BibTeX records: Yael Gertner

download as .bib file

@inproceedings{DBLP:conf/sigcse/IseneggerFGHP24,
  author       = {Kathleen Isenegger and
                  Max Fowler and
                  Yael Gertner and
                  Raya Hegeman{-}Davis and
                  Leonard Pitt},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Designing and Piloting a High School {CS+X} Topics Course},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {562--568},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626252.3630824},
  doi          = {10.1145/3626252.3630824},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/IseneggerFGHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/PoulsenGCC0H24,
  author       = {Seth Poulsen and
                  Yael Gertner and
                  Hongxuan Chen and
                  Benjamin Cosman and
                  Matthew West and
                  Geoffrey L. Herman},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Disentangling the Learning Gains from Reading a Book Chapter and Completing
                  Proof Blocks Problems},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1056--1062},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626252.3630831},
  doi          = {10.1145/3626252.3630831},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/PoulsenGCC0H24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/GeorgeFOFIPPGL24,
  author       = {Kari L. George and
                  Max Fowler and
                  Vidushi Ojha and
                  Morgan M. Fong and
                  Kathleen Isenegger and
                  Christopher Perdriau and
                  Mariam Saffar Perez and
                  Yael Gertner and
                  Colleen M. Lewis},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Leveraging Kotter's 8 Stage Model of Organizational Change to Understand
                  Broadening Participation in Computing},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 2, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1652--1653},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626253.3635541},
  doi          = {10.1145/3626253.3635541},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/GeorgeFOFIPPGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/LiuPCWGF24,
  author       = {Jonathan Liu and
                  Seth Poulsen and
                  Hongxuan Chen and
                  Grace Williams and
                  Yael Gertner and
                  Diana Franklin},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Teaching Algorithm Design: {A} Literature Review},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 2, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1722--1723},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626253.3635548},
  doi          = {10.1145/3626253.3635548},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/LiuPCWGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/PoulsenGC0H23,
  author       = {Seth Poulsen and
                  Yael Gertner and
                  Benjamin Cosman and
                  Matthew West and
                  Geoffrey L. Herman},
  editor       = {Maureen Doyle and
                  Ben Stephenson and
                  Brian Dorn and
                  Leen{-}Kiat Soh and
                  Lina Battestilli},
  title        = {Efficiency of Learning from Proof Blocks Versus Writing Proofs},
  booktitle    = {Proceedings of the 54th {ACM} Technical Symposium on Computer Science
                  Education, Volume 1, {SIGCSE} 2023, Toronto, ON, Canada, March 15-18,
                  2023},
  pages        = {472--478},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3545945.3569797},
  doi          = {10.1145/3545945.3569797},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/PoulsenGC0H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-00792,
  author       = {Seth Poulsen and
                  Hongxuan Chen and
                  Yael Gertner and
                  Benjamin Cosman and
                  Matthew West and
                  Geoffrey L. Herman},
  title        = {Measuring the Impact of Distractors on Student Learning Gains while
                  Using Proof Blocks},
  journal      = {CoRR},
  volume       = {abs/2311.00792},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.00792},
  doi          = {10.48550/ARXIV.2311.00792},
  eprinttype    = {arXiv},
  eprint       = {2311.00792},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-00792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-09609,
  author       = {Seth Poulsen and
                  Yael Gertner and
                  Benjamin Cosman and
                  Matthew West and
                  Geoffrey L. Herman},
  title        = {Efficiency of Learning from Proof Blocks Versus Writing Proofs},
  journal      = {CoRR},
  volume       = {abs/2211.09609},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.09609},
  doi          = {10.48550/ARXIV.2211.09609},
  eprinttype    = {arXiv},
  eprint       = {2211.09609},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-09609.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/ConnorGFR10,
  author       = {Michael Connor and
                  Yael Gertner and
                  Cynthia Fisher and
                  Dan Roth},
  editor       = {Jan Hajic and
                  Sandra Carberry and
                  Stephen Clark},
  title        = {Starting from Scratch in Semantic Role Labeling},
  booktitle    = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association
                  for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden},
  pages        = {989--998},
  publisher    = {The Association for Computer Linguistics},
  year         = {2010},
  url          = {https://aclanthology.org/P10-1101/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/ConnorGFR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conll/ConnorGFR09,
  author       = {Michael Connor and
