EPSRC logo
EPSRC Support by Research Topic in Fundamentals of Computing

We classify grants using one or more research topics. Value is the total value of the grants awarded, not the proportion assigned to different research topics, so it does not show the level of investment in different research areas.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A coalgebraic framework for reductive logic and proof-search (ReLiC)Pym, Professor DUCLComputer Science 974,936
A compositional approach to game-theoretic economic modellingHedges, Mr JUniversity of OxfordComputer Science 259,304
A Constraint Modelling PipelineMiguel, Professor IJUniversity of St AndrewsComputer Science 886,923
ABC: Adaptive Brokerage for the CloudBarker, Professor AUniversity of St AndrewsComputer Science 386,558
ABC: Adaptive Brokerage for the CloudElkhatib, Dr YLancaster UniversityComputing & Communications 388,701
Academic Centre of Excellence in Cyber Security Research - [Royal Holloway University of London]Markantonakis, Professor KRoyal Holloway, Univ of LondonInformation Security 78,117
Academic Centre of Excellence in Cyber Security Research - Cardiff UniversityBurnap, Professor PCardiff UniversityComputer Science 64,898
Academic Centre of Excellence in Cyber Security Research - Imperial College LondonLupu, Professor ECImperial College LondonInstitute for Security Science and Tech 81,930
Academic Centre of Excellence in Cyber Security Research - King's College LondonSuch, Dr J MKings College LondonInformatics 63,961
Academic Centre of Excellence in Cyber Security Research - Lancaster UniversityRoedig, Professor ULancaster UniversityComputing & Communications 81,803
Academic Centre of Excellence in Cyber Security Research - Newcastle UniversityGross, Dr TRNewcastle UniversitySch of Computing 81,936
Academic Centre of Excellence in Cyber Security Research - Queen's University BelfastMcCanny, Professor Sir JVQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 81,965
Academic Centre of Excellence in Cyber Security Research - University College LondonGroth, Professor JUCLComputer Science 81,904
Academic Centre of Excellence in Cyber Security Research - University of BirminghamRyan, Professor MUniversity of BirminghamSchool of Computer Science 81,162
Academic Centre of Excellence in Cyber Security Research - University of BristolPage, Dr DUniversity of BristolComputer Science 36,205
Academic Centre of Excellence in Cyber Security Research - University of CambridgeStajano, Dr FUniversity of CambridgeComputer Science and Technology 81,719
Academic Centre of Excellence in Cyber Security Research - University of EdinburghAspinall, Professor DUniversity of EdinburghSch of Informatics 81,715
Academic Centre of Excellence in Cyber Security Research - University of KentLi, Professor SUniversity of KentSch of Computing 64,602
Academic Centre of Excellence in Cyber Security Research - University of OxfordMartin, Professor AUniversity of OxfordComputer Science 81,931
Academic Centre of Excellence in Cyber Security Research - University of SouthamptonSassone, Professor VUniversity of SouthamptonElectronics and Computer Science 81,867
Academic Centre of Excellence in Cyber Security Research - University of SurreySchneider, Professor SAUniversity of SurreyComputing Science 81,966
Academic Centre of Excellence in Cyber Security Research - University of WarwickMaple, Professor CUniversity of WarwickWMG 81,965
Algorithmic Aspects of Temporal GraphsSpirakis, Professor PUniversity of LiverpoolComputer Science 319,782
Algorithmic Aspects of Temporal GraphsMertzios, Dr GDurham, University ofComputer Science 319,069
Algorithms on rank aggregation for preference orderingsLin, Dr ZUniversity of UlsterSch of Computing & Mathematical Sci 100,781
Algorithms that count: exploring the limits of tractabilityJerrum, Professor MQueen Mary University of LondonSch of Mathematical Sciences 361,972
ALGOUK - A Network for Algorithms and Complexity in the UKStewart, Professor IADurham, University ofComputer Science 108,682
Automatically Detecting and Surviving Exploitable Compiler BugsCadar, Dr CImperial College LondonDept of Computing 672,083
Big Hypotheses: A Fully Parallelised Bayesian Inference SolutionMaskell, Professor S SUniversity of LiverpoolElectrical Engineering and Electronics 2,557,654
Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic EncryptionAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 80,215
Border Patrol: Improving Smart Device Security through Type-Aware Systems DesignVanderbauwhede, Dr WUniversity of GlasgowSchool of Computing Science 1,765,760
C3: Scalable & Verified Shared Memory via Consistency-directed Cache CoherenceNagarajan, Dr VUniversity of EdinburghSch of Informatics 668,897
Centre for Doctoral Training in Cyber Security at Royal HollowayCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,793,546
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,454,896
Combining Viewpoints in Quantum TheoryHeunen, Dr CUniversity of EdinburghSch of Informatics 298,236
Compositional Higher-Order Model Checking: Logics, Models and AlgorithmsOng, Professor CHLUniversity of OxfordComputer Science 630,834
Compositional, dependency-aware C++ concurrencyBatty, Dr MUniversity of KentSch of Computing 98,786
Computing with Liquid MarblesAdamatzky, Professor AUniversity of the West of EnglandFaculty of Environment and Technology 727,811
Contextuality as a Resource in Quantum ComputationSeverini, Professor SUCLComputer Science 300,605
Contextuality as a Resource in Quantum ComputationAbramsky, Professor SUniversity of OxfordComputer Science 320,381
CRITiCaL - Combatting cRiminals In The CLoudGross, Dr TRNewcastle UniversitySch of Computing 2,027,646
CSIT 2O'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 5,032,504
Customized and Adaptive approach for Optimal Cybersecurity InvestmentMalacaria, Professor PQueen Mary University of LondonSch of Electronic Eng & Computer Science 388,777
Customized and Adaptive approach for Optimal Cybersecurity InvestmentHankin, Professor CImperial College LondonInstitute for Security Science and Tech 386,129
Cyber Security CDT Phase Two (University of Oxford)Martin, Professor AUniversity of OxfordComputer Science 3,489,711
DAASE: Dynamic Adaptive Automated Software EngineeringBarr, Dr EUCLComputer Science 6,834,903
Data Release - Trust, Identity, Privacy and SecurityJones, Professor MWSwansea UniversityCollege of Science 993,796
Data Release - Trust, Identity, Privacy and SecurityWang, Dr VUniversity of PortsmouthInstitute of Criminal Justice Studies 299,355
DATA-CENTRIC: Developing AccounTAble Computational ENgineering Through Robust InferenCeDiaz De la O, Dr FUniversity of LiverpoolCivil Engineering and Industrial Design 387,228
Declarative and Interoperable Overlay Networks, Applications to Systems of Systems (DIONASYS)Blair, Professor GLancaster UniversityComputing & Communications 341,850
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Discovery: Pattern Discovery and Program Shaping for Heterogeneous Manycore SystemsCole, Professor MUniversity of EdinburghSch of Informatics 338,165
Discovery: Pattern Discovery and Program Shaping for Manycore SystemsHammond, Professor KUniversity of St AndrewsComputer Science 366,059
Embedding Machine Learning within Quantifier Elimination ProceduresEngland, Dr MCoventry UniversityCtr for Flow Measure & Fluid Mechanics 100,988
ENergy Efficient Adaptive Computing with multi-grain heterogeneous architectures (ENEAC)Nunez-Yanez, Dr JUniversity of BristolElectrical and Electronic Engineering 567,204
Energy Efficient ControlSchewe, Professor SUniversity of LiverpoolComputer Science 429,107
Energy Efficient ControlMayr, Dr RMUniversity of EdinburghSch of Informatics 371,397
Enhanced Formal Reasoning for Algebraic Network TheoryZanasi, Dr FUCLComputer Science 100,613
EPSRC Centre for Doctoral Training in Data ScienceStorkey, Professor AJUniversity of EdinburghSch of Informatics 4,726,271
