Knowledge (XXG)

Nectar robbing

Source ๐Ÿ“

155:. In order to access the nectar, the bee will enter the flower through a hole bitten at the base, stealing the nectar without aiding in pollination. Birds are mostly primary robbers and typically use their beaks to penetrate the corolla tissue of flower petals. The upper mandible is used to hold the flower while the lower mandible creates the hole and extracts the nectar. While this is the most common method employed by bird species, some steal nectar in a more aggressive manner. For example, bullfinches reach the nectar by completely tearing the corolla off from the calyx. Mammal robbers such as the striped squirrel chew holes at the base of the flower and then consume the nectar. 315:
attractiveness of the flower. Positive reproductive results may occur from nectar robbing if the robbers act as pollinators during the same or different visit. The holes created by primary robbers may attract more secondary robbers that commonly search for nectar and collect pollen from anthers during the same visit. Additionally, certain dense arrangements of flowers allow pollen to be transferred when robber birds pierce holes into flowers to access the nectar. Thus, plant reproduction can potentially be boosted from nectar robbing due to the increase in potential pollen vectors. Distinguishing between a legitimate pollinator and a nectar robber can be difficult.
159:(removing nectar from in between petals, which generally bypasses floral reproductive structures). Individual organisms may exhibit mixed behaviors, combining legitimate pollination and nectar robbing, or primary and secondary robbing. Nectar robbing rates can also greatly vary temporally and spatially. The abundance of nectar robbing can fluctuate based on the season or even within a season. This inconsistency displayed in nectar robbing makes it difficult to label certain species as "thieves" and complicates research on the ecological phenomenon of nectar robbing. 329: 384:. If nectar robbers have an effect (direct or indirect) on a plant or pollinator fitness, they are part of the coevolution process. Where nectar robbing is detrimental to the plant, a plant species might evolve to minimize the traits that attract the robbers or develop some type of protective mechanism to hinder them. Another option is to try to neutralize negative effects of nectar robbers. Nectar robbers are adapted for more efficient nectar robbing: for instance, hummingbirds and 340: 20: 187: 173: 304:
Nectar robbing, especially by birds, can damage the reproductive parts of a flower and thus diminish the fitness of a plant. In this case, the effect of robbery on a plant is direct. A good example of an indirect effect is the change in the behaviour of a legitimate pollinator, which either increases
253:
effectively evicts legitimate pollinators. Nectar robbers may change the behaviour of legitimate pollinators in other ways, such as by reducing the amount of nectar available. This may force pollinators to visit more flowers in their nectar foraging. The increased number of flowers visited and longer
142:
are prone to robbing. Secondary robbers often do not have suitable mouth parts to be able to create penetrations into the flowers themselves, nor to reach the nectar without robbing it. Thus they take advantage of the perforations already made by other organisms to be able to steal the nectar. For
395:
It is not completely clear how pollination mutualisms persist in the presence of cheating nectar robbers. Nevertheless, as exploitation is not always harmful for the plant, the relationship may be able to endure some cheating. Mutualism may simply confer a higher payoff than nectar robbing. Some
295:
The functionality of flowers can be curtailed by nectar robbers that severely maim the flower by shortening their life span. Damaged flowers are less attractive and thus can lead to a decrease in visit frequency as pollinators practice avoidance of robbed flowers and favor intact flowers. Nectar
134:
Nectar robbing is specifically the behavior of consuming nectar from a perforation (robbing hole) in the floral tissue rather than from the floral opening. There are two main types of nectar robbing: primary robbing, which requires that the nectar forager perforate the floral tissues itself, and
314:
The effect of robbing is positive if the robber also pollinates or increases the pollination by the legitimate pollinator, and negative if the robber damages the reproductive parts of a plant or reduces pollination success, either by competing with the legitimate pollinator or by lessening the
158:
The term "floral larceny" has been proposed to include the entire suite of foraging behaviors for floral rewards that can potentially disrupt pollination. They include "nectar theft" (floral visits that remove nectar from the floral opening without pollinating the flower), and "base working"
423:
Toxins and secondary compounds are likely to act as a defence against nectar robbing because they are often found in floral nectar or petal tissue. There is some evidence that secondary compounds in nectar only affect nectar robbers and not the pollinators. One example is a plant called
281:
by avoiding heavily robbed flowers. Pollinating birds may be better at this than insects, because of their higher sensory capability. The ways that bees distinguish between robbed and unrobbed flowers have not been studied, but they have been thought to be related to the damage on
470:
The term 'resistance' refers to the plant's ability to live and reproduce in spite of nectar robbers. This may happen, for example, by compensating the lost nectar by producing more. With the help of defence and resistance, mutualisms can persist even in the presence of cheaters.
