EPSRC logo
EPSRC Support by Research Topic in Fundamentals of Computing

We classify grants using one or more research topics. Value is the total value of the grants awarded, not the proportion assigned to different research topics, so it does not show the level of investment in different research areas.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A coalgebraic framework for reductive logic and proof-search (ReLiC)Pym, Professor DUCLComputer Science 974,936
A theory of type theoriesAhrens, Dr BUniversity of BirminghamSchool of Computer Science 261,609
ABC: Adaptive Brokerage for the CloudElkhatib, Dr YLancaster UniversityComputing & Communications 388,701
ABC: Adaptive Brokerage for the CloudBarker, Professor AUniversity of St AndrewsComputer Science 386,558
Academic Centre of Excellence in Cyber Security Research - [Royal Holloway University of London]Markantonakis, Professor KRoyal Holloway, Univ of LondonInformation Security 78,117
Academic Centre of Excellence in Cyber Security Research - Cardiff UniversityBurnap, Professor PCardiff UniversityComputer Science 64,898
Academic Centre of Excellence in Cyber Security Research - De Montfort UniversityBoiten, Professor EADe Montfort UniversityComputer Technology 48,741
Academic Centre of Excellence in Cyber Security Research - Imperial College LondonLupu, Professor ECImperial College LondonInstitute for Security Science and Tech 81,930
Academic Centre of Excellence in Cyber Security Research - King's College LondonSuch, Dr JMKings College LondonInformatics 63,961
Academic Centre of Excellence in Cyber Security Research - Lancaster UniversityRace, Professor NLancaster UniversityComputing & Communications 81,803
Academic Centre of Excellence in Cyber Security Research - Newcastle UniversityGross, Dr TRNewcastle UniversitySch of Computing 81,936
Academic Centre of Excellence in Cyber Security Research - Queen's University BelfastO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 81,965
Academic Centre of Excellence in Cyber Security Research - University College LondonDe Cristofaro, Dr EUCLComputer Science 81,904
Academic Centre of Excellence in Cyber Security Research - University of BirminghamRyan, Professor MUniversity of BirminghamSchool of Computer Science 81,162
Academic Centre of Excellence in Cyber Security Research - University of BristolPage, Dr DUniversity of BristolComputer Science 36,205
Academic Centre of Excellence in Cyber Security Research - University of CambridgeStajano, Dr FUniversity of CambridgeComputer Science and Technology 81,719
Academic Centre of Excellence in Cyber Security Research - University of EdinburghAspinall, Professor DUniversity of EdinburghSch of Informatics 81,715
Academic Centre of Excellence in Cyber Security Research - University of KentLi, Professor SUniversity of KentSch of Computing 64,602
Academic Centre of Excellence in Cyber Security Research - University of Northumbria at NewcastleCoventry, Professor LNorthumbria, University ofFac of Health and Life Sciences 48,574
Academic Centre of Excellence in Cyber Security Research - University of OxfordMartin, Professor AUniversity of OxfordComputer Science 81,931
Academic Centre of Excellence in Cyber Security Research - University of SouthamptonSassone, Professor VUniversity of SouthamptonSch of Electronics and Computer Sci 81,867
Academic Centre of Excellence in Cyber Security Research - University of SurreySchneider, Professor SAUniversity of SurreyComputing Science 81,966
Academic Centre of Excellence in Cyber Security Research - University of WarwickMaple, Professor CUniversity of WarwickWMG 81,965
AISEC: AI Secure and Explainable by ConstructionKomendantskaya, Dr EHeriot-Watt UniversityS of Mathematical and Computer Sciences 807,165
AISEC: AI Secure and Explainable by ConstructionAtkey, Dr RAUniversity of StrathclydeComputer and Information Sciences 348,439
AISEC: AI Secure and Explainable by ConstructionAspinall, Professor DUniversity of EdinburghSch of Informatics 670,675