EPSRC Centre for Doctoral Training in Delivering Quantum TechnologiesBrowne, Professor DUCLLondon Centre for Nanotechnology 5,004,658
EPSRC Centre for Doctoral Training in Pervasive ParallelismO'Boyle, Professor MUniversity of EdinburghSch of Informatics 3,892,290
Event-based parallel computing - partially ordered event-triggered systems (POETS)Brown, Professor ADUniversity of SouthamptonElectronics and Computer Science 4,981,302
Exploiting Parallelism through Type Transformations for Hybrid Manycore SystemsVanderbauwhede, Dr WUniversity of GlasgowSchool of Computing Science 1,539,602
Extension: MathSoMac: the social machine of mathematicsMartin, Professor UHUniversity of EdinburghSch of Informatics 911,629
FORGING: Fortuitous Geometries and Compressive LearningKaban, Professor AUniversity of BirminghamSchool of Computer Science 876,859
Framework for Computational PersuasionHunter, Professor AUCLComputer Science 556,693
From Data Types to Session Types---A Basis for Concurrency and DistributionWadler, Professor PUniversity of EdinburghSch of Informatics 3,956,088
Future AI and Robotics Hub for Space (FAIR-SPACE)Gao, Professor YUniversity of SurreySurrey Space Centre Academic 7,932,511
Glass Houses: Transparency and Privacy in Information EconomiesMeiklejohn, Ms SUCLComputer Science 969,096
Heterogeneous ThinkingO'Boyle, Professor MUniversity of EdinburghSch of Informatics 1,074,832
Higher Algebra and Quantum ProtocolsVicary, Dr JOUniversity of BirminghamSchool of Computer Science 337,112
Higher Algebra and Quantum ProtocolsDouglas, Dr CUniversity of OxfordMathematical Institute 494,701
Holey Sampling: Topological Analysis of Sampling Patterns for Assessing Error in High-dimensional Quadraturesubr, Dr kUniversity of EdinburghSch of Informatics 100,964
Homotopy Type Theory: Programming and VerificationGhani, Professor NUniversity of StrathclydeComputer and Information Sciences 499,631
Homotopy Type Theory: Programming and VerificationAltenkirch, Dr TUniversity of NottinghamSchool of Computer Science 408,815
Homotopy Type Theory: Programming and VerificationGambino, Dr NUniversity of LeedsPure Mathematics 93,134
Improving Symbolic Execution via Targeted Program TransformationsCadar, Dr CImperial College LondonDept of Computing 286,470
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
IOSEC - Protection and Memory Safety for Input/Output SecurityWatson, Dr R N MUniversity of CambridgeComputer Science and Technology 511,891
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsGarcia Quiles, Dr SUniversity of EdinburghSch of Mathematics 448,386
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsManlove, Dr DFUniversity of GlasgowSchool of Computing Science 353,253
Isogeny-based cryptography: from theory to practicePetit, Dr CUniversity of BirminghamSchool of Computer Science 327,745
Leakage Aware Design Automation (LADA): Tools & Techniques for Software Crypto ImplementationsOswald, Professor MEUniversity of BristolComputer Science 1,150,814
LECTURE: LanguagE ComposiTion UnifiEdTratt, Dr LKings College LondonInformatics 953,405
LUCID: Clearer Software by Integrating Natural Language Analysis into Software EngineeringBarr, Dr EUCLComputer Science 337,411
LUCID: Clearer Software by Integrating Natural Language Analysis into Software EngineeringSutton, Dr CUniversity of EdinburghSch of Informatics 306,726
Machine Learning, Robust Optimisation, and Verification: Creating Synergistic Capabilities in Cybersecurity ResearchHuth, Professor MRImperial College LondonDept of Computing 202,161
Manycore Research Innovation and Opportunities Network (MaRIONet)Singer, Dr JUniversity of GlasgowSchool of Computing Science 91,619
Mind the Gap: Unified Reasoning About Program Correctness and EfficiencyHutton, Professor GUniversity of NottinghamSchool of Computer Science 411,980
MobSec: Malware and Security in the Mobile AgeCavallaro, Professor LRoyal Holloway, Univ of LondonInformation Security 747,777
