correlation length exponent v for the homogeneous percolation model, they prove that in d=2, the borderline value of lambda is lamb...
Article
The authors study a variant of the Mandelbrot percolation process which is of current use as a model of aerogels. The model has two parameters: One of them, Q, is the usual multiscale parameter of the Mandelbrot percolation process and the other, p, is a Bernoulli percolation parameter that is reserved for 'the last step of the construction'. They...
Article
The authors present an approach to dilute Ising and Potts models, based on the Fortuin-Kasteleyn random cluster representation, which is simultaneously rigorous, intuitive and surprisingly simple. Their analysis yields, with no dimensional restrictions or other caveats, the following asymptotic form of the phase boundary. For the regular dilute mod...
Article
We consider a classical spin system on the hypercubic lattice with a general interaction of the form$$ H = \frac{\beta } {4}\sum\limits_{\begin{array}{*{20}c} {x,y:} \\ {|x - y| = 1} \\ \end{array} } {|s_x - s_y | - h} \sum\limits_x {x{}_x + } \sum\limits_A {\lambda _A \prod\limits_{y \in A} {S_y } } $$ are the spin variables, Β is the inverse temp...
Article
We consider quantum lattice systems which are quantum perturbations of suitable classical systems with two translation-invariant ground states, not necessarily related by symmetry. Simple examples of such systems include the anisotropic quantum Heisenberg model and the narrow band extended Hubbard model. Under the assumption that the quantum pertur...
Article
Full-text available
We study the continuum Widom-Rowlinson model of interpenetrating spheres. Using a new geometric representation for this system we provide a simple percolation-based proof of the phase transition. We also use this representation to formulate the problem, and prove the existence of an interfacial tension between coexisting phases. Finally, we ascribe...

Network

Cited By