EPSRC logo
EPSRC Support by Research Area in Theoretical computer science

Research areas are used to describe EPSRC's portfolio of excellent long term research and high quality postgraduate training.

Grants are classified using one or more research areas. All the grants listed below have some relevance to this research area. The value of the investment is the total awarded by EPSRC and does not reflect the proportion assigned to this research area.

We always try to ensure that grants on the web contains the most recent information but it is possible that some might be slightly out of date.

Grant TitlePrincipal
Investigator
OrganisationDepartmentTotal Grant
Value (£)
A compositional approach to game-theoretic economic modellingHedges, Mr JUniversity of OxfordComputer Science 259,304
A Constraint Modelling PipelineMiguel, Professor IJUniversity of St AndrewsComputer Science 886,923
Academic Centre of Excellence in Cyber Security Research - [Royal Holloway University of London]Markantonakis, Professor KRoyal Holloway, Univ of LondonInformation Security 78,117
Academic Centre of Excellence in Cyber Security Research - Imperial College LondonLupu, Dr ECImperial College LondonInstitute for Security Science and Tech 81,930
Academic Centre of Excellence in Cyber Security Research - Lancaster UniversityRashid, Professor ALancaster UniversityComputing & Communications 81,803
Academic Centre of Excellence in Cyber Security Research - Newcastle UniversityGross, Dr TRNewcastle UniversityComputing Sciences 81,936
Academic Centre of Excellence in Cyber Security Research - Queen's University BelfastMcCanny, Professor JVQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 81,965
Academic Centre of Excellence in Cyber Security Research - University College LondonGroth, Professor JUCLComputer Science 81,904
Academic Centre of Excellence in Cyber Security Research - University of BirminghamRyan, Professor MUniversity of BirminghamSchool of Computer Science 40,058
Academic Centre of Excellence in Cyber Security Research - University of BirminghamRyan, Professor MUniversity of BirminghamSchool of Computer Science 81,162
Academic Centre of Excellence in Cyber Security Research - University of BristolSmart, Professor NUniversity of BristolComputer Science 36,205
Academic Centre of Excellence in Cyber Security Research - University of CambridgeStajano, Dr FUniversity of CambridgeComputer Laboratory 81,719
Academic Centre of Excellence in Cyber Security Research - University of EdinburghAspinall, Professor DUniversity of EdinburghSch of Informatics 81,715
Academic Centre of Excellence in Cyber Security Research - University of OxfordMartin, Professor AUniversity of OxfordComputer Science 81,931
Academic Centre of Excellence in Cyber Security Research - University of SouthamptonSassone, Professor VUniversity of SouthamptonElectronics and Computer Science 81,867
Academic Centre of Excellence in Cyber Security Research - University of SurreySchneider, Professor SAUniversity of SurreyComputing Science 81,966
Academic Centre of Excellence in Cyber Security Research - University of WarwickMaple, Professor CUniversity of WarwickWMG 81,965
Algebra and Logic for Policy and Utility in Information SecurityMcCusker, Professor GUniversity of BathComputer Science 401,216
Algebra and Logic for Policy and Utility in Information SecurityPym, Professor DUCLComputer Science 441,734
Algorithmic Aspects of Temporal GraphsMertzios, Dr GDurham, University ofComputer Science 319,069
Algorithmic Aspects of Temporal GraphsSpirakis, Professor PUniversity of LiverpoolComputer Science 319,782
Algorithms on rank aggregation for preference orderingsLin, Dr ZUniversity of UlsterSch of Computing & Mathematical Sci 100,781
Algorithms that count: exploring the limits of tractabilityJerrum, Professor MQueen Mary, University of LondonSch of Mathematical Sciences 361,972
