Michael T. Goodrich
Michael T. Goodrich
Professor of Computer Science, University of California, Irvine
Verified email at uci.edu - Homepage
TitleCited byYear
Data structures and algorithms in Java
MT Goodrich, R Tamassia, MH Goldwasser
John Wiley & Sons, 2014
5802014
Almost optimal set covers in finite VC-dimension
H Brönnimann, MT Goodrich
Discrete & Computational Geometry 14 (4), 463-479, 1995
5091995
Algorithm design: foundation, analysis and internet examples
MT Goodrich, R Tamassia
John Wiley & Sons, 2006
4432006
External-Memory Graph Algorithms.
YJ Chiang, MT Goodrich, EF Grove, R Tamassia, DE Vengroff, JS Vitter
SODA 95, 139-149, 1995
4211995
Probabilistic packet marking for large-scale IP traceback
MT Goodrich
IEEE/ACM Transactions on Networking (TON) 16 (1), 15-24, 2008
372*2008
Loud and clear: Human-verifiable authentication based on audio
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
2952006
Cascading divide-and-conquer: A technique for designing parallel algorithms
MJ Atallah, R Cole, MT Goodrich
SIAM Journal on Computing 18 (3), 499-532, 1989
2731989
External-memory computational geometry
MT Goodrich, JJ Tsay, DE Vengroff, JS Vitter
Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, 714-723, 1993
2711993
Privacy-preserving access of outsourced data via oblivious RAM simulation
MT Goodrich, M Mitzenmacher
International Colloquium on Automata, Languages, and Programming, 576-587, 2011
2302011
A multi-dimensional approach to force-directed layouts of large graphs
P Gajer, MT Goodrich, SG Kobourov
Computational Geometry 29 (1), 3-18, 2004
230*2004
Efficient tree-based revocation in groups of low-state devices
MT Goodrich, JZ Sun, R Tamassia
Annual International Cryptology Conference, 511-527, 2004
2202004
Privacy-preserving group data access via stateless oblivious RAM simulation
MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012
2162012
Implementation of an authenticated dictionary with skip lists and commutative hashing
MT Goodrich, R Tamassia, A Schwerin
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
2132001
Geometric pattern matching under Euclidean motion
LP Chew, MT Goodrich, DP Huttenlocher, K Kedem, JM Kleinberg, ...
Computational Geometry 7 (1-2), 113-124, 1997
178*1997
Communication-efficient parallel sorting
MT Goodrich
SIAM Journal on Computing 29 (2), 416-432, 1999
1751999
Skip quadtrees: Dynamic data structures for multidimensional point sets
D Eppstein, MT Goodrich, JZ Sun
International Journal of Computational Geometry & Applications 18 (01n02 …, 2008
173*2008
Approximate geometric pattern matching under rigid motions
MT Goodrich, JSB Mitchell, MW Orletsky
IEEE Transactions on Pattern Analysis and Machine Intelligence 21 (4), 371-379, 1999
149*1999
Persistent authenticated dictionaries and their applications
A Anagnostopoulos, MT Goodrich, R Tamassia
International Conference on Information Security, 379-393, 2001
1482001
Confluent drawings: Visualizing non-planar diagrams in a planar way.
M Dickerson, D Eppstein, MT Goodrich, JY Meng
J. Graph Algorithms Appl. 9 (1), 31-52, 2005
1472005
Sorting, searching, and simulation in the mapreduce framework
MT Goodrich, N Sitchinava, Q Zhang
International Symposium on Algorithms and Computation, 374-383, 2011
1452011
The system can't perform the operation now. Try again later.
Articles 1–20