Corrected Mean-Field Model for Random Sequential Adsorption on Random Geometric Graphs

A notorious problem in mathematics and physics is to create a solvable model for random sequential adsorption of non-overlapping congruent spheres in the d-dimensional Euclidean space with d≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d\ge 2$$\end{document}. Spheres arrive sequentially at uniformly chosen locations in space and are accepted only when there is no overlap with previously deposited spheres. Due to spatial correlations, characterizing the fraction of accepted spheres remains largely intractable. We study this fraction by taking a novel approach that compares random sequential adsorption in Euclidean space to the nearest-neighbor blocking on a sequence of clustered random graphs. This random network model can be thought of as a corrected mean-field model for the interaction graph between the attempted spheres. Using functional limit theorems, we characterize the fraction of accepted spheres and its fluctuations.


Introduction
Random sequential adsorption of congruent spheres in the d-dimensional Euclidean space has been a topic of great interest across the sciences, serving as basic models in condensed matter and quantum physics [21,28,35,37], nanotechnology [11,14], information theory and optimization problems [20,24,40]. Random sequential adsorption also arises naturally in experimental settings, ranging from the deposition of nano-scale particles on polymer surfaces, adsorption of proteins on solid surfaces to the creation of logic gates for quantum computing, and many more applications in domains as diverse biology, ecology and sociology, see [10,45,46] for extensive surveys. We refer with random sequential adsorption (rsa) to the dynamic process defined as follows: At each time epoch, a point appears at a uniformly chosen location in space, and an attempt is made to place a sphere of radius r with the chosen point as its center. The new sphere must either fit in the empty area without overlap with the spheres deposited earlier, or its deposition attempt is discarded. After n deposition attempts, the quantity of interest is the proportionof accepted spheres, or equivalently, the volume covered by the accepted spheres. Figure 1a illustrates an instance of this rsa process in 2D.
Equivalently, we may think of the interaction network of the n chosen centers of spheres by drawing an edge between two points if they are at most 2r distance apart. This is because a deposition attempt can block another deposition attempt if and only if the centers are at most 2r distance apart. The obtained random graph is known as the random geometric graph (rgg) [32]. The fraction of accepted spheres can be obtained via the following greedy algorithm to find independent sets of rgg: Given a graph G, initially, all the vertices are declared inactive. Sequentially activate uniformly chosen inactive vertices of the graph and block the neighborhood until all the inactive vertices are exhausted. We refer to the above greedy algorithm as rsa on the graph G. If G has the same distribution as rgg on n vertices, then the final set of active vertices has the same distribution as the number of accepted spheres in the continuum after n deposition attempts. Thus, we one can equivalently study rsa on rgg to obtain the fraction of accepted spheres when rsa is applied in continuum.
The precise setting in this paper considers rsa in a finite-volume box [0, 1] d with periodic boundary, filled with 'small' spheres of radius r and volume V d (r) [34,36,37]. Since the volume of [0, 1] d is 1, the probability that two randomly chosen vertices share an edge in the interaction network is equal to the volume of a sphere of radius 2r given by V d (2r) = π d/2 (2r) d /Γ (1 + d/2). Thus the average vertex degree in the rgg is c = nV d (2r), and since c is also the average number of overlaps per sphere, with all other attempted spheres, we interchangeably use the terms density and average degree for c. We operate in the sparse regime, where both r → 0 and n → ∞, so that c 0 is an arbitrary but fixed constant. In fact, maintaining a constant density c in the large-network limit is necessary to observe a non-degenerate limit of the fraction of accepted spheres. In other words, as we will see, the jamming fraction converges to 1 or 0 when c converges to 0 or infinity. Thus, in order for c to remain fixed as n → ∞, the radius should scale as a function of n according to r = r(n) = 1 2 Notice that it is equivalent to consider the deposition of spheres with fixed radii into a box of growing volume. We parameterize the rgg model by the density c and the dimension d, and henceforth write this as rgg(c, d). A typical instance of rgg(5, 2) with n = 1000 vertices is shown in Fig. 1b. Let J n (c, d) be the fraction of active vertices in the rgg(c, d) model on n vertices. In the classical setting, one keeps adding spheres until there is no place left to add another sphere and studies the fraction of area N n (d) covered by the accepted spheres. Detailed results about N n (d) involving law of large numbers and Gaussian fluctuations have been obtained in [33,38]. The settings under consideration in this paper, however, are known as fixed or finite input packing in the literature. It was shown in [34] that there exist constants J(c, d) and V(c, d) such that J n (c, d) More detailed results about the point process of locations of accepted spheres and the number of accepted spheres have been obtained in [4][5][6]17,39]. This includes both moderate and large deviation results for N n (d). To the best of our knowledge, finding an explicit quantitative characterization of J(c, d) for dimensions 2 remains an open problem, although numerical estimates have been obtained through extensive simulations [3,13,19,41,44,47,51].
In this paper, we do not aim to analyze the rsa process on rgg's directly. Rather, we introduce an approximate approach for studying J(c, d) and V(c, d) by considering rsa on a clustered random graph model, designed to match the local spatial properties of the rgg model in terms of average degree and clustering. Exact analysis of this random graph model leads to expressions for the limiting jamming fraction and its fluctuations, in turn providing approximations for J(c, d) and V(c, d). Using simulations we show that these approximations are accurate. havior of rsa on rgg and our proposed random graph model via. extensive simulation.
The paper is structured as follows: Sect. 2 introduces the clustered random graph and the correspondence with the random geometric graph. Section 3 presents the main results for the jamming fraction in the mean-field regime. We also show through extensive simulations that the mean-field approximations are accurate for all densities and dimensions. Sections 4, 5, and 6 contain all the proofs, and we conclude in Sect. 7 with a discussion.