438:
If robbers and pollinators forage at different times of day, plants may produce nectar according to the active period of a legitimate pollinator. This is an example of a defence by escaping in time. Another way to use time in defence is to flower only for one day as a tropical
43:, carried out by feeding from holes bitten in flowers, rather than by entering through the flowers' natural openings. Nectar robbers usually feed in this way, avoiding contact with the floral reproductive structures, and therefore do not facilitate plant reproduction via 300:
which causes a decrease in visitation frequency by legitimate pollinators. Nectar robbing can also cause plants to reallocate resources from reproduction and growth to replenishing the stolen nectar, which can be costly to produce for some plants.
305:
or decreases the fitness of a plant. There are both primary and secondary nectar robbers. Secondary robbers are those that take advantage of the holes made by primary robbers. While most flies and bees are secondary robbers, some species, such as
226:
but this does not lead to significant reduction in fruit-set of the plant. In another example, when 80 percent of the flowers in a study site were robbed and the robbers did not pollinate, neither the seed nor fruit set were negatively affected.
434:
that deter nectar-thieving ants but not legitimate bee pollinators. Low sugar concentration in nectar may also deter nectar robbers without deterring pollinators because dilute nectar does not yield net energy profits for robbers.
391:
Nectar robbers may only get food in illegitimate ways because of the mismatch between the morphologies of their mouthparts and the floral structure; or they may rob nectar as a more energy-saving way to get nectar from flowers.
262:. This requires a robber's not completely consuming all of a flower's nectar. When a robber consumes all of a flower's nectar, legitimate pollinators may avoid the flower, resulting in a negative effect on plant fitness. 238:
may take place when the body of the robber contacts the reproductive parts of the plant while it robs, or during pollen collection which some bees practice in concert with nectar robbing. The impact of
292:
steals nectar through a slit they make in the base of the petals. If nectar robbing severely reduces the success of legitimate pollinators they may be able to switch to other nectar sources.
51:. While there is variation in the dependency on nectar for robber species, most species rob facultatively (that is, to supplement their diets, rather than as an absolute necessity). 452:
bees. Escaping in space refers to a situation in which plant avoids being robbed by growing in a certain location like next to a plant which is more attractive to the robbers.
1476: 555:
Deng, X.; Ren, P.; Gao, J.; Li, Q. (2004). The Striped Squirrel (Tamiops swinhoei hainanus) as a Nectar Robber of Ginger (Alpinia kwangsiensis). Biotropica. 36(4):633โ€“636.
412:(especially florivores). Some defences may have evolved through traits originally referred to pollination. Defences against nectar robbers have been thought to include 1173:
Traveset, A.; Willson, M. F.; Sabag, C. (1998). "Effect of nectar robbing birds on fruit set of Fuchsia magellanica in Tierra Del Fuego: a disrupted mutualism".
546:
Olmos, F.; Boulhosa, R. (2000). A meeting of opportunists: birds and other visitors to Mabea fistulifera (Euphorbiaceae) in florescences. Ararajuba 8(2):93โ€“98.
212:
or nectar. As nectar robbers receive the rewards without direct contact with the reproductive parts of the flower, their behaviour is easily assumed to be
568:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-11-02). "Nectar Robbing: Ecological and Evolutionary Perspectives".
47:. Because many species that act as pollinators also act as nectar robbers, nectar robbing is considered to be a form of exploitation of plant-pollinator 910:
Schemsk e, Douglas W.; Horvitz, Carol C. (1984). "Variation among Floral Visitors in Pollination Ability: A Precondition for Mutualism Specialization".
396:
studies have shown that nectar robbing does not have a significant negative effect on the reproductive success of both male and female plants.
662: 408:
evolved in plants against nectar robbers, the adaptations have been assumed not to rise from traits used in interactions between plants and
1362:
Anstett, M.C.; Hossaert, McKey M.; Kjellberg, F. (1997). "Figs and fig pollinators: Evolutionary conflicts in a coevolved mutualism".
138:
The former is performed most often on flowers whose nectar is concealed or hard to reach. For instance, long flowers with tubular
1327:
Pellmyr O.; Thompson J.N.; Brown J.M.; Harrison R.G. (1996). "Evolution of pollination and mutualism in the yucca moth lineage".
1019:
Irwin, R. E.; Brody, A. K. (1998). "Nectar Robbing in Ipomopsis aggregata: effects on pollinator behaviour and plant fitness".
234:
depends on several issues. Firstly, nectar robbers, such as carpenter bees, bumble bees and some birds, can pollinate flowers.
277:
and many species of nectar-feeding birds can distinguish between robbed and unrobbed plants and minimize their energy cost of
834:
Irwin, R. E. (2003). "Impact of nectar robbing on estimates of pollen flow: conceptual predictions and empirical outcomes".
93: 1218:
Irwin R. E.; Brody A. K. (1999). "Nectar robbing bumble bees reduce the fitness of Ibomopsis aggregata (Polemoniaceae)".
1073:
Roubic, D. W. (1982). "The ecological impact of nectar robbing bees and pollinating humming birds on a tropical shrub".
969:
Maloof J. E. (2001). "The effects of a bumble bee nectar robber on plant reproductive success and pollinator behavior".
788:
Morris, W. F. (1996). "Mutualism denied? Nectar-robbing bumble bees do not reduce female or male success of bluebells".
204:
Pollination systems are mostly mutualistic, meaning that the plant benefits from the pollinator's transport of male
216:. However, the effect of robbery on the plant is sometimes neutral or even positive. For example, the proboscis of 459:. Tightly packed flowers and unfavourably sized corolla tubes, bract liquid moats and toughness of the corolla or 109: 847: 533: 121: 388:
flowerpiercers have serrated bills that are thought to aid them in incising flower tissue for nectar robbing.
354: 265:
The response of different species of legitimate pollinators also varies. Some species, like the bumble bees
1132: 750: 519: 650: 259: 120:
observed bumblebees stealing nectar from flowers in 1859. These observations were published in his book
1416:
Zhang Y.; Wang Y.; Guo Y. (2006). "The effects of nectar robbing on plant reproduction and evolution".
863:"Pollination ecology of Anthyllis vulneraria subsp. vulgaris (Fabaceae): Nectar robbers as pollinators" 1496: 1299: 1227: 1182: 1082: 1028: 919: 797: 713: 615: 417: 463:
are barriers for some nectar robbers. A good example of an indirect defence is to attract symbiotic
1506: 1266:"Effects of nectar robbing on male and female reproductive success of a pollinator-dependent plant" 524: 48: 1501: 1456: 1344: 1243: 1098: 1052: 986: 951: 935: 884: 813: 631: 250: 213: 1379: 1152: 1044: 994: 943: 892: 770: 658: 585: 288: 273: 231: 36: 24: 1131:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-12-01).
749:
Irwin, Rebecca E.; Bronstein, Judith L.; Manson, Jessamyn S.; Richardson, Leif (2010-12-01).
1491: 1448: 1371: 1336: 1307: 1235: 1198: 1190: 1144: 1090: 1036: 978: 927: 874: 843: 805: 762: 729: 721: 623: 577: 529: 426: 267: 1397:
Ornelas, J. F. (1994). "Serrate tomia: An adaptation for nectar robbing in hummingbirds?".
19: 1148: 766: 581: 444: 307: 144: 81: 64: 1265: 1303: 1231: 1186: 1086: 1032: 923: 801: 717: 619: 218: 135:
secondary robbing, which is foraging from a robbing hole created by a primary robber.
117: 108:
Records of nectar robbing in nature date back at least to 1793, when German naturalist
1375: 1485: 1312: 1287: 1194: 349: 85: 55: 1348: 1056: 955: 701: 510:
Maloof, J. E.; Inouye, D. W. (2000). "Are nectar robbers cheaters or mutualists?".
455:
The last two methods of protection are physical barriers and indirect defence like
339: 328: 296:
robbers that diminish the volume of nectar in flowers may also leave behind their
186: 931: 365: 255: 235: 172: 77: 44: 405: 381: 1156: 774: 589: 151:) are unable to reach the nectar located at the base of long flowers such as 464: 456: 431: 409: 152: 89: 59: 1383: 1048: 998: 947: 896: 1040: 249:) on a plant is almost always negative, probably because their aggressive 702:"The dual role of floral traits: pollinator attraction and plant defence" 373: 278: 1203: 114:
The Secret of Nature in the Form and Fertilization of Flowers Discovered
112:
observed bumblebees perforating flowers. This was recorded in his book,
54:
Nectar robbers vary greatly in species diversity and include species of
1460: 1102: 990: 939: 888: 817: 734: 635: 241: 97: 1247: 222:
does not come in contact with the reproductive parts of the flower in
209: 205: 40: 1452: 1094: 982: 879: 862: 809: 725: 627: 420:, escape in time or space, physical barriers and indirect defences. 1340: 1239: 467:(like ants) by nectar or other rewards to scare away the robbers. 460: 440: 413: 377: 369: 283: 139: 18: 1435:
Stephenson, A. G. (1981). "Toxic nectar deters nectar thieves of
297: 69: 606:
Inouye, David W. (1980). "The Terminology of Floral Larceny".
358:(top), and hole used to obtain the nectar (bottom, red circle) 73: 848:
10.1890/0012-9658(2003)084[0485:IONROE]2.0.CO;2
534:
10.1890/0012-9658(2000)081[2651:ANRCOM]2.0.CO;2
1133:"Nectar Robbing: Ecological and Evolutionary Perspectives" 751:"Nectar Robbing: Ecological and Evolutionary Perspectives" 258:, which is beneficial for the plant because it lessens 1137:
Annual Review of Ecology, Evolution, and Systematics
755:
Annual Review of Ecology, Evolution, and Systematics
570:
Annual Review of Ecology, Evolution, and Systematics
404:
Even though there has not been much research on the
1477:
iNaturalist observations of nectar robbing behavior
286:tissue after robbery or changes in nectar quality. 208:and the pollinator benefits from a reward, such as 700:Irwin, R. E.; Adler, L. S.; Brody, A. K. (2004). 563: 561: 230:The effect of floral-nectar robbing on plant 8: 1281: 1279: 829: 827: 649:Inouye, D. W.; Ogilvie, J. E. (2017-01-01), 192:...and using its tongue to drink the nectar. 1168: 1166: 695: 693: 691: 689: 687: 685: 683: 681: 679: 39:used by some organisms that feed on floral 254:flight distances increase pollen flow and 1311: 1202: 1068: 1066: 878: 733: 523: 505: 503: 430:which produces nectar containing iridoid 1116:Bentley, Barbara; Elias, Thomas (1983). 1014: 1012: 1010: 1008: 601: 599: 501: 499: 497: 495: 493: 491: 489: 487: 485: 483: 368:, as in the close relationships between 143:example, short-tongued bees such as the 479: 1259: 1257: 1149:10.1146/annurev.ecolsys.110308.120330 767:10.1146/annurev.ecolsys.110308.120330 582:10.1146/annurev.ecolsys.110308.120330 198:A bumblebee "nectar robbing" a flower 88:. Nectar-robbing mammals include the 7: 1264:Roja-Nossa, S.V. (19 October 2015). 178:Biting open the base of a flower... 14: 655:Reference Module in Life Sciences 1313:10.1046/j.1461-0248.2001.00218.x 1288:"The exploitation of mutualisms" 1195:10.1046/j.1365-2435.1998.00212.x 352:, robbing nectar from the plant 338: 327: 185: 171: 1364:Trends in Ecology and Evolution 116:, which was written in Berlin. 1: 1376:10.1016/s0169-5347(96)10064-1 348:Female of a hummingbird, the 1120:. Columbia University Press. 932:10.1126/science.225.4661.519 400:Defences in flowering plants 96:, which rob nectar from the 1441:American Midland Naturalist 1523: 971:American Journal of Botany 867:American Journal of Botany 448:does to avoid the robbing 364:Pollination systems cause 311:, act as primary robbers. 94:Swinhoe's striped squirrel 1286:Bronstein, J. L. (2001). 319:Evolutionary implications 110:Christian Konrad Sprengel 1118:The Biology of Nectaries 163:Effects on plant fitness 651:"Pollinators, Role ofโ˜†" 130:Forms of floral larceny 355:Amphilophium elongatum 29: 1418:Zhiwu Shengtai Xuebao 1041:10.1007/s004420050617 260:inbreeding depression 251:territorial behaviour 123:The Origin of Species 68:bees, solitary bees, 22: 224:Calathea ovandensis, 1329:American Naturalist 1304:2001EcolL...4..277B 1232:1999Ecol...80.1703I 1187:1998FuEco..12..459T 1087:1982Ecol...63..354R 1033:1998Oecol.116..519I 924:1984Sci...225..519S 802:1996Ecol...77.1451M 718:2004Ecol...85.1503I 620:1980Ecol...61.1251I 418:secondary compounds 1175:Functional Ecology 861:Navarro L (2000). 445:Pavonia dasypetala 247:Trigona ferricauda 30: 977:(11): 1960โ€“1965. 918:(4661): 519โ€“521. 664:978-0-12-809633-8 518:(10): 2651โ€“2661. 289:Xylocopa sonorina 37:foraging behavior 25:Bombus terrestris 16:Foraging behavior 1514: 1465: 1464: 1437:Catalpa speciosa 1432: 1426: 1425: 1413: 1407: 1406: 1394: 1388: 1387: 1359: 1353: 1352: 1324: 1318: 1317: 1315: 1283: 1274: 1273: 1261: 1252: 1251: 1226:(5): 1703โ€“1712. 1215: 1209: 1208: 1206: 1170: 1161: 1160: 1128: 1122: 1121: 1113: 1107: 1106: 1070: 1061: 1060: 1016: 1003: 1002: 966: 960: 959: 907: 901: 900: 882: 858: 852: 851: 831: 822: 821: 796:(5): 1451โ€“1462. 785: 779: 778: 746: 740: 739: 737: 712:(6): 1503โ€“1511. 697: 674: 673: 672: 671: 646: 640: 639: 614:(5): 1251โ€“1253. 603: 594: 593: 565: 556: 553: 547: 544: 538: 537: 527: 507: 427:Catalpa speciosa 342: 331: 268:Bombus appositus 189: 175: 1522: 1521: 1517: 1516: 1515: 1513: 1512: 1511: 1482: 1481: 1473: 1468: 1453:10.2307/2424757 1434: 1433: 1429: 1415: 1414: 1410: 1396: 1395: 1391: 1361: 1360: 1356: 1326: 1325: 1321: 1292:Ecology Letters 1285: 1284: 1277: 1270:Oxford Academic 1263: 1262: 1255: 1217: 1216: 1212: 1172: 1171: 1164: 1130: 1129: 1125: 1115: 1114: 1110: 1095:10.2307/1938953 1072: 1071: 1064: 1018: 1017: 1006: 983:10.2307/3558423 968: 967: 963: 909: 908: 904: 880:10.2307/2656997 860: 859: 855: 833: 832: 825: 810:10.2307/2265542 787: 786: 782: 748: 747: 743: 726:10.1890/03-0390 699: 698: 677: 669: 667: 665: 648: 647: 643: 628:10.2307/1936841 605: 604: 597: 567: 566: 559: 554: 550: 545: 541: 509: 508: 481: 477: 402: 362: 361: 360: 359: 345: 344: 343: 334: 333: 332: 321: 308:Bombylius major 274:B. occidentalis 202: 201: 200: 199: 195: 194: 193: 190: 181: 180: 179: 176: 165: 149:Bombus pratorum 145:early bumblebee 132: 106: 82:passerine birds 28:stealing nectar 17: 12: 11: 5: 1520: 1518: 1510: 1509: 1504: 1499: 1494: 1484: 1483: 1480: 1479: 1472: 1471:External links 1469: 1467: 1466: 1447:(2): 381โ€“383. 