You can download and install the required version of gcc and then make the
following change in otcl-1.13/Makefile.in :
"CC=@CC@" to "CC=gcc-x.y" putting in the required version instead of the x.y
Hope this helps!

On Fri, Oct 7, 2011 at 5:30 AM, <ns-users-requ...@isi.edu> wrote:

> Send Ns-users mailing list submissions to
>        ns-users@isi.edu
>
> To subscribe or unsubscribe via the World Wide Web, visit
>        http://mailman.isi.edu/mailman/listinfo/ns-users
> or, via email, send a message with subject or body 'help' to
>        ns-users-requ...@isi.edu
>
> You can reach the person managing the list at
>        ns-users-ow...@isi.edu
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ns-users digest..."
>
>
> Today's Topics:
>
>   1. 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart,
>      Germany (Cristina Pascual)
>   2. How to install NS2.28 in Ubuntu 10.04 if i have ns2.34? (Roc?o R)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 6 Oct 2011 16:46:52 +0200
> From: Cristina Pascual<cris.pascual.gonza...@gmail.com>
> Subject: [ns] 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 -
>        Stuttgart,      Germany
> To: ns-users@isi.edu
> Message-ID: <201110061446.p96ekplw021...@smtp.upv.es>
> Content-Type: text/plain; charset=us-ascii
>
>
> INVITATION:
>
> =================
> Please, consider to contribute to and/or forward to the appropriate groups
> the following opportunity to submit and publish original scientific results
> to ICIMP 2012.
> The submission deadline is set to January 5, 2012.
> In addition, authors of selected papers will be invited to submit extended
> article versions to one of the IARIA Journals:
> http://www.iariajournals.org
> =================
>
>
> ============== ICIMP 2012 | Call for Papers ===============
>
> CALL FOR PAPERS, TUTORIALS, PANELS
>
> ICIMP 2012, The Seventh International Conference on Internet Monitoring and
> Protection
>
> May 27 - June 1, 2012 - Stuttgart, Germany
>
> General page: http://www.iaria.org/conferences2012/ICIMP12.html
>
> Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html
>
> - regular papers
> - short papers (work in progress)
> - posters
> - ideas
>
>
> Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html
>
> Submission deadline: January 5, 2012
>
> Sponsored by IARIA, www.iaria.org
>
>
> Extended versions of selected papers will be published in IARIA Journals:
> http://www.iariajournals.org
>
>
> Please note the Poster and Work in Progress options.
>
> The topics suggested by the conference can be discussed in term of
> concepts, state of the art, research, standards, implementations, running
> experiments, applications, and industrial case studies. Authors are invited
> to submit complete unpublished papers, which are not under review in any
> other conference or journal in the following, but not limited to, topic
> areas.
>
>
> All tracks are open to both research and industry contributions, in terms
> of Regular papers, Posters, Work in progress, Technical/marketing/business
> presentations, Demos, Tutorials, and Panels.
>
> Before submission, please check and conform with the Editorial rules:
> http://www.iaria.org/editorialrules.html
>
>
> ICIMP 2012 Topics (topics and submission details: see CfP on the site)
>
>
> TRASI: Internet traffic surveillance and interception
> Methods and context to classify legal and illegal traffic; Methods and
> procedure to classify wanted and undesired traffic; Overloads, attacks, and
> failures; Detection of attacks via protocols and applications; Undesired
> traffic evaluation; Traffic identification caused by malicious code (spam,
> virii, and worms, etc.); Traffic profile during disaster recovery; Traffic
> during active emergency services; Early warning on growing undesired
> traffic; Access control and audit detection points; Denial of service;
> Spoofing; Lawful interception; Multi-modal undesired traffic detection;
> Measurements and data mining correlation; Countermeasures on undesired
> traffic
>
> IPERF: Internet performance
> Performance-oriented design; Active and passive performance monitoring;
> Performance metrics and measurements; Measurement-based performance
> evaluation in Internet; System measurement and monitoring; Performance model
> verification and validation; Stochastic modeling (queues,  Petri nets,
> etc.); Statistical performance; Performance of Internet routing; Performance
> optimization; Internet performance prediction; Internet performance
> evaluation studies; Internet performance testbeds; Performance evaluation of
> Web search engines; Performance evaluation of P2P systems
>
> RTSEC: Security for Internet-based real-time systems
> Security and availability of Web Services; Security/Performance trade-off;
> Distributed systems security; Language-based security; Formalisms for
> security and protocol verification; Performance on firewall protected
> real-time systems; Security management in real-time systems; Metrics and
> techniques for security risk assessment; Internet monitoring and response
> security service; Protecting emergency communications from misuse and
> exploitation; Maintaining security in the face of disaster; Intrusion
> prevention and detection systems; Secure networks from web-based threats
>
> DISAS: Disaster prevention and recovery
> Survivable networks on chips; Intrusion detection and defense; Alerting
> systems based on outstanding network events; Recovery methods in various
> networks; Disaster diagnosis and continuity plans; Fighting mechanisms for
> disaster of networks and applications; Global positioning systems; Vehicle
> localization and navigation systems; Disaster relief agencies to perform
> recovery operations; Survivability-driven defense and do-it-yourself
> disaster recovery; Security during disaster recovery; Budgeting disaster
> recovery; Networks emergency services; Reliable emergency communications and
> applications; Response to the networks emergency services; Disaster
> prevention and recovery; Fighting mechanisms for disaster of networks and
> applications; Networks resiliency methods; Recovery in various networks;
> Theory on robust networks; Customer protection and serviceability
> perception; Cost models and business impact; Cultural and legal aspects;
> Future advanced network development and evolutio!