Analysing and Detecting Advanced Multi-stage Attacks against ICS (ADAMA)McLaughlin, Dr KQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 99,552
Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic EncryptionAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 80,215
Bit Security of Learning with Errors for Post-Quantum Cryptography and Fully Homomorphic EncryptionAlbrecht, Dr MRoyal Holloway, Univ of LondonInformation Security 80,215
Bristol/Bar-Ilan MPCSmart, Professor NUniversity of BristolComputer Science 200,707
Capacity Building in Complexity Science at WarwickConnaughton, Dr CUniversity of WarwickMathematics 4,142,427
Centre for Doctoral Training in Cyber Security at Royal HollowayCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,793,546
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,454,896
Centre for Doctoral Training in Cyber Security at Royal Holloway: Renewal of the CS-CDT at RHULCid, Professor CRoyal Holloway, Univ of LondonInformation Security 3,454,896
Coalgebraic Foundations of Semi-Structured DataKupke, Dr CUniversity of StrathclydeComputer and Information Sciences 99,423
Combining Qualitative and Quantitative Reasoning for Logic-based GamesWooldridge, Professor MUniversity of OxfordComputer Science 271,272
Combining Viewpoints in Quantum TheoryHeunen, Dr CUniversity of EdinburghSch of Informatics 298,236
Communicating and evaluating cyber risk and dependenciesBloomfield, Professor RCity, University of LondonCentre for Software Reliability 402,738
Compositional Higher-Order Model Checking: Logics, Models and AlgorithmsOng, Professor CHLUniversity of OxfordComputer Science 630,834
Computational Creativity TheoryColton, Professor SFalmouth UniversityGames Academy 438,505
Computing with Liquid MarblesAdamatzky, Professor AUniversity of the West of EnglandFaculty of Environment and Technology 727,811
Contextuality as a Resource in Quantum ComputationAbramsky, Professor SUniversity of OxfordComputer Science 320,381
Contextuality as a Resource in Quantum ComputationSeverini, Dr SUCLComputer Science 300,605
Conversation-Based Governance for Distributed Systems by Multiparty Session TypesYoshida, Professor NImperial College LondonDept of Computing 1,500,660
Counter Automata: Verification and SynthesisWorrell, Professor JBUniversity of OxfordComputer Science 241,539
CRITiCaL - Combatting cRiminals In The CLoudGross, Dr TRNewcastle UniversityComputing Sciences 2,027,646
CSIT 2McCanny, Professor JVQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 5,032,504
Customized and Adaptive approach for Optimal Cybersecurity InvestmentMalacaria, Professor PQueen Mary, University of LondonSch of Electronic Eng & Computer Science 388,777
Customized and Adaptive approach for Optimal Cybersecurity InvestmentHankin, Professor CImperial College LondonInstitute for Security Science and Tech 386,129
Cyber Security CDT Phase Two (University of Oxford)Martin, Professor AUniversity of OxfordComputer Science 3,489,111
Cyber Security CDT Phase Two (University of Oxford)Martin, Professor AUniversity of OxfordComputer Science 3,489,111
DeepSecurity - Applying Deep Learning to Hardware SecurityO'Neill, Professor MQueen's University of BelfastSch of Electronics, Elec Eng & Comp Sci 765,827
Efficient Software Verification by Reasoning about AbstractionsSchrammel, Dr PUniversity of SussexSch of Engineering and Informatics 99,279
Energy Efficient ControlMayr, Dr RMUniversity of EdinburghSch of Informatics 371,397
Energy Efficient ControlSchewe, Professor SUniversity of LiverpoolComputer Science 429,107
EPSRC Centre for Doctoral Training in Cloud Computing for Big DataWatson, Professor PNewcastle UniversityComputing Sciences 3,503,438
EPSRC Centre for Doctoral Training in Data ScienceSutton, Dr CUniversity of EdinburghSch of Informatics 4,726,271
