Generation, evolution and exploitation of ASFM

Summary
D3.3 explains how the whole WP3 tool-chain exploits the ASFM. It defines the algorithms that are implemented in D3.4 and that will be implemented in D3.5. This deliverable will evolve to become the documentation of the resulting demonstrators of T3.2, T3.3, T3.4 and T3.5 that are the software D3.2, D3.4 and D3.5.