>  n; Standards and guidelines; Lawful
> interception and defense strategies; Security issues with emergency
> services and disaster recovery
>
> EMERG: Networks and applications emergency services
> Survivability architecture for e-commerce; Emergency and non-emergency
> services; Emergency coverage and intermittent services; PSAPs and emergency
> services; Future 911 PSAP message interfaces; Reliable emergency
> communications; Next generation of emergency communications; Response to the
> networks emergency services; Voice emergency notification services
>
> MONIT: End-to-end sampling, measurement, and monitoring
> Internet monitoring techniques and procedures; Monitoring tools, functions,
> and metrics; Combining, filtering, and reporting monitoring metrics; Theory
> and practice on sampling/inversion problem (accuracy, complexity, etc.);
> Distributed and adaptive sampling techniques; Sampling & inverting traffic
> with passive and active systems; Internet end-to-end measurements from a
> sampling perspective; Impact of sampling on anomaly detection; Mechanisms
> for sampling the Internet traffic or collected traces; On-line and off-line
> metrics and measurements; Incident estimation and monitoring; Internet
> access monitoring; Spy software; Internet monitoring, filtering and blocking
> software; Monitoring Internet traffic to optimize network bandwidth; Remote
> monitoring
>
> REPORT: Experiences & lessons learnt in securing networks and applications
> Platforms for electronic distribution of plane tickets; Platforms for
> electronic distribution of hotel booking; Data accuracy; E-trade strengths
> and weaknesses; Malicious spyware; Blocking without quarantining the
> systems/networks; Out-of-band intrusion prevention; Antivirus e-mail
> gateways software; Security and vulnerability engineering
>
> USSAF: User safety, privacy, and protection over Internet
> Countermeasures on fraud prevention; Trust, trust estimators, and trust
> mitigation in public e-business; Customer protection and serviceability
> perception; Privacy impacts of emergency presence services;
> Authentication/authorization; Biometric methodologies and ID Cards; Security
> on hardware and smart cards; Identity management; Automated security
> analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security
> compliance; Public safety, Instance messages; Presence protocols; Priority
> user service
>
> SYVUL: Systems vulnerabilities
> Vulnerability specification languages; System vulnerability assessment;
> Formal methods for safety-critical systems; Prediction capabilities of
> vulnerability discovery models; Highly vulnerable systems; Critical
> vulnerabilities; Errors and configurations leading to vulnerabilities;
> Incident reports and handling; Networks resiliency methods; Capacity
> planning for resilience and emergency; Operational resilience; Theory of
> disaster-tolerant systems; Web service vulnerability; Protocol
> vulnerability; Vulnerabilities in database systems; Vulnerability in control
> systems; Vulnerability analysis and. requirements for the security;
> Vulnerabilities by self-managed sensors; Recovery by disruption resource
> procedures; Common vulnerability scoring systems; Cost models and
> vulnerability business impact
>
> SYDIA: Systems diagnosis
> Diagnosis platforms; Diagnosis policy language; Diagnosis event formats;
> Process algebras for systems diagnosis; Probabilistic diagnosis of
> multiprocessor systems; Self-diagnosis in distributed systems; Cognitive
> system diagnosis; System diagnosis using propagation models; Technical
> intuition in systems diagnosis; Managing conflicts in systems diagnosis;
> Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; Remote
> system diagnosis; Diagnosis licensing; Real-time symptom detection and
> fixing actions; Forensic/real-time/anticipative diagnosis; Diagnosing
> mobility-oriented systems; Diagnosis of discrete event systems; Diagnosis of
> complex dynamical systems
>
> CYBER-FRAUD: Cyber fraud
> Epidemiological models for warware and cyber-crime propagation; Record and
> retrieval of cyber-crimes; Forensic analysis; Cyber-crime prevention;
> Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed
> cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm
> attacks; Spyware and malware; Cyber-pranks, hoaxes; Phishing/Pharming and
> anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and
> security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws
>
> BUSINESS: Business continuity
> Regulatory compliance; Techniques for business continuity planning in the
> real world; Business contingency and resumption planning; Emotional
> continuity management; Semiotic engineering of online services; Emergency
> preparedness for industry and commerce; Updating, auditing and testing
> plans; Reduce downtime with continuous backup; Global connectivity and
> international formats; Web-based planning tools; Automatic high speed
> notification and response for business continuity; Centralized management;
