EPSRC logo
EPSRC Support by Research Topic in Fundamentals of Computing

We classify grants using one or more research topics. Value is the total value of the grants awarded, not the proportion assigned to different research topics, so it does not show the level of investment in different research areas.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A correct-by-construction approach to approximate computationMardare, Professor RUniversity of StrathclydeComputer and Information Sciences 692,875
Academic Centre of Excellence in Cyber Security Research - University of Northumbria at NewcastleBriggs, Professor PNorthumbria, University ofFac of Health and Life Sciences 48,574
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Professor EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
Algebraic complexity theory via the algebraic geometry and representation theory of generalised continued fractionsIkenmeyer, Dr CUniversity of WarwickComputer Science 290,624
Algebraic Methods for Quantified ConstraintsMartin, Dr B DDurham, University ofComputer Science 520,766
Algorithms and Complexity for Economic Environments (ACEE)Filos-Ratsikas, Dr AUniversity of EdinburghSch of Informatics 394,491
Algorithms, Dynamics and Connections with Phase TransitionsEfthymiou, Dr CUniversity of WarwickComputer Science 309,801
An Abstraction-based Technique for Safe Reinforcement LearningBelardinelli, Dr FImperial College LondonComputing 302,082
Assuring Responsibility for Trustworthy Autonomous SystemsHabli, Professor IUniversity of YorkComputer Science 703,616
Asynchronous Scientific Continuous Computations Exploiting Disaggregation (ASCCED)Vandierendonck, Professor HTKQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 202,213
Autonomous NAnotech GRAph Memory (ANAGRAM)Serb, Dr AUniversity of EdinburghSch of Engineering 269,789
Below the Branches of Universal TreesSchewe, Professor SUniversity of LiverpoolComputer Science 202,160
Beyond One Solution in Combinatorial OptimisationMeeks, Dr KUniversity of GlasgowSchool of Computing Science 1,363,670
Big Hypotheses: A Fully Parallelised Bayesian Inference SolutionMaskell, Professor SUniversity of LiverpoolElectrical Engineering and Electronics 2,557,654
Boolean functions with optimal stability of their cryptographic indicators under restriction of the inputsSalagean, Dr AmLoughborough UniversityComputer Science 335,434
C6: Correct-by-Construction Heterogeneous CoherenceBarbalace, Dr AUniversity of EdinburghSch of Informatics 494,698
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Professor LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Professor MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Professor TMUniversity of CambridgeComputer Science and Technology 1,202,313
CAP-TEE: Capability Architectures for Trusted ExecutionOswald, Dr D FUniversity of BirminghamSchool of Computer Science 1,000,206
CBET-EPSRC: TECAN - Telemetry-Enabled Carbon Aware NetworkingZilberman, Professor NUniversity of OxfordEngineering Science 435,640
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 3,474,398
Centre for Secure Information Technologies (CSIT) - Phase 3O'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 4,234,764
Centre for Spatial Computational LearningConstantinides, Professor GAImperial College LondonElectrical and Electronic Engineering 1,211,769
CHERI for Hypervisors and Operating Systems (CHaOS)Watson, Dr R N MUniversity of CambridgeComputer Science and Technology 878,316
Communication Complexity of Graph Algorithms (GraphCom)Mukhopadhyay, Dr SUniversity of SheffieldComputer Science 281,966
Computational Agent ResponsibilityFisher, Professor MUniversity of Manchester, TheComputer Science 642,185
Computing over Compressed Graph-Structured DataWild, Dr SUniversity of LiverpoolComputer Science 415,344
Computing with proteionidsAdamatzky, Professor AUniversity of the West of EnglandFaculty of Environment and Technology 701,011
Construction of Post-quantum Signature Schemes based on LatticesSarkar, Dr SUniversity of WarwickComputer Science 12,340
COSTRA -- The Cost of Winning StrategiesTotzke, Dr PUniversity of LiverpoolComputer Science 349,044
