155:. In order to access the nectar, the bee will enter the flower through a hole bitten at the base, stealing the nectar without aiding in pollination. Birds are mostly primary robbers and typically use their beaks to penetrate the corolla tissue of flower petals. The upper mandible is used to hold the flower while the lower mandible creates the hole and extracts the nectar. While this is the most common method employed by bird species, some steal nectar in a more aggressive manner. For example, bullfinches reach the nectar by completely tearing the corolla off from the calyx. Mammal robbers such as the striped squirrel chew holes at the base of the flower and then consume the nectar.
315:
attractiveness of the flower. Positive reproductive results may occur from nectar robbing if the robbers act as pollinators during the same or different visit. The holes created by primary robbers may attract more secondary robbers that commonly search for nectar and collect pollen from anthers during the same visit. Additionally, certain dense arrangements of flowers allow pollen to be transferred when robber birds pierce holes into flowers to access the nectar. Thus, plant reproduction can potentially be boosted from nectar robbing due to the increase in potential pollen vectors. Distinguishing between a legitimate pollinator and a nectar robber can be difficult.
159:(removing nectar from in between petals, which generally bypasses floral reproductive structures). Individual organisms may exhibit mixed behaviors, combining legitimate pollination and nectar robbing, or primary and secondary robbing. Nectar robbing rates can also greatly vary temporally and spatially. The abundance of nectar robbing can fluctuate based on the season or even within a season. This inconsistency displayed in nectar robbing makes it difficult to label certain species as "thieves" and complicates research on the ecological phenomenon of nectar robbing.
329:
384:. If nectar robbers have an effect (direct or indirect) on a plant or pollinator fitness, they are part of the coevolution process. Where nectar robbing is detrimental to the plant, a plant species might evolve to minimize the traits that attract the robbers or develop some type of protective mechanism to hinder them. Another option is to try to neutralize negative effects of nectar robbers. Nectar robbers are adapted for more efficient nectar robbing: for instance, hummingbirds and
340:
20:
187:
173:
304:
Nectar robbing, especially by birds, can damage the reproductive parts of a flower and thus diminish the fitness of a plant. In this case, the effect of robbery on a plant is direct. A good example of an indirect effect is the change in the behaviour of a legitimate pollinator, which either increases
253:
effectively evicts legitimate pollinators. Nectar robbers may change the behaviour of legitimate pollinators in other ways, such as by reducing the amount of nectar available. This may force pollinators to visit more flowers in their nectar foraging. The increased number of flowers visited and longer
142:
are prone to robbing. Secondary robbers often do not have suitable mouth parts to be able to create penetrations into the flowers themselves, nor to reach the nectar without robbing it. Thus they take advantage of the perforations already made by other organisms to be able to steal the nectar. For
395:
It is not completely clear how pollination mutualisms persist in the presence of cheating nectar robbers. Nevertheless, as exploitation is not always harmful for the plant, the relationship may be able to endure some cheating. Mutualism may simply confer a higher payoff than nectar robbing. Some
295:
The functionality of flowers can be curtailed by nectar robbers that severely maim the flower by shortening their life span. Damaged flowers are less attractive and thus can lead to a decrease in visit frequency as pollinators practice avoidance of robbed flowers and favor intact flowers. Nectar
134:
Nectar robbing is specifically the behavior of consuming nectar from a perforation (robbing hole) in the floral tissue rather than from the floral opening. There are two main types of nectar robbing: primary robbing, which requires that the nectar forager perforate the floral tissues itself, and
314:
The effect of robbing is positive if the robber also pollinates or increases the pollination by the legitimate pollinator, and negative if the robber damages the reproductive parts of a plant or reduces pollination success, either by competing with the legitimate pollinator or by lessening the
158:
The term "floral larceny" has been proposed to include the entire suite of foraging behaviors for floral rewards that can potentially disrupt pollination. They include "nectar theft" (floral visits that remove nectar from the floral opening without pollinating the flower), and "base working"
423:
Toxins and secondary compounds are likely to act as a defence against nectar robbing because they are often found in floral nectar or petal tissue. There is some evidence that secondary compounds in nectar only affect nectar robbers and not the pollinators. One example is a plant called
281:
by avoiding heavily robbed flowers. Pollinating birds may be better at this than insects, because of their higher sensory capability. The ways that bees distinguish between robbed and unrobbed flowers have not been studied, but they have been thought to be related to the damage on
470:
The term 'resistance' refers to the plant's ability to live and reproduce in spite of nectar robbers. This may happen, for example, by compensating the lost nectar by producing more. With the help of defence and resistance, mutualisms can persist even in the presence of cheaters.
438:
If robbers and pollinators forage at different times of day, plants may produce nectar according to the active period of a legitimate pollinator. This is an example of a defence by escaping in time. Another way to use time in defence is to flower only for one day as a tropical
43:, carried out by feeding from holes bitten in flowers, rather than by entering through the flowers' natural openings. Nectar robbers usually feed in this way, avoiding contact with the floral reproductive structures, and therefore do not facilitate plant reproduction via
300:
which causes a decrease in visitation frequency by legitimate pollinators. Nectar robbing can also cause plants to reallocate resources from reproduction and growth to replenishing the stolen nectar, which can be costly to produce for some plants.
305:
or decreases the fitness of a plant. There are both primary and secondary nectar robbers. Secondary robbers are those that take advantage of the holes made by primary robbers. While most flies and bees are secondary robbers, some species, such as
226:
but this does not lead to significant reduction in fruit-set of the plant. In another example, when 80 percent of the flowers in a study site were robbed and the robbers did not pollinate, neither the seed nor fruit set were negatively affected.
434:
that deter nectar-thieving ants but not legitimate bee pollinators. Low sugar concentration in nectar may also deter nectar robbers without deterring pollinators because dilute nectar does not yield net energy profits for robbers.
391:
Nectar robbers may only get food in illegitimate ways because of the mismatch between the morphologies of their mouthparts and the floral structure; or they may rob nectar as a more energy-saving way to get nectar from flowers.
262:. This requires a robber's not completely consuming all of a flower's nectar. When a robber consumes all of a flower's nectar, legitimate pollinators may avoid the flower, resulting in a negative effect on plant fitness.
238:
may take place when the body of the robber contacts the reproductive parts of the plant while it robs, or during pollen collection which some bees practice in concert with nectar robbing. The impact of
292:
steals nectar through a slit they make in the base of the petals. If nectar robbing severely reduces the success of legitimate pollinators they may be able to switch to other nectar sources.
51:. While there is variation in the dependency on nectar for robber species, most species rob facultatively (that is, to supplement their diets, rather than as an absolute necessity).
452:
bees. Escaping in space refers to a situation in which plant avoids being robbed by growing in a certain location like next to a plant which is more attractive to the robbers.
1476:
555:
Deng, X.; Ren, P.; Gao, J.; Li, Q. (2004). The
Striped Squirrel (Tamiops swinhoei hainanus) as a Nectar Robber of Ginger (Alpinia kwangsiensis). Biotropica. 36(4):633โ636.
412:(especially florivores). Some defences may have evolved through traits originally referred to pollination. Defences against nectar robbers have been thought to include
1173:
Traveset, A.; Willson, M. F.; Sabag, C. (1998). "Effect of nectar robbing birds on fruit set of
Fuchsia magellanica in Tierra Del Fuego: a disrupted mutualism".
546:
Olmos, F.; Boulhosa, R. (2000). A meeting of opportunists: birds and other visitors to Mabea fistulifera (Euphorbiaceae) in florescences. Ararajuba 8(2):93โ98.
212:
or nectar. As nectar robbers receive the rewards without direct contact with the reproductive parts of the flower, their behaviour is easily assumed to be
568:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-11-02). "Nectar
Robbing: Ecological and Evolutionary Perspectives".
47:. Because many species that act as pollinators also act as nectar robbers, nectar robbing is considered to be a form of exploitation of plant-pollinator
910:
Schemsk e, Douglas W.; Horvitz, Carol C. (1984). "Variation among Floral
Visitors in Pollination Ability: A Precondition for Mutualism Specialization".
396:
studies have shown that nectar robbing does not have a significant negative effect on the reproductive success of both male and female plants.
662:
408:
evolved in plants against nectar robbers, the adaptations have been assumed not to rise from traits used in interactions between plants and
1362:
Anstett, M.C.; Hossaert, McKey M.; Kjellberg, F. (1997). "Figs and fig pollinators: Evolutionary conflicts in a coevolved mutualism".
138:
The former is performed most often on flowers whose nectar is concealed or hard to reach. For instance, long flowers with tubular
1327:
Pellmyr O.; Thompson J.N.; Brown J.M.; Harrison R.G. (1996). "Evolution of pollination and mutualism in the yucca moth lineage".
1019:
Irwin, R. E.; Brody, A. K. (1998). "Nectar
Robbing in Ipomopsis aggregata: effects on pollinator behaviour and plant fitness".
234:
depends on several issues. Firstly, nectar robbers, such as carpenter bees, bumble bees and some birds, can pollinate flowers.
277:
and many species of nectar-feeding birds can distinguish between robbed and unrobbed plants and minimize their energy cost of
834:
Irwin, R. E. (2003). "Impact of nectar robbing on estimates of pollen flow: conceptual predictions and empirical outcomes".
93:
1218:
Irwin R. E.; Brody A. K. (1999). "Nectar robbing bumble bees reduce the fitness of
Ibomopsis aggregata (Polemoniaceae)".
1073:
Roubic, D. W. (1982). "The ecological impact of nectar robbing bees and pollinating humming birds on a tropical shrub".
969:
Maloof J. E. (2001). "The effects of a bumble bee nectar robber on plant reproductive success and pollinator behavior".
788:
Morris, W. F. (1996). "Mutualism denied? Nectar-robbing bumble bees do not reduce female or male success of bluebells".
204:
Pollination systems are mostly mutualistic, meaning that the plant benefits from the pollinator's transport of male
216:. However, the effect of robbery on the plant is sometimes neutral or even positive. For example, the proboscis of
459:. Tightly packed flowers and unfavourably sized corolla tubes, bract liquid moats and toughness of the corolla or
109:
847:
533:
121:
388:
flowerpiercers have serrated bills that are thought to aid them in incising flower tissue for nectar robbing.
354:
265:
The response of different species of legitimate pollinators also varies. Some species, like the bumble bees
1132:
750:
519:
650:
259:
120:
observed bumblebees stealing nectar from flowers in 1859. These observations were published in his book
1416:
Zhang Y.; Wang Y.; Guo Y. (2006). "The effects of nectar robbing on plant reproduction and evolution".
863:"Pollination ecology of Anthyllis vulneraria subsp. vulgaris (Fabaceae): Nectar robbers as pollinators"
1496:
1299:
1227:
1182:
1082:
1028:
919:
797:
713:
615:
417:
463:
are barriers for some nectar robbers. A good example of an indirect defence is to attract symbiotic
1506:
1266:"Effects of nectar robbing on male and female reproductive success of a pollinator-dependent plant"
524:
48:
1501:
1456:
1344:
1243:
1098:
1052:
986:
951:
935:
884:
813:
631:
250:
213:
1379:
1152:
1044:
994:
943:
892:
770:
658:
585:
288:
273:
231:
36:
24:
1131:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-12-01).
749:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-12-01).
1491:
1448:
1371:
1336:
1307:
1235:
1198:
1190:
1144:
1090:
1036:
978:
927:
874:
843:
805:
762:
729:
721:
623:
577:
529:
426:
267:
1397:
Ornelas, J. F. (1994). "Serrate tomia: An adaptation for nectar robbing in hummingbirds?".
19:
1148:
766:
581:
444:
307:
144:
81:
64:
1265:
1303:
1231:
1186:
1086:
1032:
923:
801:
717:
619:
218:
135:
secondary robbing, which is foraging from a robbing hole created by a primary robber.
117:
108:
Records of nectar robbing in nature date back at least to 1793, when German naturalist
1375:
1485:
1312:
1287:
1194:
349:
85:
55:
1348:
1056:
955:
701:
510:
Maloof, J. E.; Inouye, D. W. (2000). "Are nectar robbers cheaters or mutualists?".
455:
The last two methods of protection are physical barriers and indirect defence like
339:
328:
296:
robbers that diminish the volume of nectar in flowers may also leave behind their
186:
931:
365:
255:
235:
172:
77:
44:
405:
381:
1156:
774:
589:
151:) are unable to reach the nectar located at the base of long flowers such as
464:
456:
431:
409:
152:
89:
59:
1383:
1048:
998:
947:
896:
1040:
249:) on a plant is almost always negative, probably because their aggressive
702:"The dual role of floral traits: pollinator attraction and plant defence"
373:
278:
1203:
114:
The Secret of Nature in the Form and
Fertilization of Flowers Discovered
112:
observed bumblebees perforating flowers. This was recorded in his book,
54:
Nectar robbers vary greatly in species diversity and include species of
1460:
1102:
990:
939:
888:
817:
734:
635:
241:
97:
1247:
222:
does not come in contact with the reproductive parts of the flower in
209:
205:
40:
1452:
1094:
982:
879:
862:
809:
725:
627:
420:, escape in time or space, physical barriers and indirect defences.
1340:
1239:
467:(like ants) by nectar or other rewards to scare away the robbers.
460:
440:
413:
377:
369:
283:
139:
18:
1435:
Stephenson, A. G. (1981). "Toxic nectar deters nectar thieves of
297:
69:
606:
Inouye, David W. (1980). "The
Terminology of Floral Larceny".
358:(top), and hole used to obtain the nectar (bottom, red circle)
73:
848:
10.1890/0012-9658(2003)084[0485:IONROE]2.0.CO;2
534:
10.1890/0012-9658(2000)081[2651:ANRCOM]2.0.CO;2
1133:"Nectar Robbing: Ecological and Evolutionary Perspectives"
751:"Nectar Robbing: Ecological and Evolutionary Perspectives"
258:, which is beneficial for the plant because it lessens
1137:
Annual Review of
Ecology, Evolution, and Systematics
755:
Annual Review of
Ecology, Evolution, and Systematics
570:
Annual Review of Ecology, Evolution, and Systematics
404:
Even though there has not been much research on the
1477:
iNaturalist observations of nectar robbing behavior
286:tissue after robbery or changes in nectar quality.
208:and the pollinator benefits from a reward, such as
700:Irwin, R. E.; Adler, L. S.; Brody, A. K. (2004).
563:
561:
230:The effect of floral-nectar robbing on plant
8:
1281:
1279:
829:
827:
649:Inouye, D. W.; Ogilvie, J. E. (2017-01-01),
192:...and using its tongue to drink the nectar.
1168:
1166:
695:
693:
691:
689:
687:
685:
683:
681:
679:
39:used by some organisms that feed on floral
254:flight distances increase pollen flow and
1311:
1202:
1068:
1066:
878:
733:
523:
505:
503:
430:which produces nectar containing iridoid
1116:Bentley, Barbara; Elias, Thomas (1983).
1014:
1012:
1010:
1008:
601:
599:
501:
499:
497:
495:
493:
491:
489:
487:
485:
483:
368:, as in the close relationships between
143:example, short-tongued bees such as the
479:
1259:
1257:
1149:10.1146/annurev.ecolsys.110308.120330
767:10.1146/annurev.ecolsys.110308.120330
582:10.1146/annurev.ecolsys.110308.120330
198:A bumblebee "nectar robbing" a flower
88:. Nectar-robbing mammals include the
7:
1264:Roja-Nossa, S.V. (19 October 2015).
178:Biting open the base of a flower...
14:
655:Reference Module in Life Sciences
1313:10.1046/j.1461-0248.2001.00218.x
1288:"The exploitation of mutualisms"
1195:10.1046/j.1365-2435.1998.00212.x
352:, robbing nectar from the plant
338:
327:
185:
171:
1364:Trends in Ecology and Evolution
116:, which was written in Berlin.
1:
1376:10.1016/s0169-5347(96)10064-1
348:Female of a hummingbird, the
1120:. Columbia University Press.
932:10.1126/science.225.4661.519
400:Defences in flowering plants
96:, which rob nectar from the
1441:American Midland Naturalist
1523:
971:American Journal of Botany
867:American Journal of Botany
448:does to avoid the robbing
364:Pollination systems cause
311:, act as primary robbers.
94:Swinhoe's striped squirrel
1286:Bronstein, J. L. (2001).
319:Evolutionary implications
110:Christian Konrad Sprengel
1118:The Biology of Nectaries
163:Effects on plant fitness
651:"Pollinators, Role ofโ"
130:Forms of floral larceny
355:Amphilophium elongatum
29:
1418:Zhiwu Shengtai Xuebao
1041:10.1007/s004420050617
260:inbreeding depression
251:territorial behaviour
123:The Origin of Species
68:bees, solitary bees,
22:
224:Calathea ovandensis,
1329:American Naturalist
1304:2001EcolL...4..277B
1232:1999Ecol...80.1703I
1187:1998FuEco..12..459T
1087:1982Ecol...63..354R
1033:1998Oecol.116..519I
924:1984Sci...225..519S
802:1996Ecol...77.1451M
718:2004Ecol...85.1503I
620:1980Ecol...61.1251I
418:secondary compounds
1175:Functional Ecology
861:Navarro L (2000).
445:Pavonia dasypetala
247:Trigona ferricauda
30:
977:(11): 1960โ1965.
918:(4661): 519โ521.
664:978-0-12-809633-8
518:(10): 2651โ2661.
289:Xylocopa sonorina
37:foraging behavior
25:Bombus terrestris
16:Foraging behavior
1514:
1465:
1464:
1437:Catalpa speciosa
1432:
1426:
1425:
1413:
1407:
1406:
1394:
1388:
1387:
1359:
1353:
1352:
1324:
1318:
1317:
1315:
1283:
1274:
1273:
1261:
1252:
1251:
1226:(5): 1703โ1712.
1215:
1209:
1208:
1206:
1170:
1161:
1160:
1128:
1122:
1121:
1113:
1107:
1106:
1070:
1061:
1060:
1016:
1003:
1002:
966:
960:
959:
907:
901:
900:
882:
858:
852:
851:
831:
822:
821:
796:(5): 1451โ1462.
785:
779:
778:
746:
740:
739:
737:
712:(6): 1503โ1511.
697:
674:
673:
672:
671:
646:
640:
639:
614:(5): 1251โ1253.
603:
594:
593:
565:
556:
553:
547:
544:
538:
537:
527:
507:
427:Catalpa speciosa
342:
331:
268:Bombus appositus
189:
175:
1522:
1521:
1517:
1516:
1515:
1513:
1512:
1511:
1482:
1481:
1473:
1468:
1453:10.2307/2424757
1434:
1433:
1429:
1415:
1414:
1410:
1396:
1395:
1391:
1361:
1360:
1356:
1326:
1325:
1321:
1292:Ecology Letters
1285:
1284:
1277:
1270:Oxford Academic
1263:
1262:
1255:
1217:
1216:
1212:
1172:
1171:
1164:
1130:
1129:
1125:
1115:
1114:
1110:
1095:10.2307/1938953
1072:
1071:
1064:
1018:
1017:
1006:
983:10.2307/3558423
968:
967:
963:
909:
908:
904:
880:10.2307/2656997
860:
859:
855:
833:
832:
825:
810:10.2307/2265542
787:
786:
782:
748:
747:
743:
726:10.1890/03-0390
699:
698:
677:
669:
667:
665:
648:
647:
643:
628:10.2307/1936841
605:
604:
597:
567:
566:
559:
554:
550:
545:
541:
509:
508:
481:
477:
402:
362:
361:
360:
359:
345:
344:
343:
334:
333:
332:
321:
308:Bombylius major
274:B. occidentalis
202:
201:
200:
199:
195:
194:
193:
190:
181:
180:
179:
176:
165:
149:Bombus pratorum
145:early bumblebee
132:
106:
82:passerine birds
28:stealing nectar
17:
12:
11:
5:
1520:
1518:
1510:
1509:
1504:
1499:
1494:
1484:
1483:
1480:
1479:
1472:
1471:External links
1469:
1467:
1466:
1447:(2): 381โ383.
1427:
1408:
1389:
1354:
1341:10.1086/285958
1335:(5): 827โ847.
1319:
1298:(3): 277โ287.
1275:
1253:
1240:10.2307/176558
1210:
1181:(3): 459โ464.
1162:
1143:(1): 271โ292.
1123:
1108:
1081:(2): 354โ360.
1062:
1027:(4): 519โ527.
1004:
961:
902:
873:(7): 980โ985.
853:
842:(2): 485โ495.
823:
780:
761:(1): 271โ292.
741:
675:
663:
641:
595:
576:(1): 271โ292.
557:
548:
539:
525:10.1.1.463.752
478:
476:
473:
401:
398:
347:
346:
337:
336:
335:
326:
325:
324:
323:
322:
320:
317:
219:Eurybia elvina
197:
196:
191:
184:
183:
182:
177:
170:
169:
168:
167:
166:
164:
161:
131:
128:
118:Charles Darwin
105:
102:
86:flowerpiercers
56:carpenter bees
33:Nectar robbing
15:
13:
10:
9:
6:
4:
3:
2:
1519:
1508:
1505:
1503:
1500:
1498:
1495:
1493:
1490:
1489:
1487:
1478:
1475:
1474:
1470:
1462:
1458:
1454:
1450:
1446:
1442:
1438:
1431:
1428:
1424:(4): 695โ702.
1423:
1419:
1412:
1409:
1405:(3): 703โ713.
1404:
1400:
1393:
1390:
1385:
1381:
1377:
1373:
1369:
1365:
1358:
1355:
1350:
1346:
1342:
1338:
1334:
1330:
1323:
1320:
1314:
1309:
1305:
1301:
1297:
1293:
1289:
1282:
1280:
1276:
1271:
1267:
1260:
1258:
1254:
1249:
1245:
1241:
1237:
1233:
1229:
1225:
1221:
1214:
1211:
1205:
1200:
1196:
1192:
1188:
1184:
1180:
1176:
1169:
1167:
1163:
1158:
1154:
1150:
1146:
1142:
1138:
1134:
1127:
1124:
1119:
1112:
1109:
1104:
1100:
1096:
1092:
1088:
1084:
1080:
1076:
1069:
1067:
1063:
1058:
1054:
1050:
1046:
1042:
1038:
1034:
1030:
1026:
1022:
1015:
1013:
1011:
1009:
1005:
1000:
996:
992:
988:
984:
980:
976:
972:
965:
962:
957:
953:
949:
945:
941:
937:
933:
929:
925:
921:
917:
913:
906:
903:
898:
894:
890:
886:
881:
876:
872:
868:
864:
857:
854:
849:
845:
841:
837:
830:
828:
824:
819:
815:
811:
807:
803:
799:
795:
791:
784:
781:
776:
772:
768:
764:
760:
756:
752:
745:
742:
736:
731:
727:
723:
719:
715:
711:
707:
703:
696:
694:
692:
690:
688:
686:
684:
682:
680:
676:
666:
660:
656:
652:
645:
642:
637:
633:
629:
625:
621:
617:
613:
609:
602:
600:
596:
591:
587:
583:
579:
575:
571:
564:
562:
558:
552:
549:
543:
540:
535:
531:
526:
521:
517:
513:
506:
504:
502:
500:
498:
496:
494:
492:
490:
488:
486:
484:
480:
474:
472:
468:
466:
462:
458:
453:
451:
447:
446:
442:
436:
433:
429:
428:
421:
419:
415:
411:
407:
399:
397:
393:
389:
387:
383:
379:
375:
371:
367:
357:
356:
351:
350:horned sungem
341:
330:
318:
316:
312:
310:
309:
302:
299:
293:
291:
290:
285:
280:
276:
275:
270:
269:
263:
261:
257:
252:
248:
244:
243:
237:
233:
228:
225:
221:
220:
215:
211:
207:
188:
174:
162:
160:
156:
154:
150:
146:
141:
136:
129:
127:
125:
124:
119:
115:
111:
103:
101:
99:
95:
91:
87:
83:
79:
75:
71:
67:
66:
61:
57:
52:
50:
46:
42:
38:
34:
27:
26:
21:
1444:
1440:
1436:
1430:
1421:
1417:
1411:
1402:
1398:
1392:
1370:(3): 94โ99.
1367:
1363:
1357:
1332:
1328:
1322:
1295:
1291:
1269:
1223:
1219:
1213:
1204:10261/110827
1178:
1174:
1140:
1136:
1126:
1117:
1111:
1078:
1074:
1024:
1020:
974:
970:
964:
915:
911:
905:
870:
866:
856:
839:
835:
793:
789:
783:
758:
754:
744:
709:
705:
668:, retrieved
657:, Elsevier,
654:
644:
611:
607:
573:
569:
551:
542:
515:
511:
469:
454:
449:
443:
437:
425:
422:
403:
394:
390:
385:
363:
353:
313:
306:
303:
294:
287:
272:
266:
264:
246:
240:
229:
223:
217:
203:
157:
148:
137:
133:
122:
113:
107:
98:ginger plant
84:, including
78:hummingbirds
63:
62:, stingless
53:
32:
31:
23:
1497:Pollination
735:10919/24802
382:yucca moths
376:as well as
366:coevolution
256:outcrossing
245:bees (e.g.
236:Pollination
80:, and some
45:pollination
1507:Parasitism
1486:Categories
670:2021-12-04
475:References
432:glycosides
410:herbivores
60:bumblebees
1502:Symbiosis
1157:1543-592X
1021:Oecologia
775:1543-592X
590:1543-592X
520:CiteSeerX
465:predators
457:symbionts
374:fig wasps
90:fruit bat
49:mutualism
1384:21237991
1349:84816447
1049:28307521
999:21669629
948:17750855
897:10898775
406:defences
386:Diglossa
279:foraging
214:cheating
153:comfreys
140:corollas
1492:Ecology
1461:2424757
1399:The Auk
1300:Bibcode
1228:Bibcode
1220:Ecology
1183:Bibcode
1103:1938953
1083:Bibcode
1075:Ecology
1057:7113074
1029:Bibcode
991:3558423
956:7256793
940:1694004
920:Bibcode
912:Science
889:2656997
836:Ecology
818:2265542
798:Bibcode
790:Ecology
714:Bibcode
706:Ecology
636:1936841
616:Bibcode
608:Ecology
512:Ecology
450:Trigona
242:Trigona
232:fitness
206:gametes
104:History
65:Trigona
1459:
1382:
1347:
1248:176558
1246:
1155:
1101:
1055:
1047:
997:
989:
954:
946:
938:
895:
887:
816:
773:
661:
634:
588:
522:
414:toxins
378:yuccas
210:pollen
41:nectar
1457:JSTOR
1345:S2CID
1244:JSTOR
1099:JSTOR
1053:S2CID
987:JSTOR
952:S2CID
936:JSTOR
885:JSTOR
814:JSTOR
632:JSTOR
461:sepal
441:shrub
284:petal
70:wasps
35:is a
1380:PMID
1153:ISSN
1045:PMID
995:PMID
944:PMID
893:PMID
771:ISSN
659:ISBN
586:ISSN
416:and
380:and
372:and
370:figs
298:odor
92:and
74:ants
1449:doi
1445:105
1439:".
1403:111
1372:doi
1337:doi
1333:148
1308:doi
1236:doi
1199:hdl
1191:doi
1145:doi
1091:doi
1037:doi
1025:116
979:doi
928:doi
916:225
875:doi
844:doi
806:doi
763:doi
730:hdl
722:doi
624:doi
578:doi
530:doi
271:or
126:.
1488::
1455:.
1443:.
1422:30
1420:.
1401:.
1378:.
1368:12
1366:.
1343:.
1331:.
1306:.
1294:.
1290:.
1278:^
1268:.
1256:^
1242:.
1234:.
1224:80
1222:.
1197:.
1189:.
1179:12
1177:.
1165:^
1151:.
1141:41
1139:.
1135:.
1097:.
1089:.
1079:63
1077:.
1065:^
1051:.
1043:.
1035:.
1023:.
1007:^
993:.
985:.
975:88
973:.
950:.
942:.
934:.
926:.
914:.
891:.
883:.
871:87
869:.
865:.
840:84
838:.
826:^
812:.
804:.
794:77
792:.
769:.
759:41
757:.
753:.
728:.
720:.
710:85
708:.
704:.
678:^
653:,
630:.
622:.
612:61
610:.
598:^
584:.
574:41
572:.
560:^
528:.
516:81
514:.
482:^
100:.
76:,
72:,
58:,
1463:.
1451::
1386:.
1374::
1351:.
1339::
1316:.
1310::
1302::
1296:4
1272:.
1250:.
1238::
1230::
1207:.
1201::
1193::
1185::
1159:.
1147::
1105:.
1093::
1085::
1059:.
1039::
1031::
1001:.
981::
958:.
930::
922::
899:.
877::
850:.
846::
820:.
808::
800::
777:.
765::
738:.
732::
724::
716::
638:.
626::
618::
592:.
580::
536:.
532::
147:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.