A
- ARiAT ARiAT - Advance Reasoning in Arithmetic Theories
B
E
- ELSA ELSA: European Lighthouse for Safe and Secure AI
F
- FAIR FAIR: Framework for Responsible Innovation for Responsible Adoption of AI in the Financial Services Industry
- FUN2MODEL From FUNction-based TO MOdel-based automated probabilistic reasoning for DEep Learning
R
- Reasoning about control
- ReCount -- Prototype
- RoaRQ RoarQ - Robust and Reliable Quantum Computing
S
- Soteria Soteria - Demonstrating the Security Capabilities of the Morello System in the e-commerce Vertical Industrial Segment
A
- Advanced Formal Verification Techniques for Heterogeneous Multi-core Programming
- AFFECTech AFFECTech: Personal Technologies for Affective Health
- Automated quantitative software verification with PRISM
- Automated Verification of Probabilistic Programs
- Autonomous Ubiquitous Sensing
C
- CESAR Cost-efficient methods and processes for safety relevant embedded systems
- CONNECT-IP CONNECT-IP: Emergent Connectors for Eternal Software Intensive Networked Systems
- CPROVER Validation of Concurrent Software Across Abstraction Layers
- CSP Model Checking CSP Model Checking: New Technology and Techniques
E
- Effective Validation of Firmware
- Efficient Verification of Software with Replicated Components
- EPSRC UAV Autonomy New Foundational Structures for Engineering Verified multi-UAVs
F
G
- GAMES GAMES: Games for Design and Verification
- Generalisation Operators for Abstraction-Refinement
- Groebner Basis Techniques for Constraint Satisfaction Problems
M
- Mobile Robotics Mobile Autonomy Programme Grant: Safety, Trust and Integrity
- Model Checking Partially Ordered State Spaces Abstraction Discovery and Refinement for Model Checking Partially Ordered State Spaces
- Model Checking Timed Systems with Restricted Resources: Algorithms and Complexity
- Model-based test generation for embedded systems Model-based Generation of Tests for Dependable Embedded Systems
- Model-Checking for Timed Systems Model-Checking Algorithms for Timed Systems
N
- New Approaches to Security and Model Checking
- Notions of width for directed graphs and hypergraphs Notions of width for directed graphs and hypergraphs: foundations and applications
P
- PINCETTE Validating Changes and Upgrades in Networked Software
- Predictable Software Systems
- PRISMATIC PRISMATIC: Unified Hierarchical Probabilistic Verification Tool
Q
S
- SCorCH SCorCH: Secure Code for Capability Hardware
T
- The Social Machine of Mathematics
- Towards comprehensive verification of stochastic systems
- Transducer-based approach to infinite-state verification A generic transducer-based approach to modelling and verifying infinite systems
- Trust Metrics for SPKI/SDSI
U
- Ubiquitous Computing Shaping an International Grand Challenge Community for Ubiquitous Computing
- UbiVal UbiVal: Fundamental Approaches to Validation of Ubiquitous Computing Applications and Infrastructures
V
- Verification of Shared-Memory Concurrent Software
- Verified Communication Protocols for Multicore/SoC Architectures
- Verifying Properties of the ML Family of Languages
- VERIPACE VERIPACE: Design, Analysis and Synthesis Tools for Cardiac Pacemaker Software
- VERIWARE VERIWARE: From Software Verification to Everyware Verification