Clustered Random Graphs
Random graphs serve to model large networked systems, but are typically unfit for capturing local clustering in the form of relatively many short cycles. This can be resolved by locally adding so-called households or small dense graphs [2,12,23,29,42,43,48,49]. Vertices in a household have a much denser connectivity to all (or many) other household members, which enforces local clustering. We now introduce a specific household model, called clustered random graph model (crg), designed for the purpose of analyzing the rsa problem. An arbitrary vertex in the crg model has local or short-distance connections with nearby vertices, and global or long-distance connections with the other vertices. When pairing vertices, the local and global connections are formed according to different statistical rules. The degree In the crg(c, α) model however, the total mass of connectivity measured in the density parameter c, is split into αc to account for direct local blocking and (1 − α)c to incorporate the propagation of spatial correlations over longer distances. The crg(c, α) model with n vertices is then defined as follows (see Fig. 2): • Partition the n vertices into random households of size 1+Poisson(αc). This can be done by sequentially selecting 1 + Poisson(αc) vertices uniformly at random and declaring them as a household, and repeat this procedure until at some point the next 1+Poisson(αc) random variable is at most the number of remaining vertices. All the remaining vertices are then declared a household too, and the household formation process is completed. • Now that all vertices are declared members of some household, the random graph is constructed according to a local and a global rule. The local rule says that all vertices in the same household get connected by an edge, leading to complete graphs of size 1+Poisson(αc). The global rule adds a connection between any two vertices belonging to two different households with probability (1 − α)c/n.
This creates a class of random networks with average degree c and tunable level of clustering via the free parameter α. With the goal to design a solvable model for the rsa process, the crg(c, α) model has nc/2 connections to build a random structure that mimics the local spatial structure of the rgg(c, d) model on n vertices. Seen as the topology underlying the rsa problem, the crg(c, α) model incorporates local clusters of overlapping spheres, which occur naturally in random geometric graphs; see Fig. 1b. We can now also consider rsa on the crg(c, α) model, by using the greedy algorithm that constructs an independent set on the graph by sequentially selecting vertices uniformly at random, and placing them in the independent set unless they are adjacent to some vertex already chosen. The jamming fraction J n (c, α) is then the size of the greedy independent set divided by the network size n. From a high-level perspective, we will solve the rsa problem on the crg(c, α) model, and translate this solution into an equivalent result for rsa on the rgg(c, d).
Our ansatz is that for large enough n, a unique relation can be established between dimension d in rgg and the parameter α = α d in crg, so that the jamming fractions are comparable, i.e., J n (c, d) ≈ J n (c, α d ), and virtually indistinguishable in the large network limit. In order to do so, we map the crg(c, α) model onto the rgg(c, d) model by imposing two natural conditions. The first condition matches the average degrees in both topologies, i.e., c is chosen to be equal to nV d (2r). The second condition tunes the local clustering. Let us first describe the clustering in the rgg model. Consider two points chosen uniformly at random in a d-dimensional hypersphere of radius 2r. Then what is the probability that these two points are themselves at most 2r distance apart? From the rgg perspective, this corresponds to the probability that, conditional on two vertices u and v being neighbors, a uniformly chosen neighbor w of u is also a neighbor of v, which is known as the local clustering coefficient [30]. In the crg(c, α) model, on the other hand, the relevant measure of clustering is α, the probability that a randomly chosen neighbor is a neighbor of one of its household members. We then choose the unique α-value that equates to the clustering coefficient of rgg. Denote this unique value by α d , to express its dependence on the dimension d. In Sect. 6, we show that with I z (a, b) the normalized incomplete beta integral. Table 1 shows the numerical values of α d for dimensions 1 to 5. With the uniquely characterized α d in (2.1), the crg(c, α d ) model can now serve as a generator of random topologies for guiding the rsa process. By extending the mean-field techniques recently developed for analyzing rsa on random graph models [7,9,16,36], it turns out that rsa on the crg(c, α d ) model is analytically solvable, even at later times when the filled space becomes more dense (large c).
The main goal of these works was to find greedy independent sets (or colorings) of large random networks. All these results, however, were obtained for non-geometric random graphs, typically used as first approximations for sparse interaction networks in the absence of any known geometry.

