نتایج جستجو برای: authorized exploiters
تعداد نتایج: 6369 فیلتر نتایج به سال:
This paper describes the key management method which allows secure communication channels between devices in home networks. Home network technologies have developed to enable various kinds of home devices to access the digital information between the devices. Without security framework, however, the digital information including a user’s private data may be exposed to a malicious attacker. Alth...
Two plants can influence one another indirectly by affecting population dynamics of shared exploiters and/or mutualists, giving rise to apparent competition or mutualism, respectively. Indirect interactions between also occur when the preferences and mutualists adapt changes in relative plant densities. Here we study simultaneous effects adaptive herbivore pollinator on two competing population...
The combined impact of multiple plant parasites on plant performance can either be additive (the total damage equals the sum of the individual effects) or nonadditive (synergistic or antagonistic damage). Two statistical models are available for testing the independent (=additive) effects of two factors. Here we suggest that the natural history of the plant-parasite system should motivate the c...
Ant-plant interactions represent a diversity of strategies, from exploitative to mutualistic, and how these strategies evolve is poorly understood. Here, we link physiological, ecological, and phylogenetic approaches to study the evolution and coexistence of strategies in the Acacia-Pseudomyrmex system. Host plant species represented 2 different strategies. High-reward hosts produced significan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید