Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02

Url canonique :
Url courte ou permalien :

Avoiding attack the evolutionary ecology of crypsis, warning signals and mimicry (pod) The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Avoiding attack the evolutionary ecology of crypsis, warning signals and mimicry (pod)
This book discusses the diversity of mechanisms by which prey avoid attack by predators and explores how such defensive mechanisms have evolved through natural selection. It considers how potential prey avoid detection, how they make themselves unprofitable to attack, how they signal their unprofitability, and how other species have exploited these signals. Using carefully selected examples drawn from a wide range of species and ecosystems, the authors present a critical analysis of the most important published works in the field. Illustrative examples of camouflage, mimicry and warning signals regularly appear in undergraduate ecology textbooks, but these subjects are rarely considered in depth. This book summarises some of the latest research into these fascinating adaptations, developing mathematical models where appropriate and making recommendations for the most urgently needed outstanding areas of enquiry.
AVOIDING DETECTION, 1: Background Matching, 2: Disruptive Coloration, 3: Countershading, 4: Transparency and Silvering, SIGNALLING UNPROFITABILITY, 5: Secondary Defences, 6: Signalling to Predators, 7: The Form and Function of Warning Displays, 8: The Initial Evolution of Warning Displays, 9: The Evolution and Maintenance of Mullerian Mimicry, DECEIVING PREDATORS, 10: The Evolution and Maintenance of Batesian Mimicry, 11: The Relationship Between Batesian and Mullerian Mimicry, 12: Other Forms of Adaptive Resemblance, 13: Deflection and Startling of Predators, 14: General Conclusions, Appendix 1: A summary of mathematical and computer models that deal with Mullerian mimcry, Appendix 2: A summary of mathematical and computer models that deal with Batesian mimcry
Graeme Ruxton has co-written two books, both published by Oxford University Press - 'Living in Groups' (2002) for the Oxford Series in Ecology and Evolution, and the textbook 'Elementary Experimental Design for the Life Sciences' (2003). He is also the author of over 100 scientific articles. His background in physics provides particular strength in the functional aspects of signalling systems discussed in this book. Tom Sherratt is the author of nearly 50 scientific papers on subjects ranging from the evolution of co-operation, to the maintenance of imperfect mimicry and the evolution of warning signals. His practical background in both tropical and temperate entomology (principally damselflies and mosquitoes) has been of great value in evaluating empirical work in this broad field, whilst his wide interests in evolutionary biology and foraging theory complement those of his co-authors in placing empirical findings within an appropriate theoretical context. Mike Speed has worked for over a decade on the role of predator behaviour in the generation of insect warning signals. He is consulting editor for the journal Animal Behaviour and a member of the education committee of the Association for the Study of Animal Behaviour. His publications span theoretical and empirical studies of mimicry and aposematism
  • How do animals protect themselves from attack?
  • Why are ladybirds brightly coloured and why are most moths camouflaged?
  • First monograph in this area for over 25 years, written by some of the most innovative thinkers in the field
  • Date de parution :

    Ouvrage de 250 p.

    19x24.6 cm

    Sous réserve de disponibilité chez l'éditeur.

    Prix indicatif 76,54 €

    Ajouter au panier

    Thèmes d’Avoiding attack the evolutionary ecology of crypsis... :

    En continuant à naviguer, vous autorisez Lavoisier à déposer des cookies à des fins de mesure d'audience. Pour en savoir plus et paramétrer les cookies, rendez-vous sur la page Confidentialité & Sécurité.