DART: Design Accelerators by Regulating TransformationsLuk, Professor WImperial College LondonComputing 613,910
Design and Verification of Time-Critical Byzantine Fault-Tolerant SystemsRahli, Dr VUniversity of BirminghamSchool of Computer Science 396,533
DIADEM: debugging made dependable and measurableKell, Dr S RKings College LondonInformatics 324,823
Digital Healthcare: A vehicle for capacity building in ICT skills and public engagementTerry, Professor JRUniversity of BirminghamSchool of Computer Science 170,511
Dijkstra's Pipe: Timing-Secure Processors by DesignPatras, Dr PUniversity of EdinburghSch of Informatics 535,239
Driving Behaviour in Multi-Winner Elections (BMW)Polukarov, Dr MKings College LondonInformatics 504,648
Driving Behaviour in Multi-Winner Elections (BMW)Elkind, Professor EUniversity of OxfordComputer Science 461,653
EDGE - Adaptive Deep Learning Hardware for Embedded PlatformsZhai, Dr XUniversity of EssexComputer Sci and Electronic Engineering 232,166
Efficient Spectral Algorithms for Massive and Dynamic GraphsSun, Dr HUniversity of EdinburghSch of Informatics 1,205,706
Enabling Transient Computing for Unreliable Internet of Things: A Paradigm Shift for Sensor Systems (PROCEEDING)Balsamo, Dr DNewcastle UniversitySch of Engineering 393,416
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
Energise: Refactorings and Skeletons for Energy-Aware Applications on High-Performance Embedded SystemsBrown, Dr CMUniversity of St AndrewsComputer Science 382,865
Enhancing Group Search with Graph TechniquesHoffmann, Dr RUniversity of St AndrewsComputer Science 165,165
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 6,323,611
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 6,063,927
EPSRC Centre for Doctoral Training in Distributed Algorithms: the what, how and where of next-generation data scienceMaskell, Professor SUniversity of LiverpoolElectrical Engineering and Electronics 4,896,240
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,522,797
Establishing Electrically Programmable Reaction Arrays as Universal Chemical ComputersCronin, Professor LUniversity of GlasgowSchool of Chemistry 733,213
EXHIBIT : Expressive High-Level Languages for Bidirectional TransformationsWang, Dr MUniversity of BristolComputer Science 427,420
Exploiting sparsity in large-scale optimizationScott, Professor JASTFC Laboratories (Grouped)Scientific Computing Department 76,281
Fair and modular blockchain data infrastructure for open science and society (FairOnChain)Knottenbelt, Professor WJImperial College LondonComputing 95,825
Foundations of the Finite Model Theory of ConcatenationFreydenberger, Dr DDLoughborough UniversityComputer Science 397,698
Future Memcomputing Arrays for Next Generation Computer VisionKemp, Dr NTUniversity of NottinghamSch of Physics & Astronomy 368,171
Games for GoodTotzke, Dr PUniversity of LiverpoolComputer Science 493,930
Games for GoodTotzke, Dr PUniversity of LiverpoolComputer Science 493,930
Generalised Context PrivacyBradbury, Dr M SLancaster UniversityComputing & Communications 387,468
Hardware Acceleration of Functional Languages (HAFLANG)Stewart, Dr RHeriot-Watt UniversityS of Mathematical and Computer Sciences 350,700
Hardware Security for Approximate ComputingGU, Dr CQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 298,063
Heterogeneous ThinkingO'Boyle, Professor MUniversity of EdinburghSch of Informatics 1,074,832
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Imperative programs from proofsPowell, Dr T R JUniversity of BathComputer Science 311,440
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
Inverse design of periodic crystalsKurlin, Professor VUniversity of LiverpoolComputer Science 202,213
IOTEE: Securing and analysing trusted execution beyond the CPUAtamli, Dr AUniversity of SouthamptonSch of Electronics and Computer Sci 457,328
IOTEE: Securing and analysing trusted execution beyond the CPUAtamli, Dr AUniversity of SouthamptonSch of Electronics and Computer Sci 457,328
IOTEE: Securing and analysing trusted execution beyond the CPUAtamli, Dr AUniversity of SouthamptonSch of Electronics and Computer Sci 457,328