Algorithmic Aspects of Temporal GraphsMertzios, Dr GDurham, University ofComputer Science 319,069
Algorithms for Computing with Uncertainty: Theory and ExperimentsErlebach, Professor TRUniversity of LeicesterComputer Science 401,205
ALGOUK - A Network for Algorithms and Complexity in the UKStewart, Professor IADurham, University ofComputer Science 108,682
Automatically Detecting and Surviving Exploitable Compiler BugsCadar, Professor CImperial College LondonComputing 672,083
Big Hypotheses: A Fully Parallelised Bayesian Inference SolutionMaskell, Professor SUniversity of LiverpoolElectrical Engineering and Electronics 2,557,654
Border Patrol: Improving Smart Device Security through Type-Aware Systems DesignVanderbauwhede, Professor WUniversity of GlasgowSchool of Computing Science 1,765,760
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyLing, Dr CImperial College LondonElectrical and Electronic Engineering 436,303
Bridging the Gap Between Lattice Coding and Lattice Cryptography - Post-Quantum CryptographyAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 379,964
CaMELot: Catching and Mitigating Event-Loop Concurrency IssuesMarr, Dr SUniversity of KentSch of Computing 209,756
Capable VMsSinger, Dr JUniversity of GlasgowSchool of Computing Science 469,283
CapableVMsTratt, Dr LKings College LondonInformatics 837,189
CapC: Capability C semantics, tools and reasoningBatty, Dr MUniversity of KentSch of Computing 485,168
CAPcelerate: Capabilities for Heterogeneous AcceleratorsJones, Dr TMUniversity of CambridgeComputer Science and Technology 1,199,866
CAPS: Collaborative Architectures for Proof SearchReger, Dr GUniversity of Manchester, TheComputer Science 251,632
CAP-TEE: Capability Architectures for Trusted ExecutionOswald, Dr D FUniversity of BirminghamSchool of Computer Science 1,000,206
Centre for Doctoral Training in Cyber Security at Royal HollowayCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,798,380
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,454,896
Centre for Spatial Computational LearningConstantinides, Professor GAImperial College LondonElectrical and Electronic Engineering 1,211,769
CHERI for Hypervisors and Operating Systems (CHaOS)Watson, Dr R N MUniversity of CambridgeComputer Science and Technology 875,939
Circuits, Logic and SymmetryDawar, Professor AUniversity of CambridgeComputer Science and Technology 362,033
CloudCAP: Capability-based Isolation for Cloud Native ApplicationsPietzuch, Professor PRImperial College LondonComputing 879,242
Cohomology, Machine Learning and String Model BuildingConstantin, Dr AUniversity of OxfordOxford Physics 435,734
Combining Viewpoints in Quantum Theory (Ext.)Heunen, Dr CUniversity of EdinburghSch of Informatics 529,579
Computing with Liquid MarblesAdamatzky, Professor AUniversity of the West of EnglandFaculty of Environment and Technology 727,811
CRITiCaL - Combatting cRiminals In The CLoudGross, Dr TRNewcastle UniversitySch of Computing 2,027,646
CSIT 2O'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 5,032,504
Customized and Adaptive approach for Optimal Cybersecurity InvestmentHankin, Professor CImperial College LondonInstitute for Security Science and Tech 386,129
Customized and Adaptive approach for Optimal Cybersecurity InvestmentMalacaria, Professor PQueen Mary University of LondonSch of Electronic Eng & Computer Science 388,777
Cyber Security CDT Phase Two (University of Oxford)Martin, Professor AUniversity of OxfordComputer Science 3,489,711
Data Release - Trust, Identity, Privacy and SecurityWang, Dr VUniversity of PortsmouthInstitute of Criminal Justice Studies 299,355
DATA-CENTRIC: Developing AccounTAble Computational ENgineering Through Robust InferenCeDiaz De la O, Dr FUCLMathematics 244,313
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Discovery: Pattern Discovery and Program Shaping for Heterogeneous Manycore SystemsCole, Professor MUniversity of EdinburghSch of Informatics 338,165
Discovery: Pattern Discovery and Program Shaping for Manycore SystemsThomson, Dr J DUniversity of St AndrewsComputer Science 366,059
Edge Computing Resource Allocation for Dynamic NetworksAthanasopoulos, Dr NQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 254,305
Efficient Spectral Algorithms for Massive and Dynamic GraphsSun, Dr HUniversity of EdinburghSch of Informatics 1,205,706
End to End Authentication of Caller ID in Heterogeneous Telephony SystemsHao, Professor FUniversity of WarwickComputer Science 901,040
Energise: Refactorings and Skeletons for Energy-Aware Applications on High-Performance Embedded SystemsBrown, Dr CMUniversity of St AndrewsComputer Science 382,865
EnnCore: End-to-End Conceptual Guarding of Neural ArchitecturesCordeiro, Dr LCUniversity of Manchester, TheComputer Science 1,721,560
EPSRC Centre for Doctoral Training in Cyber Security for the EverydayMartin, Professor KRoyal Holloway, Univ of LondonInformation Security 5,964,769
EPSRC Centre for Doctoral Training in CybersecurityPym, Professor DUCLComputer Science 5,733,543
EPSRC Centre for Doctoral Training in Data ScienceStorkey, Professor AJUniversity of EdinburghSch of Informatics 4,731,730
EPSRC Centre for Doctoral Training in Delivering Quantum TechnologiesWarburton, Professor PAUCLLondon Centre for Nanotechnology 5,005,238
EPSRC Centre for Doctoral Training in Distributed Algorithms: the what, how and where of next-generation data scienceMaskell, Professor SUniversity of LiverpoolElectrical Engineering and Electronics 4,688,822
EPSRC Centre for Doctoral Training in Pervasive ParallelismO'Boyle, Professor MUniversity of EdinburghSch of Informatics 3,906,792
EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-scale Infrastructures (TIPS-at-Scale)Rashid, Professor AUniversity of BristolComputer Science 6,235,172
Event-based parallel computing - partially ordered event-triggered systems (POETS)Brown, Professor ADUniversity of SouthamptonSch of Electronics and Computer Sci 4,981,302
EXHIBIT : Expressive High-Level Languages for Bidirectional TransformationsWang, Dr MUniversity of BristolComputer Science 427,420
Extension: MathSoMac: the social machine of mathematicsMartin, Professor UHUniversity of EdinburghSch of Informatics 911,629
FORGING: Fortuitous Geometries and Compressive LearningKaban, Professor AUniversity of BirminghamSchool of Computer Science 876,859
Foundations of the Finite Model Theory of ConcatenationFreydenberger, Dr DDLoughborough UniversityComputer Science 397,698
From Data Types to Session Types---A Basis for Concurrency and DistributionWadler, Professor PUniversity of EdinburghSch of Informatics 3,956,088
Future AI and Robotics Hub for Space (FAIR-SPACE)Sweeting, Professor Sir MUniversity of SurreySurrey Space Centre Academic 7,932,511
Glass Houses: Transparency and Privacy in Information EconomiesMeiklejohn, Dr SUCLComputer Science 969,096
HAMLET: Hardware Enabled Meta-Tracing (ext.)Tratt, Dr LKings College LondonInformatics 922,997
Heterogeneous ThinkingO'Boyle, Professor MUniversity of EdinburghSch of Informatics 1,074,832
Higher Algebra and Quantum ProtocolsDouglas, Dr CUniversity of OxfordMathematical Institute 494,701
Higher Algebra and Quantum ProtocolsVicary, Dr JOUniversity of BirminghamSchool of Computer Science 337,112
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsRamsay, Dr S JUniversity of BristolComputer Science 366,931
Higher-order Constrained Horn Clauses: A New Approach to Verifying Higher-order ProgramsOng, Professor CHLUniversity of OxfordComputer Science 409,019
Holistic Design of Secure Systems on Capability Hardware (HD-Sec)Butler, Professor MUniversity of SouthamptonSch of Electronics and Computer Sci 1,030,183
Interface reasoning for interacting systems (IRIS).Pym, Professor DUCLComputer Science 6,146,075
IOSEC - Protection and Memory Safety for Input/Output SecurityWatson, Dr R N MUniversity of CambridgeComputer Science and Technology 511,891
