did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780198528609

Avoiding Attack The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry

by ; ;
  • ISBN13:

    9780198528609

  • ISBN10:

    0198528604

  • Format: Paperback
  • Copyright: 2005-02-03
  • Publisher: Oxford University Press
  • View Upgraded Edition
  • Purchase Benefits
List Price: $105.60

Summary

This book discusses the diversity of mechanisms by which prey avoid attack by predators and questions how such defensive mechanisms have evolved through natural selection. It considers how potential prey avoid detection, how they make themselves unprofitable to attack, how they signal theirunprofitability, and how other species have exploited these signals. Using carefully selected examples drawn from a wide range of species and ecosystems, the authors present a critical analysis of the most important published works in the field. Illustrative examples of camouflage, mimicry and warning signals regularly appear in undergraduate ecology textbooks, but these subjects are rarely considered in depth. This book summarises some of the latest research into these fascinating adaptations, developing mathematical models whereappropriate and making recommendations for the most urgently needed outstanding areas of enquiry.

Author Biography


Graeme Ruxton has co-written two books, both published by Oxford University Press - 'Living in Groups' (2002) for the Oxford Series in Ecology and Evolution, and the textbook 'Elementary Experimental Design for the Life Sciences' (2003). He is also the author of over 100 scientific articles. His background in physics provides particular strength in the functional aspects of signalling systems discussed in this book. Tom Sherratt is the author of nearly 50 scientific papers on subjects ranging from the evolution of co-operation, to the maintenance of imperfect mimicry and the evolution of warning signals. His practical background in both tropical and temperate entomology (principally damselflies and mosquitoes) has been of great value in evaluating empirical work in this broad field, whilst his wide interests in evolutionary biology and foraging theory complement those of his co-authors in placing empirical findings within an appropriate theoretical context. Mike Speed has worked for over a decade on the role of predator behaviour in the generation of insect warning signals. He is consulting editor for the journal Animal Behaviour and a member of the education committee of the Association for the Study of Animal Behaviour. His publications span theoretical and empirical studies of mimicry and aposematism.

