WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 7 | 8 ||

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 9 ] --

• Consortia agreements are required for all actions.

• Particular requirements for participation, evaluation and implementation:

The minimum number of participating entities required, for all funding schemes, is set out in the Rules for Participation: For Collaborative projects, the minimum condition shall be the participation of 3 legal entities, each of which is established in a Member State or Associated Country and no two of which are established in the same Member State or Associated Country. For Coordination and Supporting Actions aiming at supporting research activities and policies the minimum condition shall be the participation of one legal entity. For Coordination and Supporting Actions aiming at coordinating research activities and policies the minimum condition shall be the participation of three legal entities, each of which is established in a Member State or Associated Country, and no two of which are established in the same Member State or Associated Country.

Proposers should indicate in which of the two specific foci of the call their proposal best fits. There will be a joint evaluation of proposals submitted under the two specific foci.

During the evaluation, evaluators could move, in a transparent manner, proposals from one specific focus to the other, if they consider that a proposal would fit better there and that this would be to the benefit of the proposers.

Proposals must not contain any classified information, this will immediately lead to declaring them ineligible (note that the proposed action itself can involve classified information).

If classified inputs are required to carry out a proposed action or the output of the action needs to be classified, proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.

Proposers addressing topics of the specific focus 2 and claiming that their proposal should receive Community funding up to 75% should demonstrate in the proposal that the required conditions (very limited market size and a risk of "market failure", the need for accelerated equipment development in response to new threats) apply. The final decision will be based on the recommendations of the relevant evaluation panel.

Consortia are strongly encouraged to actively involve SMEs and end users. Their presence in the consortia will be judged under the evaluation criterion ‘Quality and efficiency of the implementation and the management’ with a view to meeting the main objectives of the theme.

The evaluation panel will comprise end users as well.

Page 51 of 53 FP 7 Cooperation Work Programme: Security

The evaluation criteria (including weights and thresholds) and sub-criteria, together with the eligibility, selection and award criteria for the different funding schemes are set out in Annex 2 to this work programme.

Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.

As a result of the evaluation, a ranked list of proposals retained for funding will be drawn up as well as a reserve list of proposals that may be funded in case budget becomes available during negotiations.

The forms of grants which will be offered are specified in Annex 3 to the Cooperation work programme

–  –  –

IV INDICATIVE PRIORITIES FOR FUTURE CALLS

Indicative roadmap of future calls 12/2006: Security Research Call 1 08/2007: Joint Call ICT & Security 1 06/2008: Security Research Call 2 06/2009: Security Research Call 3 09/2009 Optional Call (for Demonstration projects phases 2) 06/2010: Security Research Call 4 09/2010 Optional Call (for Demonstration projects phases 2) 06/2011: Security Research Call 5 06/2012: Security Research Call 6 Indicative approach of future calls

• Security Research Call 2 will be open for the first phases of two to three more demonstration projects and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.

The demonstration projects (phase 1 only) called for will be in Activity 1: Security of citizens o Logistic and supply chain security o CBRNE (Chemical, Biological, Radiological, Nuclear agents and Explosives) in Activity 4: Restoring security and safety in case of crisis o Aftermath crisis management system The integration projects called for will be those called for but not sufficiently covered by

the first call, as well as:

–  –  –

For more information on these demonstration and integration project topics, the ESRAB report can be consulted.

The capability projects called for will be selected from those not yet sufficiently covered by the first call, as well as those recommended by ESRAB but not included in the first call.

• Security Research Call 3 will be open for the second phases of the demonstration projects* called for in Security Research Call 1 and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.

• Security Research Call 4 will be open for the second phases of the demonstration projects* called for in Security Research Call 2 and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.

* If required, additional calls to the main annual calls can be launched especially with a view to the second phases of demonstration projects.

• Security Research Calls 5 and 6 will offer reserve opportunities for the second phases of the demonstration projects called for in Security Research Calls 1 and 2, in case no proposal will have been selected for funding in earlier calls, and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.

All calls will follow the building block approach of the Security theme. While focussing on the demonstration projects, these will be supported and enabled by the output of the capability and integration projects.

On the level of the capability projects, future calls will invite actions along the following

functions, which group the capabilities as required in all security missions:

Function A: Risk assessment, modelling & impact reduction Function B: Doctrine & operation Function C: Training & exercises Function D: Detection, identification & authentication Function E: Positioning & localisation Function F: Situation awareness & assessment (surveillance) Function G: Information management Function H: Intervention & neutralisation Function I: Communication Function J: Command & control Function K: Incident response

–  –  –



Pages:     | 1 |   ...   | 7 | 8 ||


Similar works:

«December 2010 Exposure Draft ED/2010/13 Hedge Accounting Comments to be received by 9 March 2011 Exposure Draft HEDGE ACCOUNTING Comments to be received by 9 March 2011 ED/2010/13 This exposure draft Hedge Accounting is published by the International Accounting Standards Board (IASB) for comment only. The proposals may be modified in the light of the comments received before being issued in final form as amendments to IFRS 9 Financial Instruments. Comments on the exposure draft and the Basis...»

