#### Filter Results:

- Full text PDF available (263)

#### Publication Year

1985

2017

- This year (5)
- Last 5 years (59)
- Last 10 years (141)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Data Set Used

#### Key Phrases

Learn More

We present a collection of new techniques for designing and analyzing eecient external-memory algorithms for graph problems and illustrate how these techniques can be applied to a wide variety of speciic problems. Our results include: Proximate-neighboring. We present a simple method for deriving external-memory lower bounds via reductions from a problem we… (More)

- Michael T. Goodrich, Michael Mitzenmacher
- ICALP
- 2011

Suppose a client, Alice, has outsourced her data to an external storage provider, Bob, because he has capacity for her massive data set, of size n, whereas her private storage is much smaller—say, of size O(n 1/r), for some constant r > 1. Alice trusts Bob to maintain her data, but she would like to keep its contents private. She can encrypt her data, of… (More)

We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users. We show that such privacy-preserving data access is possible using a combination of probabilistic encryp-tion, which directly hides data values, and stateless oblivious RAM simulation, which hides the pattern of data… (More)

- Michael T. Goodrich, Roberto Tamassia
- World wide series in computer science
- 1998

* This newest edition examines fundamental data structures by following a consistent object-oriented framework that builds intuition and analysis skills of data structures and algorithms...

- Michael T. Goodrich, Jyh-Jong Tsayy, Darren Erik Vengro, Scott Vitterx
- 1993

In this paper we give new techniques for designing eecient algorithms for computational geometry problems that are too large to be solved in internal memory. We use these techniques to develop optimal and practical algorithms for a number of important large-scale problems. We discuss our algorithms primarily in the context of single processor/single disk… (More)

- Mikhail J. Atallah, Richard Cole, Michael T. Goodrich
- 28th Annual Symposium on Foundations of Computer…
- 1987

We present techniques for parallel divide-and-conquer, resulting in improved parallel algorithms for a number of problems. The problems for which we give improved algorithms include intersection detection, trapezoidal decomposition (hence, polygon triangulation), and planar point location (hence, Voronoi diagram construction). We also give efficient… (More)

- David Eppstein, Michael T. Goodrich, Frank Uyeda, George Varghese
- SIGCOMM
- 2011

We describe a synopsis structure, the Difference Digest, that allows two nodes to compute the elements belonging to the set difference in a single round with communication overhead proportional to the <i>size of the difference</i> times the logarithm of the keyspace. While set reconciliation can be done efficiently using logs, logs require overhead for… (More)

- Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia
- CRYPTO
- 2004

We study the problem of broadcasting confidential information to a collection of n devices while providing the ability to revoke an arbitrary subset of those devices (and tolerating collusion among the revoked devices). In this paper, we restrict our attention to low-memory devices, that is, devices that can store at most O(log n) keys. We consider… (More)

- Matthew Dickerson, David Eppstein, Michael T. Goodrich, Jeremy Yu Meng
- J. Graph Algorithms Appl.
- 2003

We introduce a new approach for drawing diagrams. Our approach is to use a technique we call confluent drawing for visualizing non-planar graphs in a planar way. This approach allows us to draw, in a crossing-free manner, graphs—such as software interaction diagrams—that would normally have many crossings. The main idea of this approach is quite simple: we… (More)