Parallels between sexual strategies and other allocation strategies

Author(s):  
D. G. Lloyd
2020 ◽  
pp. 177-196
Author(s):  
Kota Sawada ◽  
Sachi Yamaguchi

This chapter reviews sex determination and sex allocation strategies among crustaceans with different sexual systems (gonochorism, sequential and simultaneous hermaphroditism, and androdioecy), from the perspective of evolutionary ecology. The discussion includes genetic, environmental, and cytoplasmic sex determination in free-living and parasitic crustaceans, timing and frequency of sex change especially in partial protandry, the effects of mating group size on resource allocation by simultaneous hermaphrodites, and sex ratio and determination in androdioecious crustaceans. The fascinating diversity of crustacean reproduction stimulated theoretical biologists to construct models to explain them, and empirical biologists attempted to test hypotheses derived from those models. This review clearly shows that the interaction between theoretical and empirical studies has facilitated understanding of the evolutionary conditions of diverse sexual strategies among crustaceans. Since sexual strategies often interact with other aspects of adaptive strategies such as life history, integrating different aspects into both theoretical and empirical studies will provide further understandings into crustacean sexual systems. In addition, the authors point out the potential of phylogenetic comparative analyses using natural history data as a tool to understand the tempo and mode of evolution of sex allocation strategies.


2007 ◽  
Author(s):  
David M. Njus ◽  
Cynthia M. Bane ◽  
Brian Meyer ◽  
Cathy Betterman

2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Sign in / Sign up

Export Citation Format

Share Document