Limiting Jamming Fraction
For the crg(c, α) model on n vertices, recall that J n (c, α) denotes the fraction of active vertices at the end of the rsa process. We then have the following result, which characterize the limiting fraction: The ODE (3.1) can be understood intuitively in terms of the algorithmic description in Sect. 4.1 that sequentially explores the graph while activating the allowed vertices. Rescale time by n, so that after rescaling the algorithm has to end before time t = 1 (because the network size is n). Now think of x(t) as the fraction of neutral vertices at time t. Then clearly x(0) = 1, and the drift −t says that one vertex activates per time unit. Upon activation, a vertex on average blocks its αc household members and (1−α)c other vertices outside its household. At time t, the fraction of vertices that are not members of any discovered households equals on average (1 − (1 + αc)t) and all vertices which are not part of any discovered households, are potential household members of the newly active vertex (irrespective of whether it is blocked or not). Since household members are uniformly selected at random, only a fraction x(t)/(1 − (1 + αc)t) of the new αc household members will belong to the set of neutral vertices. Moreover, since all x(t)n vertices are being blocked by the newly active vertex with probability (1 − α)c/n, on average (1 − α)cx(t) neutral vertices will be blocked due to distant connections. Notice that the graph will be maximally packed when x(t) becomes zero, i.e., there are no neutral vertices that can become active. This explains why J (c, α) should be the time t when x(t) = 0, i.e., smallest root of (3.1).
is completely characterized by (3.1) and serves an approximation for the intractable counterpart J(c, d), the limiting jammed fraction for the rgg(c, d) model. The choice of α d , as discussed earlier, is given by (2.1) and shown in Table 1. Figure 3 validates the mean-field limit for the crg model, and shows the theoretical values J (c, α 2 ) from Theorem 3.1, along with the simulated values of J n (c, 2) on the rgg(c, 2) model for values of c ranging from 0 to 30. Figure 4 shows further comparisons between J (c, α d ) and J n (c, d) for dimensions d = 3, 4, 5, and densities 0 c 30. All simulations use n = 1000 vertices. The remarkable agreement of the J (c, α d )-curves with the simulated results across all dimensions shows that the integral equation (3.1) accurately describes the mean-field large-network behavior of the rsa process, not only for the crg model, but also for the rgg model. The following result is a direct consequence of Theorem 3.1, and gives a simple law to describe the asymptotic fraction J (c, α d ) in the large density (c → ∞) regime.
Hence, for large enough c, J (c, α d ) ≈ (1 + α d c) −1 serves as an approximation for all dimensions. Due to the accurate prediction provided by the crg model, the total scaled volume cJ(c, d)/2 d covered by the deposited spheres in dimension d can be well approximated. Indeed, for large c, Corollary 3.1 yields J (c, α d ) ∼ 1/(α d c), and in any dimension d, our model leads to a precise characterization of the covered volume given by Notice that α d → 0 as d → ∞. Thus, the interaction network described by the crg(c, α d ) model becomes almost like the (pure) mean-field Erdős-Rényi random graph model, which supports the widely believed conjecture that in high dimensions the interaction network associated with the random geometric graph loses its local clustering property [15].

