Node-by-node disassembly of a mutualistic interaction web driven by species introductions.
نویسندگان
چکیده
Interaction webs summarize the diverse interactions among species in communities. The addition or loss of particular species and the alteration of key interactions can lead to the disassembly of the entire interaction web, although the nontrophic effects of species loss on interaction webs are poorly understood. We took advantage of ongoing invasions by a suite of exotic species to examine their impact in terms of the disassembly of an interaction web in Patagonia, Argentina. We found that the reduction of one species (a host of a keystone mistletoe species) resulted in diverse indirect effects that led to the disassembly of an interaction web through the loss of the mistletoe, two key seed-dispersers (a marsupial and a bird), and a pollinator (hummingbird). Our results demonstrate that the gains and losses of species are both consequences and drivers of global change that can lead to underappreciated cascading coextinctions through the disruption of mutualisms.
منابع مشابه
Automatic QoS-aware Web Services Composition based on Set-Cover Problem
By definition, web-services composition works on developing merely optimum coordination among a number of available web-services to provide a new composed web-service intended to satisfy some users requirements for which a single web service is not (good) enough. In this article, the formulation of the automatic web-services composition is proposed as several set-cover problems and an approxima...
متن کاملEffects of T-2 Toxin on Cytokine Produc-tion by Mice Peritoneal Macrophages and Lymph Node T-Cells
Background: T-2 toxin is a mycotoxin of type A trichothecenes produced by several fungal genera such as Fusarium species. Mycotoxins can affect both cell mediated and humoral immune compartments. Objective: The purpose of this study was to investi-gate the effect of T-2 toxin on cytokine production by mouse peritoneal macrophages and lymph node T cells. Methods: Mouse peritoneal macrophages and...
متن کاملA confidence-aware interval-based trust model
It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...
متن کاملLink Prediction using Network Embedding based on Global Similarity
Background: The link prediction issue is one of the most widely used problems in complex network analysis. Link prediction requires knowing the background of previous link connections and combining them with available information. The link prediction local approaches with node structure objectives are fast in case of speed but are not accurate enough. On the other hand, the global link predicti...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Proceedings of the National Academy of Sciences of the United States of America
دوره 110 41 شماره
صفحات -
تاریخ انتشار 2013