Please use this identifier to cite or link to this item:
|Type:||Artigo de periódico|
|Title:||Nectar Robbery By A Hermit Hummingbird: Association To Floral Phenotype And Its Influence On Flowers And Network Structure.|
|Author:||Maruyama, Pietro Kiyoshi|
|Abstract:||Interactions between flowers and their visitors span the spectrum from mutualism to antagonism. The literature is rich in studies focusing on mutualism, but nectar robbery has mostly been investigated using phytocentric approaches focused on only a few plant species. To fill this gap, we studied the interactions between a nectar-robbing hermit hummingbird, Phaethornis ruber, and the array of flowers it visits. First, based on a literature review of the interactions involving P. ruber, we characterized the association of floral larceny to floral phenotype. We then experimentally examined the effects of nectar robbing on nectar standing crop and number of visits of the pollinators to the flowers of Canna paniculata. Finally, we asked whether the incorporation of illegitimate interactions into the analysis affects plant-hummingbird network structure. We identified 97 plant species visited by P. ruber and found that P. ruber engaged in floral larceny in almost 30 % of these species. Nectar robbery was especially common in flowers with longer corolla. In terms of the effect on C. paniculata, the depletion of nectar due to robbery by P. ruber was associated with decreased visitation rates of legitimate pollinators. At the community level, the inclusion of the illegitimate visits of P. ruber resulted in modifications of how modules within the network were organized, notably giving rise to a new module consisting of P. ruber and mostly robbed flowers. However, although illegitimate visits constituted approximately 9 % of all interactions in the network, changes in nestedness, modularity, and network-level specialization were minor. Our results indicate that although a flower robber may have a strong effect on the pollination of a particular plant species, the inclusion of its illegitimate interactions has limited capacity to change overall network structure.|
|Citation:||Oecologia. , 2015-Mar.|
|Appears in Collections:||Unicamp - Artigos e Outros Documentos|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.