4216 Bren Hall (Computer Science 3)
Irvine, CA 92697-3435
Goodrich is a Chancellor's Professor at the University of California, Irvine, where he has been a faculty member in the Department of Computer Science since 2001 and director of the Center for Cyber-Security and Privacy since 2005. In addition, he currently serves as Equity Advisor and Associate Dean for Academic Personnel in the Donald Bren School of Information and Computer Sciences. He was a professor in the Department of Computer Science at Johns Hopkins University from 1987-2001. With over 200 publications, including several widely-adopted books, his recent work includes contributions to efficient and secure distributed data structures, authenticated geometric searching, IP traceback, and network/grid security. Goodrich is an ACM Distinguished Scientist, a Compere Loveless Fellow, a Fellow of the San Diego Supercomputer Center (SDSC), and a Fulbright Scholar, as well as being a member of the Sigma Xi Scientific Research Honor Society and the editorial boards of several top journals on algorithms. He is a recipient of the IEEE Computer Society Technical Achievement Award, the NSF Research Initiation Award, the DARPA Spirit of Technology Transfer Award, the Brown Univ. Award for Technological Innovation, the ACM Recognition of Service Award and the Pond Award for Excellence in Undergraduate Teaching.
Ph.D., Purdue University, Computer Sciences, 1987
M.S., Purdue University, Computer Sciences, 1985
B.A., Calvin College, Mathematics and Computer Science, 1983
Goodrich's research is directed at the design of high-performance algorithms and data structures for solving large-scale problems motivated from information assurance and security, the Internet, information visualization and geometric computing. He has pioneered and led research on efficient parallel and distributed solutions to a number of fundamental problems, including sorting, convex hull construction, segment intersection reporting, fixed-dimensional linear programming, polygon triangulation, Voronoi diagram construction and data authentication.