cache protection
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 5)

H-INDEX

10
(FIVE YEARS 0)

Author(s):  
Aleksandra Wróbel ◽  
Przemysław Kurek ◽  
Dorota Dobrowolska

AbstractSeed hoarding by granivorous animals requires cache-protection strategies which allow to protect hoarded seeds against pilferage. This study reports the first case of acorn hoarding in tree cavities by Eurasian Jays (Garrulus glandarius). Out of 116 removed acorns of both pedunculate oak (Quercus robur) and Northern red oak (Q. rubra), we localized 14 consumed and 102 stored acorns. Five experimental acorns (4.9% of stored acorns) were found stored in tree cavities. The notion that hoarding seeds in tree cavities may constitute a cache-protection behavior of Eurasian Jays represents a working hypothesis that ought to be tested in future studies.


2021 ◽  
Author(s):  
Piero Amodio ◽  
Benjamin G Farrar ◽  
Christopher Krupenye ◽  
Ljerka Ostojic ◽  
Nicola S Clayton

Corvids appear to be capable of adjusting their behaviour according to another's perspective, knowledge and desire. For example, Eurasian jays have been found to employ a variety of cache protection strategies to minimise cache loss by responding to cues about the visual perspective or current desire of an observing conspecific. However, it is not known whether these jays (or any other corvid) can integrate multiple cues about different mental states and perform the optimal response accordingly. Across five experiments, we found little evidence that our Eurasian jays responded to either the visual perspective or current desire of another agent. In Experiments 1 and 2 we investigated whether Eurasian jays can limit the risk of cache loss by responding simultaneously to cues about the desire and perspective of a potential conspecific pilferer. Building on established paradigms, we used opaque and clear barriers to manipulate the observer's visual access to cache locations, and specific satiety to manipulate the observer's desire towards different types of food. Across both experiments the jays' caching pattern provided no evidence that they could integrate information about the observer's desire and perspective. Moreover, the results were also inconsistent with the previously reported effects that jays protect their caches by responding to either the visual access or specific satiety of the observer independently. To gain further insight into these unexpected results, we conducted three more experiments. In Experiments 3 and 4, we attempted to replicate the previous finding that Eurasian jays prefer to cache behind an opaque barrier over a clear barrier when observed by a conspecific than when caching in private. In Experiment 5, we further investigated the previous finding that jays preferentially cache a type of food that had been eaten to satiety by a conspecific over a food that had not been eaten by the conspecific. Experiments 3, 4 and 5 found no significant effects in the direction of the previously reported effects, questioning their robustness. We conclude by discussing the implications of our study for the field of corvid cognition and highlight several key issues that affect the reliability of comparative cognition research.


2019 ◽  
Author(s):  
Mikel M. Delgado ◽  
Lucia F. Jacobs

AbstractScatter-hoarding animals cannot physically protect individual caches, and instead utilize several behavioral strategies that are hypothesized to offer protection for caches. We validated the use of physically altered, cacheable food items, and determined that intraspecific pilfering among free-ranging fox squirrels (N = 23) could be assessed in the field. In this study we were able to identify specific individual squirrels who pilfered or moved caches that had been stored by a conspecific. We identified a high level of pilfering (25%) among this population. In a subsequent study, we assessed the fate of squirrel-made caches. Nineteen fox squirrels cached 294 hazelnuts with passive integrated transponder tags implanted in them. Variables collected included assessment and cache investment and protection behaviors; cache location, substrate, and conspicuousness of each cache; how long each cache remained in its original location, and the location where the cache was finally consumed. We also examined whether assessment or cache protection behaviors were related to the outcomes of buried nuts. Finally, we measured the population dynamics and heterogeneity of squirrels in this study, testing the hypothesis that cache proximity and pilferage tolerance could serve as a form of kin selection. Polymer chain reaction (PCR) was used to analyze hair samples and determine relatedness among 15 squirrels, and the potential impact of relatedness on caching behavior. Results suggested that cache protection behaviors and the lifespan of a cache were dependent on the conspicuousness of a cache. Squirrels may mitigate some of the costs of pilfering by caching closer to the caches of related squirrels than to those of non-related squirrels.


PeerJ ◽  
2018 ◽  
Vol 6 ◽  
pp. e4451 ◽  
Author(s):  
Katharina F. Brecht ◽  
Ljerka Ostojić ◽  
Edward W. Legg ◽  
Nicola S. Clayton

Previous research has suggested that videos can be used to experimentally manipulate social stimuli. In the present study, we used the California scrub-jays’ cache protection strategies to assess whether video playback can be used to simulate conspecifics in a social context. In both the lab and the field, scrub-jays are known to exhibit a range of behaviours to protect their caches from potential pilferage by a conspecific, for example by hiding food in locations out of the observer’s view or by re-caching previously made caches once the observer has left. Here, we presented scrub-jays with videos of a conspecific observer as well as two non-social conditions during a caching period and assessed whether they would cache out of the observer’s “view” (Experiment 1) or would re-cache their caches once the observer was no longer present (Experiment 2). In contrast to previous studies using live observers, the scrub-jays’ caching and re-caching behaviour was not influenced by whether the observer was present or absent. These findings suggest that there might be limitations in using video playback of social agents to mimic real-life situations when investigating corvid decision making.


2017 ◽  
Vol 13 (7) ◽  
pp. 20170242
Author(s):  
Laura A. Kelley ◽  
Nicola S. Clayton

Some animals hide food to consume later; however, these caches are susceptible to theft by conspecifics and heterospecifics. Caching animals can use protective strategies to minimize sensory cues available to potential pilferers, such as caching in shaded areas and in quiet substrate. Background matching (where object patterning matches the visual background) is commonly seen in prey animals to reduce conspicuousness, and caching animals may also use this tactic to hide caches, for example, by hiding coloured food in a similar coloured substrate. We tested whether California scrub-jays ( Aphelocoma californica ) camouflage their food in this way by offering them caching substrates that either matched or did not match the colour of food available for caching. We also determined whether this caching behaviour was sensitive to social context by allowing the birds to cache when a conspecific potential pilferer could be both heard and seen (acoustic and visual cues present), or unseen (acoustic cues only). When caching events could be both heard and seen by a potential pilferer, birds cached randomly in matching and non-matching substrates. However, they preferentially hid food in the substrate that matched the food colour when only acoustic cues were present. This is a novel cache protection strategy that also appears to be sensitive to social context. We conclude that studies of cache protection strategies should consider the perceptual capabilities of the cacher and potential pilferers.


2017 ◽  
Vol 27 (2) ◽  
pp. R51-R53 ◽  
Author(s):  
Ljerka Ostojić ◽  
Edward W. Legg ◽  
Katharina F. Brecht ◽  
Florian Lange ◽  
Chantal Deininger ◽  
...  

2016 ◽  
Vol 19 (4) ◽  
pp. 753-758 ◽  
Author(s):  
Edward W. Legg ◽  
Ljerka Ostojić ◽  
Nicola S. Clayton

Sign in / Sign up

Export Citation Format

Share Document