Fluctuations of the Jamming Fraction
The next theorem characterizes the fluctuations of J n (c, α) around its mean: where Z has a normal distribution with mean zero and variance V (c, α). Here J (c, α) is given by Theorem 3.1, and V (c, α) = σ xx (J (c, α)) with σ xx (t) being the unique solution of the system of differential equations, for 0 t < 1/μ,  Table 2 shows numerical values of V (c, α d ) and compares the analytically obtained values of J (c, α d ) and V (c, α d ), and simulated mean and variance for the random geometric graph ensemble. The agreement again confirms the appropriateness of the crg(c, α d ) model for modeling the continuum rsa. Furthermore, V (c, α d ) serves as an approximation for the value of V(c, d), the asymptotic variance of J(c, d) (suitably rescaled). Figure 5b shows the density function of the random variable based on the Gaussian approximation in Theorem 3.2. We observe that both the mean and the fluctuations around the mean decrease with c. Indeed, the variance-to-mean ratio has been typically observed to be smaller than one for rsa in the continuum, and it is generally   believed that the jamming fractions are typically of sub-Poissonian nature with fluctuations that are not as large as for a Poisson distribution; see for instance the Mandel Q parameter in quantum physics [36]. So, while a closed-form expression remains out of reach (as for the Mandel Q parameter [36]), our solvable model gives a way to describe approximately the variance-to-mean ratio as V (c, α d )/J (c, α d ).

Proof of Theorem 3.1
In this section we analyze several asymptotic properties of rsa on the crg(c, α) model. In particular, we will prove Theorem 3.1. We first introduce an algorithm that sequentially activates the vertices while obeying the hard-core exclusion constraint, and then analyze the exploration algorithm (see [8,9,16] for similar analyses in various other contexts). The idea is to keep track of the number of vertices that are not neighbors of already actives vertices (termed unexplored vertices), so that when this number becomes zero, no vertex can be activated further. The number of unexplored vertices can then be decomposed into a drift part which converges to a deterministic function and a fluctuation or martingale part which becomes asymptotically negligible in the mean-filed case (Theorem 3.1) but gives rise to the a system of SDEs with variance (3.3). The proof crucially relies on the Functional Laws of Large Numbers (FLLN) and the Functional Central Limit Theorem (FCLT). The key challenge here is that the process that keeps track of the number of unexplored vertices while the exploration algorithm is running does not yield a Markov process, so we have to introduce another process to make the system Markovian and analyze this two-dimensional system. For each vertex, the neighboring vertices inside and outside its own household will be referred to as 'household neighbors' and 'distant neighbors', respectively. If H denotes the size of the households, then H ∼ 1 + Poisson(αc). Therefore, E (H) = 1 + αc, and Var(H) = αc. Furthermore, any two vertices belonging to two different households are connected by an edge with probability p n = (1 − α)c/n, so the number of distant neighbors is a Bin(n − H − 1, p n ) random variable, Poisson((1 − α)c) in the large n limit. As mentioned earlier, the total number of neighbors, is then asymptotically given by a Poisson(c) random variable. In this section we fix c > 0 and α ∈ [0, 1], and simply write J n and J for J n (c, α) and J (c, α) respectively.

Notation
We will use boldfaced letters to denote stochastic processes and vectors. A sequence of random variables {X n } n 1 is said to be O P (f(n)), or o P (f(n)), for some function f : R → R + , if the sequence of scaled random variables {X n /f(n)} n 1 is tight, or converges to zero in probability, respectively. We denote by D E [0, ∞) the set of all càdlàg (right continuous left limit exists) functions from [0, ∞) to a complete, separable metric space E, endowed with the Skorohod J 1 topology, and by ' d − →' and ' P − →', convergence in distribution and in probability, respectively. In particular, if the sample paths of a stochastic process X are continuous, we (4.1)