«MESSAGE FROM THE CONFERENCE CO-CHAIRS Welcome to the 11th Annual CGC Graduate Conference: Play/Rewind. We are excited to welcome presenters from across Canada and internationally to explore this year’s theme and share their research. With a broad range of academic disciplines and scholarly traditions represented, we would like to thank all of this year’s participants for helping the conference continue to grow in size and stature. This conference is made possible thanks to a great deal of...»

«Bausch & Lomb Incorporated Educational Brochure P/N 50-0065, Revision B, p.1 PATIENT LABELING Table of Contents Page Introducing Crystalens® 2 What is a cataract 3 How the eye works Vision restoration options 5 Are you a candidate for the Crystalens? 9 What to expect 9 Getting the best result 10 Frequently asked questions 12 Glossary of terms 17 Bausch & Lomb Incorporated Educational Brochure P/N 50-0065, Revision B, p.2 Introducing Crystalens® Your physician has selected you as a good...»

«Publish data Protists Algae Amoebas Plankton And Or books document, also Download PDF Protists Algae Amoebas Plankton And Or digital file PROTISTS ALGAE AMOEBAS PLANKTON AND OR PDF Enjoy ways of help documentation is really a hard copy manual that's printed protists algae amoebas plankton and or PDF nicely bound, and functional. It operates as a reference manual skim the TOC or index, get the page, and stick to the directions detail by detail. The challenge using these sorts of documents is the...»

«Galvas, J. M. (2010). Does the use of differentiated performance tasks following Gardner’s multiple intelligences theory improve my high school science students’ opportunity to demonstrate their achievement? Wisdom of Practice: An Online Journal of Action Research. Does the use of differentiated performance tasks following Gardner’s multiple intelligences theory improve my high school science students’ opportunity to demonstrate their achievement? Jason M. Galvas, Ed.M. Washington State...»

«Partial melting and melt segregation in a convecting mantle by Harro Schmeling* Department of Geology and Geophysics, SOEST, University of Hawaii at Manoa, Honolulu, USA * permanent address: Institute of Meteorology and Geophysics, J.W. Goethe University, Frankfurt, Germany in: Physics and Chemistry of Partially Molten Rocks, ed. N. Bagdassarov, D. Laporte, A. B. Thompson, Kluwer Academic Publisher, Dordrecht, 2000 Abstract Various causes for mantle melting (decompression, heating or release of...»

«Access Control in the Web Dieter Gollmann Hamburg University of Technology NISNet Winter School 2010, Finse Quoting Virgil Gligor. IT keeps posing new security challenges. It takes about 10 years to get a good understanding and solid solutions for a given new challenge. At that time, the next new challenges have emerged. Researchers spend the next ten to twenty years on perfecting solutions for the old new challenge. Where are fairly new security challenges? Jim Massey: The difficult problems...»

«UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING Dale Miller Computer and Information Science Department University of Pennsylvania, Philadelphia, PA 19104 Gopalan Nadathur Computer Science Department Duke University, Durham, NC 27706 Frank Pfenning Computer Science Department Carnegie Mellon University, Pittsburgh, PA 15213 Andre Scedrov Mathematics Department University of Pennsylvania, Philadelphia, PA 19104 Abstract: A proof-theoretic characterization of logical languages that form...»

«OPJS UNIVERSITY,CHURU(RAJASTHAN) SYLLABUS For Bachelor of Computer Applications (BCA) * School of Computer Science & IT Opjs University,Churu(Rajasthan) 2014-15 ~*~ YEARLY SCHEME OF EXAMINATION BCA COURSE (I-Year) S.No. Paper Code Name of Papers M.M.(T./S./P.) 1. BCA-101 Introduction To Information Technology 70+30 2. BCA-102 Pc Software Packages 70+30 3. BCA-103 Problem Solving Through ‘C’ Programming 70+30 4. BCA-104 Basic Electronics 70+30 5. BCA-105 Basic Mathematics 70+30 6. BCA-106...»

«Housing Authority of the County of San Bernardino, San Bernardino, CA Shelter Plus Care Program Office of Audit, Region 9 Audit Report Number: 2015-LA-1004 Los Angeles, CA May 29, 2015 To: William G. Vasquez, Director, Office of Community Planning and Development, Los Angeles, 9DD //SIGNED// From: Tanya E. Schulze, Regional Inspector General for Audit, 9DGA Subject: The Housing Authority of the County of San Bernardino, San Bernardino, CA, Used Shelter Plus Care Program Funds for Ineligible and...»

«NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. A-4442-11T2 MATTHEW J. BARRICK, JR., APPROVED FOR PUBLICATION May 1, 2013 Appellant, APPELLATE DIVISION v. STATE OF NEW JERSEY, DEPARTMENT OF TREASURY, DIVISION OF PROPERTY MANAGEMENT AND CONSTRUCTION, Respondent. _ Argued: April 17, 2013 – Decided: May 1, 2013 Before Judges Axelrad, Sapp-Peterson and Happas. On appeal from the Division of Property Management and...»

«State Bank FreedoM: Frequently Asked Questions GENERAL CATEGORY What is State Bank Freedom? State Bank Freedom is Mobile Banking Service provided by State Bank Group. It helps you to do following banking transactions: Balance Enquiry of accounts enabled for Mobile Banking Mini statement (last five transactions) of your accounts enabled for mobile banking services Fund transfer within the Bank from one account to another Fund transfer to accounts of other banks using NEFT scheme of RBI. Fund...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.