CISE Cross-Cutting Programs: FY 2010
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/greenline.jpg)
CONTACTS
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/bluefade.jpg)
Name |
Email |
Phone |
Room |
Darleen
L.
Fisher |
dlfisher@nsf.gov |
(703) 292-8950 |
1175N |
Jim
French |
jfrench@nsf.gov |
(703) 292-8930 |
1125S |
Karl
Levitt |
klevitt@nsf.gov |
(703) 292-8950 |
1175N |
In addition to the Program Officers identified as program points of contact above, the following CISE Program Officers also support the cross-cutting programs as indicated below: Data-Intensive Computing (DC) Network Science and Engineering (NetSE) Trustworthy Computing (TC) |
PROGRAM GUIDELINES
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/bluefade.jpg)
Solicitation
09-558
Please be advised that the NSF Proposal & Award Policies & Procedures Guide (PAPPG) includes
revised guidelines to implement the mentoring provisions of the America COMPETES Act (ACA)
(Pub. L. No. 110-69, Aug. 9, 2007.) As specified in the ACA, each proposal that requests
funding to support postdoctoral researchers must include a description of the mentoring
activities that will be provided for such individuals. Proposals that do not comply
with this requirement will be returned without review (see the PAPP Guide Part I:
Grant Proposal Guide Chapter II for further information about the implementation of
this new requirement).
DUE DATES
Full Proposal Window: August 1, 2009
-
August 30, 2009
Medium Projects
Full Proposal Window: November 1, 2009
-
November 28, 2009
Large Projects
Full Proposal Window: December 1, 2009
-
December 17, 2009
Small Projects
SYNOPSIS
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/bluefade.jpg)
This solicitation seeks proposals in cross-cutting areas that are scientifically timely, and that benefit from the intellectual contributions of researchers with expertise in a number of computing fields and/or sub-fields. The cross-cutting programs for FY 2010 are: - Data-intensive Computing;
- Network Science and Engineering; and
- Trustworthy Computing.
The full descriptions of these programs can be found in the II. Program Description section of this solicitation. CISE expects that over time, these cross-cutting programs will evolve or be absorbed into the core programs, and that new cross-cutting programs will be introduced. Proposers are invited to submit proposals in three project classes, which are defined as follows: - Small Projects - up to $500,000 total budget with durations up to three years;
- Medium Projects - $500,001 to $1,200,000 total budget with durations up to four years; and
- Large Projects - $1,200,001 to $3,000,000 total budget with durations up to five years.
A more complete description of the project classes can be found in section II. Program Description, of this document. CISE investments in Small, Medium and Large projects complement the directorate’s investments in the Expeditions in Computing program, http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=503169&org=CISE&from=home, where projects are funded at levels of up to $10,000,000 total for durations up to 5 years.
FUNDED AS PART OF THIS ACTIVITY
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/bluefade.jpg)
Data-intensive Computing
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
Network Science and Engineering
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
Trustworthy Computing
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
RELATED URLS
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/bluefade.jpg)
Invitation: Network Science & Engineering (NetSE) Workshop on September 5, 2008
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
2005 Treasury - NSF Workshop on Resilient Financial Information Systems
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
Cyber Security FY04 Summary (text / HTML)
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
Cyber Security FY04 Summary (tabular format)
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
2004 US-Japan Critical Information Infrastructure Protection Workshop
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
2004 Cyber Trust PI Meeting
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
2003 Cyber Trust PI meeting
![](https://webarchive.library.unt.edu/eot2008/20090813233746im_/http://nsf.gov/images/x.gif)
Abstracts of Recent Awards Made Through This Program
News
|