Michael T. Goodrich

Picture of Michael T. Goodrich
Chancellor's Professor, Computer Science
Donald Bren School of Information and Computer Sciences
PH.D., Purdue University, 1987
Phone: (949) 824-9366
Fax: (949) 824-4056
Email: goodrich@uci.edu
University of California, Irvine
Donald Bren Hall 4216
Mail Code: 3435
Irvine, CA 92697
Research Interests
Information Security Algorithms, Geometric and Combinatorial Algorithms, Graph Visualization, Data Structures, Geometric Algorithms, Large-Scale (Parallel and External-Memory) Algorithms
Research Abstract
Prof. Goodrich's research is directed at the design of high performance algorithms and data structures for solving large-scale problems motivated from information assurance and security, the Internet, information visualization, and geometric computing. He is also interested in computer science education.
Publications
M.T. Goodrich, "The Mastermind Attack on Genomic Data," Proc. 30th IEEE Symposium on Security and Privacy (SSP), 2009, 204-218.
A.U. Asuncion and M.T. Goodrich, "Turning Privacy Leaks into Floods: Surreptitious Discovery of Social Network Friendships and Other Sensitive Binary Attribute Vectors," Proc. Workshop on Privacy in the Electronic Society (WPES), held in conjunction with the 17th ACM Conference on Computer and Communications Security (CCS), 2010, 21-30.
D. Eppstein, M.T. Goodrich, R. Tamassia, "Privacy-Preserving Data-Oblivious Geometric Algorithms for Geographic Data," Proc. 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS), 2010, 13-22.
M.T. Goodrich, "Randomized Shellsort: A Simple Oblivious Sorting Algorithm," 21st ACM-SIAM Symposium on Discrete Algorithms (SODA), 2010, 1262-1277.
L. Arge, M.T. Goodrich, and N. Sitchinava, "Parallel External Memory Graph Algorithms," 24th IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2010, 1-11.
M.T. Goodrich and F. Kerschbaum, "Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions," ACM Conference on Data and Application Security and Privacy (CODASPY), 2011, 273-282.
M.T. Goodrich and M. Mitzenmacher, "Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation," 38th International Colloquium on Automata, Languages and Programming (ICALP), LNCS, vol. 6756, 2011, 576-587.
M.T. Goodrich and R. Tamassia, Introduction to Computer Security, Addison-Wesley, Inc., 2011.
M.T. Goodrich, R. Tamassia, and D. Mount, Data Structures and Algorithms in C++, Second Edition, John Wiley and Sons, Inc., 2011. Book
M.T. Goodrich and R. Tamassia, Data Structures and Algorithms in Java, Fifth Edition, John Wiley and Sons, Inc., 2011.
D. Eppstein and M.T. Goodrich, "Straggler Identi cation in Round-Trip Data Streams via Newton's Identities and Invertible Bloom Filters," IEEE Transactions on Knowledge and Data Engineering (TKDE), 23, 297-306, 2011.
Research Centers
Center for Algorithms and Theory of Computation
Last updated
12/07/2011