You can download and install the required version of gcc and then make the following change in otcl-1.13/Makefile.in : "CC=@CC@" to "CC=gcc-x.y" putting in the required version instead of the x.y Hope this helps!
On Fri, Oct 7, 2011 at 5:30 AM, <ns-users-requ...@isi.edu> wrote: > Send Ns-users mailing list submissions to > ns-users@isi.edu > > To subscribe or unsubscribe via the World Wide Web, visit > http://mailman.isi.edu/mailman/listinfo/ns-users > or, via email, send a message with subject or body 'help' to > ns-users-requ...@isi.edu > > You can reach the person managing the list at > ns-users-ow...@isi.edu > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Ns-users digest..." > > > Today's Topics: > > 1. 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart, > Germany (Cristina Pascual) > 2. How to install NS2.28 in Ubuntu 10.04 if i have ns2.34? (Roc?o R) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 6 Oct 2011 16:46:52 +0200 > From: Cristina Pascual<cris.pascual.gonza...@gmail.com> > Subject: [ns] 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 - > Stuttgart, Germany > To: ns-users@isi.edu > Message-ID: <201110061446.p96ekplw021...@smtp.upv.es> > Content-Type: text/plain; charset=us-ascii > > > INVITATION: > > ================= > Please, consider to contribute to and/or forward to the appropriate groups > the following opportunity to submit and publish original scientific results > to ICIMP 2012. > The submission deadline is set to January 5, 2012. > In addition, authors of selected papers will be invited to submit extended > article versions to one of the IARIA Journals: > http://www.iariajournals.org > ================= > > > ============== ICIMP 2012 | Call for Papers =============== > > CALL FOR PAPERS, TUTORIALS, PANELS > > ICIMP 2012, The Seventh International Conference on Internet Monitoring and > Protection > > May 27 - June 1, 2012 - Stuttgart, Germany > > General page: http://www.iaria.org/conferences2012/ICIMP12.html > > Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html > > - regular papers > - short papers (work in progress) > - posters > - ideas > > > Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html > > Submission deadline: January 5, 2012 > > Sponsored by IARIA, www.iaria.org > > > Extended versions of selected papers will be published in IARIA Journals: > http://www.iariajournals.org > > > Please note the Poster and Work in Progress options. > > The topics suggested by the conference can be discussed in term of > concepts, state of the art, research, standards, implementations, running > experiments, applications, and industrial case studies. Authors are invited > to submit complete unpublished papers, which are not under review in any > other conference or journal in the following, but not limited to, topic > areas. > > > All tracks are open to both research and industry contributions, in terms > of Regular papers, Posters, Work in progress, Technical/marketing/business > presentations, Demos, Tutorials, and Panels. > > Before submission, please check and conform with the Editorial rules: > http://www.iaria.org/editorialrules.html > > > ICIMP 2012 Topics (topics and submission details: see CfP on the site) > > > TRASI: Internet traffic surveillance and interception > Methods and context to classify legal and illegal traffic; Methods and > procedure to classify wanted and undesired traffic; Overloads, attacks, and > failures; Detection of attacks via protocols and applications; Undesired > traffic evaluation; Traffic identification caused by malicious code (spam, > virii, and worms, etc.); Traffic profile during disaster recovery; Traffic > during active emergency services; Early warning on growing undesired > traffic; Access control and audit detection points; Denial of service; > Spoofing; Lawful interception; Multi-modal undesired traffic detection; > Measurements and data mining correlation; Countermeasures on undesired > traffic > > IPERF: Internet performance > Performance-oriented design; Active and passive performance monitoring; > Performance metrics and measurements; Measurement-based performance > evaluation in Internet; System measurement and monitoring; Performance model > verification and validation; Stochastic modeling (queues, Petri nets, > etc.); Statistical performance; Performance of Internet routing; Performance > optimization; Internet performance prediction; Internet performance > evaluation studies; Internet performance testbeds; Performance evaluation of > Web search engines; Performance evaluation of P2P systems > > RTSEC: Security for Internet-based real-time systems > Security and availability of Web Services; Security/Performance trade-off; > Distributed systems security; Language-based security; Formalisms for > security and protocol verification; Performance on firewall protected > real-time systems; Security management in real-time systems; Metrics and > techniques for security risk assessment; Internet monitoring and response > security service; Protecting emergency communications from misuse and > exploitation; Maintaining security in the face of disaster; Intrusion > prevention and detection systems; Secure networks from web-based threats > > DISAS: Disaster prevention and recovery > Survivable networks on chips; Intrusion detection and defense; Alerting > systems based on outstanding network events; Recovery methods in various > networks; Disaster