Table of Contents

Introductionp. 1
Avoiding detectionp. 5
Background matchingp. 7
Why crypsis?p. 7
Industrial melanism in Biston betulariap. 9
Background is a multivariate entityp. 10
Combining background matching with other functionsp. 11
Flicker fusionp. 12
Polymorphism of background matching formsp. 12
A case study: polymorphism in Cepaeap. 13
Polymorphism through neutral selectionp. 13
Positive selection for polymorphismp. 14
Definitions related to frequency-dependent predationp. 14
Search imagesp. 17
Control of search ratep. 18
Comparing search image and search rate mechanismsp. 18
Neutral selection againp. 19
Coping with multiple backgroundsp. 20
Masqueradep. 23
Conclusionp. 25
Disruptive colourationp. 26
Introductionp. 26
Separating disruptive colouration from background matchingp. 27
Empirical evidencep. 27
Conclusionp. 29
Countershading and counterilluminationp. 30
Introductionp. 30
Self-shadow concealment and countershadingp. 30
Direct empirical tests of the advantages of countershadingp. 31
Indirect evidencep. 33
The naked mole-ratp. 33
Countershading in ungulatesp. 34
Countershading in aquatic environmentsp. 34
Counterillumination in marine animalsp. 35
Countershading in aerial, aquatic, and terrestrial systemsp. 36
Conclusionp. 37
Transparency and silveringp. 38
Transparent objects still reflect and refractp. 38
More reasons why perfect transparency need not translate to perfect crypsisp. 39
Polarizationp. 39
Other wavelengths of lightp. 40
Snell's windowp. 41
Imperfect transparency can be effective at low light levelsp. 42
Some parts of an organism cannot be made transparentp. 43
The distribution of transparency across habitatsp. 44
Silvering as a form of crypsisp. 45
Conclusionp. 48
Avoiding attack after detectionp. 49
Secondary defencesp. 51
The diversity of secondary defencesp. 51
Costs and benefits of some behavioural and morphological secondary defencesp. 53
Behavioural defencesp. 53
Morphological and other mechanical defencesp. 54
Chemical defencesp. 55
Some characteristics of chemical defencesp. 56
Are chemical defences costly?p. 59
Costs, benefits, and forms of defencep. 63
The evolution of defencesp. 64
Evolutionary pathwaysp. 64
Theoretical approaches to the evolution of defencesp. 64
Formal modelling of the evolution of defencesp. 67
Summary and conclusionp. 68
Signalling to predatorsp. 70
Introductionp. 70
Signalling that an approaching predator has been detectedp. 70
Signalling that the prey individual is intrinsically difficult to catchp. 73
Summary of theoretical workp. 75
Empirical evidence from predatorsp. 75
Stotting by gazellep. 75
Upright stance by haresp. 76
Push-up displays by lizardsp. 77
Singing by skylarksp. 77
Predator inspection behaviour by fishp. 77
Calling by antelopep. 78
Fin-flicking behaviour by fishp. 78
Studies where predator behaviour is not reportedp. 79
Tail-flicking by railsp. 79
Tail-signalling by lizardsp. 80
Calling by Diana monkeysp. 80
Snorting in African bovidsp. 81
Tail-flagging by deerp. 81
Barking by deerp. 81
Conclusionp. 81
The form and function of warning displaysp. 82
Characteristics of aposematic warning displaysp. 82
Aposematism does not require complete avoidance by predatorsp. 84
Conspicuous animals are not necessarily aposematicp. 84
Design of aposematic displays I: why conspicuousness?p. 85
The opportunity costs of crypsisp. 87
Forms of secondary defence and the need for conspicuous components of warning displaysp. 87
Design of aposematic displays II: the psychological properties of predatorsp. 89
Unlearnt warinessp. 90
Aposematism and predator learningp. 94
Memorabilityp. 97
Recognitionp. 99
Summaryp. 100
Co-evolution: which came first, conspicuousness or special psychological reponses to conspicuousness?p. 100
Conclusion: designing a warning displayp. 101
The initial evolution of warning displaysp. 104
The initial evolution of aposematism: the problemp. 104
Stochastic-deterministic scenariosp. 105
Spatial aggregationp. 106
Experimental simulations of aggregation effectsp. 108
More complex population and predator models for aposematismp. 108
Individual selection modelsp. 109
Evaluations of predator psychology modelsp. 110
Alternatives to the rare conspicuous mutant scenariop. 111
Sexual selectionp. 111
Defences, optimal conspicuousness and apparencyp. 112
Aposematism originated to advertise 'visible' defencesp. 112
Facultative, density-dependent aposematismp. 112
Simultaneous evolution of defence and conspicuousnessp. 113
Phylogeny and evolutionary historyp. 113
The evolution of aposematism: a trivial question with interesting answers?p. 114
The evolution and maintenance of Mullerian mimicryp. 115
Where Mullerian mimicry fits inp. 115
Chapter outlinep. 115
A brief early history of Mullerian mimicryp. 116
Some potential examples of Mullerian mimicryp. 118
Neotropical Heliconius butterfliesp. 119
European burnet mothsp. 120
Bumble beesp. 120
Cotton stainer bugs (genus Dysdercus)p. 122
Poison arrow frogsp. 122
Experimental evidence for Mullerian mimicryp. 122
Direct assessments of the benefits of adopting a common warning signalp. 122
Proportions of unpalatable prey consumed by naive predators in the course of educationp. 124
Models of Mullerian mimicryp. 126
Questions and controversiesp. 126
Which is the model and which is the mimic?p. 126
How can mimicry evolve through intermediate stages?p. 127
Why are mimetic species variable in form between areas?p. 129
How can multiple Mullerian mimicry rings co-exist?p. 131
What is the role of predator generalization in Mullerian mimicry?p. 134
Why are some Mullerian mimics polymorphic?p. 134
Do Mullerian mutualists only benefit simply from shared predator education?p. 135
Overviewp. 136
Deceiving predatorsp. 137
The evolution and maintenance of Batesian mimicryp. 139
Scopep. 139
Taxonomic distribution of Batesian mimicryp. 140
Examples of Batesian mimicryp. 140
Comparative evidence for Batesian mimicryp. 141
Experimental evidence for Batesian mimicry and its characteristicsp. 142
Predators learn to avoid noxious models and consequently their palatable mimicsp. 142
Palatable prey altered to resemble an unpalatable species sometimes survive better than mock controlsp. 143
Batesian mimics generally require the presence of the model to gain significant protectionp. 144
The relative (and absolute) abundances of the model and mimic affects the rate of predation on these speciesp. 147
The distastefulness of the model affects the rate of predation on the model and mimicp. 148
The model can be simply difficult to catch rather than noxious on capturep. 148
The success of mimicry is dependent on the availability of alternative preyp. 150
Mimics do not always have to be perfect replicas to gain protection, particularly when the model is relatively common or highly noxiousp. 150
Frequency-dependent selection on Batesian mimics can lead to mimetic polymorphismp. 151
The theory of Batesian mimicryp. 152
Questions and controversiesp. 154
Why are not all palatable prey Batesian mimics?p. 154
Is the spatio-temporal coincidence of the models and mimics necessary?p. 155
Why is Batesian mimicry often limited to one sex?p. 156
How is mimicry controlled genetically and how can polymorphic mimicry be maintained?p. 158
Why are imperfect mimics not improved by natural selection?p. 159
How does Batesian mimicry evolve, and why do models simply not evolve away from their mimics?p. 161
What selective factors influence behavioural mimicry?p. 162
Overviewp. 163
The relationship between Batesian and Mullerian mimicryp. 164
Contextp. 164
Evidence of interspecific differences in levels of secondary defencep. 165
Why should weakly defended mimics increase the likelihood that more highly defended models are attacked?p. 166
Predator hungerp. 166
Differences in predatory abilities: the 'Jack Sprat' effectp. 169
Psychological modelsp. 169
Observational data on the nature of the relationship between Batesian and Mullerian mimicryp. 170
Summaryp. 171
Other forms of adaptive resemblancep. 172
Overviewp. 172
Aggressive mimicryp. 172
Pollinator (floral) mimicryp. 174
Intraspecific sexual mimicryp. 175
Automimicryp. 176
The phenomenon of automimicryp. 176
The challenge to theoreticiansp. 179
Summaryp. 182
Deflection and startling of predatorsp. 183
Deflection definedp. 183
Empirical evidence for deflectionp. 183
Lizard tailsp. 183
Tadpole tailsp. 184
Eyespots on fishp. 185
False head marking on butterfliesp. 187
Weasel tailsp. 190
Summary of empirical evidence for deflective signalsp. 190
How can deflective marking evolve if they make prey easier for predators to detect?p. 191
Why do predators allow themselves to be deceived?p. 191
Startle signalsp. 192
General considerationsp. 192
Distress calls as startle signalsp. 193
Visual startle signalsp. 194
Sound generation by moths attacked by batsp. 195
Summary of empirical evidencep. 196
Why would predators be startled?p. 196
Tonic immobilityp. 197
Distraction displaysp. 198
Summaryp. 199
General Conclusionsp. 200
Appendicesp. 202
A summary of mathematical and computer models that deal with Mullerian mimicry
A summary of mathematical and computer models that deal with Batesian mimicry
Referencesp. 210
Author Indexp. 240
Species Indexp. 243
Subject Indexp. 248
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program