Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
about
Crying wolf to a predator: deceptive vocal mimicry by a bird protecting youngBees eavesdrop upon informative and persistent signal compounds in alarm pheromones.Functional traits determine heterospecific use of risk-related social information in forest birds of tropical South-East Asia.Referential calls coordinate multi-species mobbing in a forest bird community.Combining personal with social information facilitates host defences and explains why cuckoos should be secretive.The evolutionary ecology of deception.Responses of urban crows to con- and hetero-specific alarm calls in predator and non-predator zoo enclosures.Nestlings reduce their predation risk by attending to predator-information encoded within conspecific alarm calls.Social-bond strength influences vocally mediated recruitment to mobbing.Deconstructing the landscape of fear in stable multi-species societies.Hiss and snort call types of wild-living giraffes Giraffa camelopardalis: acoustic structure and context.Hearing is believing: Birds learn fear.Humans identify negative (but not positive) arousal in silver fox vocalizations: implications for the adaptive value of interspecific eavesdropping.Heterospecific eavesdropping in ant-following birds of the Neotropics is a learned behaviour.Predator encounters have spatially extensive impacts on parental behaviour in a breeding bird community.Prairie dogs increase fitness by killing interspecific competitors.Interspecific signalling between mutualists: food-thieving drongos use a cooperative sentinel call to manipulate foraging partners.Species replacement reduces community participation in avian antipredator groupsA call for viewshed ecology: Advancing our understanding of the ecology of information through viewshed analysis
P2860
Q27329832-577DC20B-D24E-44CE-A643-9C0E1E84ED3DQ28833265-85B40566-0410-44A4-81B3-B2B2FF725540Q30367193-CCC94EE1-73C1-4C4D-9ADB-A10A913601A5Q30370340-BCD1DD59-5A03-41CF-B789-B76C348041CAQ36501119-78FC6EE0-7432-4C65-9CEA-080BE877E3A4Q38539409-BA310561-EE2D-415D-8285-5F5DFECE26ECQ40416699-5611BA81-2CBC-4E3A-8E45-A9CE121B381AQ41718172-DD397915-2654-4C39-AB84-0308F89689B4Q42791016-E4222103-26DF-4616-8177-4B2A3EF0E86FQ46347295-244BA763-631C-4E0B-8BB4-04AF7AEFF43FQ48277470-85DEEC51-9BC1-4BAB-9428-9241708A56A0Q50317385-1145B4B7-0334-4C4D-A92F-158DD22D098AQ50328127-AB4B0331-7149-4477-8CFE-ADE9E83FB1EBQ51172495-116F2576-B1D6-46F0-A71D-67E19A036CE7Q51298387-A24FD195-BF8D-467F-A3A8-09B381951815Q51299535-4BFDA73E-DC5B-4386-BBA5-8D0D7BB469D9Q52652508-67563BDE-DA96-47AE-8F6E-841B59B7F5BEQ56382846-D23FCE2D-E799-4CE2-95AD-83C044F27ECDQ57050261-70142CF1-8600-454B-B6A6-8B3D43CC45E1
P2860
Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
description
2014 nî lūn-bûn
@nan
2014年の論文
@ja
2014年学术文章
@wuu
2014年学术文章
@zh-cn
2014年学术文章
@zh-hans
2014年学术文章
@zh-my
2014年学术文章
@zh-sg
2014年學術文章
@yue
2014年學術文章
@zh
2014年學術文章
@zh-hant
name
Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
@en
type
label
Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
@en
prefLabel
Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
@en
P2860
P356
P1433
P1476
Eavesdropping on heterospecific alarm calls: from mechanisms to consequences.
@en
P2093
Pamela M Fallow
Tonya M Haff
P2860
P304
P356
10.1111/BRV.12122
P577
2014-06-11T00:00:00Z