Avoiding attack: the evolutionary ecology of crypsis, warning signals, and mimicry
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
2004
|
Schriftenreihe: | Oxford biology
|
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke Literaturverz. S. 210 - 239 |
Beschreibung: | XII, 249 S. Ill., graph. Darst. 26 cm |
ISBN: | 0198528590 0198528604 9780198528593 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV019894650 | ||
003 | DE-604 | ||
005 | 20180823 | ||
007 | t | ||
008 | 050721s2004 xxkad|| |||| 00||| eng d | ||
010 | |a 2005297323 | ||
015 | |a GBA454255 |2 dnb | ||
020 | |a 0198528590 |c hbk. |9 0-19-852859-0 | ||
020 | |a 0198528604 |c pbk. |9 0-19-852860-4 | ||
020 | |a 9780198528593 |9 978-0-19-852859-3 | ||
035 | |a (OCoLC)56644492 | ||
035 | |a (DE-599)BVBBV019894650 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-M49 |a DE-19 |a DE-703 | ||
050 | 0 | |a QL759 | |
082 | 0 | |a 591.47 |2 22 | |
084 | |a WH 3700 |0 (DE-625)148656:13423 |2 rvk | ||
084 | |a BIO 136f |2 stub | ||
100 | 1 | |a Ruxton, Graeme D. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Avoiding attack |b the evolutionary ecology of crypsis, warning signals, and mimicry |c Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed |
264 | 1 | |a Oxford |b Oxford University Press |c 2004 | |
300 | |a XII, 249 S. |b Ill., graph. Darst. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Oxford biology | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
500 | |a Literaturverz. S. 210 - 239 | ||
650 | 7 | |a Camouflage |2 gtt | |
650 | 7 | |a Defensief gedrag |2 gtt | |
650 | 7 | |a Evolutionaire biologie |2 gtt | |
650 | 7 | |a Mimicry |2 gtt | |
650 | 7 | |a Signalen |2 gtt | |
650 | 7 | |a Waarschuwingssystemen |2 gtt | |
650 | 4 | |a Animal defenses | |
650 | 0 | 7 | |a Tarnung |0 (DE-588)4184477-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ökologie |0 (DE-588)4043207-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Abwehr |0 (DE-588)4141194-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mimikry |0 (DE-588)4169992-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ökologie |0 (DE-588)4043207-5 |D s |
689 | 0 | 1 | |a Tarnung |0 (DE-588)4184477-4 |D s |
689 | 0 | 2 | |a Mimikry |0 (DE-588)4169992-0 |D s |
689 | 0 | 3 | |a Abwehr |0 (DE-588)4141194-8 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Sherratt, Thomas N. |e Verfasser |0 (DE-588)1165260069 |4 aut | |
700 | 1 | |a Speed, Michael P. |e Verfasser |0 (DE-588)1165260328 |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/toc/fy053/2005297323.html |3 Table of contents | |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013218591&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013218591 |
Datensatz im Suchindex
_version_ | 1804133431081172992 |
---|---|
adam_text | Avoiding Attack
The evolutionary ecology of crypsis,
warning signals, and mimicry
Graeme D Ruxton
Thomas N Sherratt
Michael P Speed
OXFORD
UNIVERSITY PRESS
Contents
Introduction 1
Part I: Avoiding detection 5
Chapter 1: Background matching 7
1 1 Why crypsis? 7
1 2 Industrial melanism in Biston betularia 9
1 3 Background is a multivariate entity 10
1 4 Combining background matching with other functions 11
1 5 Flicker fusion 12
1 6 Polymorphism of background matching forms 12
161A case study: polymorphism in Cepaea 13
162 Polymorphism through neutral selection 13
163 Positive selection for polymorphism 14
164 Definitions related to frequency-dependent predation 14
165 Search images 17
