ConstraintDefinition Class
Namespace: Optimizer.Objects
Assembly: xprsdn (in xprsdn.dll) Version: 45.01.02+1f9fd7ff9a8620394fec1839699751312debed40
public abstract class ConstraintDefinition<C> where C : IIndex
Type Parameters
- C
The ConstraintDefinitionC type exposes the following members.
Name | Description | |
---|---|---|
![]() |
ConstraintDefinitionC | Create a new constraint. |
Name | Description | |
---|---|---|
![]() |
CheckModify | Check whether this constraint can be modified. If the constraint was already extracted, it can no longer be modified and an exception will be raised. |
![]() |
Create | Create this constraint using creator. |
![]() |
CreateInternal | Create this constraint using creator. |
![]() |
Equals | Determines whether the specified object is equal to the current object. (Inherited from Object) |
![]() |
Finalize | Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object) |
![]() |
GetHashCode | Serves as the default hash function. (Inherited from Object) |
![]() |
GetName | Get the name of this constraint. |
![]() |
GetType | Gets the Type of the current instance. (Inherited from Object) |
![]() |
MemberwiseClone | Creates a shallow copy of the current Object. (Inherited from Object) |
![]() |
SetConstraintName | Set the name of this constraint. |
![]() |
ToString | Returns a string that represents the current object. (Inherited from Object) |
Reference
© 2001-2025 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.