EPSRC Centre for Doctoral Training in Delivering Quantum TechnologiesBrowne, Dr DEUCLLondon Centre for Nanotechnology 5,004,658
EPSRC Centre for Doctoral Training in Pervasive ParallelismO'Boyle, Professor MUniversity of EdinburghSch of Informatics 3,892,290
Fixed-parameter tractability for geometric optimization problemsGiannopoulos, Dr PMiddlesex UniversitySchool of Science and Technology 95,860
FORGING: Fortuitous Geometries and Compressive LearningKaban, Dr AUniversity of BirminghamSchool of Computer Science 876,859
Framework for Computational PersuasionHunter, Professor AUCLComputer Science 556,693
From Data Types to Session Types---A Basis for Concurrency and DistributionWadler, Professor PUniversity of EdinburghSch of Informatics 3,956,088
Glass Houses: Transparency and Privacy in Information EconomiesMeiklejohn, Ms SUCLComputer Science 969,096
Higher Categories for Compositional Computer ScienceVicary, Dr JOUniversity of OxfordComputer Science 529,854
Homotopy Type Theory: Programming and VerificationGambino, Dr NUniversity of LeedsPure Mathematics 93,134
Homotopy Type Theory: Programming and VerificationAltenkirch, Dr TUniversity of NottinghamSchool of Computer Science 408,815
Homotopy Type Theory: Programming and VerificationGhani, Professor NUniversity of StrathclydeComputer and Information Sciences 499,631
Hybrid quantum and classical computation: exploiting the best of both paradigmsKendon, Dr VMDurham, University ofPhysics 1,047,712
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsGarcia Quiles, Dr SUniversity of EdinburghSch of Mathematics 448,386
IP-MATCH: Integer Programming for Large and Complex Matching ProblemsManlove, Dr DFUniversity of GlasgowSchool of Computing Science 353,253
IRIS : Multi-Party ComputationSmart, Professor NUniversity of BristolComputer Science 70,471
Logical Relations for Program VerificationGhani, Professor NUniversity of StrathclydeComputer and Information Sciences 442,444
Machine Learning, Robust Optimisation, and Verification: Creating Synergistic Capabilities in Cybersecurity ResearchHuth, Professor MRImperial College LondonDept of Computing 202,161
Manchester Centre for Doctoral Training in Computer ScienceFurber, Professor S BUniversity of Manchester, TheComputer Science 2,206,082
MathSoMac: the social machine of mathematicsMartin, Professor UHUniversity of OxfordComputer Science 1,146,391
Mind the Gap: Unified Reasoning About Program Correctness and EfficiencyHutton, Professor GUniversity of NottinghamSchool of Computer Science 411,980
MobSec: Malware and Security in the Mobile AgeCavallaro, Dr LRoyal Holloway, Univ of LondonInformation Security 747,777
Modelling and Optimisation with GraphsProsser, Dr PUniversity of GlasgowSchool of Computing Science 673,092
Multilinear Maps in CryptographyPaterson, Professor KGRoyal Holloway, Univ of LondonMathematics 519,992
New insights in quantum algorithms and complexityMontanaro, Dr AUniversity of BristolMathematics 841,259
Next generation pattern matchingClifford, Dr RUniversity of BristolComputer Science 941,287
Non-linearity as a universal resource for quantum computation over continuous variablesFerraro, Dr AQueen's University of BelfastSch of Mathematics and Physics 99,063
Oxford University Centre for Doctoral Training in Cyber SecurityMartin, Professor AUniversity of OxfordComputer Science 3,662,582
Perturbation Analysis for Probabilistic VerificationChen, Dr TMiddlesex UniversitySchool of Science and Technology 100,991
Perturbation Analysis for Probabilistic VerificationChen, Dr TMiddlesex UniversitySchool of Science and Technology 100,991
Polytope methods in parameterized complexityWahlström, Dr M ARoyal Holloway, Univ of LondonComputer Science 100,848
Polytope methods in parameterized complexityWahlström, Dr M ARoyal Holloway, Univ of LondonComputer Science 100,848