1427: 1408: 1389: 1354: 1341:10.1086/285958 1335:(5): 827โ€“847. 1319: 1298:(3): 277โ€“287. 1275: 1253: 1240:10.2307/176558 1210: 1181:(3): 459โ€“464. 1162: 1143:(1): 271โ€“292. 1123: 1108: 1081:(2): 354โ€“360. 1062: 1027:(4): 519โ€“527. 1004: 961: 902: 873:(7): 980โ€“985. 853: 842:(2): 485โ€“495. 823: 780: 761:(1): 271โ€“292. 741: 675: 663: 641: 595: 576:(1): 271โ€“292. 557: 548: 539: 525:10.1.1.463.752 478: 476: 473: 401: 398: 347: 346: 337: 336: 335: 326: 325: 324: 323: 322: 320: 317: 219:Eurybia elvina 197: 196: 191: 184: 183: 182: 177: 170: 169: 168: 167: 166: 164: 161: 131: 128: 118:Charles Darwin 105: 102: 86:flowerpiercers 56:carpenter bees 33:Nectar robbing 15: 13: 10: 9: 6: 4: 3: 2: 1519: 1508: 1505: 1503: 1500: 1498: 1495: 1493: 1490: 1489: 1487: 1478: 1475: 1474: 1470: 1462: 1458: 1454: 1450: 1446: 1442: 1438: 1431: 1428: 1424:(4): 695โ€“702. 1423: 1419: 1412: 1409: 1405:(3): 703โ€“713. 1404: 1400: 1393: 1390: 1385: 1381: 1377: 1373: 1369: 1365: 1358: 1355: 1350: 1346: 1342: 1338: 1334: 1330: 1323: 1320: 1314: 1309: 1305: 1301: 1297: 1293: 1289: 1282: 1280: 1276: 1271: 1267: 1260: 1258: 1254: 1249: 1245: 1241: 1237: 1233: 1229: 1225: 1221: 1214: 1211: 1205: 1200: 1196: 1192: 1188: 1184: 1180: 1176: 1169: 1167: 1163: 1158: 1154: 1150: 1146: 1142: 1138: 1134: 1127: 1124: 1119: 1112: 1109: 1104: 1100: 1096: 1092: 1088: 1084: 1080: 1076: 1069: 1067: 1063: 1058: 1054: 1050: 1046: 1042: 1038: 1034: 1030: 1026: 1022: 1015: 1013: 1011: 1009: 1005: 1000: 996: 992: 988: 984: 980: 976: 972: 965: 962: 957: 953: 949: 945: 941: 937: 933: 929: 925: 921: 917: 913: 906: 903: 898: 894: 890: 886: 881: 876: 872: 868: 864: 857: 854: 849: 845: 841: 837: 830: 828: 824: 819: 815: 811: 807: 803: 799: 795: 791: 784: 781: 776: 772: 768: 764: 760: 756: 752: 745: 742: 736: 731: 727: 723: 719: 715: 711: 707: 703: 696: 694: 692: 690: 688: 686: 684: 682: 680: 676: 666: 660: 656: 652: 645: 642: 637: 633: 629: 625: 621: 617: 613: 609: 602: 600: 596: 591: 587: 583: 579: 575: 571: 564: 562: 558: 552: 549: 543: 540: 535: 531: 526: 521: 517: 513: 506: 504: 502: 500: 498: 496: 494: 492: 490: 488: 486: 484: 480: 474: 472: 468: 466: 462: 458: 453: 451: 447: 446: 442: 436: 433: 429: 428: 421: 419: 415: 411: 407: 399: 397: 393: 389: 387: 383: 379: 375: 371: 367: 357: 356: 351: 350:horned sungem 341: 330: 318: 316: 312: 310: 309: 302: 299: 293: 291: 290: 285: 280: 276: 275: 270: 269: 263: 261: 257: 252: 248: 244: 243: 237: 233: 228: 225: 221: 220: 215: 211: 207: 188: 174: 162: 160: 156: 154: 150: 146: 141: 136: 129: 127: 125: 124: 119: 115: 111: 103: 101: 99: 95: 91: 87: 83: 79: 75: 71: 67: 66: 61: 57: 52: 50: 46: 42: 38: 34: 27: 26: 21: 1444: 1440: 1436: 1430: 1421: 1417: 1411: 1402: 1398: 1392: 1370:(3): 94โ€“99. 1367: 1363: 1357: 1332: 1328: 1322: 1295: 1291: 1269: 1223: 1219: 1213: 1204:10261/110827 1178: 1174: 1140: 1136: 1126: 1117: 1111: 1078: 1074: 1024: 1020: 974: 970: 964: 915: 911: 905: 870: 866: 856: 839: 835: 793: 789: 783: 758: 754: 744: 709: 705: 668:, retrieved 657:, Elsevier, 654: 644: 611: 607: 573: 569: 551: 542: 515: 511: 469: 454: 449: 443: 437: 425: 422: 403: 394: 390: 385: 363: 353: 313: 306: 303: 294: 287: 272: 266: 264: 246: 240: 229: 223: 217: 203: 157: 148: 137: 133: 122: 113: 107: 98:ginger plant 84:, including 78:hummingbirds 63: 62:, stingless 53: 32: 31: 23: 1497:Pollination 735:10919/24802 382:yucca moths 376:as well as 366:coevolution 256:outcrossing 245:bees (e.g. 236:Pollination 80:, and some 45:pollination 1507:Parasitism 1486:Categories 670:2021-12-04 475:References 432:glycosides 410:herbivores 60:bumblebees 1502:Symbiosis 1157:1543-592X 1021:Oecologia 775:1543-592X 590:1543-592X 520:CiteSeerX 465:predators 457:symbionts 374:fig wasps 90:fruit bat 49:mutualism 1384:21237991 1349:84816447 1049:28307521 999:21669629 948:17750855 897:10898775 406:defences 386:Diglossa 279:foraging 214:cheating 153:comfreys 140:corollas 1492:Ecology 1461:2424757 1399:The Auk 1300:Bibcode 1228:Bibcode 1220:Ecology 1183:Bibcode 1103:1938953 1083:Bibcode 1075:Ecology 1057:7113074 1029:Bibcode 991:3558423 956:7256793 940:1694004 920:Bibcode 912:Science 889:2656997 836:Ecology 818:2265542 798:Bibcode 790:Ecology 714:Bibcode 706:Ecology 636:1936841 616:Bibcode 608:Ecology 512:Ecology 450:Trigona 242:Trigona 232:fitness 206:gametes 104:History 65:Trigona 1459:  1382:  1347:  1248:176558 1246:  1155:  1101:  1055:  1047:  997:  989:  954:  946:  938:  895:  887:  816:  773:  661:  634:  588:  522:  414:toxins 378:yuccas 210:pollen 41:nectar 1457:JSTOR 1345:S2CID 1244:JSTOR 1099:JSTOR 1053:S2CID 987:JSTOR 952:S2CID 936:JSTOR 885:JSTOR 814:JSTOR 632:JSTOR 461:sepal 441:shrub 284:petal 70:wasps 35:is a 1380:PMID 1153:ISSN 1045:PMID 995:PMID 944:PMID 893:PMID 771:ISSN 659:ISBN 586:ISSN 416:and 380:and 372:and 370:figs 298:odor 92:and 74:ants 1449:doi 1445:105 1439:". 1403:111 1372:doi 1337:doi 1333:148 1308:doi 1236:doi 1199:hdl 1191:doi 1145:doi 1091:doi 1037:doi 1025:116 979:doi 928:doi 916:225 875:doi 844:doi 806:doi 763:doi 730:hdl 722:doi 624:doi 578:doi 530:doi 271:or 126:. 1488:: 1455:. 1443:. 1422:30 1420:. 1401:. 1378:. 1368:12 1366:. 1343:. 1331:. 1306:. 1294:. 1290:. 1278:^ 1268:. 1256:^ 1242:. 1234:. 1224:80 1222:. 1197:. 1189:. 1179:12 1177:. 1165:^ 1151:. 1141:41 1139:. 1135:. 1097:. 1089:. 1079:63 1077:. 1065:^ 1051:. 1043:. 1035:. 1023:. 1007:^ 993:. 985:. 975:88 973:. 950:. 942:. 934:. 926:. 914:. 891:. 883:. 871:87 869:. 865:. 840:84 838:. 826:^ 812:. 804:. 794:77 792:. 769:. 759:41 757:. 753:. 728:. 720:. 710:85 708:. 704:. 678:^ 653:, 630:. 622:. 612:61 610:. 598:^ 584:. 574:41 572:. 560:^ 528:. 516:81 514:. 482:^ 100:. 76:, 72:, 58:, 1463:. 1451:: 1386:. 1374:: 1351:. 1339:: 1316:. 1310:: 1302:: 1296:4 1272:. 1250:. 1238:: 1230:: 1207:. 1201:: 1193:: 1185:: 1159:. 1147:: 1105:. 1093:: 1085:: 1059:. 1039:: 1031:: 1001:. 981:: 958:. 930:: 922:: 899:. 877:: 850:. 846:: 820:. 808:: 800:: 777:. 765:: 738:. 732:: 724:: 716:: 638:. 626:: 618:: 592:. 580:: 536:. 532:: 147:(

Index


Bombus terrestris
foraging behavior
nectar
pollination
mutualism
carpenter bees
bumblebees
Trigona
wasps
ants
hummingbirds
passerine birds
flowerpiercers
fruit bat
Swinhoe's striped squirrel
ginger plant
Christian Konrad Sprengel
Charles Darwin
The Origin of Species
corollas
early bumblebee
comfreys


gametes
pollen
cheating
Eurybia elvina
fitness

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