The Exploration Algorithm
Instead of fixing a particular realization of the random graph and then studying rsa on that given graph, we introduce an algorithm which sequentially activates the vertices one-by-one, explores the neighborhood of the activated vertices, and simultaneously builds the random graph topology on the activated and explored vertices. The joint distribution of the random graph and active vertices obtained this way is same as those obtained by first fixing the random graph and then studying rsa . The idea of exploring in the above fashion simplifies the whole analysis, since the evolution of the system can be described recursively in terms of the previous states, as described below in detail.
Observe that during the process of sequential activation, until the jamming state is reached, the vertices can be in either of three states: active, blocked, and unexplored (i.e. vertices with future potential activation). Furthermore, there can be two types of blocked vertices: (i) blocked due to activation of some household neighbor, or (ii) none of the household neighbors is active, but there is an active distant neighbor. Therefore, at each time t 0, categorize the vertices into four sets: • A(t): set of all vertices active.
• U(t): set of all vertices that are not active and that have not been blocked by any vertex in A(t). • BH(t): set of all vertices that belong to a household of some vertex in A(t).
• BO(t): set of all vertices that do not belong to a household yet, but are blocked due to connections with some vertex in A(t) as a distant neighbor.
Note that BH(t) ∪ BO(t) constitutes the set of all blocked vertices at time t, and BH(t) ∩ BO(t) = ∅. Initially, all vertices are unexplored, so that U(0) = V(G), the set of all n vertices. At time step t, one vertex v is selected from U(t − 1) uniformly at random and is transferred to A(t), i.e., one unexplored vertex becomes active. We now explore the neighbors of v, which can be of two types: the household neighbors, and the distant neighbors. Further observe that v can have its household neighbors only from the set U(t − 1) ∪ BO(t − 1) \ {v}, since each vertex in BH(t − 1) already belongs to some household. Define i.e., draw a Poisson(αc) random variable independently of any other process, and if it is smaller than |U(t − 1) ∪ BO(t − 1) \ {v}|, then take it to be the value of H − 1, and otherwise set H(t) = |U(t−1)∪BO(t−1)\{v}|. Select H(t) vertices {u 1 , u 2 , . . . , u H } at random from all vertices in U(t − 1) ∪ BO(t − 1) \ {v}. These H(t) vertices together form the household containing v, and are moved to BH(t), irrespective of the set they are selected from. To explore the distant neighbors, select one by one, all the vertices in U(t − 1) ∪ BO(t − 1) ∪ BH(t − 1) \ {v, u 1 , . . . , u H }, and for every such selected vertexū, put an edge betweenū and v with probability p n . Denote the newly created distant neighbors that belonged to U(t − 1) by {ū 1 , . . . ,ū d }, and move these vertices to BO(t). In summary, the exploration algorithm yields the following recursion relations: The algorithm terminates when there is no vertex left in the set U(t) (implying that all vertices are either active or blocked), and outputs the cardinality of A(t) as the number of active vertices in the jammed state.

State Description and Martingale Decomposition
Denote for t 0, Observe that {(X n (t), Y n (t))} t 0 is a Markov chain. At each time step, one new vertex becomes active, so that |A(t)| = t, and the total number of vertices in the jammed state is given by the time step when X n (t) hits zero, i.e., the time step when the exploration algorithm terminates. Let us now introduce the shorthand notation μ = E[H] = 1 + αc, σ 2 = Var (H) = αc and λ = (1 − α)c.
Dynamics of X n First we make the following observations: • X n (t) decreases by one, when a new vertex v becomes active.
• The household neighbors of v are selected from Y n (t − 1) vertices, and X n (t) decreases by an amount of the number of such vertices which are in U(t − 1). • X n (t) decreases by the number of distant neighbors of the newly active vertex that belong to U(t − 1) (since they are transferred to BO(t)).
Dynamics of Y n The value of Y n does not change due to the creation of distant neighbors. At time t, it can only decrease due to an activation of a vertex v (since it is moved to A(t)), and the formation of a household, since all the vertices that make the household of v, were in U(t − 1) ∪ BO(t − 1), and are moved to BH(t). Thus, at each time step, Y n (t) decreases on average by an amount μ = 1 + αc, the expected household size, except at the final step when the residual number of vertices can be smaller than the household size. But this will not affect our asymptotic results in any way, and we will ignore it. Hence, Y n (t + 1) = Y n (t) − ζ n (t + 1) and Y n (0) = n, (4.7) where E (ζ n (t + 1)|X n (t), Y n (t)) = μ. (4.8) Martingale decomposition Using the Doob-Meyer decomposition [22,Theorem 4.10] of X n , (4.6) yields the following martingale decomposition where M X n = {M X n (t)} t 1 is a square-integrable martingale with respect to the usual filtration generated by the exploration algorithm. Let us now define the scaled processes x n (t) := X n ( nt ) n and y n (t) := Y n ( nt ) n .
(4.10) Similar arguments yield where M Y n = {M Y n (t)} t 1 is a square-integrable martingale with respect to a suitable filtration. We write x n and y n to denote the processes (x n (t)) t 0 an (y n (t)) t 0 respectively.

Quadratic Variation and Covariation
To investigate the scaling behavior of the martingales, we will now compute the respective quadratic variation and covariation terms. For convenience in notation, denote by P t , E t , Var t , Cov t , the conditional probability, expectation, variance and covariance, respectively, conditioned on (X n (t), Y n (t)). Notice that, for the martingales M X n and M Y n , the quadratic variation and covariation terms are given by Var i−1 (ξ n (i)), Var i−1 (ζ n (i)), Cov i−1 (ζ n (i), ξ n (i)).

Claim 1
For any t 1, Var t (ζ n (t + 1)) = σ 2 . (4.13) Proof The proof is immediate by observing that the random variable denoting the household size has variance σ 2 .

(4.21)
Proof Observe that and therefore, Thus, and hence Cov t (ζ n (t + 1), η 2 (t + 1)) = O P (n −1 ). Based on the quadratic variation and covariation results above, the following lemma shows that the martingales when scaled by n, converge to the zero-process. Proof Observe that using (4.12) along with (4.13) and (4.14), we can claim for any T 0,

Convergence of the Scaled Exploration Process
Based on the estimates from Sections 4.2, and 4.3, we now complete the proof of Theorem 3.1.
Recall the representations of x n , and y n from (4.10) and (4.11). Fix any 0 T < 1/μ. Observe that Lemma 4.1 immediately yields sup t T |y n (t) − y(t)| P − → 0. (4.28) Next note that δ(x, y), as defined in (4.9), is Lipschitz continuous on [0, 1] × [ , 1] for any > 0 and we can choose this > 0 in such a way that y(t) for all t T (since T < 1/μ). Therefore, the Lipschitz continuity of δ implies that there exists a constant C > 0 such that sup Thus, |δ(x n (t), y n (t)) − δ(x(t), y(t))|du + o P (1) where, by Lemma 4.1 and (4.28), which converges in probability to zero, as n → ∞. Using Grőnwall's inequality [18, Theo- Finally, due to Claim 4 below we note that the smallest root of x(t) is strictly smaller than 1/μ. Also, the convergence in (4.29) holds for any T < 1/μ. This concludes the proof of Theorem 3.1.
The claim below establishes that J < 1/μ.
Proof Recall that μ = (1 + αc) and λ = (1 − α)c. Notice that (3.1) gives a linear differential equation, and the solution is given by The integrand in the left hand side of (4.31) is positive, and tends to ∞ as t increases to 1/μ. Therefore, the integral t 0 e λs (1 − μs) −1+1/μ ds tends to infinity as well. Thus, there must exist a solution of (4.31) which is smaller that 1/μ. This in turn implies that J < μ −1 .
We now complete the proof of Corollary 3.1.

Proof of Theorem 3.2
Define the diffusion-scaled processes X n (t) := √ n(x n (t) − x(t)),Ȳ n (t) := √ n(y n (t) − y(t)), (5.1) and the diffusion-scaled martingales Now observe from (4.10) that Therefore, we can writē X n (t) =M X n (t) + t 0 f n (s)X n (s)ds + t 0 g n (s)Ȳ n (s)ds + o P (1), Based on the quadratic variation and covariation results in Sect. 4.3, the following lemma shows that the martingales when scaled by √ n converge to a diffusion process described by an SDE. Var i−1 (ζ n (i)) Again, (4.10), (4.14) and Theorem 3.1 yields Finally, from (4.10), (4.21) and Theorem 3.1 we obtain The proof then follows by noting the fact that (W 1 , Having proved the above convergence of martingales, we now establish weak convergence of the scaled exploration process to a suitable diffusion process. with B 1 , B 2 being independent standard Brownian motions, and f(t), g(t) and ρ(t) as defined in (3.4).
Proof First we show that ((X n ,Ȳ n )) n 1 is a stochastically bounded sequence of processes. Indeed stochastic boundedness (and in fact weak convergence) of theȲ n process follows from Lemma 5.1. Further observe that for any T < 1/μ, by Theorem 3.1, where f, g are defined in (3.4). Therefore, for any T < 1/μ, Then stochastic boundedness of (X n ) n 1 follows from Lemma 5.1, (5.7), and the stochastic boundedness criterion for square-integrable martingales given in [31,Lemma 5.8].
From stochastic boundedness of the processes we can claim that any sequence (n k ) k 1 has a further subsequence (n k ) k 1 ⊆ (n k ) k 1 such that along that subsequence, where the limit (X , Y ) may depend on the subsequence (n k ) k 1 . However, due to the convergence result in Lemma 5.1 and (5.7), the continuous mapping theorem (see [50,Section 3.4]) implies that the limit (X , Y ) must satisfy (5.6). Again, the solution to the SDE in (5.6) is unique, and therefore the limit (X , Y ) does not depend on the subsequence (n k ) k 1 . Thus, the proof is complete.
Indeed this can be seen by the application of the hitting time distribution theorem in [18,Theorem 4.1], and noting the fact that x (J ) = −1. Now since X is a centered Gaussian process, in order to complete the proof of Theorem 3.2, we only need to compute Var(X(J )). We will use the following known result [1, Theorem 8.5.5] to calculate the variance of X(t).