> Businesses continuity planning software; On-demand business transformation
>
> RISK: Risk assessment
> Risk assessment information systems; Modeling risk assessment; Risk
> Assessment methods; Global risk assessment; Qualitative risk assessments;
> Quantitative risk assessment; Challenges in risk assessment; Risk assessment
> for economy; Risk assessment for security of communications systems; Safety
> risk assessment; Health system risk assessment; Integrated risk assessment;
> Planning tools for proactive risk assessment; Risk management; Risk factors
> and economic impact; Risk metrics and calibration; Precaution and risk
> balance; Risk and economic analysis of terrorism events; Risk analysis for
> extreme events; Life cycle assessment in decision making; Environmental risk
> assessment; Credit ratings risk assessment; Risk Assessment statistics &
> numerical data; Risk assessment standards; Risk assessment tools and support
> software
>
> TRUST: Privacy and trust in pervasive communications
> Trust development and management; Engineering requirements for trust
> management; Formalisms for trust specification, verification and validation;
> Logics for the analysis of trust and for reasoning about trust; Legal
> framework for online trust environments; Trust in semantic Web services;
> Reputation systems; Distributed trust management; Trust on anonymous
> documents; Privacy and trust; Trust in collaborative work and risk
> assessment; Risk analysis to assess user trust; Human behaviors in trusted
> environments; Trust in virtual communities; Trust mediation in knowledge
> management; Trust planning and evaluation metrics; Trust policies;
> Self-adaptable trust mechanisms; Identity Management in pervasive
> environments (requirements, levels of abstractions, context, protection,
> etc.); Assurance (compliance, assurance, audit, security requirements)
>
> RIGHT: Digital rights management
> Ontology and frameworks on digital rights management; Digital rights
> property languages; Semantic and encoding of digital rights; Rights
> granularity; Digital right technologies; Digital rights management schemes;
> Federated digital rights management; Distributed digital rights management;
> Copyright protection schemes; Digital rights management ands social norms;
> Faire use, innovation, and competition; Trading fair use for digital rights
> management; Digital rights management and open access; Privacy engineering
> for digital rights management; Value-centered design for digital rights
> management; Free software and digital rights management; P2P and digital
> rights management; Broadband/IPTV content protection and digital rights
> management; Digital right management and content licensing; Digital rights
> management issues in real-time and safety/mission systems; RFID tags for
> digital rights management; Digital rights management in learning systems;
> Legal policy and digital right mana!
>  gement
>
> BIOTEC: Biometric techniques
> Models and techniques for biometric technologies; Finger, facial, iris,
> voice, and skin biometrics; Biometric security; Signature recognition;
> Multimodal biometrics; Verification and identification techniques; Accuracy
> of biometric technologies; Authentication smart cards and biometric metrics;
> Performance and assurance testing; Limitations of biometric technologies;
> Biometric card technologies; Biometric wireless technologies; Biometric
> software and hardware; Biometric standards
>
> EMDRM: Enterprise & Media DRM
> Digital Policy Management; Enterprise Rights Management (adoption and case
> studies); DRM Interoperability; Operational Risk Management; Compliance and
> Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate Governance;
> Content and Knowledge Management (financial, CAD, IP, trade secrets, etc.);
> Interorganizational System (IOS); Retention Policies and Classification;
> Traceability, Monitoring, tracking, usage metering, audit trails
>
> ----------------------------------
> Technical Program Committee
> http://www.iaria.org/conferences2012/ComICIMP12.html
> ====================
>
>
>
> ------------------------------
>
> Message: 2
> Date: Thu, 6 Oct 2011 13:57:46 -0500
> From: Roc?o R <rira1...@hotmail.com>
> Subject: [ns] How to install NS2.28 in Ubuntu 10.04 if i have ns2.34?
> To: <ns-users@isi.edu>
> Message-ID: <col103-w587ccd73eb18edc1c7fd8bcf...@phx.gbl>
> Content-Type: text/plain; charset="iso-8859-1"
>
>
> I want to install NS2.28  in Ubuntu 10.04 where i have ns2.34 working with
> gcc-4.3
>
> Someone can help me?
>
> I read that NS2.28 requires an older version of gcc.
> How can I install the two versions of gcc and make sure that each version
> of ns uses the correct gcc version?
>
> Thanks
>
>
> ------------------------------
>
> _______________________________________________
> Ns-users mailing list
> Ns-users@isi.edu
> http://mailman.isi.edu/mailman/listinfo/ns-users
>
>
> End of Ns-users Digest, Vol 94, Issue 6
> ***************************************
>

Reply via email to