Michael T. Goodrich
Chancellor's Professor, Computer Science
Donald Bren School of Information and Computer Sciences
Donald Bren School of Information and Computer Sciences
PH.D., Purdue University, 1987
University of California, Irvine
Donald Bren Hall 4216
Mail Code: 3435
Irvine, CA 92697
Donald Bren Hall 4216
Mail Code: 3435
Irvine, CA 92697
Research Interests
Information Security Algorithms, Geometric and Combinatorial Algorithms, Graph Visualization, Data Structures, Geometric Algorithms, Large-Scale (Parallel and External-Memory) Algorithms
Websites
Research Abstract
Prof. Goodrich's research is directed at the design of high performance algorithms and data structures for solving large-scale problems motivated from information assurance and security, the Internet, information visualization, and geometric computing. He is also interested in computer science education.
Publications
M.T. Goodrich, "The Mastermind Attack on Genomic Data," Proc. 30th IEEE Symposium
on Security and Privacy (SSP), 2009, 204-218.
A.U. Asuncion and M.T. Goodrich, "Turning Privacy Leaks into Floods: Surreptitious
Discovery of Social Network Friendships and Other Sensitive Binary Attribute Vectors,"
Proc. Workshop on Privacy in the Electronic Society (WPES), held in conjunction with
the 17th ACM Conference on Computer and Communications Security (CCS), 2010, 21-30.
D. Eppstein, M.T. Goodrich, R. Tamassia, "Privacy-Preserving Data-Oblivious Geometric
Algorithms for Geographic Data," Proc. 18th ACM SIGSPATIAL International Conference
on Advances in Geographic Information Systems (ACM GIS), 2010, 13-22.
M.T. Goodrich, "Randomized Shellsort: A Simple Oblivious Sorting Algorithm," 21st
ACM-SIAM Symposium on Discrete Algorithms (SODA), 2010, 1262-1277.
L. Arge, M.T. Goodrich, and N. Sitchinava, "Parallel External Memory Graph Algorithms,"
24th IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2010, 1-11.
M.T. Goodrich and F. Kerschbaum, "Privacy-Enhanced Reputation-Feedback Methods to
Reduce Feedback Extortion in Online Auctions," ACM Conference on Data and Application
Security and Privacy (CODASPY), 2011, 273-282.
M.T. Goodrich and M. Mitzenmacher, "Privacy-Preserving Access of Outsourced Data via
Oblivious RAM Simulation," 38th International Colloquium on Automata, Languages and
Programming (ICALP), LNCS, vol. 6756, 2011, 576-587.
M.T. Goodrich and R. Tamassia, Introduction to Computer Security, Addison-Wesley, Inc.,
2011.
M.T. Goodrich, R. Tamassia, and D. Mount, Data Structures and Algorithms in C++,
Second Edition, John Wiley and Sons, Inc., 2011.
Book
M.T. Goodrich and R. Tamassia, Data Structures and Algorithms in Java, Fifth Edition,
John Wiley and Sons, Inc., 2011.
D. Eppstein and M.T. Goodrich, "Straggler Identication in Round-Trip Data Streams via
Newton's Identities and Invertible Bloom Filters," IEEE Transactions on Knowledge and
Data Engineering (TKDE), 23, 297-306, 2011.
Research Centers
Center for Algorithms and Theory of Computation
Link to this profile
https://faculty.uci.edu/profile/?facultyId=4682
https://faculty.uci.edu/profile/?facultyId=4682
Last updated
12/07/2011
12/07/2011