diagnosis and continuity plans; Fighting mechanisms for > disaster of networks and applications; Global positioning systems; Vehicle > localization and navigation systems; Disaster relief agencies to perform > recovery operations; Survivability-driven defense and do-it-yourself > disaster recovery; Security during disaster recovery; Budgeting disaster > recovery; Networks emergency services; Reliable emergency communications and > applications; Response to the networks emergency services; Disaster > prevention and recovery; Fighting mechanisms for disaster of networks and > applications; Networks resiliency methods; Recovery in various networks; > Theory on robust networks; Customer protection and serviceability > perception; Cost models and business impact; Cultural and legal aspects; > Future advanced network development and evolutio! > n; Standards and guidelines; Lawful > interception and defense strategies; Security issues with emergency > services and disaster recovery > > EMERG: Networks and applications emergency services > Survivability architecture for e-commerce; Emergency and non-emergency > services; Emergency coverage and intermittent services; PSAPs and emergency > services; Future 911 PSAP message interfaces; Reliable emergency > communications; Next generation of emergency communications; Response to the > networks emergency services; Voice emergency notification services > > MONIT: End-to-end sampling, measurement, and monitoring > Internet monitoring techniques and procedures; Monitoring tools, functions, > and metrics; Combining, filtering, and reporting monitoring metrics; Theory > and practice on sampling/inversion problem (accuracy, complexity, etc.); > Distributed and adaptive sampling techniques; Sampling & inverting traffic > with passive and active systems; Internet end-to-end measurements from a > sampling perspective; Impact of sampling on anomaly detection; Mechanisms > for sampling the Internet traffic or collected traces; On-line and off-line > metrics and measurements; Incident estimation and monitoring; Internet > access monitoring; Spy software; Internet monitoring, filtering and blocking > software; Monitoring Internet traffic to optimize network bandwidth; Remote > monitoring > > REPORT: Experiences & lessons learnt in securing networks and applications > Platforms for electronic distribution of plane tickets; Platforms for > electronic distribution of hotel booking; Data accuracy; E-trade strengths > and weaknesses; Malicious spyware; Blocking without quarantining the > systems/networks; Out-of-band intrusion prevention; Antivirus e-mail > gateways software; Security and vulnerability engineering > > USSAF: User safety, privacy, and protection over Internet > Countermeasures on fraud prevention; Trust, trust estimators, and trust > mitigation in public e-business; Customer protection and serviceability > perception; Privacy impacts of emergency presence services; > Authentication/authorization; Biometric methodologies and ID Cards; Security > on hardware and smart cards; Identity management; Automated security > analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security > compliance; Public safety, Instance messages; Presence protocols; Priority > user service > > SYVUL: Systems vulnerabilities > Vulnerability specification languages; System vulnerability assessment; > Formal methods for safety-critical systems; Prediction capabilities of > vulnerability discovery models; Highly vulnerable systems; Critical > vulnerabilities; Errors and configurations leading to vulnerabilities; > Incident reports and handling; Networks resiliency methods; Capacity > planning for resilience and emergency; Operational resilience; Theory of > disaster-tolerant systems; Web service vulnerability; Protocol > vulnerability; Vulnerabilities in database systems; Vulnerability in control > systems; Vulnerability analysis and. requirements for the security; > Vulnerabilities by self-managed sensors; Recovery by disruption resource > procedures; Common vulnerability scoring systems; Cost models and > vulnerability business impact > > SYDIA: Systems diagnosis > Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; > Process algebras for systems diagnosis; Probabilistic diagnosis of > multiprocessor systems; Self-diagnosis in distributed systems; Cognitive > system diagnosis; System diagnosis using propagation models; Technical > intuition in systems diagnosis; Managing conflicts in systems diagnosis; > Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; Remote > system diagnosis; Diagnosis licensing; Real-time symptom detection and > fixing actions; Forensic/real-time/anticipative diagnosis; Diagnosing > mobility-oriented systems; Diagnosis of discrete event systems; Diagnosis of > complex dynamical systems > > CYBER-FRAUD: Cyber fraud > Epidemiological models for warware and cyber-crime propagation; Record and > retrieval of cyber-crimes; Forensic analysis; Cyber-crime prevention; > Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed > cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm > attacks; Spyware and malware; Cyber-pranks, hoaxes; Phishing/Pharming and > anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and > security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws > > BUSINESS: Business continuity > Regulatory compliance; Techniques for business continuity planning in the > real world; Business