Suggested Topics within your search.
Suggested Topics within your search.
human
361
Humans
260
male
245
female
234
executive function
201
adult
200
controlled study
151
Article
146
Male
136
Female
129
article
128
human experiment
102
physiology
98
Executive Function
93
Adult
91
young adult
78
cognition
77
TK Electrical engineering. Electronics Nuclear engineering
74
Young Adult
70
adolescent
67
QA75 Electronic computers. Computer science
66
clinical article
63
major clinical study
63
child
62
diagnostic imaging
61
Adolescent
59
attention
58
Cognition
56
nuclear magnetic resonance imaging
56
Child
53
-
61
-
62
-
63
-
64
-
65
-
66
-
67
-
68by William Steel Lofquist“...The stories of those who have been executed in the Bahamas are heretofore untold. In telling...”
Published 2010-07-01
Get full text
Article -
69Published 2018Subjects: “...Executing...”
Open Access: DOAB: description of the publication
Open Access: DOAB, download the publication
eBook -
70
-
71“...In this paper, we study the optimal execution problem by considering the trading signal...”
Get full text
Article -
72by Caroline Monteiro, Quelli Cristina Cecatto, Daniela Do Amaral Oliveira Gardin“... is necessary. This article aimed to verify how the Executive Secretariat professional with his/her...”
Published 2015-08-01
Get full text
Article -
73“... and management, senior executives play an irreplaceable key role in the process of enterprise transformation...”
Get full text
Article -
74by BIANCA SNAIDERMAN“... coaching executivo de fato gera aprendizado individual. === [en] Executive coaching appeared...”
Published 2010
Get full text
Get full text
Get full text
-
75by Butko, Monica A.Subjects: “...Executive Master of Business Administration and Female Executives...”
Published 2016
Get full text
-
76by Warren, ElizabethSubjects: “...Executive coaching--South Africa...”
Published 2017
Get full text
Get full text
Others -
77
-
78“..., analysis of executable code is a more challenging task that is not fully covered by existing tools...”
Get full text
Article -
79by Igor G. Fedorov“...Executable business process models, as well as programs, require evidence of a defect-free finish...”
Published 2016-08-01
Get full text
Article -
80“... by executing arbitrary commands. The wide use of obfuscation and encryption technologies has greatly increased...”
Get full text
Article