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsGarcia Quiles, Dr SUniversity of EdinburghSch of Mathematics 448,386
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsManlove, Professor DUniversity of GlasgowSchool of Computing Science 353,253
Isogeny-based cryptography: from theory to practicePetit, Dr CUniversity of BirminghamSchool of Computer Science 327,745
Lattice-Based CryptographyAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 482,051
Leakage Aware Design Automation (LADA): Tools & Techniques for Software Crypto ImplementationsPage, Dr DUniversity of BristolComputer Science 1,150,814
Magnetic Architectures for Reservoir Computing Hardware (MARCH)Allwood, Professor DAUniversity of SheffieldMaterials Science and Engineering 936,815
MARCH: Magnetic Architectures for Reservoir Computing HardwareStepney, Professor SUniversity of YorkComputer Science 1,162,095
Mind the Gap: Unified Reasoning About Program Correctness and EfficiencyHutton, Professor GUniversity of NottinghamSchool of Computer Science 411,980
Modelling and Optimisation with GraphsProsser, Dr PUniversity of GlasgowSchool of Computing Science 673,092
Multilayer Algorithmics to Leverage Graph Structure (MultilayerALGS)Meeks, Dr KUniversity of GlasgowSchool of Computing Science 765,538
New Frontiers in Parameterizing Away from TrivialityMaadapuzhi Sridharan, Dr RUniversity of WarwickComputer Science 264,598
Nominal String DiagramsZanasi, Dr FUCLComputer Science 429,666
Nominal String DiagramsGhica, Professor DRUniversity of BirminghamSchool of Computer Science 429,879
Optimal Impartial MechanismsFischer, Dr FQueen Mary University of LondonSch of Mathematical Sciences 192,474
Optimising Information Processing for Quantum TechnologiesBerta, Dr MAImperial College LondonComputing 275,132
Oxford University Centre for Doctoral Training in Cyber SecurityMartin, Professor AUniversity of OxfordComputer Science 3,667,416
POST: Protocols, Observabilities and Session TypesYoshida, Professor NImperial College LondonComputing 1,462,802
Practical Data-intensive Secure Computation: a Data Structural ApproachDong, Dr CNewcastle UniversitySch of Computing 357,256
Practical Submodular Optimisation Beyond the Standard Greedy AlgorithmWard, Dr J DQueen Mary University of LondonSch of Mathematical Sciences 121,643
Programming as Conversation: Type-Driven Development in ActionBrady, Dr ECUniversity of St AndrewsComputer Science 367,276
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionEngland, Dr MCoventry UniversityCtr for Fluid and Complex Systems 421,951
Pushing Back the Doubly-Exponential Wall of Cylindrical Algebraic DecompositionDavenport, Professor JHUniversity of BathComputer Science 505,757
QuTie: reasoning with Quantifiers and TheoriesVoronkov, Professor AUniversity of Manchester, TheComputer Science 359,372
Research Institute in Science of Cyber Security (RISCS) Phase 2Carr, Professor MUCLComputer Science 648,984
Research Institute in Verified Trustworthy Software Systems (VeTSS)Gardner, Professor PImperial College LondonComputing 654,850
Resources and co-resources: a junction between semantics and descriptive complexityAbramsky, Professor SUniversity of OxfordComputer Science 400,336
Resources and co-resources: a junction between semantics and descriptive complexityDawar, Professor AUniversity of CambridgeComputer Science and Technology 399,683
Robotics and Artificial Intelligence for Nuclear (RAIN)Lennox, Professor BUniversity of Manchester, TheElectrical and Electronic Engineering 12,203,190
SAIS: Secure AI assistantSLomuscio, Professor ARImperial College LondonComputing 396,174
SAIS: Secure AI assistantSSuch, Dr JMKings College LondonInformatics 1,155,316
Sampling in Hereditary ClassesJerrum, Professor MQueen Mary University of LondonSch of Mathematical Sciences 78,309
Sampling in Hereditary ClassesMuller, Dr HUniversity of LeedsSch of Computing 507,341