IOTEE: Securing and analysing trusted execution beyond the CPUOswald, Dr D FUniversity of BirminghamSchool of Computer Science 448,286
IOTEE: Securing and analysing trusted execution beyond the CPUOswald, Dr D FUniversity of BirminghamSchool of Computer Science 448,286
IOTEE: Securing and analysing trusted execution beyond the CPUOswald, Dr D FUniversity of BirminghamSchool of Computer Science 448,286
Keep LearningMiguel, Professor IJUniversity of St AndrewsComputer Science 378,027
Keep LearningHart, Professor EEdinburgh Napier UniversitySchool of Computing 388,219
KidneyAlgo: New Algorithms for UK and International Kidney ExchangePaulusma, Professor DDurham, University ofComputer Science 262,778
KidneyAlgo: New Algorithms for UK and International Kidney ExchangeManlove, Professor DUniversity of GlasgowSchool of Computing Science 456,946
KUber: Knowledge Delivery System For Machine Learning At ScaleMohamed Abdelmoniem Sayed, Dr AQueen Mary University of LondonSch of Electronic Eng & Computer Science 522,781
Magnetic Architectures for Reservoir Computing Hardware (MARCH)Hayward, Dr T JUniversity of SheffieldMaterials Science and Engineering 936,815
MARCH: Magnetic Architectures for Reservoir Computing HardwareStepney, Professor SUniversity of YorkComputer Science 1,162,095
Mathematical Foundations of Intelligence: An "Erlangen Programme" for AIBronstein, Professor MUniversity of OxfordComputer Science 8,567,300
MCPS-VeriSec: Model-based Security of Medical Cyber-Physical SystemsPaoletti, Dr NKings College LondonInformatics 424,397
Modernise Compiler Technology With Deep LearningWang, Professor ZUniversity of LeedsSch of Computing 202,424
Multilayer Algorithmics to Leverage Graph Structure (MultilayerALGS)Meeks, Dr KUniversity of GlasgowSchool of Computing Science 765,538
NAfANE: New Approaches for Approximate Nash EquilibriaDeligkas, Dr ARoyal Holloway, Univ of LondonComputer Science 500,163
Nervous SystemsTrefzer, Dr M AUniversity of YorkElectronics 859,395
Nervous SystemsHarkin, Professor JUniversity of UlsterSch of Computing & Intelligent Systems 614,711
NetPM: Co-designing Data Management and Networking Principles for Persistent MemoryHonda, Dr MUniversity of EdinburghSch of Informatics 391,902
New Horizons in Multivariate Preprocessing (MULTIPROCESS)Maadapuzhi Sridharan, Dr RUniversity of WarwickComputer Science 545,674
New perspectives towards Woodall's Conjecture and the Generalised Berge-Fulkerson ConjectureAbdi, Dr ALondon School of Economics & Pol SciMathematics 422,542
New proximal algorithms for computational imaging: From optimisation theory to enhanced deep learningRepetti, Dr AHeriot-Watt UniversityS of Mathematical and Computer Sciences 284,313
New Techniques for Resolving Boundary Problems in Total SearchFearnley, Dr JUniversity of LiverpoolComputer Science 441,269
Noise-avoidance and Simulation in Quantum Information TechnologiesJennings, Dr DUniversity of LeedsPhysics and Astronomy 401,471
Nominal String DiagramsGhica, Professor DRUniversity of BirminghamSchool of Computer Science 429,879
Nominal String DiagramsZanasi, Dr FUCLComputer Science 429,666
On-Sensor Computer VisionMayol-Cuevas, Professor WWUniversity of BristolComputer Science 620,993
On-Sensor Computer VisionDudek, Professor PUniversity of Manchester, TheElectrical and Electronic Engineering 1,327,360
On-Sensor Computer VisionKelly, Professor PImperial College LondonComputing 1,404,122
Optimisation for Game Theory and Machine LearningGoldberg, Professor PUniversity of OxfordComputer Science 624,351
ParaSol: Fine-Grained Thread-Level Parallelism for Single-Threaded PerformanceJones, Professor TMUniversity of CambridgeComputer Science and Technology 1,091,793
Paul Curzon - Public Engagement Champion via CS4FNCurzon, Professor PQueen Mary University of LondonSch of Electronic Eng & Computer Science 162,605
Perfect Recollection for clearer insightMullins, Dr RDUniversity of CambridgeComputer Science and Technology 1,037,935
PKC-Sec: Security Analysis of Classical and Post-Quantum Public Key Cryptography AssumptionsGranger, Dr RUniversity of SurreyComputing Science 297,923