Lemma 5.3 (Expectation and variance of SDE) Consider the d-dimensional stochastic differential equation given by
where Z(0) = z 0 ∈ R d , the b i 's are R d -valued functions, and the B i 's are independent standard Brownian motions, i = 1, . . . , d. Then given Z(0) = x 0 , Z(t) has a normal distribution with mean vector m(t) and covariance matrix V(t), where m(t) and V(t) satisfy the recursion relations In our case, observe from (5.6) that Denote the variance-covariance matrix of (X(t), Y(t)) by Therefore, the variance of X(t) can be obtained from the solution of the recursion equations 13) and the proof is thus completed by noting that σ yy (t) = σ 2 t.

Clustering Coefficient of Random Geometric Graphs
The clustering coefficient for the random geometric graph was derived in [13] along with an asymptotic formula, when the dimension becomes large. Below we give an alternative derivation. The formula (2.1) is more tractable in all dimensions compared with the formula in [13]. Consider n uniformly chosen points on a d-dimensional box [0, 1] d and connect two points u, v by an edge if they are at most 2r distance apart. Fix any three vertex indices u, v, and w. We write u ↔ v to denote that u and v share an edge. The clustering coefficient for rgg(c, d) on n vertices is then defined by The following proposition explicitly characterizes the asymptotic value of C n (c, d) for any density c and dimension d.
We shall use the following lemma to compute the expectation term in (6.3).
Lemma 6.2 [26] For any x with x = ρ, the intersection volume |B d (0, 2r) ∩ B d (x, 2r)| depends only on ρ and r, and is given by where I z (a, b) denotes the normalized incomplete beta integral given by Observe that the Jacobian corresponding to the transformation from the Cartesian coordinates (x 1 , . . . , x d ) to the Polar coordinates (ρ, θ, φ 1 , . . . , φ d−2 ), is given by

Discussion
We introduced a clustered random graph model with tunable local clustering and a sparse superimposed structure. The level of clustering was set to suitably match the local clustering in the topology generated by the random geometric graph. This resulted in a unique parameter α d that for each dimension d creates a one-to-one mapping between the tractable random network model and the intractable random geometric graph. In this way, we offer a new perspective for understanding rsa on the continuum space in terms of rsa on random networks with local clustering. Analysis of the random network model resulted in precise characterizations of the limiting jamming fraction and its fluctuation. The precise results then served, using the one-to-one mapping, as predictions for the fraction of covered volume for rsa in the Euclidean space. Based on extensive simulations we then showed that these prediction were remarkably accurate, irrespective of density or dimension. In our analysis the random network model serves as a topology generator that replaces the topology generated by the random geometric graph. While the latter is directly connected with the metric in the Euclidian space, the only spatial information in the topologies generated by the random network model is contained in the matched average degree and clustering. One could be inclined to think that random topology generators such as the crg(c, α d ) model may not be good enough. Indeed, this random network model reduces all possible interactions among pairs of vertices to only two principal components: the local interactions due to the clustering, and a mean-field distant interaction. There is, however, building evidence that such randomized topologies can approximate rigid spatial topologies when the local interactions in both topologies are matched. Apart from this paper, the strongest evidence to date for this line of reasoning is [25], where it was shown that the typical ensembles from the latent-space geometric graph model can be modeled by an inhomogeneous random graph model that matches with the original graph in terms of the average degree and a measure of clustering. We should mention that [25] is restricted to one-dimensional models and does not deal with rsa, but it shares with this paper the perspective that matching degrees and local clustering can be sufficient for describing spatial settings.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.