scholarly journals Caching at a distance: a cache protection strategy in Eurasian jays

2016 ◽  
Vol 19 (4) ◽  
pp. 753-758 ◽  
Author(s):  
Edward W. Legg ◽  
Ljerka Ostojić ◽  
Nicola S. Clayton
2013 ◽  
Vol 280 (1752) ◽  
pp. 20122238 ◽  
Author(s):  
Rachael C. Shaw ◽  
Nicola S. Clayton

Food-storing corvids use many cache-protection and pilfering strategies. We tested whether Eurasian jays ( Garrulus glandarius ) reduce the transfer of auditory information to a competitor when caching and pilfering. We gave jays a noisy and a quiet substrate to cache in. Compared with when alone, birds cached less in the noisy substrate when with a conspecific that could hear but could not see them caching. By contrast, jays did not change the amount cached in the noisy substrate when they were with a competitor that could see and hear them caching compared with when they were alone. Together, these results suggest that jays reduce auditory information during caching as a cache-protection strategy. By contrast, as pilferers, jays did not attempt to conceal their presence from a cacher and did not prefer a silent viewing perch over a noisy one when observing caching. However, birds vocalized less when watching caching compared with when they were alone, when they were watching a non-caching conspecific or when they were watching their own caches being pilfered. Pilfering jays may therefore attempt to suppress some types of auditory information. Our results raise the possibility that jays both understand and can attribute auditory perception to another individual.


2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


Engineering ◽  
2021 ◽  
Author(s):  
Yuping Zheng ◽  
Jiawei He ◽  
Bin Li ◽  
Tonghua Wu ◽  
Wei Dai ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document