Program Logics for Compositional Specification and Verification of Distributed SystemsSergey, Dr I IUCLComputer Science 101,009
QuTie: reasoning with Quantifiers and TheoriesVoronkov, Professor AUniversity of Manchester, TheComputer Science 359,372
Randomized Algorithms for Computer NetworksCooper, Professor CKings College LondonInformatics 312,174
Randomized algorithms for computer networksDyer, Professor MEUniversity of LeedsSch of Computing 146,167
Reachability problems for words, matrices and maps: Algorithms and ComplexityPotapov, Dr IUniversity of LiverpoolComputer Science 453,237
REMS: Rigorous Engineering for Mainstream SystemsSewell, Professor PMUniversity of CambridgeComputer Laboratory 5,575,635
Rigorous Runtime Analysis of Bio-Inspired ComputingOliveto, Dr PSUniversity of SheffieldComputer Science 1,266,592
Risk Measures for MDPsHan, Dr TBirkbeck CollegeComputer Science and Information Systems 101,113
SCEPTICS: A SystematiC Evaluation Process for Threats to Industrial Control SystemsRoberts, Professor CUniversity of BirminghamElectronic, Electrical and Computer Eng 395,222
Science of Sensor System SoftwareCalder, Professor MUniversity of GlasgowSchool of Computing Science 4,183,694
Security and Privacy in Smart Grid Systems: Countermeasure and Formal VerificationMartin, Professor AUniversity of OxfordComputer Science 202,914
Security by Design for Interconnected Critical InfrastructuresChana, Dr DImperial College LondonInstitute for Security Science and Tech 203,506
Self-repairing hardware paradigms based on astrocyte-neuron modelsMcDaid, Professor LJUniversity of UlsterSch of Computing & Intelligent Systems 375,835
Self-repairing Hardware Paradigms based on Astrocyte-neuron ModelsHalliday, Dr DUniversity of YorkElectronics 683,915
Semantic Types for Verified Program BehaviourLaird, Dr JUniversity of BathComputer Science 265,061
Solving Parity Games in Theory and PracticeJurdzinski, Dr MUniversity of WarwickComputer Science 347,959
Solving Parity Games in Theory and PracticeSchewe, Professor SUniversity of LiverpoolComputer Science 409,109
Strengthening anonymity in messaging systemsDanezis, Dr GUCLComputer Science 175,975
Structure of Hereditary Graph Classes and Its Algorithmic ConsequencesVuskovic, Professor KUniversity of LeedsSch of Computing 570,417
Sublinear Algorithms for Big GraphsCzumaj, Professor AUniversity of WarwickComputer Science 490,032
System-Level Game Semantics: A unifying framework for composing systemsGhica, Dr DRUniversity of BirminghamSchool of Computer Science 334,312
System-Level Game Semantics: A unifying framework for composing systemsTzevelekos, Dr NQueen Mary, University of LondonSch of Electronic Eng & Computer Science 326,972
The Integration and Interaction of Multiple Mathematical Reasoning ProcessesIreland, Professor AHeriot-Watt UniversityS of Mathematical and Computer Sciences 1,304,455
Trust and Security in NumbersSmart, Professor NUniversity of BristolComputer Science 1,509,984
Trusted and Transparent Voting SystemsSchneider, Professor SAUniversity of SurreyComputing Science 614,484
Verification of Concurrent and Higher-Order Recursive ProgramsHague, Dr MRoyal Holloway, Univ of LondonComputer Science 469,677
Verification of Linear Dynamical SystemsWorrell, Professor JBUniversity of OxfordComputer Science 1,005,506
Vulnerability Discovery using Abduction and InterpolationKing, Professor AUniversity of KentSch of Computing 199,130
WHole Animal Modelling (WHAM): Toward the integrated understanding of sensory motor control in C. elegansCohen, Professor NUniversity of LeedsSch of Computing 1,185,968

Total Number of Grants: 114
Total Value of Grants: £104,144,090

The grant value may include the cost of access to facilities (these funds are not awarded to the grant holding organisation).