contingency and resumption planning; Emotional > continuity management; Semiotic engineering of online services; Emergency > preparedness for industry and commerce; Updating, auditing and testing > plans; Reduce downtime with continuous backup; Global connectivity and > international formats; Web-based planning tools; Automatic high speed > notification and response for business continuity; Centralized management; > Businesses continuity planning software; On-demand business transformation > > RISK: Risk assessment > Risk assessment information systems; Modeling risk assessment; Risk > Assessment methods; Global risk assessment; Qualitative risk assessments; > Quantitative risk assessment; Challenges in risk assessment; Risk assessment > for economy; Risk assessment for security of communications systems; Safety > risk assessment; Health system risk assessment; Integrated risk assessment; > Planning tools for proactive risk assessment; Risk management; Risk factors > and economic impact; Risk metrics and calibration; Precaution and risk > balance; Risk and economic analysis of terrorism events; Risk analysis for > extreme events; Life cycle assessment in decision making; Environmental risk > assessment; Credit ratings risk assessment; Risk Assessment statistics & > numerical data; Risk assessment standards; Risk assessment tools and support > software > > TRUST: Privacy and trust in pervasive communications > Trust development and management; Engineering requirements for trust > management; Formalisms for trust specification, verification and validation; > Logics for the analysis of trust and for reasoning about trust; Legal > framework for online trust environments; Trust in semantic Web services; > Reputation systems; Distributed trust management; Trust on anonymous > documents; Privacy and trust; Trust in collaborative work and risk > assessment; Risk analysis to assess user trust; Human behaviors in trusted > environments; Trust in virtual communities; Trust mediation in knowledge > management; Trust planning and evaluation metrics; Trust policies; > Self-adaptable trust mechanisms; Identity Management in pervasive > environments (requirements, levels of abstractions, context, protection, > etc.); Assurance (compliance, assurance, audit, security requirements) > > RIGHT: Digital rights management > Ontology and frameworks on digital rights management; Digital rights > property languages; Semantic and encoding of digital rights; Rights > granularity; Digital right technologies; Digital rights management schemes; > Federated digital rights management; Distributed digital rights management; > Copyright protection schemes; Digital rights management ands social norms; > Faire use, innovation, and competition; Trading fair use for digital rights > management; Digital rights management and open access; Privacy engineering > for digital rights management; Value-centered design for digital rights > management; Free software and digital rights management; P2P and digital > rights management; Broadband/IPTV content protection and digital rights > management; Digital right management and content licensing; Digital rights > management issues in real-time and safety/mission systems; RFID tags for > digital rights management; Digital rights management in learning systems; > Legal policy and digital right mana! > gement > > BIOTEC: Biometric techniques > Models and techniques for biometric technologies; Finger, facial, iris, > voice, and skin biometrics; Biometric security; Signature recognition; > Multimodal biometrics; Verification and identification techniques; Accuracy > of biometric technologies; Authentication smart cards and biometric metrics; > Performance and assurance testing; Limitations of biometric technologies; > Biometric card technologies; Biometric wireless technologies; Biometric > software and hardware; Biometric standards > > EMDRM: Enterprise & Media DRM > Digital Policy Management; Enterprise Rights Management (adoption and case > studies); DRM Interoperability; Operational Risk Management; Compliance and > Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate Governance; > Content and Knowledge Management (financial, CAD, IP, trade secrets, etc.); > Interorganizational System (IOS); Retention Policies and Classification; > Traceability, Monitoring, tracking, usage metering, audit trails > > ---------------------------------- > Technical Program Committee > http://www.iaria.org/conferences2012/ComICIMP12.html > ==================== > > > > ------------------------------ > > Message: 2 > Date: Thu, 6 Oct 2011 13:57:46 -0500 > From: Roc?o R <rira1...@hotmail.com> > Subject: [ns] How to install NS2.28 in Ubuntu 10.04 if i have ns2.34? > To: <ns-users@isi.edu> > Message-ID: <col103-w587ccd73eb18edc1c7fd8bcf...@phx.gbl> > Content-Type: text/plain; charset="iso-8859-1" > > > I want to install NS2.28 in Ubuntu 10.04 where i have ns2.34 working with > gcc-4.3 > > Someone can help me? > > I read that NS2.28 requires an older version of gcc. > How can I install the two versions of gcc and make sure that each version > of ns uses the correct gcc version? > > Thanks > > > ------------------------------ > > _______________________________________________ > Ns-users mailing list > Ns-users@isi.edu > http://mailman.isi.edu/mailman/listinfo/ns-users > > > End of Ns-users Digest, Vol 94, Issue 6 > *************************************** >