Modelling and Optimisation with GraphsProsser, Dr PUniversity of GlasgowSchool of Computing Science 673,092
Next generation pattern matchingClifford, Dr RUniversity of BristolComputer Science 941,287
Open3D: Collaborative Editing for 3D Virtual WorldsSteed, Professor AUCLComputer Science 712,097
Oxford University Centre for Doctoral Training in Cyber SecurityMartin, Professor AUniversity of OxfordComputer Science 3,662,582
Perturbation Analysis for Probabilistic VerificationChen, Dr TBirkbeck CollegeComputer Science and Information Systems 85,032
Pin the Tail: Understanding Straggler Manifestation in Internet-based Distributed SystemsGarraghan, Dr PLancaster UniversityComputing & Communications 96,599
Practical Data-intensive Secure Computation: a Data Structural ApproachDong, Dr CNewcastle UniversitySch of Computing 357,256
QuTie: reasoning with Quantifiers and TheoriesVoronkov, Professor AUniversity of Manchester, TheComputer Science 359,372
Reachability problems for words, matrices and maps: Algorithms and ComplexityPotapov, Professor IUniversity of LiverpoolComputer Science 453,237
Recursion, guarded recursion and computational effectsLevy, Dr PBUniversity of BirminghamSchool of Computer Science 361,844
Reliable Many-Core ProgrammingDonaldson, Dr AFImperial College LondonDept of Computing 1,005,751
REMS: Rigorous Engineering for Mainstream SystemsSewell, Professor PMUniversity of CambridgeComputer Science and Technology 5,575,635
Research Institute in Science of Cyber Security (RISCS) Phase 2Carr, Dr MUCLComputer Science 648,984
Research Institute in Verified Trustworthy Software Systems (VeTSS)Gardner, Professor PImperial College LondonDept of Computing 654,850
Rigorous Runtime Analysis of Bio-Inspired ComputingOliveto, Dr PSUniversity of SheffieldComputer Science 1,266,592
Risk Measures for MDPsHan, Dr TBirkbeck CollegeComputer Science and Information Systems 101,113
RIVERAS: Robust Integrated Verification of Autonomous SystemsEder, Professor KUniversity of BristolComputer Science 817,020
Robotics and Artificial Intelligence for Nuclear (RAIN)Lennox, Professor BUniversity of Manchester, TheElectrical and Electronic Engineering 12,203,190
Robustness-as-evolvability: building a dynamic control plane with Software-Defined NetworkingNagaraja, Dr SUniversity of StrathclydeComputer and Information Sciences 119,677
RS Fellow - EPSRC grant (2014): Quantum computation as a programming languageStaton, Dr SUniversity of OxfordComputer Science 226,293
Sampling in Hereditary ClassesMuller, Dr HUniversity of LeedsSch of Computing 507,341
Sampling in Hereditary ClassesJerrum, Professor MQueen Mary University of LondonSch of Mathematical Sciences 78,309
SchedUling on heterogeneous Mobile Multicores based on quality of ExpeRienceLeather, Dr HUniversity of EdinburghSch of Informatics 101,027
Science of Sensor System SoftwareCalder, Professor MUniversity of GlasgowSchool of Computing Science 4,183,694
Security and Privacy in Smart Grid Systems: Countermeasure and Formal VerificationMartin, Professor AUniversity of OxfordComputer Science 202,914
Self-repairing hardware paradigms based on astrocyte-neuron modelsMcDaid, Professor LJUniversity of UlsterSch of Computing & Intelligent Systems 375,835
Self-repairing Hardware Paradigms based on Astrocyte-neuron ModelsHalliday, Dr DUniversity of YorkElectronics 683,915
Semantic Foundations for Interactive ProgramsKrishnaswami, Dr NUniversity of CambridgeComputer Science and Technology 96,282
Solving Parity Games in Theory and PracticeSchewe, Professor SUniversity of LiverpoolComputer Science 409,109
Solving Parity Games in Theory and PracticeJurdzinski, Dr MUniversity of WarwickComputer Science 347,959
Spin Inspired RepresentationsStepney, Professor SUniversity of YorkComputer Science 507,656
STRATA; Layers for Structuring Trustworthy Ambient SystemsRomanovsky, Professor ANewcastle UniversitySch of Computing 965,298
Structure of Hereditary Graph Classes and Its Algorithmic ConsequencesVuskovic, Professor KUniversity of LeedsSch of Computing 570,417