                  Yael Gertner and
                  Cynthia Fisher and
                  Dan Roth},
  editor       = {Suzanne Stevenson and
                  Xavier Carreras},
  title        = {Minimally Supervised Model of Early Language Acquisition},
  booktitle    = {Proceedings of the Thirteenth Conference on Computational Natural
                  Language Learning, CoNLL 2009, Boulder, Colorado, USA, June 4-5, 2009},
  pages        = {84--92},
  publisher    = {{ACL}},
  year         = {2009},
  url          = {https://aclanthology.org/W09-1112/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conll/ConnorGFR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conll/ConnorGFR08,
  author       = {Michael Connor and
                  Yael Gertner and
                  Cynthia Fisher and
                  Dan Roth},
  editor       = {Alexander Clark and
                  Kristina Toutanova},
  title        = {Baby {SRL:} Modeling Early Language Acquisition},
  booktitle    = {Proceedings of the Twelfth Conference on Computational Natural Language
                  Learning, CoNLL 2008, Manchester, UK, August 16-17, 2008},
  pages        = {81--88},
  publisher    = {{ACL}},
  year         = {2008},
  url          = {https://aclanthology.org/W08-2111/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conll/ConnorGFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GertnerMM07,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  editor       = {Salil P. Vadhan},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {434--455},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_24},
  doi          = {10.1007/978-3-540-70936-7\_24},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerMM06,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/447},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GennaroGKT05,
  author       = {Rosario Gennaro and
                  Yael Gertner and
                  Jonathan Katz and
                  Luca Trevisan},
  title        = {Bounds on the Efficiency of Generic Cryptographic Constructions},
  journal      = {{SIAM} J. Comput.},
  volume       = {35},
  number       = {1},
  pages        = {217--246},
  year         = {2005},
  url          = {https://doi.org/10.1137/S0097539704443276},
  doi          = {10.1137/S0097539704443276},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GennaroGKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GennaroGK03,
  author       = {Rosario Gennaro and
                  Yael Gertner and
                  Jonathan Katz},
  editor       = {Lawrence L. Larmore and
                  Michel X. Goemans},
  title        = {Lower bounds on the efficiency of encryption and digital signature
                  schemes},
  booktitle    = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
                  June 9-11, 2003, San Diego, CA, {USA}},
  pages        = {417--425},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/780542.780604},
  doi          = {10.1145/780542.780604},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GennaroGK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GertnerMR01,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Omer Reingold},
  title        = {On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates},
  booktitle    = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001,
                  14-17 October 2001, Las Vegas, Nevada, {USA}},
  pages        = {126--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SFCS.2001.959887},
  doi          = {10.1109/SFCS.2001.959887},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GertnerMR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GertnerIKM00,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {592--629},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1689},
  doi          = {10.1006/JCSS.1999.1689},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GertnerIKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GertnerKMRV00,
  author       = {Yael Gertner and
                  Sampath Kannan and
                  Tal Malkin and
                  Omer Reingold and
                  Mahesh Viswanathan},
  title        = {The Relationship between Public Key Encryption and Oblivious Transfer},
  booktitle    = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
                  12-14 November 2000, Redondo Beach, California, {USA}},
  pages        = {325--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SFCS.2000.892121},
  doi          = {10.1109/SFCS.2000.892121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GertnerKMRV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  editor       = {Michael Luby and
                  Jos{\'{e}} D. P. Rolim and
                  Maria J. Serna},
  title        = {A Random Server Model for Private Information Retrieval or How to
                  Achieve Information Theoretic {PIR} Avoiding Database Replication},
  booktitle    = {Randomization and Approximation Techniques in Computer Science, Second
                  International Workshop, RANDOM'98, Barcelona, Spain, October 8-10,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1518},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49543-6\_17},
  doi          = {10.1007/3-540-49543-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GertnerIKM98,
  author       = {Yael Gertner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Malkin},
  editor       = {Jeffrey Scott Vitter},
  title        = {Protecting Data Privacy in Private Information Retrieval Schemes},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276723},
  doi          = {10.1145/276698.276723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GertnerIKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  title        = {A Random Server Model for Private Information Retrieval (or How to
                  Achieve Information Theoretic {PIR} Avoiding Data Replication)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics