AbstractSecurityAnalysisExecutionInput() |  | 0% | | n/a | 1 | 1 | 8 | 8 | 1 | 1 |
setOperatorStrategies(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
setActions(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
setMonitors(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
setLimitReductions(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
addResultExtension(String) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
addResultExtensions(Collection) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
addViolationType(LimitViolationType) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
addViolationTypes(Collection) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
addOperatorStrategies(List) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
addActions(List) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setNetworkVariant(Network, String) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setContingenciesSource(ByteSource) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setWithLogs(boolean) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
getContingenciesSource() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getResultExtensions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getViolationTypes() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getOperatorStrategies() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getActions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getMonitors() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getLimitReductions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
getNetworkVariant() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
isWithLogs() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |