XPRSenumerations.CutStrategy
- java.lang.Object
-
- com.dashoptimization.XPRSenumerations.EnumerationEntry
-
- com.dashoptimization.XPRSenumerations.CutStrategy
-
- Enclosing interface:
- XPRSenumerations
public static final class XPRSenumerations.CutStrategy extends XPRSenumerations.EnumerationEntry
An enumeration of 'CUTSTRATEGY' - all instances of this enumeration will be drawn from the constant objects defined in this class.
-
-
Field Summary
Modifier and Type Field and Description static XPRSenumerations.CutStrategy
AGGRESSIVE
static XPRSenumerations.CutStrategy
CONSERVATIVE
static XPRSenumerations.CutStrategy
DEFAULT
static XPRSenumerations.CutStrategy
MODERATE
static XPRSenumerations.CutStrategy
NONE
-
Method Summary
Modifier and Type Method and Description static XPRSenumerations.CutStrategy
fromValue(int val)
Get enumeration entry from numeric value-
Methods inherited from class com.dashoptimization.XPRSenumerations.EnumerationEntry
equals, getName, getValue, toString
-
-
-
-
Field Detail
-
DEFAULT
public static final XPRSenumerations.CutStrategy DEFAULT
-
NONE
public static final XPRSenumerations.CutStrategy NONE
-
CONSERVATIVE
public static final XPRSenumerations.CutStrategy CONSERVATIVE
-
MODERATE
public static final XPRSenumerations.CutStrategy MODERATE
-
AGGRESSIVE
public static final XPRSenumerations.CutStrategy AGGRESSIVE
-
-
Method Detail
-
fromValue
public static XPRSenumerations.CutStrategy fromValue(int val)
Get enumeration entry from numeric value
-
-
© 2001-2019 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.