POST: Protocols, Observabilities and Session TypesYoshida, Professor NUniversity of OxfordComputer Science 1,243,069
Post-Quantum Cryptography: a Cryptanalysis ApproachPetit, Dr CUniversity of BirminghamSchool of Computer Science 1,663,949
Promise Constraint Satisfaction Problem: Structure and ComplexityKrokhin, Professor ADurham, University ofComputer Science 1,385,237
Property Testing for Quantum Engineering (ProTeQE)Datta, Professor AUniversity of WarwickPhysics 202,437
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionDavenport, Professor JHUniversity of BathComputer Science 505,757
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionEngland, Dr MCoventry UniversityCtr for Fluid and Complex Systems 421,951
Quantitative verification of software families based on coalgebraic modal logic and gamesBeohar, Dr HUniversity of SheffieldComputer Science 235,841
Quantum Enhanced and Verified Exascale Computing - QEVECKendon, Professor VMUniversity of StrathclydePhysics 1,007,642
Query EvaluationChen, Dr HKings College LondonInformatics 475,688
Reconfigurable Intelligent Surfaces 2.0 for 6G: Beyond Diagonal Phase Shift MatricesClerckx, Professor BImperial College LondonElectrical and Electronic Engineering 891,185
REMOTE: Resilient and Secure Multi-Access Interoperable Communication Fabric for TinyEdgeYadav, Dr PUniversity of YorkComputer Science 444,867
REPHRAIN: National Research centre on Privacy, Harm Reduction and Adversarial Influence online (Phase II)Rashid, Professor AUniversity of BristolComputer Science 756,638
REPHRAIN: Research centre on Privacy, Harm Reduction and Adversarial Influence onlineRashid, Professor AUniversity of BristolComputer Science 6,972,599
RESICS:Resilience and Safety to attacks in ICS and CPSLupu, Professor ECImperial College LondonComputing 919,122
RESICS:Resilience and Safety to attacks in ICS and CPSLupu, Professor ECImperial College LondonComputing 919,122
Resources in ComputationAbramsky, Professor SUCLComputer Science 1,792,395
Revolutionising Operational Safety and Economy for High-value Infrastructure using Population-based SHM (ROSEHIPS)Worden, Professor KUniversity of SheffieldMechanical Engineering 6,326,800
Rubber DUQ: Flexible Dynamic Universal Quantum programmingHeunen, Dr CUniversity of EdinburghSch of Informatics 1,037,881
SACRED-MA: Safe And seCure REmote Direct Memory AccessRaad, Dr AImperial College LondonComputing 452,577
SACRED-MA: Safe And seCure REmote Direct Memory AccessRaad, Dr AImperial College LondonComputing 452,577
SACRED-MA: Safe And seCure REmote Direct Memory AccessRaad, Dr AImperial College LondonComputing 452,577
SACRED-MA: Safe And seCure REmote Direct Memory AccessDongol, Professor BUniversity of SurreyComputing Science 466,480
SACRED-MA: Safe And seCure REmote Direct Memory AccessDongol, Professor BUniversity of SurreyComputing Science 466,480
SACRED-MA: Safe And seCure REmote Direct Memory AccessDongol, Professor BUniversity of SurreyComputing Science 466,480
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Derrick, Professor JUniversity of SheffieldComputer Science 422,585
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Batty, Professor MUniversity of KentSch of Computing 374,699
Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)Dongol, Professor BUniversity of SurreyComputing Science 416,971
SAIS: Secure AI assistantSSuch, Professor JMKings College LondonInformatics 1,155,316
SAIS: Secure AI assistantSLomuscio, Professor ARImperial College LondonComputing 396,174
SECCOM: Securing composable hardware platformsGoodacre, Professor JUniversity of Manchester, TheComputer Science 789,633
Semantics-Directed Compiler Construction: From Formal Semantics to Certified CompilersGhica, Professor DRUniversity of BirminghamSchool of Computer Science 446,229
Semantics-Directed Compiler Construction: From Formal Semantics to Certified CompilersHutton, Professor GUniversity of NottinghamSchool of Computer Science 466,425
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NUniversity of OxfordComputer Science 599,888