166 Control of search rate 18
167 Comparing search image and search rate mechanisms 18
168 Neutral selection again 19
1 7 Coping with multiple backgrounds 20
1 8 Masquerade 23
1 9 Conclusion 25
Chapter 2: Disruptive colouration 26
2 1 Introduction 26
2 2 Separating disruptive colouration from background matching 27
2 3 Empirical evidence 27
2 4 Conclusion 29
Chapter 3: Countershading and counterillumination 30
3 1 Introduction 30
3 2 Self-shadow concealment and countershading 30
3 3 Direct empirical tests of the advantages of countershading 31
3 4 Indirect evidence 33
341 The naked mole-rat 33
342 Countershading in ungulates 34
343 Countershading in aquatic environments 34
344 Counterillumination in marine animals 35
viii CONTENTS
3 5 Countershading in aerial, aquatic, and terrestrial systems 36
3 6 Conclusion 37
Chapter 4: Transparency and silvering 38
4 1 Transparent objects still reflect and refract 38
4 2 More reasons why perfect transparency need not translate to perfect crypsis 39
421 Polarization 39
422 Other wavelengths of light 40
423 Snell s window 41
4 3 Imperfect transparency can be effective at low light levels 42
4 4 Some parts of an organism cannot be made transparent 43
4 5 The distribution of transparency across habitats 44
4 6 Silvering as a form of crypsis 45
4 7 Conclusion 48
Part II: Avoiding attack after detection 49
Chapter 5: Secondary defences 51
5 1 The diversity of secondary defences 51
5 2 Costs and benefits of some behavioural and morphological secondary defences 53
521 Behavioural defences 53
522 Morphological and other mechanical defences 54
5 3 Chemical defences 55
531 Some characteristics of chemical defences 56
532 Are chemical defences costly? 59
5 4 Costs, benefits, and forms of defence 63
5 5 The evolution of defences 64
551 Evolutionary pathways 64
552 Theoretical approaches to the evolution of defences 64
553 Formal modelling of the evolution of defences 67
5 6 Summary and conclusion 68
Chapter 6: Signalling to predators 70
6 1 Introduction 70
6 2 Signalling thatanapproaching predator has been detected 70
6 3 Signalling that the prey individual is intrinsically difficult to catch 73
6 4 Summary of theoretical work 75
6 5 Empirical evidence from predators 75
651 Stotting by gazelle 75
652 Upright stance by hares 76
653 Push-up displays by lizards 77
654 Singing by skylarks 77
655 Predator inspection behaviour by fish 77
656 Calling by antelope 78
657 Fin-flicking behaviour by fish 78
6 6 Studies where predator behaviour is not reported 79
661 Tail-flicking by rails 79
CONTENTS ix
662 Tail-signalling by lizards 80
663 Calling by Diana monkeys 80
664 Snorting in African bovids 81
665 Tail-flagging by deer 81
666 Barking by deer 81
6 7 Conclusion 81
Chapter 7: The form and function of warning displays 82
7 1 Characteristics of aposematic warning displays 82
711 Aposematism does not require complete avoidance by predators 84
712 Conspicuous animals are not necessarily aposematic 84
7 2 Design of aposematic displays I: why conspicuousness? 85
721 The opportunity costs of crypsis 87
722 Forms of secondary defence and the need for conspicuous 87
components of warning displays
7 3 Design of aposematic displays II: the psychological properties of predators 89
731 Unlearnt wariness 90
732 Aposematism and predator learning 94
733 Memorability 97
734 Recognition 99
735 Summary 100
7 4 Co-evolution: which came first, conspicuousness or special 100
psychological responses to conspicuousness?
7 5 Conclusion: designing a warning display 101
Chapter 8: The initial evolution of warning displays 104
8 1 The initial evolution of aposematism: the problem 104
8 2 Stochastic-deterministic scenarios 105
8 3 Spatial aggregation 106
831 Experimental simulations of aggregation effects 108
8 4 More complex population and predator models for aposematism 108
8 5 Individual selection models 109
8 6 Evaluations of predator psychology models 110
8 7 Alternatives to the rare conspicuous mutant scenario 111
--8 7 1 ^Sexual selection 111
872 Defences, optimal conspicuousness and apparency 112
873 Aposematism originated to advertise visible defences 112
874 Facultative, density-dependent aposematism 112
875 Simultaneous evolution of defence and conspicuousness 113
8 8 Phylogeny and evolutionary history 113
8 9 The evolution of aposematism: a trivial question with interesting answers? 114
Chapter 9: The evolution and maintenance of Mullerian mimicry 115
9 1 Where Mullerian mimicry fits in 115
9 2 Chapter outline 115
93A brief early history of Mullerian mimicry 116
9 4 Some potential examples of Mullerian mimicry 118
x CONTENTS
941 Neotropical Heliconius butterflies 119
942 European burnet moths 120
943 Bumble bees 120
944 Cotton stainer bugs (genus Dysdercus) 122
945 Poison arrow frogs 122
9 5 Experimental evidence for Mullerian mimicry 122
951 Direct assessments of the benefits of adopting a common 122
warning signal
952 Proportions of unpalatable prey consumed by naive predators 124
in the course of education
9 6 Models of Mullerian mimicry 126
9 7 Questions and controversies 126
971 Which is the model and which is the mimic? 126
972 How can mimicry evolve through intermediate stages? 127
973 Why are mimetic species variable in form between areas? 129
974 How can multiple Mullerian mimicry rings co-exist? 131
975 What is the role of predator generalization in Mullerian mimicry? 134
976 Why are some Mullerian mimics polymorphic? 134
977 Do Mullerian mutualists only benefit simply from 135
shared predator education?
9 8 Overview 136
Part III: Deceiving predators 137
Chapter 10: The evolution and maintenance of Batesian mimicry 139
10 1 Scope 139
10 2 Taxonomic distribution of Batesian mimicry 140
10 2 1 Examples of Batesian mimicry 140
10 2 2 Comparative evidence for Batesian mimicry 141
10 3 Experimental evidence for Batesian mimicry and its characteristics 142
10 3 1 Predators learn to avoid noxious models and 142
consequently their palatable mimics
10 3 2 Palatable prey altered to resemble an unpalatable species 143
_ ^sometimes survive better than mock controls
10 3 3 Batesian-mimics generally require the presence of 144
the model to gain significant protection
10 3 4 The relative (and absolute) abundances of the model 147
and mimic affects the rate of predation on these species
10 3 5 -The distastefulness of the model affects the rate of 148
predation on the model and mimic
10 3 6 The model can be simply difficult to catch rather 148
than noxious on capture
10 3 7 The success of mimicry is dependent on the availability 150
of alternative prey
10 3 8 Mimics do not always have to be perfect replicas 150
to gain protection, particularly when the model is relatively
common or highly noxious
CONTENTS x i
10 3 9 Frequency-dependent selection on Batesian 151
mimics can lead to mimetic polymorphism
10 4 The theory of Batesian mimicry 152
10 5 Questions and controversies 154
10 5 1 Why are not all palatable prey Batesian mimics? 154
10 5 2 Is the spatio-temporal coincidence of the models 155
and mimics necessary?
10 5 3 Why is Batesian mimicry often limited to one sex? 156
10 5 4 How is mimicry controlled genetically and how can 158
polymorphic mimicry be maintained?
10 5 5 Why are imperfect mimics not improved by natural selection? 159
10 5 6 How does Batesian mimicry evolve, and why do 161
models simply not evolve away from their mimics?
10 5 7 What selective factors influence behavioural mimicry? 162
10 6 Overview 163
Chapter 11: The relationship between Batesian and Mullerian mimicry 164
11 1 Context 164
11 2 Evidence of interspecific differences in levels of secondary defence 165
11 3 Why should weakly defended mimics increase the 166
likelihood that more highly defended models are attacked?
11 3 1 Predator hunger 166
11 3 2 Differences in predatory abilities: the Jack Sprat effect 169
11 3 3 Psychological models 169
11 4 Observational data on the nature of the relationship 170
between Batesian and Mullerian mimicry
11 5 Summary 171
Chapter 12: Other forms of adaptive resemblance 172
12 1 Overview 172
12 2 Aggressive mimicry 172
12 3 Pollinator (floral) mimicry 174
12 4 Intraspecific sexual mimicry 175
12 5 Automimicry 176
1-2-5 1 The phenomenon of automimicry 176
12 5 2 Thechallenge to theoreticians 179
12 5 3 Summary 182
Chapter 13: Deflection and startling of predators 183
13 1 Deflection defined 183
13 2 Empirical evidence for deflection 183
13 2 1 Lizard tails 183
13 2 2 Tadpole tails 184
13 2 3 Eyespots on fish 185
13 2 4 False head marking on butterflies 187
13 2 5 Weasel tails * 190
13 2 6 Summary of empirical evidence for deflective signals 190
xii CONTENTS
13 3 How can deflective marking evolve if they make prey easier for
predators to detect?
13 4 Why do predators allow themselves to be deceived?
13 5 Startle signals
13 5 1 General considerations
13 5 2 Distress calls as startle signals
13 5 3 Visual startle signals
13 5 4 Sound generation by moths attacked by bats
13 5 5 Summary of empirical evidence
13 5 6 Why would predators be startled?
13 6 Tonic immobility
13 7 Distraction displays
13 8 Summary
Chapter 14: General Conclusions
Appendices
A: A summary of mathematical and computer models
that deal with Mullerian mimicry
B: A summary of mathematical and computer models that
deal with Batesian mimicry
References
Author Index
Species Index
Subject Index
|
any_adam_object | 1 |
author | Ruxton, Graeme D. Sherratt, Thomas N. Speed, Michael P. |
author_GND | (DE-588)1165260069 (DE-588)1165260328 |
author_facet | Ruxton, Graeme D. Sherratt, Thomas N. Speed, Michael P. |
author_role | aut aut aut |
author_sort | Ruxton, Graeme D. |
author_variant | g d r gd gdr t n s tn tns m p s mp mps |
building | Verbundindex |
bvnumber | BV019894650 |
callnumber-first | Q - Science |
callnumber-label | QL759 |
callnumber-raw | QL759 |
callnumber-search | QL759 |
callnumber-sort | QL 3759 |
callnumber-subject | QL - Zoology |
classification_rvk | WH 3700 |
classification_tum | BIO 136f |
ctrlnum | (OCoLC)56644492 (DE-599)BVBBV019894650 |
dewey-full | 591.47 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 591 - Specific topics in natural history of animals |
dewey-raw | 591.47 |
dewey-search | 591.47 |
dewey-sort | 3591.47 |
dewey-tens | 590 - Animals |
discipline | Biologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02460nam a2200637zc 4500</leader><controlfield tag="001">BV019894650</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180823 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050721s2004 xxkad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005297323</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA454255</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198528590</subfield><subfield code="c">hbk.</subfield><subfield code="9">0-19-852859-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198528604</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-19-852860-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198528593</subfield><subfield code="9">978-0-19-852859-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56644492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019894650</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M49</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QL759</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">591.47</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WH 3700</subfield><subfield code="0">(DE-625)148656:13423</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIO 136f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ruxton, Graeme D.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Avoiding attack</subfield><subfield code="b">the evolutionary ecology of crypsis, warning signals, and mimicry</subfield><subfield code="c">Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 249 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Oxford biology</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 210 - 239</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Camouflage</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Defensief gedrag</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Evolutionaire biologie</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mimicry</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Signalen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Waarschuwingssystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Animal defenses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Tarnung</subfield><subfield code="0">(DE-588)4184477-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ökologie</subfield><subfield code="0">(DE-588)4043207-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mimikry</subfield><subfield code="0">(DE-588)4169992-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ökologie</subfield><subfield code="0">(DE-588)4043207-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Tarnung</subfield><subfield code="0">(DE-588)4184477-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Mimikry</subfield><subfield code="0">(DE-588)4169992-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sherratt, Thomas N.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1165260069</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Speed, Michael P.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1165260328</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/fy053/2005297323.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013218591&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013218591</subfield></datafield></record></collection> |
id | DE-604.BV019894650 |
illustrated | Illustrated |
indexdate | 2024-07-09T20:08:36Z |
institution | BVB |
isbn | 0198528590 0198528604 9780198528593 |
language | English |
lccn | 2005297323 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013218591 |
oclc_num | 56644492 |
open_access_boolean | |
owner | DE-M49 DE-BY-TUM DE-19 DE-BY-UBM DE-703 |
owner_facet | DE-M49 DE-BY-TUM DE-19 DE-BY-UBM DE-703 |
physical | XII, 249 S. Ill., graph. Darst. 26 cm |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Oxford University Press |
record_format | marc |
series2 | Oxford biology |
spelling | Ruxton, Graeme D. Verfasser aut Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed Oxford Oxford University Press 2004 XII, 249 S. Ill., graph. Darst. 26 cm txt rdacontent n rdamedia nc rdacarrier Oxford biology Hier auch später erschienene, unveränderte Nachdrucke Literaturverz. S. 210 - 239 Camouflage gtt Defensief gedrag gtt Evolutionaire biologie gtt Mimicry gtt Signalen gtt Waarschuwingssystemen gtt Animal defenses Tarnung (DE-588)4184477-4 gnd rswk-swf Ökologie (DE-588)4043207-5 gnd rswk-swf Abwehr (DE-588)4141194-8 gnd rswk-swf Mimikry (DE-588)4169992-0 gnd rswk-swf Ökologie (DE-588)4043207-5 s Tarnung (DE-588)4184477-4 s Mimikry (DE-588)4169992-0 s Abwehr (DE-588)4141194-8 s b DE-604 Sherratt, Thomas N. Verfasser (DE-588)1165260069 aut Speed, Michael P. Verfasser (DE-588)1165260328 aut http://www.loc.gov/catdir/toc/fy053/2005297323.html Table of contents HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013218591&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ruxton, Graeme D. Sherratt, Thomas N. Speed, Michael P. Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry Camouflage gtt Defensief gedrag gtt Evolutionaire biologie gtt Mimicry gtt Signalen gtt Waarschuwingssystemen gtt Animal defenses Tarnung (DE-588)4184477-4 gnd Ökologie (DE-588)4043207-5 gnd Abwehr (DE-588)4141194-8 gnd Mimikry (DE-588)4169992-0 gnd |
subject_GND | (DE-588)4184477-4 (DE-588)4043207-5 (DE-588)4141194-8 (DE-588)4169992-0 |
title | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry |
title_auth | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry |
title_exact_search | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry |
title_full | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed |
title_fullStr | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed |
title_full_unstemmed | Avoiding attack the evolutionary ecology of crypsis, warning signals, and mimicry Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed |
title_short | Avoiding attack |
title_sort | avoiding attack the evolutionary ecology of crypsis warning signals and mimicry |
title_sub | the evolutionary ecology of crypsis, warning signals, and mimicry |
topic | Camouflage gtt Defensief gedrag gtt Evolutionaire biologie gtt Mimicry gtt Signalen gtt Waarschuwingssystemen gtt Animal defenses Tarnung (DE-588)4184477-4 gnd Ökologie (DE-588)4043207-5 gnd Abwehr (DE-588)4141194-8 gnd Mimikry (DE-588)4169992-0 gnd |
topic_facet | Camouflage Defensief gedrag Evolutionaire biologie Mimicry Signalen Waarschuwingssystemen Animal defenses Tarnung Ökologie Abwehr Mimikry |
url | http://www.loc.gov/catdir/toc/fy053/2005297323.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013218591&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ruxtongraemed avoidingattacktheevolutionaryecologyofcrypsiswarningsignalsandmimicry AT sherrattthomasn avoidingattacktheevolutionaryecologyofcrypsiswarningsignalsandmimicry AT speedmichaelp avoidingattacktheevolutionaryecologyofcrypsiswarningsignalsandmimicry |