Sublinear Algorithms for Big GraphsCzumaj, Professor AUniversity of WarwickComputer Science 490,032
SUCCESS -- SecUre aCCESSibility for the internet of thingsKammueller, Dr FMiddlesex UniversityFaculty of Science & Technology 199,602
Synthetic Portabolomics: Leading the way at the crossroads of the Digital and the Bio EconomiesKrasnogor, Professor NNewcastle UniversitySch of Computing 4,353,851
System-Level Game Semantics: A unifying framework for composing systemsTzevelekos, Dr NQueen Mary University of LondonSch of Electronic Eng & Computer Science 326,972
System-Level Game Semantics: A unifying framework for composing systemsGhica, Dr DRUniversity of BirminghamSchool of Computer Science 334,312
The Complexity of Promise Constraint SatisfactionKrokhin, Professor ADurham, University ofComputer Science 441,210
The Integration and Interaction of Multiple Mathematical Reasoning ProcessesIreland, Professor AHeriot-Watt UniversityS of Mathematical and Computer Sciences 1,304,455
The next level of SAT solving for very hard problemsKullmann, Dr OSwansea UniversityCollege of Science 839,938
Time-sensitive protocol design and implementationBocchi, Dr LUniversity of KentSch of Computing 101,196
Towards Explainable and Robust Statistical AI: A Symbolic ApproachBelle, Dr VUniversity of EdinburghSch of Informatics 100,740
Trusted and Transparent Voting SystemsSchneider, Professor SAUniversity of SurreyComputing Science 614,484
Trustworthy refactoringThompson, Professor SUniversity of KentSch of Computing 728,766
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsYoshida, Professor NImperial College LondonDept of Computing 863,741
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsChopra, Dr ALancaster UniversityComputing & Communications 686,507
Typed Lambda-Calculi with Sharing and UnsharingHeijltjes, Dr W BUniversity of BathComputer Science 325,415
UK Robotics and Artificial Intelligence Hub for Offshore Energy Asset Integrity ManagementLane, Professor DHeriot-Watt UniversitySch of Engineering and Physical Science 14,635,591
Understanding Information Leakage in Searchable EncryptionWarinschi, Professor BUniversity of BristolComputer Science 22,020
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
VAC+: Verifier of Access ControlFerrara, Dr AUniversity of SouthamptonElectronics and Computer Science 100,746
VADA: Value Added Data Systems -- Principles and ArchitectureGottlob, Professor GUniversity of OxfordComputer Science 4,557,635
Verifiable AutonomyFisher, Professor MUniversity of LiverpoolComputer Science 640,791
Verifiable AutonomyVeres, Professor SMUniversity of SheffieldAutomatic Control and Systems Eng 439,585
Verifiable AutonomyWinfield, Professor AFUniversity of the West of EnglandBristol Robotics Laboratory 340,338
Verifiably correct concurrency abstractionsDerrick, Professor JUniversity of SheffieldComputer Science 17,123
Verifiably Correct Transactional MemoryDongol, Dr BUniversity of SurreyComputing Science 397,680
Verifiably Correct Transactional MemoryOwens, Dr SAUniversity of KentSch of Computing 82,904
Verifiably Correct Transactional Memory.Derrick, Professor JUniversity of SheffieldComputer Science 406,411
Verification of Linear Dynamical SystemsWorrell, Professor JBUniversity of OxfordComputer Science 1,005,506
Verification of Quantum TechnologyKashefi, Professor EUniversity of EdinburghSch of Informatics 1,237,804
Verifying concurrent algorithms on Weak Memory ModelsDerrick, Professor JUniversity of SheffieldComputer Science 389,207
Vulnerability Discovery using Abduction and InterpolationKing, Professor AUniversity of KentSch of Computing 199,130
Wearable and Autonomous Computing for Future Smart Cities: A Platform GrantBeeby, Professor SPUniversity of SouthamptonElectronics and Computer Science 1,431,420

Total Number of Grants: 155
Total Value of Grants: £172,071,667

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).