Science of Sensor System SoftwareCalder, Professor MUniversity of GlasgowSchool of Computing Science 4,183,694
SCOPE: Scoped Contextual Operations and Effects.Wu, Dr NImperial College LondonComputing 262,413
SCorCH : Secure Code for Capability HardwareKroening, Professor DUniversity of OxfordComputer Science 312,916
SCorCH: Secure Code for Capability HardwareReger, Dr GUniversity of Manchester, TheComputer Science 1,034,990
Session Types for Reliable Distributed Systems (STARDUST)Yoshida, Professor NImperial College LondonComputing 697,651
Session Types for Reliable Distributed Systems (STARDUST)Bocchi, Dr LUniversity of KentSch of Computing 555,120
Session Types for Reliable Distributed Systems (STARDUST)Gay, Professor SJUniversity of GlasgowSchool of Computing Science 563,806
Solving Parity Games in Theory and PracticeSchewe, Professor SUniversity of LiverpoolComputer Science 409,109
Solving Parity Games in Theory and PracticeJurdzinski, Dr MUniversity of WarwickComputer Science 347,959
Spin Inspired RepresentationsStepney, Professor SUniversity of YorkComputer Science 507,656
SPRITE+: The Security, Privacy, Identity, and Trust Engagement NetworkPlusBarrett, Professor EUniversity of Manchester, TheSocial Sciences 1,386,196
STRATA; Layers for Structuring Trustworthy Ambient SystemsRomanovsky, Professor ANewcastle UniversitySch of Computing 965,298
String Constraint Solving with Real-World Regular ExpressionsHague, Dr MRoyal Holloway, Univ of LondonComputer Science 393,618
Structure of Hereditary Graph Classes and Its Algorithmic ConsequencesVuskovic, Professor KUniversity of LeedsSch of Computing 570,417
Synthetic Portabolomics: Leading the way at the crossroads of the Digital and the Bio EconomiesKrasnogor, Professor NNewcastle UniversitySch of Computing 4,353,851
The Complexity of Promise Constraint SatisfactionKrokhin, Professor ADurham, University ofComputer Science 441,210
The next level of SAT solving for very hard problemsKullmann, Dr OSwansea UniversityCollege of Science 839,938
Theory and Applications of Dynamic AlgorithmsBhattacharya, Dr SUniversity of WarwickComputer Science 246,483
Towards a physical theory of computer science.Chu, Dr DUniversity of KentSch of Computing 49,181
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsChopra, Dr ALancaster UniversityComputing & Communications 686,507
Turtles: Protocol-Based Foundations for Distributed Multiagent SystemsYoshida, Professor NImperial College LondonComputing 863,741
Typed Lambda-Calculi with Sharing and UnsharingHeijltjes, Dr W BUniversity of BathComputer Science 325,415
UK Robotics and Artificial Intelligence Hub for Offshore Energy Asset Integrity ManagementLane, Professor DHeriot-Watt UniversitySch of Engineering and Physical Science 14,635,591
User-controlled hardware security anchors: evaluation and designsRyan, Professor MUniversity of BirminghamSchool of Computer Science 486,082
Verifiably Correct Transactional MemoryDongol, Dr BUniversity of SurreyComputing Science 397,680
Verifiably Correct Transactional MemoryOwens, Dr SAUniversity of KentSch of Computing 82,904
Verifiably Correct Transactional Memory.Derrick, Professor JUniversity of SheffieldComputer Science 406,411
Verification of Hardware Concurrency via Model Learning (CLeVer)Silva, Professor AUCLComputer Science 692,958
Verification of Linear Dynamical SystemsWorrell, Professor JBUniversity of OxfordComputer Science 1,005,506
Verification of Quantum TechnologyKashefi, Professor EUniversity of EdinburghSch of Informatics 1,237,804
VeTSpec: Verified Trustworthy Software SpecificationGardner, Professor PImperial College LondonComputing 1,579,794
Wearable and Autonomous Computing for Future Smart Cities: A Platform GrantBeeby, Professor SPUniversity of SouthamptonSch of Electronics and Computer Sci 1,431,420

Total Number of Grants: 153
Total Value of Grants: £188,375,109

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).