SGAI: Brain-Inspired Nanosystems for Smart and Green AIRajendran, Professor BKings College LondonEngineering 1,518,054
Social Foundations of CryptographyMedrado, Dr AMLUniversity of WestminsterWestminster Sch of Media & Communication 74,370
Social Foundations of CryptographyAlbrecht, Professor MKings College LondonInformatics 725,498
Social foundations of cryptographyDowling, Dr BUniversity of SheffieldComputer Science 59,617
Software Environment for Actionable & VVUQ-evaluated Exascale Applications (SEAVEA)Coveney, Professor PUCLChemistry 728,470
Software Environment for Actionable & VVUQ-evaluated Exascale Applications (SEAVEA)Groen, Dr DBrunel University LondonComputer Science 287,922
Solver Feedback Loops for Automated Constraint ModellingNightingale, Dr PWUniversity of YorkComputer Science 307,728
SONNETS: Scalability Oriented Novel Network of Event Triggered SystemsThomas, Professor DBUniversity of SouthamptonSch of Electronics and Computer Sci 6,467,613
StreamDG: Streaming Processing of Massive Dynamic GraphsKonrad, Dr CUniversity of BristolComputer Science 248,776
Sustainability and EDI (Equality, Diversity, and Inclusion) in the R ProjectTurner, Dr HLUniversity of WarwickStatistics 776,695
The next level of SAT solving for very hard problemsKullmann, Dr OSwansea UniversityCollege of Science 839,938
The Science of Solving Hard Subgraph ProblemsMcCreesh, Dr CUniversity of GlasgowSchool of Computing Science 360,843
Theoretical Foundations of Modern Parallel and Distributed AlgorithmsCzumaj, Professor AUniversity of WarwickComputer Science 552,577
Towards Directed Model CategoriesKavvos, Dr AUniversity of BristolComputer Science 70,581
Transparent Compression for General-Purpose Programming LanguagesPirk, Dr HImperial College LondonComputing 293,360
TROCI: Towards Resilient Operation of Critical Infrastructures - application to water and energy systemsAhmed, Dr HUniversity of SheffieldNuclear AMRC 295,163
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentKhakpour, Dr NNNewcastle UniversitySch of Computing 492,653
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE DevelopmentSchewe, Professor SUniversity of LiverpoolComputer Science 426,375
TrustVote: Dispute-resolution mechanisms and systems for Private and Verifiable VotingDragan, Dr CCUniversity of SurreyComputing Science 375,666
Trustworthy Distributed Brain-inspired Systems: Theoretical Basis and Hardware ImplementationAlouani, Dr IQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 299,391
Turing AI Fellowship: Citizen-Centric AI SystemsStein, Professor SUniversity of SouthamptonSch of Electronics and Computer Sci 1,199,982
Turing AI Fellowship: Rigorous time-complexity analysis of co-evolutionary algorithmsLehre, Professor PUniversity of BirminghamSchool of Computer Science 1,254,385
Two-way automata: limitations and frontiersChistikov, Dr DUniversity of WarwickComputer Science 280,432
UK-Australia Centre in a Secure Internet of Energy: Supporting Electric Vehicle Infrastructure at the "Edge" of the GridRanjan, Professor RNewcastle UniversitySch of Computing 1,511,081
UKRI-RCN: Exploiting the dynamics of self-timed machine learning hardware (ESTEEM)Yakovlev, Professor ANewcastle UniversitySch of Engineering 836,689
UniFaaS: A Unikernel-Based Serverless Operating SystemOlivier, Dr PUniversity of Manchester, TheComputer Science 267,264
Uni-pi: safety, adaptability and resilience in distributed ecosystems, by constructionDardha, Dr OUniversity of GlasgowSchool of Computing Science 409,562
Unlocking the Potential of Neural Architecture Search (UPNAS)Crowley, Dr E JUniversity of EdinburghSch of Engineering 273,786
Untargeted Attacks in (Password-Based) CryptographyFarshim, Dr PDurham, University ofComputer Science 265,225
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Using Robust Graph Clustering to Detect Fake NewsMallmann-Trenn, Dr FKings College LondonInformatics 295,373
Verifiably Correct Swarm AttestationDongol, Professor BUniversity of SurreyComputing Science 514,155
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794

Total Number of Grants: 179
Total Value of Grants: £164,492,478

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).